Download Date 30/09/2021 06:35:08

Total Page:16

File Type:pdf, Size:1020Kb

Download Date 30/09/2021 06:35:08 Suitability of MANET Protocols for Heterogeneous Mobile Devices Communication in Gaming and Multimedia Item Type Meetings and Proceedings Authors Salim, Aly; Mehdi, Qasim Citation In: Mehdi, Q. and Elmaghraby, A. (Eds.), Proceedings of CGAMES’2008. 12th International Conference on Computer Games: AI, Animation, Mobile, Educational and Serious Games, 30th July – 2nd August 2008, Louisville, Kentucky, USA Publisher University of Wolverhampton, School of Computing and Information Technology Download date 30/09/2021 06:35:08 Link to Item http://hdl.handle.net/2384/295010 Suitability of MANET Protocols for Heterogeneous Mobile Devices Communication in Gaming and Multimedia bismillahir-Rahmanir-Rahim Salim, Aly and Mehdi Quasim Games Simulation and Artificial Intelligence Centre (GSAI) School of Computing and Information Technology, University of Wolverhampton, UK [email protected] Abstract These devices are capable of performing different functions and The improvement and development of mostly they are now merged into one MANET protocols has been widely complete device. This has thus enabled researched in order to bring about new the development of more powerful technology with the rapidly developing mobile devices which are ultra-mobile field. More emphasis has been placed but at the same time can cater for a on development of protocols with some whole host of tasks like playing videos, improvements focused on one issue in music, and games at a less MANETs (ECMANSI, MANSI, ZRP, computational costs compared to the DVMRP) than working on all round PC’s. There are also indications that MANET that would significantly tackle these devices are now being brought most if not all issues with MANET into classrooms slowly but surely by protocols so far (FLIP). However, students thus in the near future they there has also been more emphasis on will form a part of their education. development of non demanding These devices however do have some applications that are not included inferiority. Due to their size, there are multiplayer gaming and real-time restrictions in hardware capabilities multimedia content rich streaming which rendered constrain on the applications. This paper looks at the software capabilities as well [1]. These use of mobile devices in gaming and can be seen in different devices having multimedia rich applications. It different hardware specifications and proposes a protocol, which is in also communication specifications. development that offers better Thus to be able to relay an application efficiency, reliability, robustness and across a plethora of different devices, adaptability of wireless there must be an accommodation for communication. these devices to help relay information Keywords between heterogeneous devices as the application is in operation. MANET, Steiner Trees, Network Protocol, Heterogeneous devices, The standard for communication Multiplayer games among mobile devices is varied with 1 Introduction some devices choosing to use Bluetooth rather than WIFI while some As time goes on there are many new employ both communication forms of communication being techniques. These are the two main integrated into young people’s lives? modes of wireless communication These include mobile phones, video including GPRS. The nature of mp3 players, mini laptops (ASUS) etc. 52 communication between these devices a hindrance. The mobile device has and their uniqueness has prompted the and is being trialled in different ways birth of MANET communication for different applications including protocols [1]. These protocols have the classroom usage, gaming and ability to be mobile and versatile in simulations, context aware computing, connecting different devices on the flexible mobile content delivery and move and with varying capabilities. many more [2]. Thus mobile device However, there are different routes gaming as far as types are concerned when it comes to MANET protocols can be seen as equivalent to PCs or with some using uni-casting methods Platform games for designated gaming and others using multicasting methods hardware like Playstation and Xbox for data distribution and route [10]. Some of game genres include establishment. MMOG, FPS, Strategy games, Pervasive games, educational games, The operating systems on all these Racing games, sports games, Virtual different mobile devices vary as well reality games etc [10] have already from windows mobile, Symbian, linux, been designed for these game consoles. blackberry, J2ME [2]. These are the These games are now being shaped main platforms on the market being into multiplayer games on used but with Symbian taking the lead heterogeneous devices but with some in Europe terms of percentage of users difficulties because of the problems due to its feature rich system and ease associated with the portability, device of use [2]. The development engines mobility, latency, reliability of used to make gaming and advanced networks. content rich multimedia applications include J2ME, Flashlite, Brew, The utilisation of MANET protocols in JAMDAT [10]. The use of game the Dispersal and Mobile engines for mobile devices has still not communication in gaming takes place been exhausted and is thus a ripe area in the wireless networking but with of research. There are a few engines some constraints including mobile such as OPENGL ES, M3GE (Mobile device limitations, overheads, platform 3D Game Engine), EDGELIB, limitations, packet loss, speeds, and Mobiola 3D being used to create overcrowding of the bandwidth. The challenging games on mobile devices. number of players that could be This has led to a mini revolution as far involved at any given time in as the quality of graphics and game multiplayer instances could also have play available on mobile devices. an impact on the network performance These engines have given rise to more [2]. However, these limitations can be FSP’s being developed for mobile manipulated and their influence devices enabling mobile device owners reduced or even eradicated in order to to enjoy more challenging game play boost the communication level that could only be found on dedicated between heterogeneous mobile gaming equipment or PC’s [10]. devices. The mobility and number of participating devices have