Technical terminology

Introduction
This is a book made by a researcher and is only intended to public benefit and not for sale. And I hope that Allah accept this work from me.

This book has some terminologies that can help you to have information about basics in Information Technology field. These definitions are collected from famous websites.

The researcher

2

Softphone
Softphone is a software program for making telephone calls over the Internet using a general purpose computer, rather than using dedicated hardware. Often a softphone is designed to behave like a traditional telephone, sometimes appearing as an image of a phone, with a display panel and buttons with which the user can interact. A softphone is usually used with a headset (Headphones) connected to the sound card of the PC, or with a USB phone. USBphone looks like traditional phone device, but it has USB connector instead of RJ-11. It may be used with most softphones and services like Skype.

Softphone Applications
A typical application of a softphone is to make calls via an Internet telephony service provider to other softphones or to telephones. Service providers may offer PC-to-PC calls for free; PC-to-phone and phone-toPC calls are usually not free. Another type of softphone connects to a private branch exchange (PBX) ( which is a telephone exchange that serves a particular business or office, as opposed to one that a common carrier or telephone company operates for many businesses or for the general public. PBXs are also referred to as: PABX - private automatic branch exchange EPABX - electronic private automatic branch exchange) through a local area network (LAN) and is used to control and dial through an existing hardware phone. This is often used in a call center environment to make calls from a central customer directory, and to "pop-up" information on the screen about which customer is calling, instantly providing the operator with details of the relationship between the caller and the company using the call center. Some countries do not allow this PBX. It's important to differentiate softphones from services based on softphones. Skype, Google Talk, and Vonage are Internet telephony service providers having their own softphones that you install on your computer. Unfortunately these three major providers are not interoperable, and you can't place a direct call between them. 3

Your VoIP provider may permit you to select an area code different from the area in which you live. or are available but only for an additional fee. traditional wireline telephone service. If you use a telephone with a VoIP adapter. If you use your computer.VoIP (Voice over Internet Protocol) is simply the transmission of voice traffic over IP-based networks. If you are calling a regular phone number. you will need some software and an inexpensive microphone. This can be through a cable modem. you'll be able to dial just as you always have. If you are calling someone who has a regular analog phone. normally only for calls to other subscribers to the service. while other services allow you to use a traditional phone connected to a VoIP adapter. If I have VoIP service. and international numbers. a special VoIP phone. adaptor. VoIP can allow you to make a call directly from a computer. A computer. parks. long distance. that person does not need any special equipment to talk to you. similar to existing. or you may be able to call anyone who has a telephone number including local. In addition. What Kind of Equipment Do I Need? A broadband (high speed Internet) connection is required. who can I call? Depending upon your service. You may also be able to avoid paying for both a broadband connection and a traditional telephone line. Other VoIP providers permit you to call anywhere at a flat rate for a fixed number of minutes. wireless "hot spots" in locations such as airports. It also means that people who call you may incur long distance charges depending on their area code and service. and cafes allow you to connect to the Internet and may enable you to use VoIP service wirelessly. or a traditional phone connected to a special adapter. or high speed services such as DSL or a local area network. and the service provider may also provide a dial tone. you might be limited only to other subscribers to the service. the signal is converted to a regular telephone signal before it reaches the destination. 4 . or specialized phone is required. How VoIP / Internet Voice Works VoIP services convert your voice into a digital signal that travels over the Internet. Some VoIP services only work over your computer or a special VoIP phone. Special VoIP phones plug directly into your broadband connection and operate largely like a traditional telephone. mobile. What Are Some Advantages of VoIP? Some VoIP services offer features and services that are not available with a traditional phone. Some VoIP services may allow you to speak with more than one person at a time. Is there a difference between making a Local Call and a Long Distance Call? Some VoIP providers offer their services for free. Some VoIP providers charge for a long distance call to a number outside your calling area.

there are some possible differences:    Some VoIP services don't work during power outages and the service provider may not offer backup power. the software supplied by your service provider will alert you when you have an incoming call. VoIP providers may or may not offer directory assistance/white page listings. Aspects of these considerations may change with new developments in internet technology. which supports communications services in high-cost areas and for income-eligible telephone subscribers. Does my Computer Have to be Turned on? Only if your service requires you to make calls using your computer. the phone will ring like a traditional telephone. For additional information. In addition. Not all VoIP services connect directly to emergency services through 9-11. All VoIP services require your broadband Internet connection to be active.What Are Some disadvantages of VoIP? If you're considering replacing your traditional telephone service with VoIP. see VoIP & 911 Advisory. see VoIP & 911 Advisory. You should always check with the VoIP service provider you choose to confirm any advantages and limitations to their service. 5 . Can I use my Computer While I talk on the Phone? In most cases. Please see our consumer fact sheet on VoIP and 911 services for complete information on these differences. that 911 calls using VoIP are handled differently than 911 calls using your regular telephone service. For more information about VoIP see our factsheet (pdf file). You should know. For additional information. Can I Take My Phone Adapter with me When I Travel? Some VoIP service providers offer services that can be used wherever a high speed Internet connection available. Using a VoIP service from a new location may impact your ability to connect directly to emergency services through 9-1-1. How Do I Know If I have a VoIP phone Call? If you have a special VoIP phone or a regular telephone connected to a VoIP adapter. If your VoIP service requires you to make calls using your computer. however. yes. Does the FCC Regulate VoIP? In June 2005 the FCC imposed 911 obligations on providers of “interconnected” VoIP services – VoIP services that allow users generally to make calls to and receive calls from the regular telephone network. the FCC requires interconnected VoIP providers to comply with the Communications Assistance for Law Enforcement Act of 1994 (CALEA) and to contribute to the Universal Service Fund.

H.323. or IAX (althoughH.[2] Before 2003.An ITSP (Internet Telephony Service Provider) offers an Internet data service for making telephone calls using VoIP (Voice over IP) technology. 6 . In the United States. ITSPs are also known as VSP (Voice Service Provider) or simply VoIP Providers. Most ITSPs use SIP. net2Phone began offering consumer VoIP service in 1995. many VoIP services required customers to make and receive phone calls through a personal computer. Customers may use traditional telephones with an analog telephony adapter (ATA) providing RJ11 to Ethernetconnection.323 use is declining)[1] for transmitting telephone calls as IP data packets.

or Stream Control Transmission Protocol (SCTP)[3].private automatic branch exchange EPABX . etc. instant messaging. A central office is the physical building used to house inside plant equipment including telephone switches. as opposed to one that acommon carrier or telephone company operates for many businesses or for the general public. Other feasible application examples include video conferencing. it can run on Transmission Control Protocol (TCP). which make telephone 7 . inviting more participants.electronic private automatic branch exchange In the field of telecommunications. It is a text-based protocol. a telephone exchange or telephone switch is a system of electronic components that connects telephone calls. The modification can involve changing addresses or ports. adding or deleting media streams. SIP was originally designed by Henning Schulzrinne and Mark Handley starting in 1996.The Session Initiation Protocol (SIP) is a signaling protocol. incorporating many elements of the Hypertext Transfer Protocol (HTTP) and theSimple Mail Transfer Protocol (SMTP)[4]. streaming multimedia distribution. The SIP protocol is a TCP/IP-based Application Layer protocol. presence information and online games. SIP is designed to be independent of the underlying transport layer. The protocol can be used for creating.[2] In November 2000. PBXs are also referred to as: PABX . The latest version of the specification is RFC 3261[1] from the IETF Network Working Group. Private branch exchange (PBX) is a telephone exchange that serves a particular business or office. modifying and terminating two-party (unicast) or multiparty (multicast) sessions consisting of one or several media streams. widely used for controlling multimedia communication sessions such as voice and video calls over Internet Protocol (IP). SIP was accepted as a 3GPP signaling protocol and permanent element of the IP Multimedia Subsystem (IMS) architecture for IP-based streaming multimedia services in cellular systems. User Datagram Protocol (UDP). allowing for direct inspection by administrators.

manage credit cards. while making routine services and inquiries available to the public 24 hours a day. Public airlines. or services and offers its services to the general public under license or authority provided by a regulatory body. other obsolete Bell System terms includeoffice code and NXX. In the three-digit sense of the word. IVR (interactive voice response) is a telephony technology that allows users to interact with a database through phone keypad or voice commands. cruise ships. The term exchange can also be used to refer to an area served by a particular switch (typically known as a wire center in the US telecommunications industry). Most of us use IVR systems daily to do things like check bank balances. the word exchange can also have the legal meaning of a local access and transport area under the Modification of Final Judgment (MFJ). in some areas it can refer to the first three digits of the local number. Any person who undertakes to transport goods is simply referred to as a carrier. Common carriers typically transport persons or goods according to defined and published routes. A common carrier holds itself out to provide service to the general public without discrimination for the "public convenience and necessity". IVR automated systems save businesses money and employee resources. More narrowly. bus lines. such as NPA or area code. In the United States.e. In Continental Europe the term is seldom used and has little or no legal implications. check for store hours or locations. The term common carrier is of Anglo-American origin. A common carrier is a business that transports people. It is sometimes confused with other concepts of telephone geography. willing and able" to provide those services for which it is granted authority.calls"work" in the sense of making connections and relaying the speech information. motor carriers (i. A common carrier must further demonstrate to the regulator that it is "fit. or order 8 . goods.. railroads. trucking companies) and other freight companiesgenerally operate as common carriers. time schedules and rate tables upon the approval of regulators.

A recorded voice asks questions and requests simple answers. IVR systems can deliver dynamic information as well. Commonly. and to schedule appointments with government or state offices. video). like "yes. however. World Wide Web-based hyperlinked documents. IVR systems are also used to report non-emergency problems to cable or utility services. integrating it through the client's network. It may be implemented in a variety of storage. OSP solutions have advantages and disadvantages.prescription medicine. there are also "outsourced solution providers. IVR systems are installed in-house. Other popular networks 9 . for example." The IVR system might have limited to extensive built-in voice recognition. In these cases." "no. Integrating text-tospeech (TTS) functionality. centralized computer file server installations on computer networks. and surrendered control over critical functions deferred to the IVR system. These IVR providers maintain the system on their own premises. and distribution models. and an IVR-savvy staff to maintain the system. transmission. The increasing popularity of the mp3 music format in the late 1990s led to the release and growth of Napster and other software designed to aid in the sharing of electronic files. Obvious advantages include avoiding installation of a new IVR infrastructure. the Department Of Motor Vehicles. news. or electronic books. Human interaction is not required because the IVR system only allows limited access to the database. Disadvantages may include a feature-set or template that might not fit your business model as well as you'd like. depending on the requirements of the application." or "undecided. Common methods are manual sharing using removable media. such as computer programs. and the use of distributed peer-to-peer (P2P) networking. the system places outgoing calls. traffic or stock reports." or OSPs. multi-media (audio. Campaigns. IVR automation makes it possible to reach far more people than through actually manning phones. such as weather. documents. Press 1 for yes and 2 for no. for example. Multisource File Transfer Protocol (MFTP) is designed for the purpose of file sharing (It is the practice of distributing or providing access to digitally stored information. Multisource File Transfer Protocol (MFTP) In computing. Answers might also be directed through the phone's keypad. though an option might exist to be switched to a live operator during business hours. pollsters and survey takers also make use of IVR systems.

