Monday, December 28, 2009

Basic Voice Over Internet Protocol Data and History

A Brief History of Video Over IP
Video over IP has an interesting history and it is interesting to learn a little bit about what IP video really is. Basically, video over IP simply refers to the way Internet Protocol, also known as IP, is used to send video and audio.
more

Voice over IP for Beginners
VoIP will surely revolutionize the cost and of long-distance voice calling. Companies such as Skype, Vonage, and Lingo are already breaking into the new technology that takes ordinary analog audio data and turns them into digital signals that can be sent over the Internet via IP packets using voice over Internet protocol technology (VoIP).
more

What is Voice Over Internet Protocol?
The technology that most likely runs your existing switchboard and phones is a traditional public switched telephone network (PSTN) service. VoIP's advantage over this is its ability to combine several services, such as voice mail, video, e-mail and conferencing.
more


VoIP (Voice Over IP) Explained
Telephone calls through broadband: this is the future of telephony. Voice Over Internet Protocol (VoIP) technology represents a revolution in the way we communicate. Here's an outline of three of the most common ways that VoIP can be used to make cheap phone calls.

You've probably heard about new technology that allows people to use broadband to make cheap phone calls. Perhaps you already make calls or video-calls yourself from your computer. Whatever you know already, it helps to have a clear, basic grasp of how this exciting new generation of telephone services works and how it can be used.
more

Understanding VoIP Phone Service
Voice over Internet Protocol (VoIP) is a comprehensive identification for a family of communication technologies used for the conveyance of voice and or data communications when routed throughout IP networks such as the Internet or separate packet-switched data networks. Shared terms associated to VoIP may be recognized as: IP Telephony, voice over broadband, broadband phone, Internet telephony, or Broadband telephony.
more

A Comprehensive Guide to VoIP That You Can Understand!
Part One - The two major ways that we communicate today are TDM and Voice over IP (VoIP). I won't get extremely technical other than to define the two types of systems in a general way. TDM is the traditional digital (sometimes analog) communication we have always had. In the past, it has utilized cables separate from the computer network which run out to each phone, device, or end point. VoIP stands for voice over IP and utilizes the Internet Protocol in a computer network to transmit the voice as data across your computer network and the public internet.
more

A Comprehensive Guide to VoIP That You Can Understand!
Part Two - So if you have read Part 1 of Voice over IP is Here! you might be saying to yourself, "VoIP sound great! How does it apply to my business and what can it do for me?" If you aren't asking yourself this question you need to be! As I said in Part 1, Voice over IP is overtaking and will eventually be completely replacing traditional TDM communication. VoIP is here to stay and this is good thing.
more

How Voice Over IP Works
Voice Over Internet Protocol (or VoIP for short) is the latest technology many people are using in addition to, or as an alternative for, their traditional phone service. There are many reasons why customers are flocking to VoIP service providers and away from traditional phone companies. One of these reasons is the lower cost. But before taking advantage of all the benefits that come with VoIP, it's good to know how Voice Over IP works.

How It Works
more

VIDEO
What is VoIP?

A brief introduction to the Voice over IP (VoIP) technology by SigVoice Corporation. This presentation highlights key components (ATA, IP Phones




Voip
Voice over Internet Protocol (VoIP), sometimes called Voice over Broadband, or Internet telephony, is simply a way to use your existing broadband connection to place voice calls over the Internet,

Saturday, December 26, 2009

Your Bluetooth Questions Answered Bluetooth Technology, Security,Increasing Popularity ,Electrical Devices and Their Applications

Your Bluetooth Questions Answered
Bluetooth technology has changed how cell phone users communicate. Those distinctive ear pieces are not just an accessory. It allows cellular users to talk using a hands-free device. But there is probably more to it than you might realize.

For example: did you know that at one time it was considered for wireless Internet instead of Wi-Fi? Many states are considering passing laws requiring all cell phone users to use hands-free devices while driving so to reduce the amount of distractions from trying to drive and talk at the same time. Do you have more questions regarding Bluetooth services? In this article we will address some of the basic questions and concerns regarding Bluetooth Technology.

more


Bluetooth Technolgy, Infared, Electrical Devices and Their Applications Bluetooth And Infared, Electrical Devices

Bluetooth and with new electrical devices being produced every day, the problem of connecting things is becoming more and more complex in nature. The system that comprises computers and other electronics makes use of varieties of wires, cables, etc.


These parts will communicate through light beams, lasers, radio signals, and infrared. The problem however, is the devices and technology is often the connection between each component. Therefore, most electronic systems are not used to their full extent due to the problems and imperfections.
more

Security Of Your Bluetooth Devices
These days, all forms of communication technology face the problem of security and theft of personal details , and 'bluetooth' is no exception to these concerns, nor should it be. Most everybody knows by now that all email programs and networks need protection and security. What users of 'bluetooth' really do need to comprehend is that 'bluetooth' requires the same protection measures as email programs and other communication programs.


The upside for 'bluetooth' users is that the recent breaches-of-security scares, as in all scares, are usually way over – dramatized and blown way out of all reasonable proportions. The reality being told, these issues are simple to control, using several protocols now in place to ensure protection for 'bluetooth' technology
more

Increasing Popularity of Bluetooth
In the world of rapid changing technology, continuously we are bombarded by names such as Bluetooth, wi-fi and TIVO. Technology has become so advance that people only need to press the button for changing the channel and use the technology of Bluetooth and infrared to transform the data.



So are you looking for creative, cost effective methods to distribute rich media content? Here is the solution for you, Bluetooth marketing is an amazing system that uses wireless Bluetooth technology to target your audience at near proximity to your establishment with direct response message.
more

Thursday, December 24, 2009

Understanding Bluetooth and Bluetooth USB Technology

Do You Understand The Bluetooth Technology ?

With every passing month, it seems that more electronic devices are touted as being Bluetooth enabled. And, while many people are excited about the advent of its new products, others are left scratching their heads wondering, "What is Bluetooth?"

Bluetooth mobile wireless technology has become one of the leading technologies for wireless communication world wide. The reason it has become so popular around the globe, in just a few short years since its introduction, is because it allows phones, computers, PDAs and other electronic devices to easily communicate with the other enabled devices nearby. The range of its networking is limited to a short range of about 30 feet.

more


What is Bluetooth - Basic Specifications and Features

What is Bluetooth technology? Many are asking this question despite the gadget being discovered more than a decade ago, in 1994. The technology of wireless Bluetooth is all about short range communication that effectively eliminates the use of wires connecting devices, at the same time maintains high security level.

Bluetooth has turned into an in-demand gadget if only because of its low usage of power as well as cheap cost. Bluetooth specification offers structures for a variety of gadgets to easy connection and communication with one another.

more

What Is Bluetooth, A Description Of Bluetooth Technology

Every day we are seeing more and more electronic gadgets that are advertised as being Bluetooth enabled. This may leave you feeling excited or it may leave you trying to figure out what all of the fuss is about. You may just want to know what is Bluetooth? You may just want a simple description of Bluetooth technology.

Bluetooth mobile wireless technology is fast becoming a leader when it comes to technologies that involve wireless communication. It is becoming all the rage all over the world because in the short time it has been around Bluetooth technology has paved the way for computers, telephones and other electronic gadgets to be able to communicate with other Bluetooth devices that are within range. The current range for Bluetooth wireless technology networking is about thirty feet.

more

The Future of Bluetooth
Because it meets the basic needs of connectivity in close range, Bluetooth has a very bright future ahead of it. Bluetooth is actually the result of initiatives from nine leading communications and computer industry giants, including 3-COM, Sony, Lucent, IBM, Nokia, Microsoft, etc.

