Beruflich Dokumente
Kultur Dokumente
Possible uses (features) Voice calls, message calls (such as SMS/text messages), data calls, download
audio clips, video clips, ring tones and screen savers/wallpapers. Play audio
(typically MP3) and video clips. Play single user and multi user games. Take
pictures with in built camera, send and receive digital images (photographs).
Possible uses (features) The main features of these products are that they are essentially
small PCs with limited functions. You would expect the user interface
to be supplied via a small windows type environment such as
Symbian OS, Nokia Series 60/80, Palm OS, Linux or Microsoft
Windows Mobile for Pocket PC (others exist). This enhances all the
non-telephony features and introduces light versions of standard
applications such as word processors and spreadsheets.
Depending on the heritage of the device, either the mobile phone
part or a WLAN part would be built in as standard, with other
interfaces available as options.
Possible uses (features) The prime feature set for this type of device is of course as a portable
PC. As it is portable, the early addition of WLAN was purely to enable
connection to (usually corporate) networks without having to hunt
around for a data cable and network point. For users who left the
office, using mobile phone or fixed line modems to access essential
(again usually corporate) services remotely has been a common
practice. The introduction of both 3G mobile phones and public
WLAN hotspots gives greater flexibility for remote working.
Traditionally voice calls would be made using a phone, but the
introduction of Voice over IP (VoIP) services means that you can now
use this device for making phone calls if you have a network
connection.
For the purpose of 3GPP specifications the make efficient use of the same radio system,
interface between the UE and the network is the underlying access protocols have to have
the radio interface. a way of sharing the radio resource between
the users, and this means that at some level
The full vocabulary for 3GPP Terms and either the system, or the user equipment
Abbreviation can be found by following the (for efficiency, both) have to have some
link from the 3GPP home page at basic knowledge of other users. This gives
http://www.3gpp.org/ . our first user requirement.
User Requirement 2
about how users view security of • Serious intruders who are spending time
information. within radio range of the access point
and are intent on stealing data from you;
GSM / GPRS and the up coming
European UMTS systems WCDMA have • People who have time on there hands and
well documented security systems in place. I are doing it “because they can”;
don’t plan to go in to great details here,
except to say that even though the GSM I also found many articles from 2004
security mechanism have been (quite which were based on people who I would
rightly) hailed as a success, even they are suggest fit in the second category above,
not completely free from threat. This was searching for Wireless LAN Access Points
discussed at the recent “2nd IEE Secure in urban areas, typically offices. Despite all
Mobile Communications Forum – the publicity, something between 30% and
Exploring the Technical Challenges in 50% of the access points found
Secure GSM and WLAN, held by the IEE (depending on which report you read), still
on 23 September 2004”. DID NOT have WEP turned on, and were
therefore letting their raw IP based
We all are probably well aware of the company data be freely listened to by
situation that the 802.11 community left us anyone who wanted to. There were
with when their very brave attempt at secondary reports about the admin login
Wireless Equivalence Privacy (WEP) to and password for these Access Points (each
make wireless systems, in particularly Access Point has its own internal
802.11 based Wireless LAN’s as safe as a administration feature which sets up IP
wired system, was found to be not quite as functions, the WEP keys and many other
good as first thought. However, there is a features), which were not numerically
fix for this in terms of WiFi Protected reported, but leaving the password set at
Access (WPA), and there is a follow up any default for the manufacturer can only
plan in progress which will introduce WiFi occur (in my personal experience) if the
Protected Access 2 (WPA2) also known as unit has been switched on and not
802.11i in the IEEE standards groups configured at all.
(which can be found via the IEEE pages at
http://www.ieee.org/ ). This will add, This leads to my next important point;
amongst other things, Advanced this paper is all about User Requirements.
Encryption Standard (AES) to the wireless My personal view is that WLANs are
air interface. great, should be more widely used than
they are, and in commercial use they
While researching this paper I came should be up to WPA standard BUT they
across an interesting fact relating to WEP. must be shipped so that these features are
While it does have a problem (which turned on from day one. There are many
everybody talks about) it is actually a time issues here; a default security setting is as
based problem (you have to be in the right bad as no setting at all, as the default
place, locked on to the right radio becomes public knowledge very quickly.
frequency and have bit stream Contrast this with the European mobile
synchronisation to capture and decode a phone systems GSM and WCDMA, plug a
new user as they log on to an Access Point), SIM (or USIM) card in, switch it on, and
this immediately means that the people who off you go, security systems enabled and
can do this are probably either: working (as well as the billing and account
6. Changes in the last 1-2 • Take part in a video phone call, rather
years than a voice call;