and therefore may acquire more features or other improvements in addition to those discussed in this article. this file is corrupted. It is still under development.k. by theOvernet network. in this case. There are several unique forks of the protocol: eDonkey2000 implemented what it called "hording" of sources. in its extended implementation. and xMule has extended the credit system to facilitate in the transfer of rare files. This is the communication protocol used by such clients as eMule and eDonkey and. and BitTorrent. the nowdefunct Kazaa network. Many file sharing programs and services have been shut down due to litigation by groups such as the RIAA and MPAA. eMule uses a credit system. 10 . The protocol is still under development. this file isn't what the name may indicate). and every known mature client allows the user to tweak file and user upload priorities. some studies have suggested that file sharing is not the primary cause of declines in sales. eDonkey2000.include Gnutella. so additional features and other improvements are still possible. Features/Strengths In addition to being able to search by filename. It has recently been announced that MFTP had been used successfully in Internet2 project. During the early 2000s. It is also possible to sharemetadata about a given file with links on Web sites (such as: this file is good. MFTP is able to uniquely identify files based on their contents. Gnutella2. the files are identified with theirMD4 hash numbers (which are consistent) rather than their filenames (which will often vary from one computer to the next). leech resistance) built into the protocol. File sharing remains widespread. the fight against copyright infringement expanded into lawsuits against individual users of file sharing software. with mixed public opinion about the morality of the practice for commercial material). The economic impact on media industries is disputed. regardless of how they are named on each individual computer. achieving excellent results in terms of speed and reliability when transferring or sharing files. although publishers and copyright holders claim economic damage. It also has bandwidth management (a.a.

and other programmable electronic chips to be programmed while installed in a complete system.In-System Programming In-System Programming (abbreviated ISP) is the ability of some programmable logic devices. GSM (Global System for Mobile communications: originally from Groupe Spécial Mobile) is the most popular standard for mobile phones in the world. The primary advantage of this feature is that it allows manufacturers of electronic devices to integrate programming and testing into a single production phase. enabling subscribers to use their phones in many parts of the world. allowing the entire programming and test procedure to be accomplished under the control of a single protocol.[1] GSM is used by over 3 billion people across more than 212 countries and territories. In systems complex enough to require moderately large glue logic. and thus is considered a second 11 . making it feasible to apply code or design changes in the middle of a production run.[2][3] Its ubiquity makes international roaming very common between mobile phone operators. estimates that 80% of the global mobile market uses the standard. rather than requiring a separate programming stage prior to assembling the system. and communicate with the programmer via a serial protocol. in order to facilitate easier integration with automated testing procedures. GSM differs from its predecessors in that both signaling and speech channels are digital. Most programmable logic devices use a variant of the JTAG protocol for ISP. Typically. rather than requiring the chip to be programmed prior to installing it into the system. This may allow manufacturers to program the chips in their own system's production line instead of buying preprogrammed chips from a manufacturer or distributor. designers may implement a JTAG-controlled programming subsystem for non-JTAG devices such as flash memory and microcontrollers. microcontrollers. chips supporting ISP have internal circuitry to generate any necessary programming voltage from the system's normal supply voltage. Its promoter. Other devices usually use proprietary protocols or protocols defined by older standards. the GSM Association.

com/docs/pr/pressrelease. that is. (General packet radio service (GPRS) is a packet oriented mobile data service available to users of the 2G cellular communication systems global system for mobile communications(GSM). which is now supported on other mobile standards as well. 2006 | url = http://focus.5G. This has also meant that data communication was easy to build into the system. 2G cellular systems combined with GPRS are often described as 2. a technology between the second (2G) and third (3G) generations of mobile telephony.ti. GPRS is a besteffort packet switched service. while data communication via traditional circuit switching is billed per minute of connection time. GPRS data transfer is typically charged per megabyte of traffic transferred.112.jhtml?prelId=sc06127 | accessdate = 2007-01-08}}</ref>). also called "text messaging"). by means of General Packet Radio Service (GPRS). For example.generation (2G) mobile phone system.[4] This makes it easier for international travellers to connect to emergency services without knowing the local emergency number. the short message service (SMS. Release '97 of the standard added packet data capabilities. GPRS provides data rates of 56-114 kbit/s. by using unused time division multiple access (TDMA) channels in. In 2G systems. but instead those networks are being converted to 12 . Another advantage is that the standard includes one worldwide emergency telephone number. Originally there was some thought to extend GPRS to cover other standards. Newer versions of the standard were backward-compatible with the original GSM phones. The ubiquity of the GSM standard has been an advantage to both consumers (who benefit from the ability to roam and switch carriers without switching phones) and also to network operators (Executive Meets with India Government Official to outline Benefits of Open Standards to drive mobile phone penetration | publisher = Texas Instruments | date = July 12. GSM also pioneered a low-cost (to the network carrier) alternative to voice calls. for example. independent of whether the user actually is using the capacity or is in an idle state. as opposed to circuit switching. where a certain quality of service (QoS) is guaranteed during the connection for non-mobile users. the GSM system. as well as in the 3G systems. It provides moderate speed data transfer.

Release '99 introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE). The GPRS core network is the centralized part of the GPRS system. It was originally standardized by European Telecommunications Standards Institute (ETSI).). for transmitting IP packets. so that GSM is the only kind of network where GPRS is in use. but now by the 3rd Generation Partnership Project (3GPP). it will allow network operators greater control over their GSM networks. is currently under development [5]. It also provides support for WCDMA based 3G networks.use the GSM standard. OR-GSM. The General Packet Radio Service (GPRS) system is used by GSM mobile phones. A new operator-restricted version of GSM. GPRS was developed as a GSM response to the earlier CDPD and imode packet switched cellular technologies. The GPRS core network is an integrated part of the GSM network switching subsystem. Scheduled to be released in 2010. The higher data rates allow users to take part in video conferences and interact with multimedia Web sites and similar applications using mobile handheld devices as well as notebook 13 . the most common mobile phone system in the world. GPRS is integrated into GSM Release 97 and newer releases. General Packet Radio Services (GPRS) is a packetbasedwireless communication service that promises data rates from 56 up to 114Kbps and continuous connection to the Internet for mobile phone and computer users.

Cellular radio network Main article: Cellular network GSM is a cellular network. The modulation used in GSM is Gaussian minimum-shift keying (GMSK). depending on the antenna system. along with other 2.5G and 3G services. which means that mobile phones connect to it by searching for cells in the immediate vicinity. In theory. the signal to be modulated onto the carrier is first smoothed with a Gaussian low-pass filter prior to being fed to a frequency modulator. as-packets-are-needed basis rather than dedicated to only one user at a time. or an indoor repeater with distributed indoor antennas fed through power splitters. where the cell radius could be double or even more. to deliver the radio signals from an antenna outdoors to the separate indoor distributed antenna system. There are five different celwho can choose equipment from any of the many vendors implementing GSM Cite error: Closing </ref> missing for <ref> tag. 14 . this is not a prerequisite. in shopping centers or airports. It is also easier to make applications available to mobile users because the faster data rate means that middleware currently needed to adapt applications to the slower speed of wireless systems are no longer be needed. GPRS packet-based services cost users less than circuitswitched services since communication channels are being used on a shared-use. since indoor coverage is also provided by in-building penetration of the radio signals from any nearby cell. mobile users of virtual private networks (VPNs) have been able to access the private network continuously over wireless rather than through a rooted dial-up connection. GPRS is based on Global System for Mobile (GSM) communication and complements existing services such circuitswitched cellular phone connections and the Short Message Service (SMS). These are typically deployed when a lot of call capacity is needed indoors. However. for example. the type of terrain and the timing advance. Indoor coverage is also supported by GSM and may be achieved by using an indoor picocell base station. As GPRS has become more widely available.computers.. a kind of continuous-phase frequency shift keying. In GMSK.

televisions. GSM frequencies Main article: GSM frequency ranges GSM networks operate in a number of different frequency ranges (separated into GSM frequency ranges for 2G and UMTS frequency bands for 3G). This also depends on the handset's design. such as car stereos and portable audio players. which could be mitigated or eliminated by use of additional shielding and/or bypass capacitors in these audio devices. The clicking noise itself represents the power bursts that carry the TDMA signal. Interference with audio devices Some audio devices are susceptible to radio frequency interference (RFI). [12] It is a common occurrence for a nearby GSM handset to induce a "dit. 15 . These signals have been known to interfere with other electronic devices. the FCC. Some countries in the Americas (including Canada and the United States) use the 850 MHz and 1900 MHz bands because the 900 and 1800 MHz frequency bands were already allocated. and its conformance to strict rules and regulations allocated by the US body. home stereo systems. and personal music devices. dit di-dit.which greatly reduces the interference to neighboring channels (adjacent channel interference). dit di-dit" audio output on PAs. dit di-dit. the radio signal is strong enough that the solid state amplifiers in the audio chain act as a detector. in part 15 of its rules and regulations pertaining to interference with electronic devices. wireless microphones. the increased cost of doing so is difficult for a designer to justify. computers. providing 125 RF channels (channel numbers 0 to 124) spaced at 200 kHz. When these audio devices are in the near field of the GSM handset. Most 3G GSM networks in Europe operate in the 2100 MHz frequency band. The rarer 400 and 450 MHz frequency bands are assigned in some countries where these frequencies were previously used for firstgeneration systems. GSM-900 uses 890–915 MHz to send information from the mobile station to the base station (uplink) and 935–960 MHz for the other direction (downlink). Most 2G GSM networks operate in the 900 MHz or 1800 MHz bands. However. Duplex spacing of 45 MHz is used. cordless phones.

two codecs. Voice codecs GSM has used a variety of voice codecs to squeeze 3. Half rate channels use alternate frames in the same timeslot. Network structure 16 .2 kbit/s codec that uses a full rate channel. These used a system based upon linear predictive coding (LPC). EFR was refactored into a variable-rate codec called AMR-Narrowband. Originally. these codecs also made it easier to identify more important parts of the audio. allowing the air interface layer to prioritize and better protect these parts of the signal. There are eight radio timeslots (giving eight burst periods) grouped into what is called a TDMA frame. E-GSM. Time division multiplexing is used to allow eight full-rate or sixteen half-rate speech channels per radio frequency channel. which is high quality and robust against interference when used on full rate channels. and the frame duration is 4.833 kbit/s. GSM was further enhanced in 1997[13] with the Enhanced Full Rate (EFR) codec. named after the types of data channel they were allocated. The transmission power in the handset is limited to a maximum of 2 watts in GSM850/900 and 1 watt in GSM1800/1900.5 kbit/s) and Full Rate (13 kbit/s).In some countries the GSM-900 band has been extended to cover a larger frequency range. uses 880–915 MHz (uplink) and 925–960 MHz (downlink).615 ms. adding 50 channels (channel numbers 975 to 1023 and 0) to the original GSM-900 band. and less robust but still relatively high quality when used in good radio conditions on half-rate channels.6 and 13 kbit/s. were used. Finally. In addition to being efficient with bitrates. with the development of UMTS. a 12. The channel data rate for all 8 channels is 270. This 'extended GSM'.1 kHz audio into between 5. called Half Rate (6.

The SIM is a detachable smart 17 .  the Network and Switching Subsystem (the part of the network most similar to a fixed network).  the GPRS Core Network (the optional part which allows packet based Internet connections). It is divided into a number of sections and these are each covered in separate articles.The structure of a GSM network The network behind the GSM seen by the customer is large and complicated in order to provide all of the services which are required. Subscriber Identity Module (SIM) Main article: Subscriber Identity Module  One of the key features of GSM is the Subscriber Identity Module. commonly known as a SIM card. the Base Station Subsystem (the base stations and their controllers).  all of the elements in the system combine to produce many GSM services such as voice calls and SMS. This is sometimes also just called the core network.