Since the forming of the original group, more than 1,800 manufacturers around the world have joined the initiative. According to reports, the Bluetooth technology is expected to be built into more than 100 million devices, with over 670 million enabled Bluetooth devices

more

Understanding Bluetooth Usb

Bluetooth wireless technology nowadays has become very popular if you are looking for a convenient way to perform short-range communication and connectivity between different electronic devices without the hassle of wires and cables.

The technology has become a globally available standard and easy to use because there’s no need for a driver software to be installed. All you need is a Bluetooth USB in the form of adapters and dongles. They are capable of enabling electronic devices that has a USB port to support the Bluetooth protocol.

Currently, a lot of products are available in the market that supports the Bluetooth technology such as Bluetooth cell phone, wireless technology PDAs (Personal Digital Assistants), laptop computers, wireless stereo headset, MP3 players and cell phone headsets.


more


The Benefits Of The Bluetooth Wireless USB Adapter

Bluetooth mobile wireless technology is the clear and simple choice when you need convenient, short-range connectivity and communication between various electronic devices, and all without the hassle of a web of wires and cables. Bluetooth technology is a standard that is globally available and simple to use because driver software does not need to be installed. The Bluetooth wireless USB adapter is making the benefits of Bluetooth technology available to almost any device that has a USB port.

There is a wide array of products that are becoming available on the market that use the Bluetooth wireless technology networking, such as: cellular phones, laptop computers, a wireless technology PDA, a wireless stereo headset, hand-held computers, cell phone headsets and MP3 players. These are just some of the products that commonly have this technology integrated into them and more are being introduced on the market all the time. An enabled USB adapter allows you to add mobile wireless technology to a desktop computer or a laptop computer, that is not equipped with Bluetooth capabilities.

more

Sunday, December 20, 2009

Key Learning Points of Bluetooth

Author: Mark Allen

Bluetooth is easily the best in wireless handheld technology. When it comes to learning, Bluetooth can get quite complicated. To help you, you'll find the key learning points of Bluetooth below:

Go here and see the newest Bluetooth Headsets:

http://stores.channeladvisor.com/socaltel/Items/BLUEV510?

1. Bluetooth is an energy efficient, low overhead communication protocol that's ideal for interdevice communications.

2. Unlike infrared, Bluetooth doesn't require a line of sight.

3. Depending on the implementation, Bluetooth can have a range of up to 100 meters.

4. The specification of Bluetooth consists of a Foundation Profile Document and a Foundation Core Document.

5. The protocol stack for Bluetooth consists of core protocols, cable protocols, and even adapted protocols.

6. The transmitter operates around the 2.4 GHz frequency band.

7. The data channel will change frequency, or hops, 1,600 times in a second, between the 79 allocated channels in the ISM band.

8. Bluetooth utilizes a spread spectrum frequency hopping RF characteristic to ensure that independent networking operates when the other devices are in range.

9. A piconet is formed when one or more devices open up a channel of communication.

10. A piconet can have a master and up to seven slaves.

11. Communication of the interdevice is based on the concepts of channels.

12. All Bluetooth devices are capable of transmitting voice.

13. The channel has a total capacity of 1 MB per second.

14. There are two types of channels with Bluetooth - SCO (Synchronous Connection Oriented) and ACL (Asynchronous Connectionless).

15. The SCO channels are time oriented, and are therefore primarily used for transferring time critical data such as voice.

16. ACL channels are normally used for communicating data.

17. Data contained in a packet can be up to 2,745 bits in length.

18. In a single piconet, there can be up to three SCO links containing 64,000 bits a second each.

19. To avoid collision and timing problems, SCO links are reserved slots that are set up by the master.

20. The masters can support up to three SCO links with one, two, or three slaves.

21. The slots that aren't reserved for SCO links can be used as ACL links.

22. The LMP (Link Management Protocol) will handle link level security, error corrections, and the establishment of communications links.

23. The LMP packets will have priority over user packets that originate and form the L2CAP layer.

24. The L2CAP layer will ensure an acceptable quality of service.

25. No more than one ACL link can exist at the L2CAP layer.

Go here and see the newest Bluetooth Headsets:

http://stores.channeladvisor.com/socaltel/Items/BLUEV510?

About the Author:

Mark is the Chief Sales Officer of SCT Product Sales.

Mark is giving away FREE articles on Bluetooth Technology.

Visit:
http://www.simplyusedphones.com/articles.html

Email: myoung@socaltel.com.

Article Source: Key Learning Points of Bluetooth

Saturday, December 19, 2009

Making Life Easier With Bluetooth Technology

Author: Mark Allen

Bluetooth is easily the best in wireless handheld technology. When it comes to learning, Bluetooth can get quite complicated. To help you, you'll find the key learning points of Bluetooth below:

Go here and see the newest Bluetooth Headsets:

http://stores.channeladvisor.com/socaltel/Items/BLUEV510?


1. Bluetooth is an energy efficient, low overhead communication protocol that's ideal for interdevice communications.

2. Unlike infrared, Bluetooth doesn't require a line of sight.

3. Depending on the implementation, Bluetooth can have a range of up to 100 meters.

4. The specification of Bluetooth consists of a Foundation Profile Document and a Foundation Core Document.

5. The protocol stack for Bluetooth consists of core protocols, cable protocols, and even adapted protocols.

6. The transmitter operates around the 2.4 GHz frequency band.

7. The data channel will change frequency, or hops, 1,600 times in a second, between the 79 allocated channels in the ISM band.

8. Bluetooth utilizes a spread spectrum frequency hopping RF characteristic to ensure that independent networking operates when the other devices are in range.

9. A piconet is formed when one or more devices open up a channel of communication.

10. A piconet can have a master and up to seven slaves.

11. Communication of the interdevice is based on the concepts of channels.

12. All Bluetooth devices are capable of transmitting voice.

13. The channel has a total capacity of 1 MB per second.

14. There are two types of channels with Bluetooth - SCO (Synchronous Connection Oriented) and ACL (Asynchronous Connectionless).

15. The SCO channels are time oriented, and are therefore primarily used for transferring time critical data such as voice.

16. ACL channels are normally used for communicating data.

17. Data contained in a packet can be up to 2,745 bits in length.

18. In a single piconet, there can be up to three SCO links containing 64,000 bits a second each.

19. To avoid collision and timing problems, SCO links are reserved slots that are set up by the master.

20. The masters can support up to three SCO links with one, two, or three slaves.

21. The slots that aren't reserved for SCO links can be used as ACL links.

22. The LMP (Link Management Protocol) will handle link level security, error corrections, and the establishment of communications links.

23. The LMP packets will have priority over user packets that originate and form the L2CAP layer.

24. The L2CAP layer will ensure an acceptable quality of service.

25. No more than one ACL link can exist at the L2CAP layer.

Go here and see the newest Bluetooth Headsets:

http://stores.channeladvisor.com/socaltel/Items/BLUEV510?

About the Author:

Mark is the Chief Sales Officer of SCT Product Sales.

Mark is giving away FREE articles on Bluetooth Technology.

Visit:
http://www.simplyusedphones.com/articles.html

Email: myoung@socaltel.com.