This was also the case in Finland until April 1. in Belgium. North America and Europe many operators lock the mobiles they sell. it is unlawful for operators there to offer any form of subsidy on the phone's price. some do it for free. In Australia. This allows the user to retain his or her information after switching handsets. Indonesia. In some countries such as Bangladesh. The security model therefore offers confidentiality and authentication.card containing the user's subscription information and phone book. not to the account (which is identified by the SIM card). The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. and operators want to try to avoid subsidising competitor's mobiles. GSM security GSM was designed with a moderate level of security. utilize private services to remove the lock. and no nonrepudiation. GSM uses several cryptographic algorithms for security. or make use of ample software and websites available on the Internet to unlock the handset themselves. when selling subsidized combinations of handsets and accounts became legal. Malaysia. or only a SIM issued by them. Hong Kong and Pakistan. Belgium. This is done because the price of the mobile phone is typically subsidised with revenue from subscriptions. the user can also change operators while retaining the handset simply by changing the SIM. The development of UMTS introduces an optional USIM. Alternatively. Some operators will block this by allowing the phone to use only a single SIM. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air 18 . and is illegal in some countries. all phones are sold unlocked. but limited authorization capabilities. Communications between the subscriber and the base station can be encrypted. that uses a longer authentication key to give greater security. 2006. this practice is known as SIM locking. A subscriber can usually contact the provider to remove the lock for a fee. The locking applies to the handset. though operators have to unlock phones free of charge after a certain period (at most 24 months). Costa Rica. While most web sites offer the unlocking for a fee. However. as well as mutually authenticating the network and the user whereas GSM only authenticates the user to the network (and not vice versa). identified by its International Mobile Equipment Identity (IMEI) number.

A5/2 is weaker and used in other countries. Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack. or dynamically converted to. and in February 2008. WAP Wireless Application Protocol (commonly referred to as WAP) is an open international standard[1] for application layer network communications in a wireless communicationenvironment. Its main use is to enable access to the Mobile Web from a mobile phone or PDA. Pico Computing. Interactive data applications are required to support now commonplace activities such as:      Email by mobile phone Tracking of stock market prices Sports results News headlines Music downloads    +------------------------------------------+ | Wireless Application Environment (WAE) | +------------------------------------------+ \ 19 . service providers had extremely limited opportunities to offer interactive data services. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack. WML (Wireless Markup Language) and accessed via the WAP browser. A WAP browser provides all of the basic services of a computer based web browser but simplified to operate within the restrictions of a mobile phone. WAP sites are websites written in. such as its smaller view screen.voice privacy.[14] The system supports multiple algorithms so operators may replace that cipher with a stronger one. Before the introduction of WAP. A5/1 was developed first and is a stronger algorithm used within Europe and the United States.

Its use is optional. USSD. The rationale for this was to build a single platform for competing network technologies such as GSM and IS95 (also known as CDMA) networks. WTP provides transaction support (reliable request/response) that is adapted to the wireless world. which is common in 2G wireless technologies in most radio conditions. but is misinterpreted by TCP as network congestion. On native IP bearers such as GPRS. UMTS packet-radio service. or PPP on top of a circuitswitched data connection. WDP is considered by all the upper layers as one and the same protocol. WTLS provides a public-key cryptography-based security mechanism similar to TLS. The bottom-most protocol in the suite is the WAP Datagram Protocol (WDP). WSP is best thought of on first approach as a compressed version of HTTP.          | Wireless Session Protocol (WSP) | +------------------------------------------+ | Wireless Transaction Protocol (WTP) | +------------------------------------------+ | Wireless Transport Layer Security (WTLS) | +------------------------------------------+ | Wireless Datagram Protocol (WDP) | +------------------------------------------+ | *** Any Wireless Data Network *** | +------------------------------------------+ | | | WAP | protocol | suite | | / Technical specifications  The WAP standard describes a protocol suite that allows the interoperability of WAP equipment and software with many different network technologies. which has several "technical realizations" on top of other "data bearers" such as SMS. WDP is in fact exactly UDP. etc. WTP supports more effectively than TCP the problem of packet loss.     20 . Finally. which is an adaptation layer that makes every data network look a bit like UDP to the upper layers by providing unreliable transport of data with two 16-bit port numbers (origin and destination).

Wireless communication with PC input and output devices. Transfer of files.This protocol suite allows a terminal to emit requests that have an HTTP or HTTPS equivalent to a WAP gateway. More prevalent applications of Bluetooth include:      Wireless control of and communication between a mobile phone and a hands-free headset. Bluetooth Bluetooth is an open wireless protocol for exchanging data over short distances from fixed and mobile devices. and reminders between devices with OBEX. medical equipment. This was one of the earliest applications to become popular. It was originally conceived as a wireless alternative to RS232 data cables. GPS receivers. the gateway translates requests into plain HTTP. calendar appointments. bar code scanners. keyboard and printer. overcoming problems of synchronization. Replacement of traditional wired serial communications in test equipment. the most common being the mouse. Wireless networking between PCs in a confined space and where little bandwidth is required. creating personal area networks (PANs). and traffic control devices. List of applications A typical Bluetooth mobile phone headset. 21 . It can connect several devices. contact details.

Bluetooth devices A Bluetooth USB dongle with a 100 m range. use Bluetooth for their respective wireless controllers. Bluetooth exists in many products. with a Bluetooth headset) or byte data with hand-held computers (transferring files). Bluetooth is commonly used to transfer sound data with telephones (i. Wireless bridge between two Industrial Ethernet (e. PROFINET) networks. Bluetooth devices[citation needed]. PSP Go.      For controls where infrared was traditionally used. Nintendo's Wii[6] and Sony's PlayStation 3. the Wii. modems and headsets... Two seventh-generation game consoles. Sending small advertisements from Bluetooth-enabled advertising hoardings to other.g. PlayStation 3. Lego Mindstorms NXT and recently in some high definition watches[citation needed]. For low bandwidth applications where higher [USB] bandwidth is not required and cable-free connection desired. such as telephones. network 22 . Bluetooth protocols simplify the discovery and setup of services between devices. This makes using services easier because more of the security. Bluetooth devices can advertise all of the services they provide. The technology is useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Dial-up internet access on personal computers or PDAs using a datacapable mobile phone as a modem. discoverable.e.

and better security than Bluetooth. Wi-Fi is sometimes called "wireless Ethernet. A personal computer must have a Bluetooth adapter in order to communicate with other Bluetooth devices (such as mobile 23 . as it also provides an indication of its relative strengths and weaknesses. headsets and hands-free devices). Computer requirements A typical Bluetooth USB dongle. Wi-Fi Main article: Wi-Fi Wi-Fi is a traditional Ethernet network. Wi-Fi requires more setup but is better suited for operating full-scale networks. it enables a faster connection. and to set up audio links (for example. An internal notebook Bluetooth card (14×36×4 mm). but with higher power. and requires configuration to set up shared resources. transmit files. Wi-Fi uses the same radio frequencies as Bluetooth. better range from the base station. resulting in a stronger connection." This description is accurate.address and permission configuration can be automated than with many other network types.

0 release. the Open Mobile Terminal Platform (OMTP) forum has recently published a recommendations paper. BlueZ and Affix.0 release. entitled "Bluetooth Local Connectivity". Apple has supported Bluetooth since Mac OS X v10. IrDA. see external links below to download this paper. which were not directly supported by Microsoft.[7] For Microsoft platforms. which requires a separate adapter for each device. Mobile phone requirements A mobile phone that is Bluetooth enabled is able to pair with many devices. Bluetooth allows multiple devices to communicate with a computer over a single adapter. While some desktop computers and most recent laptops come with a built-in Bluetooth adapter. To ensure the broadest support of feature functionality together with legacy device support.phones.[8] Microsoft's own Bluetooth dongles (packaged with their Bluetooth computer devices) have no external drivers and thus require at least Windows XP Service Pack 2. others will require an external one in the form of a dongle. FreeBSD features Bluetooth support since its 5. miceand keyboards). Unlike its predecessor. Its Bluetooth stack has been ported to OpenBSD as well.2 which was released in 2002. Windows XP Service Pack 2 and later releases have native support for Bluetooth. Previous versions required users to install their Bluetooth adapter's own drivers. The Affix stack was developed by Nokia. The BlueZ[9] stack is included with most Linux kernels and was originally developed by Qualcomm. see Bluetooth stack. NetBSDfeatures Bluetooth support since its 4. Operating system support For more details on this topic. 24 . Linux has two popular Bluetooth stacks.

DTMF tones were also used by cable television broadcasters to indicate the start and stop times of local commercial insertion points during station breaks for the benefit of cable companies. Sweden. and is standardized by ITUT Recommendation Q. and later joined by many other companies. which 25 . telephone systems employed a system commonly referred to as pulse (Dial Pulse or DP in the U. fast. Until better out-of-band signaling equipment was developed in the 1990s. As a method of in-band signaling. and loud DTMF tone sequences could be heard during the commercial breaks of cable channels in the United States and elsewhere.23. Toshiba. It is also known in the UK as MF4.000 companies worldwide. The specifications were formalized by the Bluetooth Special Interest Group (SIG).[10][citation needed] The specification is based on frequency-hopping spread spectrum technology. unacknowledged. Intel. Today it has a membership of over 11. It was established by Ericsson. who were working for Ericsson Mobile Platforms in Lund. and Nokia.Data Transformation Management System Dual-tone multi-frequency (DTMF) signaling is used for telecommunication signaling over analog telephone lines in the voicefrequency band betweentelephone handsets and other communications devices and the switching center. IBM.S. Other multi-frequency systems are used for signaling internal to the telephone network.[citation needed] History In the time preceding the development of DTMF.) or loop disconnect (LD) signaling to dial numbers. 1984). 1998. The version of DTMF used for telephone tone dialing is known by the trademarked term TouchTone (canceled March 13. The SIG was formally announced on May 20.Specifications and features The Bluetooth specification was developed in 1994 by Jaap Haartsen and Sven Mattisson. DTMS .

and surveyed a number of companies to see what they would need for this role. Other vendors of compatible telephone equipment called this same system "Tone" dialing or "DTMF. The repeated connection and disconnection. a derivative technique was offered by AT&T through its Bell System telephone companies as a "modern" way for network customers to place calls.as detailed below. sometimes called 'octothorpe' or 'pound' in this context) and asterisk or "star" (*) keys as well as a group of keys for menu selection: A. #. A. B. C. Loop disconnect range was restricted by telegraphic distortion and other technical problems." or used their own registered trade names such as the "Digitone" of Northern Electric (now known as Nortel Networks). In AT&Ts Compatibility Bulletin No. C and D. or DTMF." The consumer product was marketed by AT&T under the registered trade name Touch-Tone. is a method for instructing a telephone switching system of the telephone number to be dialed.functions by rapidly disconnecting and connecting the calling party's telephone line. AT&T described the product as "a method for pushbutton signaling from customer stations using the voice transmission path. and it was many years 26 . sounds like a series of clicks. In the early 1960s. Dual Tone Multi-Frequency. *. 105. as the dial spins. and D The engineers had envisioned phones being used to access computers. In the end. The DTMF system uses eight different frequency signals transmitted in pairs to represent sixteen different numbers. and placing calls over longer distances required either operator assistance (operators used an earlier kind of multi-frequency dial) or the provision of subscriber trunk dialing equipment. symbols and letters . The exchange equipment counts those clicks or dial pulses to determine the called number. This led to the addition of thenumber sign (#. similar to flicking a light switch on and off. the lettered keys were dropped from most phones. The DTMF dialing system traces its roots to a technique developed by Bell Labs in the 1940s called MF (Multi-Frequency) which was deployed within the AT&T telephone network to direct calls between switching facilities using in-band signaling. B. or to issue commands to switching systems or related telephony equipment.

C and D keys on telephone networks are few. it was limited to the White House Communications Agency. cutting in over existing calls if need be. but using number combinations (Example: Entering 93 before a number is a priority call) rather than the separate tones and the Government Emergency Telecommunications Service has superseded Autovon for any civilian priority telco access. Public payphones that accept credit cards use these additional codes to send the information from the magnetic strip. Problems listening to this file? See media help. the A key is used on some networks to cycle through different carriers at will (thereby 27 . B. Flash Override will kick every other call off the trunks between the origin and destination. before dialing would make the switch first look for any free lines. it would disconnect any non-priority calls. overriding other conversations on the network. The idea was to allow important traffic to get through every time. and exclusive to network control.S. Immediate (C). The levels of priority available were Flash Override (A). Immediate. Precedence dialing is still done on the military phone networks. and if all lines were in use.before these keys became widely used for vertical service codes such as *67 in the United States and Canada to suppresscaller ID. The U. Flash (B). DTMF Push-To-Talk ID Example of DTMF used as push-to-talk ID on a two-way radio system. Here they were used before dialing the phone in order to give some calls priority. Pressing C. Pressing one of these keys gave your call priority. For example. and Priority (D). relabeled. and then any priority calls. military also used the letters. Present-day uses of the A. in their now defunct Autovon phone system[1]. Consequently. with Flash Override being the highest priority.