Article Source: Key Learning Points of Bluetooth

Thursday, December 17, 2009

Bluetooth for connection

Author: Darren Evans

Bluetooth: What it is and How it Works

I know many experienced computer users who never give a thought to Bluetooth. “Oh, yeah, I think that’s built into my laptop but I never use it” is a common refrain. Initially touted as the technology that would finally free us from the horrors of multiple tangled cables and cords, Bluetooth didn’t catch on as quickly as expected. Until recently, there just weren’t that many useful (with the emphasis on “useful”) Bluetooth devices available – at least, not for desktop computing. Users of handheld computers (such as my iPaq) adopted the technology more quickly, as it allowed us to easily attach portable keyboards, headsets, printers, etc. to our portable devices (which often don’t have a bunch of connection ports like desktops and laptops do). Bluetooth-enabled cell phones allow you to connect a PDA or portable computer to the Internet through them.

Bluetooth was designed to be the basis of the Personal Area Network (PAN) – a way for devices within relatively close proximity to communicate wirelessly with one another. The range for Bluetooth transmissions varies from about 1 meter up to 100 meters, depending on the power class of the device. Thus, the most powerful (Class 1) can communicate over a distance of more than 300 feet, similar to a typical wi-fi network.

Like 802.11b and g, Bluetooth transmits over the 2.4 GHz radio frequency. Its speed is limited to about 1 Mbps (far slower than wi-fi, but still roughly equivalent to a typical broadband Internet connection). It uses LMP (Link Manager Protocol) to handle the connections between devices.
Bluetooth Security Issues

Bluetooth can operate in one of three security models:

1. is non security.
2. provides security at the service level, after the channel is established.
3. provides security at the link level, before the channel is established.

Each Bluetooth device has a unique 48-bit device address. The authentication scheme is challenge-response, using symmetric keys, and encryption is done with a key that can be up to 128 bits (negotiated by the communicating devices, with each device having a maximum key length defined). A 128 bit random link key handles security transactions between two or more devices.

When two Bluetooth devices establish a communications channel, they both create an initialization key. A passkey or Personal Identification Number is input and the inititalization key is created, and the link key is calculated using it. Then the link key is used for authentication.

The first security concern is the passkey or PIN. As with any key, long keys are more secure than short ones. If a hacker is able to discover the passkey, he can calculate possible initiation keys, and then from that, calculate the link key. Making the passkey long will make it much harder to accomplish the first step.

The initial key exchange takes place over an unencrypted link, so it is especially vulnerable. It’s best if this part of the BT device pairing process takes place in a more physically secure location (that is, where there are not likely to be any lurkers with BT devices who could intercept the communications). A hacker could record transmissions sent over the BT frequency and use them to recreate the PIN.

Rather than using the same fixed passkey all the time, it should be changed frequently (how frequently depends on the types of devices and the required security level).

Link keys can be combination keys or unit keys. Best security practice is to use combination keys instead of unit keys. When you use a unit key, you must use the same key for all secure transactions, and the key has to be shared with other trusted devices. This means any trusted device can potentially access traffic with other trusted devices using this key.

It’s possible to use the Bluetooth address to identify a particular device (and associated user) and log those transactions, which can create privacy concerns.
Why Does Bluetooth Security Matter?

Many Bluetooth users only use the technology to connect a wireless headset or similar device to their portable computers, and they may wonder why security is a big deal. Implementing security, even for these types of device pairings, can prevent an unauthorized user from using the headset.

However, another use of Bluetooth is to create a temporary computer network. For example, several people in a meeting room can connect their Bluetooth-enabled laptops to each other to share files during the meeting.

When you use Bluetooth to create a temporary network, it is usually an ad hoc network; that is, computers communicate directly with each other rather than going through a wireless access point (WAP). This means you have no centralized point of security control, as you do with a WAP (for example, you can configure a WAP to use MAC address filtering and other built-in security mechanisms). Thus, security becomes a major concern because you can be exposing important data stored on your laptop to others on the Bluetooth network. Remember that the range for class 1 Bluetooth devices can be more than 300 feet – far enough so that in some locations, the BT equivalent of the wi-fi “war driver” may be able to establish a link with your computer even though not within your sight.

Another special concern is the security of
Bluetooth mobile phones. These phones may have information stored on them such as the addresses and phone numbers of contacts, calendar information and other PDA-type data. Hacking into these phones using Bluetooth is called bluesnarfing. Newer mobile phones and software upgrades for older phones can patch this vulnerability.

A related hacking technique is called bluebugging, and it involves accessing the phone’s commands so that the hacker can actually make phone calls, add or delete contact info, or eavesdrop on the phone owner’s conversations. This vulnerability, too, is being addressed by phone manufacturers. Thus, if you own a BT-enabled phone, it’s important to keep the software updated or upgrade to the latest phone models frequently.

Bluetooth devices can also be targets of Denial of Service (DoS) attacks, typically by bombarding the device with requests to the point that it causes the battery to degrade.

Finally, there are “cell phone worms” such as Cabir that can use the Bluetooth technology to propagate to other BT devices. Cabir targets phones that use the Simbian OS.

The relatively short range of most Bluetooth devices helps to ameliorate the risk of most of these security issues. For example, to practice bluesnarfing or bluebugging against a BT phone, the hacker would typically need to be within about 10 meters (a little less than 33 feet) of the target phone.

Bluetooth Headsets

About the Author:

I live and work in the South East of England I am married with 4 children.
I am the publisher of several websites my latest being
Cash Advance & New Build & plot Search

Article Source: ArticlesBase.com - Bluetooth for connection

Wednesday, December 16, 2009

Bluetooth Technology

Author: Bushra Bashir

Bluetooth Technology

What is Bluetooth?

Bluetooth technology is a type of the wireless technology that eliminates the need for the number of inconvenient cables and devices that are used to connect the computers, mobile phones, digital cameras, handheld devices and new digital appliances. Bluetooth enables the users to connect to a wide variety of telecommunication and computing devices easily, without cables.

It makes rapid ad hoc connections, automatic unconscious connections between two or more digital devices. Bluetooth provides the opportunity of using the mobile data in different applications. Bluetooth makes wireless communication between the two devices in a localized area of a room of office or home very easily. Bluetooth technology uses radio-based links and all the connections between the devices and invisible and instantaneous.

By Bluetooth technology your laptop can send print request to a printer in your next room. Bluetooth is actually a standard for wireless communication between the devices in a relatively small area and it is therefore works fine in the personal area network (PAN) using radio frequency.

Any two devices that follow the Bluetooth standard can communicate with each other. A number of the Bluetooth devices like digital camera, mobile phone and handheld pc can form a network. You can send emails to your mobile phones from your laptop without any physical connect between your laptop and your mobile phones.

Features of Bluetooth technology


• Bluetooth technology uses radio waves for communication in 2.4 GHz


• It supports multipoint communication not just point to point.


• Bluetooth works in a small area of 10-15 meters.


• Bluetooth offers speed of 1-2 Mbps.


• Bluetooth chipsets are less expensive though more expensive than IrDA.

How Bluetooth Technology Works

Bluetooth is a high speed wireless link technology that uses the radio waves. It is designed to connect the mobile phones, laptops, hand held devices and portable equipments with almost no work by the end users. Unlike infrared Bluetooth does not require line of sight between the connecting units. Bluetooth technology is a modified form of the current Wireless LAN technology and it’s more acceptable for its relative small size and low cost.