Their use is probably prohibited by most carriers. Keypad Main article: Telephone keypad 1209 Hz on 697 Hz to make the 1 tone The DTMF keypad is laid out in a 4×4 matrix. with each row representing a low frequency. DTMF tones are also used by some cable television networks and radio networks to signal the local cable company/network station to insert a local advertisement or station identification. These tones were often heard during a station ID preceding a local ad insert. DTMF tones are also sometimes used in caller ID systems to transfer the caller ID information. terrestrial television stations also used DTMF tones to shut off and turn on remote transmitters. C and D tones are used in amateur radio phone patch and repeater operations to allow. and each column representing a high frequency. The A.listening in on calls). Previously. among other uses. B. control of the repeater while connected to an active phone line. Pressing a single key (such as '1' ) will send 28 . A DTMF can be heard on most Whelen Outdoor Warning systems. however in the USA only Bell 202 modulated FSK signaling is used to transfer the data.

equipment. The multiple tones are the reason for calling the system multifrequency. Most European countries use a single frequency. where the United States uses a dual frequency system. DTMF keypad frequencies (with sound clips) 1209 Hz 1336 Hz 1477 Hz 1633 Hz 697 Hz 1 2 3 A 770 Hz 4 5 6 B 852 Hz 7 8 9 C 941 Hz * 0 # D Special tone frequencies National telephone systems define additional tones to indicate the status of lines. These tones are then decoded by the switching center to determine which key was pressed. so each button activated two contacts. or the result of calls with special tones. The original keypads had levers inside. presented in the following table.a sinusoidal tone for each of the two frequencies (697 and 1209 hertz (Hz)). Such tones are standardized in each country and may consist of single or multiple frequencies. Event Low frequency High frequency Busy signal 480 Hz 620 Hz 29 .

although an unreleased x86port existed. In 2008 a new. The high frequencies may be the same volume or louder as the low frequencies when sent across the line. No frequency is a multiple of another. Symbian OS and its associated user interfaces S60. Synonyms include multifrequency pulsing and multifrequency signaling. The frequencies may not vary more than ±1. open source software. independent non-profit organization called the Symbian Foundation was established and the former Symbian Software Limited was acquired by Nokia.Ringback tone (US) 440 Hz 480 Hz Dial tone 350 Hz 440 Hz The tone frequencies. as defined by the Precise Tone Plan. are selected such that harmonics and intermodulation products will not cause an unreliable signal. which is slightly less than a whole tone. the difference between any two frequencies does not equal any of the frequencies. It was a descendant of Psion's EPOC and runs exclusively on ARM processors. frameworks and reference implementations of common tools. The loudness difference between the high and low frequencies can be as large as 3 decibels (dB) and is referred to as "twist. The frequencies were initially designed with a ratio of 21/19. with associated libraries. and the sum of any two frequencies does not equal any of the frequencies. DTMF can be decoded using the Goertzel algorithm.8% from their nominal frequency." The minimum duration of the tone should be at least 70 ms. although in some countries and applications DTMF receivers must be able to reliably detect DTMF tones as short as 45ms. developed by Symbian Ltd. DTMF was originally decoded by tuned filter banks. The process of publishing the source 30 . or the switching center will ignore the signal. Symbian OS was designed for mobile devices. UIQ and MOAP(S) were contributed by their owners to the foundation with the objective of creating the Symbian platform as royalty-free. As with other multi-frequency receivers. Late in the 20th century most were replaced with digital signal processors. user interface.

Symbian uses a microkernel. Later OS iterations diluted this approach in response to market demands. and the CPU is switched into a low power mode when applications are not directly dealing with an event. and maintains separation between user interface and engine. Symbian OS was created with three systems design principles in mind:    the integrity and security of user data is paramount. This has allowed 31 . a phone in which a single processor core executes both the userapplications and the signalling stack. has a request-and-callback approach to services.g. Symbian features pre-emptive multitasking and memory protection. as described in this entry. user time must not be wasted. all Symbian programming is event-based. EPOC's approach to multitasking was inspired by VMS and is based on asynchronous server-based events. Furthermore. did not. Similarly the Symbian approach to threads and processes is driven by reducing overheads. There are similar techniques for conserving disk space (though the disks on Symbian devices are usually flash memory). Applications. This is a feature which is not available in Linux.code under the Eclipse Public License (EPL) was slated for completion in 2010. like other operating systems (especially those created for use on desktop computers). and the OS itself. The OS is optimized for low-power battery-based devices and for ROM-based systems (e. follow an object-oriented design: Model-view-controller (MVC). and all resources are scarce. This is achieved through a programming idiom called active objects. notably with the introduction of a real-time kernel and a platform security model in versions 8 and 9. The Symbian kernel (EKA2) supports sufficiently-fast real-time response to build a single-core phone around it—that is. There is a strong emphasis on conserving resources which is exemplified by Symbian-specific programming idioms such as descriptors and a cleanup stack.[2] The term 'Symbian OS' went out of current use with the advent of the Symbian platform. To best follow these principles. however the software itself. features like XIP and re-entrancy in shared libraries).

Qualcomm's BREW. Symbian has a microkernel architecture. Google Android. availability and responsiveness. it includes the File Server and User Library. cheaper and more power efficient than their predecessors[citation needed].3% and Microsoft having 13.Symbian EKA2 phones to become smaller. telephony and filesystem support are placed in the OS Services Layer or the Base 32 .6% share of the smart mobile devices shipped in third quarter of 2008. with Apple having 17.5% (through Windows CE and Windows Mobile). which means that the minimum necessary is within the kernel to maximise robustness. a PlugIn Framework which manages all plug-ins. RIM having 15.3% (through iPhone OS). Competition Symbian is the leading OS in the "smart mobile device" market. It also includes the Text Window Server and the Text Shell: the two basic services from which a completely functional port can be created without the need for any higher layer services. DBMS and cryptographic services. SavaJe and MontaVista Software. from top to bottom:      UI Framework Layer Application Services Layer  Java ME OS Services Layer  generic OS services  communications services  multimedia and graphics services  connectivity services Base Services Layer Kernel Services & Hardware Interface Layer The Base Services Layer is the lowest level reachable by user-side operations. It contains a scheduler. Store. but other services like networking.memory management and device drivers. Other competitors include Palm OS. Structure yers. Central Repository. Statistics published in November 2008 showed that Symbian OS had a 46.

The three major UIs . These classes create the fundamental application behaviour. data model and data interface. are created independently and interact solely through their APIs with the other classes. All native Symbian C++ applications are built up from three framework classes defined by the application architecture: an application class. contains only the most basic primitives and requires an extended kernel to implement any other abstractions. text layout and font rendering libraries. Many of these are frameworks. Only the base classes and substructure were contained in Symbian OS. but an object-oriented persistence model was placed over the underlying FAT to provide a POSIX-style interface and a streaming model. Symbian is designed to emphasize compatibility with other devices. The remaining required functions. The inclusion of device drivers means the kernel is not a true microkernel. Each of these has a plug-in scheme. Java ME providing another set of APIs on top of most of the OS and multimedia. This has the 33 . and vendors are expected to supply plug-ins to these frameworks from third parties (for example. IrDA and USB.S60. SyncML. UIQ and MOAP .were contributed to Symbian in 2009. a document class and an application user interface class. the application view. There is also a large volume of user interface (UI) Code. Many other things do not yet fit into this model – for example. The EKA2 real-time kernel.PRT" protocol modules to implement various networking protocol schemes. There is a large networking and communication subsystem. Early development of EPOC led to adopting FAT as the internal file system. Symbian also contains graphics. This has resulted in data-dependence and associated difficulties with changes and data migration. while most of the actual user interfaces were maintained by third parties. especially removable media file systems. which has been termed a nanokernel. which has three main servers called: ETEL (EPOC telephony). Helix Player for multimedia codecs). The internal data formats rely on using the same APIs that create the data to run all file manipulations. The subsystem also contains code that supports short-range communication links. such as Bluetooth.Services Layer. ESOCK (EPOC sockets) and C32 (responsible for serial communication). For example ESOCK allows different ". This is no longer the case. and this remains.

although the operating system treated them as 32-bit processors. Windows Vista does not support the Itanium architecture. Symbian includes a reference user-interface called "TechView". Microsoft dropped support for the Itanium version of Windows XP in 2005. With the introduction of the Intel Itanium architecture. Versions of NT from 3. although Windows 7 does not. Microsoft released Windows XP Professional x64 Edition and x64 versions of Windows Server 2003 to support the x8664 (or x64 in Microsoft terminology) architecture. The modern 64-bit Windows family comprises AMD64/Intel64 versions of Windows Vista. Windows Server 2008 R2 drops the 32bit version. Itanium versions of Windows XP and Windows Server 2003 were released at the same time as their mainstream x86 (32-bit) counterparts. and that vendors get a lot of flexibility. It provides a basis for starting customisation and is the environment in which much Symbian test and example code runs. and Windows Server 2008. NTT DoCoMo. 34 . and Sony Ericsson. in both Itanium and x64 editions. including Symbian OS. 64-bit operating systems Windows NT included support for several different platforms before the x86-based personal computer became dominant in the professional world. Windows Vista is the first end-user version of Windows that Microsoft has released simultaneously in x86 and x64 editions. On April 25. some of which were 64-bit processors. 2005. which is referred to as IA-64. Microsoft released new versions of Windows to support it. DEC Alpha and MIPS R4000.0 variously supported PowerPC. UIQ and MOAP(S) user interfaces.advantage that the APIs to such areas of functionality are the same on many phone models. But it means that phone vendors needed to do a great deal of integration work to make a Symbian OS phone. It was created by merging and integrating software assets contributed by Nokia.1 to 4. the S60. It is very similar to the user interface from the Psion Series 5 personal organiser and is not used for any production phone user interface. The Symbian platform is an open source operating system for mobile devices.

or the number of bits used for single element in a data format. File viruses can often spread to other files when infected programs are run in Virtual DOS Machines (VDM) within OS/2. 32-Bit Operating Systems One of the significant environmental changes will be the transition from DOS to 32-bit operating systems for PCs. such as OS/2 and Windows 95. Operating system: refers primarily to the number of bits used to represent memory addresses.1 and Windows 95 programs. The term is often applied to the following: microprocessor: indicates the width of the registers. In the next few years. The effects of computer viruses on OS/2 systems is described elsewhere. However. which is often only as long as the infected program is running. Microsoft's Windows 95 is a 32-bit operating systems that supports DOS. IBM's OS/2 is a 32-bit operating system that lets users run DOS.32-Bit Operating Systems Refers to the number of bits that can be processed or transmitted in parallel. This decreases the rate at which file viruses spread in collections of OS/2 systems. they remain active in the system only as long as the infected VDM is active. Windows 3. we expect that more and more systems will run 32bit operating systems in order to better use the increasing power of newer PCs. though they can spread from systems that have DOS as well as OS/2 installed in separate partitions. Windows and OS/2 programs simultaneously. Some file viruses are likely to not spread in VDMs. we would expect this to lead to a decline in prevalence of all current DOS viruses. A 32-bit microprocessor can process data and memory addresses that are represented by 32 bits. Recent experiments with a prerelease version of Windows 95 suggest that DOS boot viruses will not in 35 . Boot viruses do not generally spread from within OS/2 itself. In environments in which OS/2 predominates over DOS. simply because of differences between VDMs and DOS.

In environments in which Windows 95 predominates over DOS. but it will not eliminate it. some might not. Viruses can be written for 32-bit operating systems. Usually these committees are used on a temporary basis. to a tailor-made suit. Ad hoc committee commission or organization Ad hoc organizations. we would also expect this to lead to a decline in prevalence of all current DOS viruses. adhoc and ad-hoc. Other derivatives of the Latin include AdHoc. Preliminary experiments carried out at the High Integrity Computing Laboratory with a pre-release version of Windows 95 suggest that some DOS file viruses will spread as usual. File viruses were not tested in these experiments. nongeneralizable. or improvised events. Common examples are organizations. however. a handcrafted network protocol or a purpose-specific equation. and which cannot be adapted to other purposes. It generally signifies a solution designed for a specific problem or task. Not all of the news is good. such as temporary oversight of an issue. and the first few such crude viruses have already appeared .general spread well from Windows 95 systems. to include committees and private non-profit organizations. inadequate planning. or review of the standing rules or theconstitution of that organization. 36 . committees. Ad hoc can also have connotations of a makeshift solution. In other fields the term may refer. and some might cause system problems. perhaps significantly. are used when an objective needs consideration and no standing organ or committee within said organization can absorb that issue into its scope. for example. ------------------------------------Ad hoc is a Latin phrase which means "for this [purpose]". The transition to these newer operating systems will change the virus problem. and commissions created at the national or international level for a specific task. These operating systems offer new facilities that viruses can use to both hide and spread.

exhibitions. A typical example is the OSCE. such as the MerriamWebster dictionary. a long-term or indefinite duration of existence. however. In these cases. Scientists are often skeptical of theories that rely on frequent. where the capitalization shows which syllable is stressed. Ad hoc hypothesis Main article: Ad hoc hypothesis In science and philosophy. it has been found to correspond quite well to the theories of dark energy. published works[citation needed]. This is in contrast to systems such as the International Phonetic 37 .[1] Much of scientific understanding relies on the modification of existing hypotheses or theories but these modifications are distinguished from ad hoc hypotheses in that the anomalies being explained propose a new means of being real.S. and can be used as corporate body access points. Under the Anglo-American Cataloguing Rules. ad hoc means the addition of extraneous hypotheses to a theory to save it from being falsified. Ad hoc hypotheses compensate for anomalies not anticipated by the theory in its unmodified form. An example of an ad hoc pronunciation would be "DIK-shuh-nair-ee". in some cases. Ad hoc hypotheses are often characteristic ofpseudoscientific subjects. ad hoc events such as athletic contests. An interesting example of an apparently supported ad hoc hypothesis was Albert Einstein's addition of the cosmological constant to general relativity in order to allow a static universe. unsupported adjustments to sustain them. an initial workgroup or forum may give place to a more permanent form of organization.[2] Ad hoc pronunciation Many reference works employ ad hoc pronunciation schemas as a way of indicating how words are pronounced. expeditions. Although he later referred to it as his "greatest blunder". These are especially popular in U. Ad hoc hypotheses are not necessarily incorrect.An ad hoc organization may have. and festivals are considered to be corporate bodies. fairs.

data mining and other tools. pre-programmed and optimized for performance by expert programmers. it is usually provided over a data warehouse. or database schema that a programmer would have. Data warehousing. ------------------------------------------------ Wireshark 38 . Typically this would be via a userfriendly GUI-based system without the need for the in-depth knowledge of SQL. there is no "standard" ad hoc schema. Ad hoc querying Ad hoc querying is a term in information science. Many application software systems have an underlying database which can be accessed by only a limited number of queries and reports. "ad hoc" reporting systems allow the users themselves to create specific. As its name suggests. which attempt to put pronunciation schemes on a standard footing. Proponents of ad hoc claim that it is much easier to use than IPA. and will have been carefully designed.Alphabet. since they rely on the ability of the reader to already know how a large number of words are commonly pronounced. along with OLAP. customized queries. though will often concur that this is usually only because the pronunciation is already known. though very often neo-common simple words are used to illustrate how the IPA applies in a specific language. In contrast. Critics of ad hoc schemes point out that such schemes are inherently selfreferential. Typically these are available via some sort of menu. Because such reporting has the potential to severely degrade the performance of a live system. By contrast. Ad hoc querying/reporting is a business intelligence subtopic. the IPA seeks to base pronunciation solely on vocal tract configurations and on the phonemes produced. and so examples will vary considerably according to the publication's whim.

software andcommunications protocol development. analysis. It is used for network troubleshooting.2. Originally named Ethereal. 12 days ago Written in C Operating system Cross-platform Type Packet analyzer License GNU General Public License Website http://www.Wireshark Wireshark on Ubuntu Developer(s) The Wireshark team Stable release 1. 12 days ago Preview release 1.org/ Wireshark is a free packet analyzer computer application.3.0 / 2009-09-15. and education. 39 .2 / 2009-09-15.wireshark. in May 2006 the project was renamed Wireshark due to trademark issues.

It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode. and many more information sorting and filtering options. running on various computer operating systemsincluding Linux. Network Integration Services) when he changed jobs. 2006.Contents [hide] 1 The functionality 2 History 3 Features 4 Security 5 Ports 6 References 7 Bibliography 8 External links The functionality Wireshark is very similar to tcpdump. but it has a graphical front-end. the entire list of authors is available from Wireshark's web-site. Mac OS X. Gerald Combs (a computer science graduate of the University of Missouri-Kansas City) started writing a program called Ethereal so that he could have a tool to capture and analyze packets. he released the first version around 1998. Released under the terms of the GNU General Public License. As of now there are over 500 contributing authors while Gerald continues to maintain the overall code and issues releases of new versions. and Microsoft Windows. The name was changed to Wireshark in May. because creator and lead developer Gerald Combs could not keep using the Ethereal trademark (which was then owned by his old employer. Wireshark uses the cross-platform GTK+ widget toolkit. History Out of necessity. and is crossplatform. Wireshark isfree software.[1] He still held copyright on most of the source code (and the rest was redistributable under the GNU 40 .

so it can read capture files from applications such as tcpdump and CA NetMaster that use that format.[3] Features Wireshark is software that "understands" the structure of different networking protocols.11.[2] eWEEK Labs named Wireshark one of "The Most Important OpenSource Apps of All Time" as of May 2. Data display can be refined using a display filter. Wireshark uses pcap to capture packets. Thus. IEEE 802. and its captures can be read by applications that use libpcap or WinPcap to read capture files. and Microsoft Network Monitor. PPP. Ethereal development has ceased. Wireshark's native network trace file format is the libpcap format supported by libpcap and WinPcap. Live data can be read from a number of types of network. It can also read captures from other network analyzers. Taking into account the huge number of protocol dissectors.       Data can be captured "from the wire" from a live network connection or read from a file that records the already-captured packets. 2007. or via the terminal (command line) version of the utility. such as snoop. and loopback. Captured network data can be browsed via a GUI. so he took theSubversion repository for Ethereal and used it as the basis for the Subversion repository of Wireshark. For this reason.Network General's Sniffer. tshark.GPL). older versions of Ethereal/Wireshark and tethereal/tshark often ran withsuperuser privileges. Plugins can be created for dissecting new protocols. which are called when traffic for their protocol is 41 . and an Ethereal security advisory recommended switching to Wireshark. Captured files can be programmatically edited or converted via command-line switches to the "editcap" program. so it can only capture the packets on the networks supported by pcap. Security Capturing raw network traffic from an interface requires special privileges on some platforms. it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. including Ethernet.

this can pose a serious security risk given a bug in a dissector. FreeBSD. In telecommunications. Modem (from modulator-demodulator) is a device that modulates (Modulation is the process of varying one waveform in relation to another waveform. As of Wireshark 0. with superuser privileges to capture packets into a file. HPUX.99. The three key parameters of a sine wave are its amplitude ("volume"). and later analyze these packets by running Wireshark with restricted privileges on the packet capture dump file. Due to the rather large number of vulnerabilities in the past (of which many have allowed remote code execution) and developers' doubts for better future development. On platforms where special privileges are needed to capture traffic. including Linux. and neither of them should be run with special privileges. it is possible to use the Aircrack wireless security tools to capture IEEE 802.6 release.11 frames and read the resulting dump files with Wireshark. or a musician may modulate the tone from a musical instrument by varying its volume.neither Wireshark nor tshark need to run with special privileges. timing and pitch.[4] One possible alternative is to run tcpdump. only dumpcap needs to be set up to run with those special privileges . NetBSD.captured. Ports Wireshark runs on Unix and Unix-like systems. 42 . all of which can be modified in accordance with a low frequency information signal to obtain the modulated signal. Wireshark and tshark run dumpcap to do traffic capture. or the dumpcap utility that comes with Wireshark. On wireless networks. and on Microsoft Windows.7. itsphase ("timing") and its frequency ("pitch"). Solaris. modulation is used to convey a message. OpenBSD and Mac OS X.OpenBSD removed Ethereal from its ports tree prior to its 3. Often a high-frequency sinusoidwaveform is used as carrier signal to convey a lower frequency signal.

pneumatic. an aneroid barometer uses rotary position as the signal to convey pressure information. Such information or machine data (for example. i. signal processing. The frequency for a given radio or television station is actually the carrier wave's center frequency. or carrier is a waveform (usually sinusoidal) that is modulated (modified) with an input signal for the purpose of conveying information. 43 . or the words now flowing into the reader's mind) must all be part of systems existing in the physical world – either living or non-living. a signal is any time-varying or spatial-varying quantity. Modems can be used over any means of transmitting analog signals (An Analog or analogue signal is any continuous signal for which the time varying feature (variable) of the signal is a representation of some other time varying quantity. any quantity measurable through time or over space can be taken as a signal. The carrier must be reintroduced at the receiver by a beat frequency oscillator (BFO). the property most commonly used is voltage followed closely by frequency. In the fields of communications.e analogous to another time varying signal. and also demodulates such a carrier signal to decode the transmitted information. the ink making up text on a paper page. An analog signal uses some property of the medium to convey the signal's information. and in electrical engineering more generally.[1] This carrier wave is usually of much higher frequency than the input signal. Frequency modulation (FM) and amplitude modulation (AM) are commonly used methods to modulate the carrier. For example. any set of human information or machine data can also be taken as a signal. A device that can do both operations is a modem (short for "Modulator-Demodulator")) an analog carrier signal (n telecommunications. It differs from a digital signal in terms of small fluctuations in the signal which are meaningful. hydraulic. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data.A device that performs modulation is known as a modulator and a device that performs the inverse operation of modulation is known as ademodulator (sometimes detector or demod). a carrier wave. current. and charge. the dots on a screen. and other systems may also convey analog signals. In the case of single-sideband modulation (SSB) the carrier is suppressed (and in some forms of SSB eliminated).mechanical. In the physical world.) to encode digital information. Analog is usually thought of in an electrical context. however. Electrically. Within a complex society.

temperature.). orpressure. light. sound) strike the diaphragm of a microphone which induces corresponding fluctuations in the current produced by a coil in an electromagnetic microphone. Therefore. An analog signal has a theoretically infinite resolution. As analog systems become more complex. in digital systems. as digital systems become more complex. Real diodes do not display such a perfect on-off directionality but have a more complex nonlinear electrical characteristic. or the voltage produced by a condensor microphone. which depends on the particular type of diode technology. A comparable performing digital system is more complex and requires more bandwidth than its analog counterpart. Diodes have two active electrodes between which the signal of interest may flow.Any information may be conveyed by an analog signal.[citation needed] In analog systems. the diode can be thought of as an electronic version of a check valve. from driven diodes (In electronics. Diodes also have many other functions in which they are not designed to operate in this on-off manner. degradation can not only be detected but corrected as well. However. position. and is achieved using a transducer. The most common function of a diode is to allow an electric current in one direction (called the forward biased condition) and to block the current in the opposite direction (the reverse biased condition). Thus. In practice an analog signal is subject to noise and a finite slew rate. a diode is a two-terminal P-N junction device (thermionic diodes may also have one or two ancillary terminals for a heater). Similarly. such as sound. The unidirectionality most diodes exhibit is sometimes generically called the rectifying property. errors can occur in the digital data stream. For example. often such a signal is a measured response to changes in physical phenomena. and most are used for their unidirectional electric current property. The voltage or the current is said to be an "analog" of the sound. it is difficult to detect when such degradation occurs. both analog and digital systems are subject to limitations in resolution and bandwidth. 44 . effects such as non-linearity and noise ultimately degrade analog resolution to such an extent that the performance of digital systems may surpass it. in sound recording. fluctuations in air pressure (that is to say.