The current circuits are contained on a circuit board of 0.9 cm square and a much smaller single chip version is in development and soon it will be in use. The cost of the Bluetooth device is expected to fall rapidly. Bluetooth chip has to be equipped in many devices. In Bluetooth technology, small and inexpensive transceivers have been placed in the digital devices. The radio waves operate at 2.45 Ghz band on the Bluetooth devices. Bluetooth supports the data speed up to 721 Kbps and 3 voice channels. The Bluetooth chip can either be built into the devices or it can be uses as an adapter. In computer it can be used with the USB port. Each Bluetooth device has a 48 bit address from the IEEE 802 standards and the Bluetooth connections can be either point to point or multipoint. Bluetooth range is 10 meter but it can be extended up to 100 meters by increasing the power.

Bluetooth devices are protected from the external interference because they change their frequency up to 1600 times in a second. Bluetooth radio technology provides the bridge between the existing data network. Bluetooth guarantees security at the bit level and the authentication is controlled by the end user by using 128 bit key. An important face of the Bluetooth technology is that it instantly forms a network when two or more devices come closer in the range of each other.

Bluetooth Technology Benefits

Bluetooth technology is a convenient choice of communication in a wire free, short range environment. Bluetooth is a globally available standard for connecting the devices like mobile phones, digital cameras, laptops, MP3 Players, cars, stereo headsets etc. Bluetooth enable devices do not need to install any drivers. The key benefits of the Bluetooth wireless technology are its built-in-security, low cost, easy of use, robustness, and ad hoc networking capabilities.

The Bluetooth wireless technology is available globally. Many manufactures from the different companies are busy to implement the technology in their products. Bluetooth technology operates in the 2.4 Ghz, one of the unlicensed, industrial and scientific radio band. Bluetooth technology is a free of charge service but your mobile phones set should support the GSM and CDMA technology.

Today mobile phones have built in capabilities and Bluetooth functionalities in them. Bluetooth technology is available in the different range of the devices like mobile phones, automobiles, medical devices, industries and enterprises etc.

Due to the key features of the Bluetooth technology like low power consumption, low cost and wireless features make it more popular. Bluetooth technology does not require any fixed infrastructure and it is very simple to install and setup.

No wires are required to connect the Bluetooth devices. You can connect to other Bluetooth enabled devices anytime if they come in your range. Bluetooth wireless technology is widely supported and is secure wireless standard today. Bluetooth devices has built-in security features such as 128 bit encryption and pin code authentication when Bluetooth devices identify themselves they use the pin code when they first time connect.

Bushra Bashir


http://www.networktutorials.info


About the Author:

Bushra Bashir

http://www.networktutorials.info

Article Source: Bluetooth Technology

Tuesday, December 15, 2009

Understanding the Magic of Bluetooth Technology

Author: Jon Arnold

Bluetooth technology is a low-power, low-cost wireless technology for short-range radio communication between various fixed and/or portable electronic devices such as mobile phones, laptops, PDAs, cars, stereo headsets, MP3s, digital cameras, PCs and computer peripherals. Bluetooth also refers to the standard communication protocol (IEEE 802.15.1) specifically designed for this kind of short-range wireless communication.

The core of Bluetooth technology lies in a low-cost 9 mm x 9 mm microchip that functions as a short-range radio link when inserted into an electronic device, making the device Bluetooth-enabled. Wireless communication between various bluetooth-enabled devices takes place via these radio links, instead of via cables as used in normal networking. Since Bluetooth technology uses radio signals, which are omni-directional and can be transmitted through walls and other obstacles, Bluetooth-enabled devices don't need to be in line of sight or be pointing at each other.

Bluetooth radio modules operate in the open, unlicensed ISM (industrialscientificmedical) spread-spectrum 2.4 GHz frequency band, divided into 79 channels separated by 1 MHz each. To avoid interference from other signals, the Bluetooth signal hops to a new channel every time it transmits or receives a data packet, making Bluetooth connection robust and secure. The communication range of Bluetooth technology varies from 1 m to 100 m, depending upon the maximum power permitted (1 mW to 100 mW). Because of this channel hopping, there should not be a consistent problem with other devices using the 2.4 Ghz frequency band, such as old cordless phones.

Each Bluetooth-enabled device can simultaneously communicate with up to seven other devices within a single personal area network, called a piconet. Each device can simultaneously belong to several piconets. Each device negotiates with each other via a defined device name so that each device can keep track of who it is communicating with. The device name to use when you are setting up your Bluetooth device is typically cleared stated in the accompanying device documentation.

Bluetooth technology offers built-in security with 128-bit encryption and PIN code authentication. When Bluetooth products identify themselves, they use the PIN code the first time they connect, thereafter staying securely connected.

Practical Applications of Bluetooth Networking

Some of the popular applications of Bluetooth technology are in wireless networking between a mobile phone and a laptop/desktop, between a mobile phone and a hands-free headset, between PCs in a restricted space and between the input and output devices of a PC (e.g., mouse, keyboard, printer). Bluetooth technology can also be used to transfer files, images and MP3 files between mobile phones or between MP3 players/digital cameras and computers.

Limitations of Bluetooth Technology

Short communication range (up to 100 m) is the greatest limitation of Bluetooth technology. Also, the data transfer rates are much lower compared to other wireless communication technologies. Susceptibility to interference from other devices operating in the 2.4 MHz band, notwithstanding adaptive frequency hopping, is another limitation. The Bluetooth technology is still not fully developed, so there is plenty of room for improvement.

Bluetooth-Enabled Devices

The Bluetooth wireless technology specification is available free-of-charge to Bluetooth member companies around the world. Many companies are interested in making their devices Bluetooth-enabled in order to avoid the clutter of wires with seamless connections and offer simultaneous transmission of data and voice as in hands-free talking.

Bluetooth technology is commercially available in a wide range of applications such as mobile phones, automobiles, medical devices, play stations and many more.

About the Author:

Jon is a computer engineer who maintains many websites to pass along his knowledge and findings. You can read more about Bluetooth technology and applications at his web site at http://www.bluetooth-explained.com/

Article Source: ArticlesBase.com - Understanding the Magic of Bluetooth Technology

Sunday, December 13, 2009

How Bluetooth Workings?

Author: christian abad

Bluetooth devices will normally operate at 2.4 GHZ in the license free, globally available ISM radio band. The advantage to this band includes worldwide availability and compatibility. A disadvantage to this however, is that the devices must share this band with other RF emitters. This includes automobile security systems, other wireless devices, and other noise sources, such as microwaves.

To overcome this challenge, Bluetooth employs a fast frequency hopping scheme and therefore uses shorter packets than other standards within the ISM band. This scheme helps to make Bluetooth communication more robust and more secure.

Frequency hopping Frequency hopping is basically jumping from frequency to frequency within the ISM radio band. After a bluetooth device sends or receives a packet, it and the device (or devices) it's communicating with hop to another frequency before the next packet is sent. This scheme offers three advantages: 1. Allows Bluetooth devices to use the entirety of the available ISM band, while never transmitting from a fixed frequency for more than a short period of time. This helps insure that Bluetooth conforms to the ISM restrictions on the transmission quantity per frequency. 2. Ensures that any interference won't last long. Any packet that doesn't arrive safely to its destination can be resent to the next frequency. 3. Provides a base level of security as it's very hard for an eavesdropping device to predict which frequency the Bluetooth devices will use next.

The connected devices however, must agree upon the frequency they will use next. The specification in Bluetooth ensures this in two ways. First, it defines a master and slave type relationship between bluetooth devices. Next, it specifies an algorithm that uses device specific information when calculating the frequency hop sequences.

A Bluetooth device that operates in master mode can communicate with up to seven devices that are set in slave mode. To each of the slaves, the master Bluetooth device will send its own unique address and the value of its own internal clock. The information sent is then used to calculate the frequency hop sequences.