aka tones. or "bps". or network connection. or base-2 number system represents numeric values using two symbols. the binary system is used internally by all modern computers) of a personal computer into sounds that can be transmitted over thetelephone lines of Plain Old Telephone Systems (POTS) (Plain old telephone service (POTS) is the voice-grade telephone service that remains the basic form of residential and small business service connection to the telephone network in most parts of the world. The system was originally known as the Post Office Telephone Service or Post Office Telephone System in many countries. When radio waves pass an electrical conductor. orphase.) to radio (Radio is the transmission of signals by modulation of electromagnetic waves with frequencies below those of visible light. usually 0 and 1. The most familiar example is a voice band modem that turns the digital 1s and 0s (The binary numeral system. normally measured in bits per second. Information is carried by systematically changing (modulating) some property of the radiated waves. frequency. The name is a retronym.[1]Electromagnetic radiation travels by means of oscillating electromagnetic fields that pass through the air and the vacuum of space.Early diodes included “cat’s whisker” crystals and vacuum tube devices (also called thermionic valves). the oscillating fields induce an alternating current in the conductor.). the number of times the modem changes its signal state per second. to carry 300 bit/s using 300 baud. and once received on the other side.21 standard used audio frequency-shift keying. Ethernet. Modems are generally classified by the amount of data they can send in a given time. mobile phones and VoIP. such as amplitude. serial. converts those 1s and 0s back into a form used by a USB. Today most diodes are made of silicon. They can also be classified by Baud. The term was dropped as telephone services were removed from the control of national post offices). 45 . For example. Owing to its straightforward implementation in digital electronic circuitry using logic gates. the usualbase-2 system is a positional notation with a radix of 2. but othersemiconductors such as germanium are sometimes used. electronic telephone exchanges and fiber-optic communication into the public switched telephone network (PSTN). in a form mostly unchanged to the normal user despite the introduction of Touch-Tone dialing. More specifically. the ITU V. POTS has been available almost since the introduction of the public telephone system in the late 19th century. and is a reflection of the telephone service still available after the advent of more advanced forms of telephony such as ISDN. This can bedetected and transformed into sound or other signals that carry information.

i.whereas the original ITU V. Some microwave modems transmit more than a hundred million bits per second.g. it is the telephone number to the SIM card in a mobile/cellular phone. while the MSISDN can change in time (e. = MSISDN is a number uniquely identifying a subscription in a GSM or UMTS mobile network. MSISDN is defined by the E.164 numbering plan. The abbreviation has several interpretations. "wide band radio modems" transmit repeating frames of data at very high data rates over microwave radio links. Most intercontinental data links now use optical modems transmitting over undersea optical fibers. One kilobit per second (kbit/s or kb/s or kbps) as used in this article means 1000 bits per second and not 1024 bits per second. due to number portability). different MSISDNs can be associated to the SIM. the card that is inserted into the mobile phone.e. In telecommunications.164.2k mainly for private radio networks. For example. Optical modems routinely have data rates in excess of a billion (1x109) bits per second. Optical modems transmit data over optical fibers.[1] The MSISDN together with IMSI are two important numbers used to identify a mobile subscriber. IMSI is often used as a key in the HLR ("subscriber database") and MSISDN is the number normally dialed to connect a call to the mobile phone. i. Faster modems are used by Internet users every day. Simply put. Mobile Station International Subscriber Directory Number (MSISDN) .000 bits (7kB) per second over the phone line. most common one being "Mobile Subscriber Integrated Services Digital Network Number". while the latter is used to route calls to the subscriber. Narrow band radio modem is used for low data rate up to 19. The MSISDN follows the numbering plan defined in the ITUT recommendation E.22 standard allowed 1200 bit/s with 600 baud using phase-shift keying. The former identifies the SIM.a number used to identify a mobile phone number internationally. A SIM is uniquely associated to an IMSI. notably cable modems and ADSL modems. a 56k modem can transfer data at up to 56.e. This number includes a country 46 .

written in a way that means it can be called from several programming languages (typically an assembly or C interface). but also to one function. An API may be:  Language-dependent. This is a desired feature for a servicestyle API that is not bound to a given process or system and is available as a remote procedure call.[1][2][3] An API determines the vocabulary and calling conventions the programmer should employ to use the services. The related term application binary interface(ABI) is a lower level definition concerning details at the assembly language level. the scope of meaning is usually determined by the person or document that communicates the information. using the syntax and elements of that language to make the API convenient to use in this context. 47 . the Linux Standard Base is an ABI. It may include specifications for routines. Thus. Language-independent. that is. available only in a given programming language. that is. data structures.code and a National Destination Code which identifies the subscriber's operator. while POSIX is an API. The software that provides the functionality described by an API is said to be an implementation of the API.[4] The API initialism may sometimes be used as a reference. For example. not only to the full interface. or even a set of multiple APIs provided by an organization. and protocols used to communicate between the requesting software and the library. An application programming interface (API) is an interface in computer science that defines the ways by which an application program may request services from libraries and/oroperating systems. object classes. An API is typically defined in terms of the programming language used to build the application.  An API itself is largely abstract in that it specifies an interface and controls the behavior of the objects specified in that interface.

Web APIs
When used in the context of web development, an API is typically a defined set of Hypertext Transfer Protocol (HTTP) request messages along with a definition of the structure of response messages, usually expressed in an Extensible Markup Language (XML) or JavaScript Object Notation (JSON) format. While "Web API" is virtually a synonym for web service, the recent trend (so-called Web 2.0) has been away from Simple Object Access Protocol (SOAP) based services towards more direct Representational State Transfer (REST) style communications[5]. Web APIs allow the combination of multiple services into new applications known as mashups [6].

Unstructured Supplementary Service Data is a capability of all GSM phones. It is generally associated with real-time or instant messaging type phone services. There is no store-and-forward capability, such as is typical of other short-message protocols (in other words, an SMSC is not present in the processing path). Response times for interactive USSD-based services are generally quicker than those used for SMS. USSD Phase 1, specified in GSM 02.90, only supports mobile initiated operation (pull operation). In the core network the message is delivered over MAP. USSD Phase 2, specified in GSM 03.90, supports networkinitiated operation (pulls and push operation). As an analogy, USSD is similar to telnet, while SMS is similar to mail. USSD is typically used as a 'trigger' to invoke independent calling services that don't require the overhead and additional usage costs of an SMSC, such as a callback service (e.g. cheaper phone charges while roaming), or interactive data service (e.g. stock quotes, sports results). USSD is a standard for transmitting information over GSM signaling channels. It is mostly used as a method to query the available balance and other similar information in pre-paid GSM services. The function that is triggered when sending USSD is network-dependent and depends on the specific services the operator is offering. Example USSD codes: 48

 

*101# *109*72348937857623#

After entering a USSD code on your GSM handset, the reply from the GSM operator is displayed within a few seconds. USSD is the base of some payment methods such as SharEpay, SWAP Mobile in South Africa, Mobipay in Spain, M-Pesa in Kenya, and mPay in Poland.

What is a USSD Gateway?
A USSD Gateway routes USSD messages from the signaling network to service applications and back. "USSD gateway" and "USSD center" are synonyms. USSD Gateway is based upon the ability of the delivery agent or the source to send and receive USSD messages. As USSD is a session-based protocol unlike its siblings (SMS and MMS), therefore, the session needs to be allocated to each and every interaction.

Difference between USSD and other Gateways
The difference between USSD Gateways and other kinds of gateways is that USSD Gateways require to know what session is going on. Also, put in the locator (it locates where the MS (Mobile Station) is currently), and you have a highly dynamic session – based protocol.

=
Crystal Reports is a business intelligence application used to design and generate reports from a wide range of data sources. Several other applications, such as Microsoft Visual Studio, bundle an OEM version of Crystal Reports as a general purpose reporting tool.[1] Crystal Reports became the de facto standard report writer when Microsoft released it with Visual Basic.[citation needed]
=

Java Naming and Directory Interface
49

Jump to: navigation, search

The Java Naming and Directory Interface (JNDI) is a Java API for a directory service that allows Java software clients to discover and look up data and objects via a name. Like all Java APIs that interface with host systems, JNDI is independent of the underlying implementation. Additionally, it specifies a service provider interface (SPI) that allows directory service implementations to be plugged into the framework. The implementations may make use of a server, a flat file, or a database; the choice is up to the vendor. The Java Naming and Directory Interface (JNDI) is part of the Java platform, providing applications based on Java technology with a unified interface to multiple naming and directory services. Powerful and portable directory-enabled applications can be built using this industry standard.

Application server
Jump to: navigation, search

An application server, is an n-tier software architecture, serves an API to expose business logic and business processes for use by third-party applications.[1] The term can refer to:
1. the services that a server makes available 2. the computer hardware on which the services run 3. the software framework used to host the services

50

) NEC WebOTX. A program that handles all application operations between users and an organization's backend business applications or databases. Application servers are typically used for complex transaction-based applications. the term application server sometimes refers to a J2EE or Java EE 5 application server. (NEC) crop. monitors for high-availability.Contents         1 Java application servers 2 Microsoft platform 3 Zend platform 4 Other platforms 5 Advantages of application servers 6 See also 7 External links 8 Footnotes Java application servers Following the success of the Java platform. Some of the better-known Java Enterprise Edition application servers include:              Tcat Server (MuleSoft) WebSphere Application Server and WebSphere Application Server Community Edition (IBM) Sybase Enterprise Application Server (Sybase Inc) WebLogic Server (Oracle) JBoss (Red Hat) JRun (Adobe Systems) Apache Geronimo (Apache Software Foundation) Oracle OC4J (Oracle) Sun GlassFish Enterprise Server (based on GlassFish Application Server)(Sun Microsystems) SAP Netweaver AS (ABAP/Java) (SAP) Glassfish Application Server (open source) WebObjects (Apple Inc. an application server has to have builtin redundancy. high-performance distributed application services and support for complex database access. Also called an appserver. 51 . To support high-end needs.

etc. 2. columns. or a collection of data including multiple content items and hierarchical levels. size. Metadata is text. a Certificate Authority (CA).2. data type. metadata would document data about data elements or attributes. the date it was last modified and the date the file (or indeed the metadata itself) was last accessed. Metadata may include descriptive information about the context. 1. or characteristics of the data. group. 1. how it is associated. An example of metadata occurs within file systems. This is in short how it works. What is SSL and what are Certificates? The Secure Socket Layer protocol was created by Netscape to ensure secure transactions between web servers and browsers. other data managed within an application or environment. voice. etc) and data about data (where it is located. etc) and data about records or data structures (length. The web server sends its public key with its certificate.). Associated with every file on the storage medium is metadata that records the date the file was created. It may be recorded with high or low granularity. This commonly defines the structure or schema of the primary data. In data processing. or sometimes metainformation) is "data about data". or documentation of. metadata provides information about. (name. The audience could be a person. 52 .[1]An item of metadata may describe an individual datum. of any sort in any media.Metadata (meta data. Metadata is important because it aids in clarifying and finding the actual data. The protocol uses a third party. For example. A browser requests a secure page (usually https://). or software program. such as a database schema. quality and condition. or image that describes what the audience wants or needs to see or experience. or content item. ownership. fields. to identify one end or both end of the transactions.