Because the master device and each of the slave devices use the same algorithm with the same initial input, the connected devices will always arrive together at the next frequency that they have agreed upon.

As a replacement for cable technology, it's no wonder that Bluetooth devices are usually battery powered, such as wireless mice and battery powered cell phones. To conserve the power, most devices operate in low power. This helps to give Bluetooth devices a range of around 5 - 10 meters.

This range is far enough for wireless communication but close enough to avoid drawing too much power from the power source of the device.

About the Author:

Check my new recliners chair and electric recliner chairs web pages.

Article Source: ArticlesBase.com - How Bluetooth Workings?

Saturday, December 12, 2009

Bluetooth Technology in Operation and Their Profiles

Author: James Murray

The networking standards of Bluetooth will transmit data via low power radio frequency. Bluetooth communicates on a 2.45 GHz frequency. This very band of frequency has been set aside by international agreement for the use of industrial and medical devices.

Many devices that you already known and use take advantage of this frequency band. Garage door openers, baby monitors, and the next generation of mobile phones all use this frequency within the ISM band. Ensuring that Bluetooth and the other devices do not interfere with each other is a crucial part of the design process.

One of the ways Bluetooth will avoid interfering with other electronic devices is by sending out weak signals of around 1 mw. In comparison, even the most powerful of cell phones can transmit a signal of 3 watts.

The low power signals will limit the range of a Bluetooth device to around 32 feet, which cut the chances of interference between your computer and other electronic devices. Even though it has low power, Bluetooth does not require a line of sight between the communicating devices. The walls in your home will not stop the signal, making it great for rooms throughout the house.

Bluetooth can connect 8 devices at the same time. With each of those devices on the same radius, you may think they would interfere with each other, although it is very unlikely. Bluetooth utilizes a technique known as low frequency hopping, which makes it harder for more than one device to transmit on the same frequency at the same time.

With this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, which change from one another

on a regular basis.

In the case of Bluetooth, the transmitters will change frequency 1,600 times or more every second, meaning that more devices can make full

use of the radio spectrum. Since every transmitter of Bluetooth will use spread spectrum automatically, it is very unlikely that two

transmitters will be on the same frequency at the exact same time.

When the Bluetooth devices come within close range of each other, an electronic conversation will occur to determine whether or not they have data to share or whether one needs to take total control. The user does not have any buttons to press or commands to give, as the conversation will occur automatically.

Once the conversation has occured, the devices will form a network. Bluetooth devices will create a PAN (Personal Area Network) or piconet that may fill a room. Once the piconet has been established, the devices will randomly hop in frequencies.

Bluetooth technology profiles will describe how the technology is used. Profiles can be best described as vertical slices through the protocol stack. It will define options in each protocol that are mandatory for the profile.

The profile will also define the parameter ranges for each protocol. The concept of the profile is used to decrease the risk of interoperability problems between the different products. These profiles will not normally define any additions to the Bluetooth specification, which is why you can add new profiles where you need them. The Bluetooth underlying technology is the same, only the specific method that it's used is defined.

Generally speaking, all profiles of Bluetooth are based on the GAP (Generic Access Profile). There are many profiles that fall in the GAP category.

a) AVRCP, Audio/Video Remote Control Profile


b) ESDP, Extended Service Discovery Profile


c) CIP, Common ISDN Access Profile


d) PAN, Public Area Network Profile


e) HCRP, Hardcopy Cable Replacement Profile


f) GAVDP, Generic Audio/Visual Distribution Profile


g) A2DP, Advanced Audio Distribution Profile


h) VDP, Video Distribution Profile


i) HID, Human Interface Device Profile

To put it another way, usage models will describe Bluetooth device applications and the associated profiles that are used. The usage model focuses mainly on three categories; voice/data access points, peripheral interconnects, and PAN (Personal Area Networking).

The voice and data access points involve connecting computing devices to communicating devices through a wireless link. This way, data can be transferred in a wireless manor, without the need of cables or other types of connectivity.

PAN is another very important usage model with strong appeal to business customers. Bluetooth networks are easy to set up in virtually any type of environment. An example would be meeting others at a trade show.

Instead of having contact information beamed via infrared, business cards can quickly and easily be transferred via Bluetooth wireless. The fact is that many documents can be exchanged this very same way, making the uses and possibilities virtually endless.

The Bluetooth profile is very important to the specification, as it enables you to do so much more. You can use peripherals and devices with the profiles, and virtually anything else that you decide.

As Bluetooth expands and gets bigger and better, you can count on the profiles to expand and get even more functions. If you have experience with Bluetooth profiles, you should know exactly what they are and what you can do with them. If not, all you need is a Bluetooth device, and a vivid imagination.

About the Author:

James Murray is a successful writer and online gambling expert providing valuable tips and advice for those interested in gambling and online gambling strategies. His numerous articles found on the Internet ,provide useful and factual gambling information and insight. Some of his websites are http://www.casinospokerrooms.com,/ http://www.bingosbingos.com,/ http://www.top-sportsbook.ca/

Article Source: Bluetooth Technology in Operation and Their Profiles

Wireless Networks and Internet Protocol Communications Data

Wireless Networks Benefits to Communities
A strong wireless network can have a very positive effect on virtually any community which has one in place. The benefits go way beyond just simple entertainment, a strong wireless network ensures that even residents on a tight budget can remain in contact with friends and loved ones and it can provide an incredible resource for the education
more

Wireless Application Protocol
What is WAP for? There’s a lot of information and resources available on the Internet, and as companies take the Web more seriously, so we can do more every day. But if the only access is via your PC, then that’s hardly convenient.
more

Internet Protocol Communications in a Medical Practice
Did you know that good-old traditional business phone system switch is quickly becoming replaced by software base IP PBX systems? In fact, sales of new IP-PBX systems surpassed traditional PBX switches in 2005, and IP Telephony products sales will represent 90% of the new phone sales by 2010 -- only a few years away.
more

Data Communication – the Language of the Future
Data communication is sometimes considered a sub-discipline of telecommunications, computer science, IT and computer engineering, which is a primary reason why people who have education, expertise and interests in these disciplines may ultimately pursue careers in data communications.
more

Bluetooth: The Need For Short-Range Communication

Author: Victor Epand

YES! Bluetooth is very much viable for the future to come. One of the prime reasons why forums are pushing the proposal for Bluetooth is that today there is the lack & the need for short-range communication over wireless medium - and mind you an efficient & stable connection that lasts. Comparing solutions available today - there is the infra red technology which does not have good bandwidth capability and also suffers from the problem of range line of sight problems.

The next available option is indoor wireless networking through radio frequency (2Ghz etc)sample solutions exist from vendors like Lucent(wavelan/orinoco)this option has a downfall of needing extensive setup (infrastructure for base stations) and is VERY expensive. The range offered is also sometimes considered as 'extra' inconvenient, thus not allowing one to manage & control interference from nearby base stations.

Bluetooth looks to overcome all of the above problems by providing for a cheap, efficient, fast, no-futz short-range wireless solution!

The Jabra BT150 (retailing between $25 and $30 in high street phone shops) is a good buy. It's either the same size or smaller than the H500, cheaper, and also in black. It's only suitable for Bluetooth version 1.1 or higher.

It's the only one I could find, but its another for you to consider. Downside to the BT150 is 2 hours less talk time and 20 hours less stand by time than the H500. You could determine how much of your phone you use, and make a decision if the extra amount of money is worth the talk/stand by time.