you have to implicitly trust: you have his/her certificate loaded in your browser (a root Certificate).2. The browser checks that the certificate was issued by a trusted party (usually a trusted root CA). because you have encrypted it with you private key. The trick in a key pair is to keep one key secret (the private key) and to distribute the other key (the public key) to everybody.3. and only the associated public key will decrypt it correctly. therefore you also trust this certificate. to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data. the other key pair can decrypt.1. right? In the opposite . A certificate. contains information about the owner of the certificate. you can certify that a message is only coming from you. Private Key/Public Key: The encryption using a private key/public key pair ensures that the data can be encrypted by one key but can only be decrypted by the other key pair. in this case the message is not secured you have only signed it. It contains also the public key and finally a hash to ensure that the certificate has not been tampered with. This is a certificate 53 .2. The browser then uses the public key. The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data. like e-mail address. certificate usage. 4. The Certificate: How do you know that you are dealing with the right person or rather the right web site. Everybody has the public key. but believe me it works. remember! One of the problem left is to know the public key of your correspondent. The browser decrypts the http data and html document using the symmetric key and displays the information. Several concepts have to be understood here. owner's name. 7. that only you will be able to decrypt. that the certificate is still valid and that the certificate is related to the site contacted. 1. Usually you will ask him to send you a non confidential signed message that will contains his publick key as well as a certificate. Well. Beware. 5. 6. This is sometime hard to understand. resource location or Distinguished Name (DN) which includes the Common Name (CN) (web site address or e-mail address depending of the usage) and the certificate ID of the person who certifies (signs) this information. As you made the choice to trust the person who signs this certificate. Anybody can send you an encrypted message. The key pair is based on prime numbers and their length in terms of bits ensures the difficulty of being able to decrypt the message without the key pairs. You are the only one to have the other key pair.2. Message-->[Public Key]-->Encrypted Message-->[Private Key]-->Message 1. The web server sends back the requested html document and http data encrypted with the symmetric key. The keys are similar in nature and can be used alternatively: what one key emcrypts. someone has taken great length (if they are serious) to ensure that the web site owners are who they claim to be. duration of validity. This someone.

You can sign a certificate using itself.org Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:ba:54:2c:ab:88:74:aa:6b:35:a5:a9:c1:d0:5a: 9b:fb:6b:b5:71:bc:ef:d3:ab:15:cc:5b:75:73:36: b8:01:d1:59:3f:c1:88:c0:33:91:04:f1:bf:1a:b4: 7a:c8:39:c2:89:1f:87:0f:91:19:81:09:46:0c:86: 08:d8:75:c4:6f:5a:98:4a:f9:f8:f7:38:24:fc:bd: 94:24:37:ab:f1:1c:d8:91:ee:fb:1b:9f:88:ba:25: da:f6:21:7f:04:32:35:17:3d:36:1c:fb:b7:32:9e: 42:af:77:b6:25:1c:59:69:af:be:00:a1:f8:b0:1a: 6c:14:e2:ae:62:e7:6b:30:e9 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Comment: OpenSSL Generated Certificate X509v3 Subject Key Identifier: FE:04:46:ED:A0:15:BE:C1:4B:59:03:F8:2D:0D:ED:2A:E0:ED:F9:2F X509v3 Authority Key Identifier: keyid:E6:12:7C:3D:A1:02:E5:BA:1F:DA:9E:37:BE:E3:45:3E:9B:AE:E5:A6 DirName:/C=FJ/ST=Fiji/L=Suva/O=SOPAC/OU=ICT/CN=SOPAC Root CA/Email=administrator@sopac.org serial:00 Signature Algorithm: md5WithRSAEncryption 34:8d:fb:65:0b:85:5b:e2:44:09:f0:55:31:3b:29:2b:f4:fd: aa:5f:db:b8:11:1a:c6:ab:33:67:59:c1:04:de:34:df:08:57: 2e:c6:60:dc:f7:d4:e2:f1:73:97:57:23:50:02:63:fc:78:96: 34:b3:ca:c4:1b:c5:4c:c8:16:69:bb:9c:4a:7e:00:19:48:62: e2:51:ab:3a:fa:fd:88:cd:e0:9d:ef:67:50:da:fe:4b:13:c5: 0c:8c:fc:ad:6e:b5:ee:40:e3:fd:34:10:9f:ad:34:bd:db:06: ed:09:3d:f2:a6:81:22:63:16:dc:ae:33:0c:70:fd:0a:6c:af: bc:5a -----BEGIN CERTIFICATE----MIIDoTCCAwqgAwIBAgIBATANBgkqhkiG9w0BAQQFADCBiTELMAkGA1UEBhMCRkox DTALBgNVBAgTBEZpamkxDTALBgNVBAcTBFN1dmExDjAMBgNVBAoTBVNPUEFDMQww 54 . O=SOPAC. All root CA certificates are self signed. OU=ICT. ST=Fiji.sopac. Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: md5WithRSAEncryption Issuer: C=FJ. CN=SOPAC Root CA/Email=administrator@sopac. A certificate is insecure until it is signed.org/Email=administrator@sopac. ST=Fiji. L=Suva.org Validity Not Before: Nov 20 05:47:44 2001 GMT Not After : Nov 20 05:47:44 2002 GMT Subject: C=FJ. L=Suva. O=SOPAC. CN=www. as only a signed certificate cannot be modified.trust tree or certificate path. Usually your browser or application has already loaded the root certificate of well known Certification Authorities (CA) or root CA Certificates. it is called a self signed certificate. The CA maintains a list of all signed certificates as well as a list of revoked certificates. OU=ICT.

This certificate has all the elements to send an encrypted message to the owner (using the public key) or to verify a message signed by the author of this certificate. then he would have been able to sue 55 . 1. using symmetric or asymmetric methods. The symmetric key is also chosen randomly. You must therefore transmit the key to the other party without the enemy getting its hands on it. then the message encrypted with the public key is secure (relatively secure. You have never transmitted your private key to anybody. the certificate contains the reference to the issuer. Usually. so that if the symmetric secret key is discovered then the next transaction will be totally different. But a symmetric key is potentially highly insecure. The solution is to encapsulate the symmetric key inside a message encrypted with an asymmetric algorithm. An algorithm using the same key to decrypt and encrypt is deemed to have a symmetric key. nothing is certain except death and taxes). The Symmetric key: Well. As you know. algorithms cannot be patented. with keys of various lengths.2. nothing is secure on the Internet. if Henri Poincare had patented his algorithms. the dates of validity of this certificate and the signature of the certificate to ensure this certificate hasen't been tampered with.CgYDVQQLEwNJQ1QxFjAUBgNVBAMTDVNPUEFDIFJvb3QgQ0ExJjAkBgkqhkiG9w0B CQEWF2FkbWluaXN0cmF0b3JAc29wYWMub3JnMB4XDTAxMTEyMDA1NDc0NFoXDTAy MTEyMDA1NDc0NFowgYkxCzAJBgNVBAYTAkZKMQ0wCwYDVQQIEwRGaWppMQ0wCwYD VQQHEwRTdXZhMQ4wDAYDVQQKEwVTT1BBQzEMMAoGA1UECxMDSUNUMRYwFAYDVQQD Ew13d3cuc29wYWMub3JnMSYwJAYJKoZIhvcNAQkBFhdhZG1pbmlzdHJhdG9yQHNv cGFjLm9yZzCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAulQsq4h0qms1panB 0Fqb+2u1cbzv06sVzFt1cza4AdFZP8GIwDORBPG/GrR6yDnCiR+HD5EZgQlGDIYI 2HXEb1qYSvn49zgk/L2UJDer8RzYke77G5+IuiXa9iF/BDI1Fz02HPu3Mp5Cr3e2 JRxZaa++AKH4sBpsFOKuYudrMOkCAwEAAaOCARUwggERMAkGA1UdEwQCMAAwLAYJ YIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1Ud DgQWBBT+BEbtoBW+wUtZA/gtDe0q4O35LzCBtgYDVR0jBIGuMIGrgBTmEnw9oQLl uh/anje+40U+m67lpqGBj6SBjDCBiTELMAkGA1UEBhMCRkoxDTALBgNVBAgTBEZp amkxDTALBgNVBAcTBFN1dmExDjAMBgNVBAoTBVNPUEFDMQwwCgYDVQQLEwNJQ1Qx FjAUBgNVBAMTDVNPUEFDIFJvb3QgQ0ExJjAkBgkqhkiG9w0BCQEWF2FkbWluaXN0 cmF0b3JAc29wYWMub3JnggEAMA0GCSqGSIb3DQEBBAUAA4GBADSN+2ULhVviRAnw VTE7KSv0/apf27gRGsarM2dZwQTeNN8IVy7GYNz31OLxc5dXI1ACY/x4ljSzysQb xUzIFmm7nEp+ABlIYuJRqzr6/YjN4J3vZ1Da/ksTxQyM/K1ute5A4/00EJ+tNL3b Bu0JPfKmgSJjFtyuMwxw/Qpsr7xa -----END CERTIFICATE----- As You may have noticed. A symmetric algorithm is much faster in doing its job than an asymmetric algorithm. Encryption algorithm: There are several encryption algorithms available. It is asymmetric because you need the other key pair to decrypt. The certificate does not contain the private key as it should never be transmitted in any form whatsoever. Symetric Key-->[Public Key]-->Encrypted Symetric Key-->[Private Key]->Symetric Key 1. Private Key/Public Key encryption algorithms are great. the public key of the owner of this certificate. You can't use the same key to encrypt and decrypt.4.2. If the enemy gets hold of the key then you have no more secret information. but they are not usually practical.3.

and in general in ensuring that any message has not been tampered with. while the second form does not even allow to read part of the message if it has been tampered with. It seems that the Internet Enginering Task Force (IETF) prefers SHA1 over MD5 for a number of technical reasons (Cf RFC2459 7.6. it means that it is impossible to get the original message knowing the hash. It is therefore extremely difficult to modify a message while keeping its original hash. The message can be a text message. 1. Signing: Signing a message. Nowadays Unix systems use MD5 hashes which have no limitation in length of the password.1.3). In the early days passwords on Unix system were limited to 8 characters. PassPhrase: “A passprase is like a password except it is longer”. decrypts the encrypted hash using your well known public key stored in your signed certificate. but not neccesarily). This is a one way function. you then add the encrypted hash and your signed certificate with the message. or someone else's certificate. or encoding the message altogether with the signature. This later form is a very simple encryption form as any software can decrypt it if it can read the embedded public key. OpenSSL can be compiled with or without certain algorithms. OpenSSL is developed in a country where algorithms cannot be patented and where encryption technology is not reserved to state agencies like military and secret services. so the term passphrase for longer passwords. The advantage of the first form is that the message is human readable allowing any non complaint client to pass the message as is for the user to read. The common preferred algorithm is then chosen. and then encrypt the hash with your private key. the applications will indicate to each other a list of algorithms that can be understood ranked by order of preference. check that both hash are equals and finally check the certificate.. So algorithms cannot be patented except mainly in USA.2.Albert Einstein. The Hash: A hash is a number given by a hash function from a message. Longer is the password harder it is to guess.5. There are usually 2 ways to sign. in certifying that applications are original (MD5 sum). 56 . means authentifying that you have yourself assured the authenticity of the message (most of the time it means you are the author. It is also called a message digest. 1. 1. Hash functions are used in password mechanisms. However the hash will drastically change even for the slightest modification in the message.2. The other advantage of signing your messages is that you transmit your public key and certificate automatically to all your recipients.2. The recipient will recreate the message hash.2 and 7.7.. To sign a message.1. During the negotiation between browser and web server. so that it can be used in many countries where restrictions apply. you create its hash. encapsulating the text message inside the signature (with delimiters).

.pem files that contains your private key and remove the passphrase from it. openssl rsa -in newreq. 3. There is also no way to find someone's public key if you have never received a prior e-mail with his certificate (including his public key).part...pem and wwwcert. Using a certificate with mod_ssl in apache First never use your self-signed root CA Certificate with any application and especially with apache as it requires you to remove the passphrase on your private key. Take the newreq. Public Key Infrastructure The Public Key Infrastructure (PKI) is the software management system and database system that allows to sign certifcate.pem in the directory /etc/httpd/conf/ssl/ as wwwkeyunsecure.1. keep a list of revoked certificates.1.2..default-vhost. Now you can use the newcert and cakeyunsecure. so no password is required when reading the private key. There will be also some people checking that you are who you are. A test 57 .8. If # the certificate is encrypted.. If someone gets its hand on it.1.pem -out wwwkeyunsecure. Securing Internet Protocols. ---# Server Certificate: # Point SSLCertificateFile at a PEM encoded certificate.pem Because the key (PRIVATE Key) is insecure. Remove any extra information to keep only the ---CERTIFCATE -. then you will be prompted for a # pass phrase.com.1.crt respectively. The key needs to be made insecure.. distribute public key. Note that a kill -HUP will prompt again..pem for apache. you must know what you are doing: check file permissions.conf. you can use any well known commercial PKI as their root CA certificate is most likely to be inside your browser/application. either you get a generic type certificate for your e-mail or you must pay about USD100 a year per certificate/e-mail address. First generate and sign a certificate request with the Common Name (CN) as www. Copy wwwkeyunsecure.mysite. ------------- 3. etc. For securing individual applications.pem and newcert. You can usually access it via a website and/or ldap server. your site is compromised (you have been warned). Edit /etc/httpd/conf/ssl/ssl. The problem is for securing email.

unsecuring the private key and combining the two into /etc/ssl/imap/ipop3sd.mycompany.4. use this # directive to point at the key file. this will change the connection port to 995 (imaps).key.crt SSLCertificateFile wwwcert.6. #SSLCertificateFile conf/ssl/ca. Generate and Sign a key with Microsoft Key Manager In Microsoft Key Manager.1.d/init. This is the location where the imap rpm on Mandrake 9.d/init. Using a certificate with Postfix FIXME 3.org).1.g mail.pem and sign the request as usual.3.unsecure SSLCertificateKeyFile wwwkeyunsecure. for instance IMAP (or WWW). Use the wizard to generate a new key. A similar procedure can be used for imap and putting the file in /etc/ssl/imap/imapsd.5.pem.xyz. Using a certificate with Stunnel FIXME 3. Key Manager shows a Key with a strike to indicate the key is not signed. 3. Using a certificate with POPS A pem file for ipop3sd can be created by generating a certificate.1. Using a certificate with IMAPS Read the paragraph on “Using a certificate with POPS”. Ensure that the distinguished name won't be identical to previous generated keys.org.pem.d/httpd start) 3.com.xyz.txt.# certificate can be generated with `make certificate' under # built time. The CN should be the name that the mail client connects to (e. for Instance for the Common Name (CN) use imap. Import this file in the OpenSSL /var/ssl directory. 58 .1. enter for the incoming mail server mail. for more information. In MSOutlook. select the service you want to create a key for.xyz. #SSLCertificateKeyFile conf/ssl/ca.d/httpd stop) ensure that all processes are dead (killall httpd) and start httpd (/etc/rc.0 expects to find the file.2. The trusted root CA must be installed in MS Internet Explorer to validate the certificate from mail.pem ---- Stop and start httpd (/etc/rc. 3.crt # Server Private Key: # If the key is not combined with the certificate. on the server tab.1. rename it to newreq. The wizard will place the request in the file C:\NewKeyRq.org and on the Advanced tab check the “This server requires a secure connection (SSL)”.

select this file.pl -pkcs12 "Franck Martin" (openssl pkcs12 -export -in newcert.pem -out newcert. you can use this procedure to make signed advisories.pem and newreq.msg -signer newcert. 3.pem file now contains only the -CERTIFICATE.txt (output test. enter the passphrase. the easy way is to do: openssl x509 -in newcert.2.2. To use this certificate with MS Outlook You need to import it in Outlook as a pkcs12 file.section. Generate and use an s/mime certificate Simply generate and sign a certificate request but with the Common Name (CN) being your e-mail address.section. right click and click on Install the Key Certificate.pem: CA.2.pem: openssl smime -sign -in test.pem Using a text editor is also suitable to delete everything outside the -CERTIFICATEsection. We have to remove the text. To generate the pkcs12 file from your newcert.pem and your key newreq. Export the file newcertx509.pem -inkey newreq.pem You can now transmit test. ----------------- 3.txt -text -out test.p12 \ -name "Franck Martin") or use this command to bundle the signing certificate with your pkcs12 file openssl pkcs12 -export -in newcert.pem -out newcertx509. Securing E-mails.pl -sign The file newcert.msg to anybody. The newcertx509. 3.msg) using your certificate newcert.pem -certfile 59 .2. The key is now fully functional.pem -inkey newreq. Now sign your message test.pem to the Computer running key Manager and while selecting the key icon in the Key Manager application.pem is not yet suitable for key manager as it contains some text and the -CERTIFICATE.pem -inkey newreq.CA. or other signed documents to be published digitally.1.

You are ready to send signed e-mails.5. You can send your message as encrypted signed messages or clear text message. To use this certificate with MS Outlook Express FIXME 3. Now click on the Settings button. The encryption is not really an encryption as the message contains everything needed to decrypt the message. The root CA certificate has to be downloaded and installed. Refer to the chapter "Install the CA root certificate as a Trusted Root Certificate in Internet Explorer". Click on the import/export button select to import the newcert. And Click on Ok. However in some instances Evolution recognises that the document is clear text signed and displays it correctly. As you have issued this certificate from a self-signed certificate (root CA Certificate).pem \ -out newcert.2. The bug is that this process is exclusive. the whole machine freezes till MS-Outlook XP has finished somehow. 3. This is a file not to let into everybody's hand. To use this certificate with Netscape Messenger FIXME 3. and will therefore be able to send you encrypted e-mails.p12 file. enter the export password and the Digital ID "Franck Martin" (That's my name so use your name in the above examples).p12 -name "Franck Martin" Beware this certificate contains your public and private key and is only secured by the passphrase.3.cacert.4. Note that early version of MS-Outlook XP will search the Internet to verify the validy of the certificate. And finally click on Ok. but it ensures that the recipient won't read the message if he does not have an s/mime compliant reader. MS Outlook should have selected the default setting so just click on New.2. the trust path won't be valid because the application does not know the root CA Certificate. When you send a signed e-mail the user at the other end will receive your public key.0 does not work with S/MIME. It is planned that Evolution will handle S/MIME in a future release (from the evolution bug database).2. It can take several seconds before the e-mail is displayed and several minutes for MS-Outlook XP to timeout when you don't have a full time or on-demand Internet connection. To use this certificate with Evolution Evolution 1. even though it can't check the signature (early 60 . but only with PGP. except if you want to change the default settings. Options and Security. In MS Outlook go to Tools.

developers expect users to compile the new or changed files themselves. Please improve the article by adding references.6. 3.2. see patch (Unix). For the software tool by Apple Inc. their patches are distributed as binary executables instead of source. To use this certificate with Balsa FIXME 3. This includes fixing security vulnerabilities[1] and other bugs.7.versions of Evolution does not understand one of the 3 MIME signature types. 61 . To use this certifcate with KMail FIXME Patch (computing) Jump to: navigation. or update a computer program or its supporting data. See the talk page for details. Though meant to fix problems. This type of patch modifies the program executable— the program the user actually runs—either by modifying the binary file to include the fixes or by completely replacing it. see Apple Software Update.. search "Software update" redirects here. In these cases. For the Unix program. Because proprietary software authors withhold their source code. Types Programmers publish and apply patches in various forms. In these cases. Patch management is the process of using a strategy and plan of what patches should be applied to which systems at a specified time. poorly designed patches can sometimes introduce new problems (see software regressions).2. the patches consist of textual differences between two source code files. unfortunately the one MS-Outlook uses quite often). Patches can also circulate in the form of source code modifications. and improving the usability or performance. These types of patches commonly come out of open source projects. (September 2008) A patch is a piece of software designed to fix problems[1] with. This article may contain original research or unverified claims.

To facilitate updates. patches have the particularly important role of fixing security holes. updates between releases are delivered as new software packages. this sort of automation helps to maintain consistency. later. The maintenance of server software and of operating systems often takes place in this manner. Some programs can update themselves via the Internet with very little or no intervention on the part of users. Such situations commonly occur in the patching of computer games. Microsoft Windows NT and its successors (including Windows 2000. expecting the recipient to cut out the indicated part of the original tape (or deck). software suppliers distributed patches on paper tape or on punched cards. Automation simplifies the end-users' task -. partly because of the aforementioned glitches. In the case of operating systems and computer server software. and patch in (hence the name) the replacement segment. Compared with the initial installation of software. patches usually do not take long to apply. History Historically. patches can become quite large when the changes add or replace nonprogram data. large fixes may use different nomenclature. Service packs for Microsoft Windows NT and its successors and for many commercial software products adopt such automated strategies. Then. Today. The application of security patches commonly occurs in this manner. Windows XP. whereupon that program makes sure that updating the target takes place completely and correctly. In several Unix-like systems. though this also depends on whether the patch includes entire files or only the changed portion(s) of files. patches came from the software developer via a disk or. Today. In situations where system administrators control a number of computers.Because the word "patch" carries the connotation of a small fix. Completely automatic updates have not succeeded in gaining widespread popularity in corporate computing environments. after the invention of removable disk drives. operating systems often provide automatic or semi-automatic update facilities. such as graphics and sounds files. with almost universal Internet access. 62 . particularly Linux. end-users must download most patches from the developer's web site. Application The size of patches may vary from a few kilobytes to hundreds of megabytes — mostly more significant changes imply a larger size. In particular. These updates are in the same format as the original installation so they can be used either to update an existing package in-place (effectively patching) or be used directly for new installations. Later patch distributions used magnetic tape. Bulky patches or patches that significantly change a program may circulate as "service packs" or as "software updates". computer programs can often coordinate patches to update a target program. CD-ROM via mail.they need only to execute an update program. and later versions) use the "service pack" terminology.

g.. tend to put off applying patches until they can verify the stability of the fixes. rather than simply of differences from the previous version. the Internet and broadband Internet access networks. time-shifted programming.. Microsoft (W)SUS support this. IPTV services may be classified into three main groups: live television. Usage of completely automatic updates is far more widespread in the consumer market. satellite signal. Any unexpected error or interruption during the update. In the cases of large patches or of significant changes. may render the motherboard unusable. such as a power outage. A motherboard BIOS update is an example of a common firmware patch. ETSI) and preferential deployment scenarios in subscriber-based telecommunications networks with high-speed access channels into enduser premises via set-top boxes or other customer-premises equipment. e. An example safeguard is to keep a backup of the firmware to use in case the primary copy is determined to be corrupt (usually through the use of a checksum. due largely to the fact that Microsoft Windows added support for them. such as a CRC). distributors often limit availability of patches to qualified developers as a beta test. and cable television (CATV) formats. Applying patches to firmware poses special challenges: re-embedding typically small code sets on hardware devices often involves the provision of totally new program code. It is possible for motherboard manufacturers to put safeguards in place to prevent serious damage.[citation needed] Package management systems can offer various degrees of patch automation.but also because administrators fear that software companies may gain unlimited control over their computers. Often the patch consists of bare binary data and a special program that replaces the previous version with the new version is provided. and content (or video) on demand. See Internet television. IPTV Internet Protocol television (IPTV) is a system through which digital television service is delivered using the architecture and networking methods of the Internet Protocol Suite over a packet-switched network infrastructure. Cautious users. and Service Pack 2 of Windows XP enabled them by default.g. 63 . particularly system administrators. It is distinguished from general Internet-based or web-based multimedia services by its on-going standardization process (e. instead of being delivered through traditional radio frequency broadcast.

Sign up to vote on this title
UsefulNot useful