The good news is that it doesn't matter how you received the text message; as long as it is on your phone as an SMS message (text message), you can forward it to someone else. Yes, you can copy the text within a text message, provided you have a device that allows you to copy text (most phones these days allow you to do this).

Once in the body of the text message, choose the Options, which should have an option to Copy. When you are in the Note, choose Options and then choose Paste. Whenever you choose the Copy option, the text will go onto the Clipboard (just like with Windows) and this will allow you to Paste the text somewhere else. If you tell me what type of phone you have, I can give you specific instructions on how to do this.

The cars that are now coming equipped with Bluetooth allow you to have a Bluetooth connection between your wireless phone and your car (through the phone and car's Bluetooth connection). If you have a compatible phone (and are on a compatible wireless network - that is, compatible with the car), you can use the car's console to dial your phone, access your address book, make and receive calls, etc. You won't need a Bluetooth headset in order to use the car's features, but you do need a compatible phone.

I'm not sure what type of car you bought, but here is an example from Audi:

Your Audi vehicle may be equipped with a phone preparation utilizing a Bluetooth interface to enable hands-free functionality (compatible mobile phones sold separately). You will need a Bluetooth - enabled mobile phone in order to utilize this function. Not all Bluetooth - enabled mobile phone models are compatible with Audi's phone preparation. Contact your local Audi dealer for the latest listing of compatible phones. Audi recommends the use of the Audi phone cradle (sold separately) with your mobile phone while operating this vehicle.

Here is some information on other cars that have the same type of system:

Plug a sleek new system-compatible phone into your car for instant integration with the Hands-Free Communication System or use the available Bluetooth interface to enjoy the benefits of hands-free calling while keeping your phone in your pocket, your purse, or wherever it's convenient.

With the system engaged, you can keep both hands on the wheel while communicating, for easier, safer, more convenient driving.

With your phone docked in the Multi-Handset Interface cradle: The system will access and display your phonebook. Your phone's battery charges automatically. Calls are clearly delivered through your audio system. The audio system automatically mutes the radio or pause's the CD during calls. You can control calls via your multifunction steering wheel or with the optional voice control system. To make hands free communication even easier, initialize your approved phone with the Bluetooth interface; the system will automatically recognize your phone every time you enter the vehicle.

About the Author:

Victor Epand is an expert agent for BuyCellularPhones.info, a huge cellphone superstore featuring great prices and rebates on cellphones including Motorola, Samsung, Nokia, Audiovox, LG, RIM Blackberry, Sanyo, Sony Ericsson, and others.

Article Source: Bluetooth: The Need For Short-Range Communication

Thursday, December 10, 2009

10 Things You Should Know About VoIP (voice Over Internet Protocol)

Author: Laura Rucker

Learn from other businesses who have already been through a VoIP roll out. Standing over someone else's shoulders, so to speak, will help you avoid their mistakes and glean tips that can make your own deployments go more smoothly.

The following 10 tips will reduce the amount of time, money and headaches that can occur during a VoIP roll out:

  • BUY TIME: Anticipate problems even if it appears the VoIP deployment will be a smooth one. Things don't always happen as planned, so add a buffer into your plans. For example, one business ordered an OC-3 circuit from their carrier, which took an extra six months to install. The business had to get by with a DS-3, which was a lot less bandwidth than they wanted.

  • GET EVERYBODY ON BOARD: Assign business-unit leaders to oversee the VoIP project team so they know the details and can communicate them to their employees. This reduces the switchover time as well as reduces user training.

  • KNOW WHAT YOU'VE GOT: Educate yourself on what your business' network infrastructure consists of. Find out what hardware you have and whether it will support technology that can improve voice quality.

  • TEST PHONE COMPATIBILITY: Make sure all the desktop phones have power and switching (PAS) capabilities and can be powered via standard Power over Ethernet (PoE, 802.3af is the IEEE standard). The phones also need to have built-in LAN switch ports, which will enable a single LAN cable to support a desktop PC and IP phone. If Gigabit Ethernet is also required, be sure the IP phone port has 1000Mbps.

  • BANDWIDTH CONTROL: If testing shows a need to increase bandwidth, consider upgrading from Fast Ethernet to Gigabit Ethernet. Even if an upgrade seems like too much right now, forecast if an increase in network traffic will be on the horizon which could warrant such an upgrade.

  • USE THE RIGHT CODEC: To reduce the amount of bandwidth VoIP service requires, businesses have a selection of codecs to choose from that take the voice stream and encode it for transmission over network wires. While codecs can be as little as 8Kbps or as much as 64Kbps, businesses need to listen to a variety of them to determine which ones produce acceptable quality. If bandwidth is limited, it's important to choose the codec that is the most acceptable and uses the least amount of bandwidth.

  • DIALING 911: It's important to know emergency personal can't trace calls placed on a VoIP service. While the VoIP knows its IP address, it doesn't know its physical location. The phone could be anywhere and moved from one network jack to another. Because of this, emergency personnel could be sent to the wrong place. To avoid this problem, it's recommended you tie phones up to an analog phone line if you can.

  • SIMPLIFY TRAINING: Large VoIP roll outs require large numbers of users that must be trained to use the new phones. Documentation is very important. Using pictures with instructions, such as, "Here's your network connector, here's the back of your phone, now plug them into each other." Also, having a list of FAQs helps reduce help desk calls.

  • GATEWAY TO SAVINGS: Consider limiting the deployment of IP phones to desktops, leaving other areas such as fax machines, hallways, loading docks or exam rooms with low-cost analog handsets with analog-to-IP gateways, for connecting the traffic to the VoIP network.

  • CONSIDER SOFT PHONES: Use these for certain types of employees, such as tech-savvy users or those who regularly work from different locations, i.e., branch offices, home offices or on-site with customers.

  • REMOTE CONTROL: Determine how remote management applies to your IP PBX. Can the same tools be used on your IP PBX or call server to remotely manage, reboot and configure mail, files, and print servers?

In summary, plan ahead when considering a roll out of VoIP technology at your place of business. Nothing is more of a killer to a business, than wasting time and, most importantly, money on poorly planned ideas. Do your homework!

About the Author:

For more information about getting the lowest price on a VoIP, T1 Line, Ethernet, MPLS or OCx Circuit, each with a Low Price Guarantee, from over 30 first-tier and top-tier carriers, from the agency that won the 2008 "Carrier of the Year" award at the National Telecom Association conference, please visit http://www.usavetelecom.com

Article Source: 10 Things You Should Know About VoIP (voice Over Internet Protocol)

Monday, December 07, 2009

Wireless Networks Benefits to Communities

Author: Amy Nutt

A strong wireless network can have a very positive effect on virtually any community which has one in place. The benefits go way beyond just simple entertainment, a strong wireless network ensures that even residents on a tight budget can remain in contact with friends and loved ones and it can provide an incredible resource for the education of students of all ages; from entering school all the way through graduate school.

Staying Safe

Communities that have a municipal wireless network in place can have all emergency service personnel online from right inside their vehicles. Laptops on board in police cruisers, ambulances and fire trucks give emergency personnel access to detailed maps of the city and will allow transmission of photos of suspected criminals and detailed layouts of buildings and houses. The laptops will also allow for silent communication between officers and other emergency personnel via e-mail and instant messaging. Wireless cameras will also allow real time footage to be transmitted from emergency vehicles directly back to the station.

Education

Community wireless networks will often allow for wireless internet connection, free of charge to schools, colleges and libraries opening up the world's largest resource - the internet - to classrooms and students. This will allow younger students to experience activities and get knowledge that may not have been available to them for years to come, all while keeping the expense for hard copy resources down. Books, streaming videos, educational games and activities all become available to teachers and students with little more than the click of a few buttons. What would have taken hundreds of dollars worth of books to teach can now be imparted to young students on a few cents worth of copy paper.

High school and college age students also get big benefits from the ability to log onto the internet. Research papers and doctoral thesis's can know be researched in much less time with direct access to literature that would have only been available through a University library otherwise. Students won't have to worry about hunting down volumes that may be needed by other students and competing for time with the materials that they need, regardless of day or time, even if every single student needs the same resource it will be available via the internet.

Some municipal wireless networks are even offering a wireless internet connection for students to access at home after school hours. This means that the education can be continued beyond the school walls. Students won't be limited to learning from this tremendous resource just during school hours - even if their family couldn't otherwise afford a wireless connection these students would be able to continue their education at home after school hours.

Keeping in Contact

E-mail and instant messaging are incredible ways to stay in touch, even if you have to pay for a monthly wireless service to access the internet, there are many free e-mail and instant messaging services available for you to stay in contact with your loved ones from around the world; send personal messages, greeting cards, pictures and videos, for free, and it doesn't end there. VoIP or voice over internet protocol is becoming a more and more popular way of staying in touch. All VoIP takes is some simple software, a microphone and some speakers and with it you can eliminate your standard phone service. The initial investment for VoIP is very minimal, many computer users already have microphones and speakers, and using it is just a simple as using your regular telephone. VoIP lets you talk to people anywhere in the world for free by transmitting your voice over the internet connection.


The benefits of a strong wireless network to communities can certainly change our lives for the better - a strong network can help educate our children, keep our streets safe and keep us in constant contact with all of our friends and loved ones.

About the Author:
Know that repairing a computer or laptop repair is not cheap, but it can be cheaper than having to replace the computer. Similar if you have a
network installation Toronto or Wireless network installation Montreal. If you run into these situations, you will need these services in Hamilton, Ottawa visit us.

Article Source: Wireless Networks Benefits to Communities

Sunday, December 06, 2009

What is Voice Over Internet Protocol?

Author: Paul Howe

It delivers these bits and bytes to a specified internet address rather than a telephone number. It's easier to think of it as being like sending e-mail from one computer to another, but in real time and using voice instead of text. The technology that most likely runs your existing switchboard and phones is a traditional public switched telephone network (PSTN) service. VoIP's advantage over this is its ability to combine several services, such as voice mail, video, e-mail and conferencing. This instantly increases your ability to collaborate and can result in higher productivity.

You've probably used VoIP services without even realizing it. Every time you've used an instant messenger program to initiate a voice conversation or sent a voice mail, you've used this cutting-edge technology.

But how can this benefit your company? Well, for starters, it's likely to lead to lower phone bills. And it could reduce the need to travel, too. If you have branch offices, they can be connected either through a dedicated lease line or virtual private network (VPN). Since all calls routed over the internet, irrespective of the network, are free, this leads to significant savings over existing voice services for inter-company communications and makes use of any under-utilised network capacity that you're paying for.

VoIP technology is not new, but some work may be needed before it achieves the reliability of traditional phone systems. Dealing with lots of hardware and service providers as well as handling technology considerations like the integration of VoIP networks with traditional phone systems may sound intimidating. However, with a little help, you will realize that the products on offer are easy to use.

Key requirements in the move to VoIP remain lower costs, abundance of choices, bundled services, high quality, reliability and availability. Most of these issues have already been addressed by VoIP service providers. And if you let them help you implement VoIP services correctly, it can lead to significant savings.


About the Author:

VoIP Technology

Article Source: What is Voice Over Internet Protocol?

Saturday, December 05, 2009

Data Communication – the Language of the Future

Author: Daniel Kirk

A career in data communications lets you work in an engineering discipline, helping computer systems and devices "talk" to each other. Networking, routers, routing protocols, and networking over the Internet are applications directly related, and of interest to, data communication majors and those considering a degree in data communication.

Data communication is sometimes considered a sub-discipline of telecommunications, computer science, IT and computer engineering, which is a primary reason why people who have education, expertise and interests in these disciplines may ultimately pursue careers in data communications. Another reason is that computer networks rely heavily on these disciplines, drawing a direct connection between the fields.

The following make students and career professionals strong candidates for careers in data communications:




  • Students and tech-savvy professionals who are interested in how computer networks "communicate with each other" and want to influence that communication.


  • Young people ready to enter the working world and seasoned professionals wanting to "re-invent" themselves who have interests in local area networks (LANS), and wide area networks (WANS).


  • Anyone interested in how networks are interconnected, allowing communication with a variety of different kinds of media.




Once you determine data communication is the field for you and you have an idea of what occupation within the data communications industry you may want to pursue, you can begin going after your data communication degree.

ITT Technical Institute not only offers a highly sought after degree in data communication, combining classroom study with real-world training, the institute also offers the option of getting your data communication degree online, which makes it easy for you to balance your data communication education with your work and personal life.

At ITT Technical Institute, the data communications courses online carry the same value as those offered in our classrooms. Here, you will not only learn the fundamentals of data communications, you'll learn and know how to apply what you've learned. This makes obtaining employment and following your career path much easier after graduation.

Whether you choose to get your entire data communication degree online or in the classroom, you'll be on your way toward a rewarding career that helps computer networks communicate, which helps the business world communicate. Who knows, perhaps you can help develop a streamlined approach to network communication or maybe even help transform the entire industry and the ways in which we communicate electronically?


For more information, please visit: ITT Tech: Data Communication Systems Technology

About the Author:

Daniel’s professional writing career includes award winning, published works of non-fiction and fiction. The author holds a Bachelor’s degree with honors from Northern Arizona University.

Article Source: Data Communication – the Language of the Future

Thursday, December 03, 2009

Wireless Application Protocol

Author: Sandra Prior

You can’t go far, even in the mainstream media, without coming across someone speculating about the future of the Internet. Among all the excessive predictions there’s one claim that never really gets much attention. Many more devices that we use will be connected to the Internet. And that’s a shame, because this is an important development, and it’s happening now, with the aid of Wireless Application Protocol (WAP).

What is WAP for?

There’s a lot of information and resources available on the Internet, and as companies take the Web more seriously, so we can do more every day. But if the only access is via your PC, then that’s hardly convenient. Dynamic information like news, sports, weather, and so on, could be of interest no matter where you are. And other sites are most useful when you’re out of the house; if you’re out shopping wouldn’t it be convenient to be able to access the Internet to quickly compare prices?

As so many people now carry some sort of wireless based device anyway, this is clearly a possibility, but there’s a problem. The devices have different capabilities, and run on lots of different wireless networks, so finding a standard way of connecting them to the Internet isn’t easy.

The solution that ties everything together is the Wireless Application Protocol (WAP). It’s designed to work on all kinds of digital wireless devices, on just about every wireless network there is. It defines both the method of communications, and the environment in which applications run, so it can be built on any operating system (PalmOS, Windows CE, EPOC, JavaOS, and so on).


Not yet impressed? It’s been estimated that more than 100 million WAP-compatible devices will have been shipped worldwide by the end of this year. The possibilities of tapping this new market are already attracting plenty of attention. Microsoft and Ericcson have formed a new company to market and deliver mobile WAP-based email solutions.


What is WAP Like?


There are many difficulties with having Net access on a mobile phone; in particular, the display size is much less than a PC, and the processor powering the device won’t even be close to Pentium power. As a result, the WAP world has replacements for all the Net technologies and protocols we know and love. For example, pages are written in WML (Wireless Markup Language) rather than HTML, scripting is done in WMLScript as opposed to Javascript, and the pages get to your device courtesy of WTP (Wireless Transaction Protocol) instead of HTTP.


If the prospect of learning a whole new way of working seems depressing, don’t worry, it’s not as bad as it seems. While there are many new concepts – in the Wireless Markup Language, you don’t really create pages, just more ‘decks’ consisting of one or more cards – when you look more closely, it seems the WAP technologies aren’t so very new at all. WMLScript doesn’t look that dissimilar to current coding languages.


What Next?


Already we’re beginning to see some of the same issues that annoy people in the regular Internet world appear with WAP – standards compliance, for one. While the main WAP specification approaches 1.2, support among the various phone companies varies; the siemens C25 supports WAP 1.0, while the Nokia 7110 and most Ericsson products handle WAP 1.1.


If you’d like to get involved yourself, or find out more there are many ways to get started. Guidance on building sites in WML and WMLScript can be found in developers’ kits or on the Internet. What you shouldn’t do is ignore it, because WAP is soon becoming more popular than your PC.

About the Author:

Subscribe to Sandra Prior’s Online Newsletter

and get up to date Computer Technology

News delivered right to your email box for free.

See website for details
http://usacomputers.rr.nu and http://sacomputers.rr.nu.

Article Source: Wireless Application Protocol

Wednesday, December 02, 2009

Ways to Use Voice Over Internet Protocol

Top Twelve Ways to Use Voice Over Internet Protocol in your Business

Author: Gregory Burrus

It seems that each year in this age of the internet, that every day there is a new technology being introduced. If you are like most of us, you are looking for technology to work for you not against you? Have you heard of Voice over internet protocol but not sure if it is worth your time and energy to explore the possible benefits to your business?

In this article we will demonstrate that Voice over internet protocol is a very powerful technology that transcends your normal latest greatest technical tool that is being introduced but you can't see how it applies to you. As the voice component of IOVC strategy and technology, we will list capabilities that you can use to reduce your business expenses and improve your ability to attract customers using just this one technical component.

Voice over internet protocol is a well known technology in some areas and in others it is relatively unknown. However as one of the internet, office, voice and customer management technologies, IOVC, it is a voice over internet protocol technology, which you may not realize, can work wonders for your business. Voice over internet protocol to most people know it as tool that can reduce their phone bill but not necessarily as a tool to help improve and grow their business. But you can use voice over internet protocol technologies:

1. As your phone service and eliminate your current traditional phone service

2. To reduce your phone bill and save some money in your pocket

3. As a marketing tool and let it help you brand your business

4. To run Teleseminars for a very low cost

5. To record audio messages and talk for you when you are not available

6. As your instant support tool and show your customers you are very customer focused

7. For voice mail when you can't be available

8. To open up international office and do this all in 5 minutes

9. For your call forwarding service and let voice over internet protocol enable you to go mobile now

10. As an office extension especially if you need to build a bigger office or add on staff

11. To pay your bills as a convenient way to send money to your Paypal contacts

12. To integrate with Microsoft Outlook and save time, money and energy

As you can see from the list of Voice over internet protocol capabilities above, this voice technology has many beneficial capabilities. It is one of the reasons this IOVC technology is starting to garner more attention in the small business community.

Most people as you can imagine only use Voice over internet protocol as phone replacement technology. But now that you know it can help you market your business, or help you present your business, even when you can't be there in person. The fact it can help you pay your bills while on the road should show you this can be one powerful tool The fact that most of this comes for free should really excite you.

About the Author:

Learn to build your business on the web using IOVC strategy and technology solutions at http://www.iovc.com. Download a free IOVC pdf now. Skye is here to stay and can help your business - learn more here http://www.techoss.com/voice.htm

Article Source: Top Twelve Ways to Use Voice Over Internet Protocol in your Business

Sunday, November 29, 2009

Transmission Control Protocol (Tcp)

Author: Mangesh A. Dahale

Transmission Control Protocol (TCP)

Today, the majority of application protocols use the Internet's reliable Transmission Control Protocol (TCP). The functionality of TCP is designed to be adequate not only for Internet applications but also for the variety of underlying networks.

The protocol aims at providing a reliable service with the following features:

1. Fairness to other flows that potentially share a channel's bandwidth

2. Dynamic discovery of current availability of bandwidth

  • 1. Mechanisms for congestion avoidance and control and for optimization of the error recovery process.

Error control mechanisms are the central component of reliable protocols. They affect a protocol's performance with respect to goodput, energy expenditure, and overhead. Error control is usually a two-step process: error detection, followed by error recovery . TCP assumes a relatively reliable underlying network where most packet losses are due to congestion . TCP error control is centered on congestion losses and ignores the possibility of transient random errors or temporary blackouts due to handoffs and extended burst errors that are typical in wireless networks. TCP detects errors by monitoring the sequence of data segments acknowledged (received). When timeouts are correctly configured, a missing segment is taken to indicate an error, namely that the segment is lost due to congestion (i.e. buffer overflow). Reliable protocols usually implement an error recovery strategy based on two techniques: retransmission of lost segments; and downward adjustment of the sender's window size and readjustment of the timeout period. When using TCP over wireless links results in congestion control measure being invoked at the source.

The Additive Increase Multiplicative Decrease (AIMD) algorithm is used to implement TCP window adjustments; based on the analysis the algorithm achieves stability and converges to fairness in situations where the demand (of competing flows) exceeds the channel's bandwidth .

In a wireless network, however packet looses will occur more often due to unreliable wireless links than due to congestion. It is shown that the performance of TCP is sensitive to the packet size, and that significant performance improvements are obtained if a ‘good' packet size is used. Packets on the internet may get lost either due to congestion, or due to corruption by the underlying physical medium. Given the low error rates of wired links, almost all losses are related to congestion. TCP's reaction to looses is based on this very observation. Losses are detected either by timeouts at the source or by multiple duplicate acknowledgements ( dupacks ) from the receiver. TCP assumes that each packet loss is solely due to congestion. However, in a wireless network, TCP will encounter packet looses that may be unrelated to congestion. Nonetheless, these losses trigger congestion control measures at the source and severely degrade performance.

TCP was designed and carefully calibrated to overcome the problems like as follows:

  • 1. Stability.
  • 2. Heterogeneous ( receiver buffers, network bandwidth and delay ).
  • 3. Fairness in bandwidth consumption of competing flows.
  • 4. Efficiency in utilization.
  • 5. Congestion control ( that effectively avoids situations of congestive collapse ).

Transmission Control Protocol (TCP) is a means for building a reliable communications stream on top of the unreliable packet Internet Protocol (IP). TCP is the protocol that supports nearly all Internet applications. The combination of TCP and IP is referred to as TCP/IP and many people imagine, incorrectly, that TCP/IP is a single protocol.

Performance Metrics of TCP :

Goodput :

This is the measure of how efficiently a connection utilizes the network. It is determined as the ratio of useful data received at the destination and the total amount of data transmitted by the source. If a connection requires a lot of extra packets to traverse the network due to retransmission, its goodput is low. It is desirable that each connection have as high a goodput as possible. Clearly, this metric is of great significance for efficient operation of a network.

Throughput :

This is the measure of how soon an end user is able to receive data. It is determined as the ratio of the total data received by the end user and the connection time. A higher throughput will directly impact the user's perception of the quality of service.

About the Author:

Article Source: Transmission Control Protocol (Tcp)