necessitated 2 Mobile Devices Gaming and the need for a protocol that can Communication actually encompass all this and more to Mobile devices have become part and reduce the amount of communication parcel of young people’s everyday restriction between mobile tools [2] that make them to be used in heterogeneous. One such protocol the class rooms as a helper rather than known as FLIP [5] is already in 53 development which addresses a wide 3 Network Protocol Design spectrum of devices and can be used as Principles an inter-connector between The network protocol that supports heterogeneous devices. It is well heterogeneous devices for distributing structured in enabling different devices game states and multimedia streaming to interlock into mobile should be able to: communication clouds. This protocol can also handle the distribution of small data packets across a wireless • minimise the latency levels in communication between network between different types of different devices devices. However it does not address the specific needs of multimedia • ensure efficiency and flexibility intensive applications. when communicating with other data link and transport In MANET’S there is a dynamic layer protocols number of nodes which need to be • provide a seamless connected together in order for communication route between communication to take place thus the heterogeneous devices thus the similarities in the Steiner tree problem efficient distribution of of trying to join a set number of points multimedia rich content/game and thus at the same time producing a states minimum tree set which would show joining of these points in an The overhead and complexity of a interconnected fashion thus enabling protocol is directly related to the cost reduction communication wise functionality of the protocol provides (transmission energy, time). There are that the flexibility of the protocol a few Multicast MANETS that have would only use in widening the types used the Steiner tree to account for cost of devices it could handle [3]. The effective shortest paths [9, 10] and in flexibility of the protocol that fits into other areas used to effectively lower different layers is shown in Figure 1. energy consumption in transmissions The protocol can take over the [7]. functionality of any layer between the transport and data link segments. At The Steiner tree which is a the same time the protocol can be used combinatorial optimization problem underneath the existing protocols to has been used in mobile device satisfy the Network layer - Data link networks to formulate heuristic layer protocols. algorithms taking polynomial time [9]. It conforms to an optimization where ENERGY ZONE there is possible set of feasible CONSERVING CLASSIFICATION MULTICASTING (ZRP) solutions which can be reduced down (ECMANSI) to a single one. Therefore the objective in using this technique is to find the Flexible Protocol (FLIP) most robust solution for the network paths between nodes from sender going to the receiver [9]. The Steiner Figure.1 Protocol Bock Diagram tree has unique features which allows for adding more vertices into the The protocol normally carries out data network as needed [8]. communication in a three phase process namely identify and tag as a 54 node and relay. The process of performance
Recommended publications
  • Dope Wars Crack House Iphone 4 >>>
    Dope Wars Crack House Iphone 4 >>> http://shurll.com/78zhf 1 / 6 2 / 6 dr fone wondershare crack mac minecraft server soulcraft cracked wheat crack password protected rar file linux command finite element analysis of slant edge crack by abaqus user pc security 6 4 94fbr serial number fire emblem awakening support grinding the crack archicad 14 free download with crack and keygen vegas pro 10 keygen only crack tomb raider 3 pc ita full paint tool sai english full free version battlefield bad company 2 vietnam crack only download social booth software crack website hide my ip crack 6.0 comar vr cinema pro cracked heels sothink logo maker professional keygen crack transmac 10 4 keygen torrent lady do nhl 09 crack frc labview serial number 2014 bmw 135i cobb v3 serial number sik trix bmx full version game free download panda antivirus 2012 full version with key muse cc 2015 crack mac os celemony melodyne mac keygen torrent solaris 11 parallels 8 serial number gastr del sol crookt crack or fly blogspot radio hawx 2 dlc keygen free happy wheels 2 full version game download microsoft office 2013 activation keygen download ek number star pravah serial are vedya asoftech photo recovery crack download crack activacion windows 7 ultimate 64 apple iphone 6 home button crack how to justify text in indesign cs2 crack crack shot guns minecraft mod adobe acrobat xi pro serial number crack programs animar en after effects cs6 serial number google earth image downloader crack world of tanks generals download crack aqua mail pro cracked lips avs video editor
    [Show full text]
  • Context Sensitive Netbooks INF5261
    UNIVERSITY OF OSLO Department of Informatics Context sensitive netbooks INF5261 Adriana Alexandri, Morten Frellumstad, Brendan Johan Lee Spring 2009 Contents 1 Introduction 3 2 Netbooks 4 2.1 History, emerging trends and the future . .4 2.2 Android to refocus netbooks? . .5 2.3 Are netbooks going away? . .6 3 Context awareness 7 3.1 Mobility . .9 3.2 Device proximity . 10 3.3 Dual use . 10 4 Ethics 11 4.1 Our issues . 13 4.2 Possible solutions . 15 4.3 The mind . 16 4.4 Conclusion . 16 5 Survey 16 5.1 Methods . 16 5.2 Results . 17 5.3 Conclusions . 18 6 Creating a context aware framework 18 6.1 Software of interest . 18 6.1.1 Mobiola Headset for Skype . 18 6.1.2 JoikuSpot . 18 6.1.3 Blueproximity and pyacceleremoter . 19 6.1.4 Anyremote, Psiloc Wireless Presenter, Salling clicker and Bluetooth remote . 19 6.2 How could we build a context aware system at UiO? . 20 6.3 Our suggested framework . 22 7 Conclusion 23 7.1 Future work . 24 7.1.1 An experiment at Blindern . 25 References 26 A Descriptive Statistics 30 B Descriptive Statistics: U1; U2; U3; U4; U5; U6; U7; U8 30 1 C Descriptive Statistics: S1; S2; S3; S4; S5; S6; S7; S8; ... 31 D Subset bring to UiO often Descriptive Statistics: U1; U2; U3; U4; U5; U6; U7; U8 32 E Existing and non-existing services 34 E.1 Non existing service (to our knowledge) . 34 E.2 Existing services . 34 2 1 Introduction Netbook is a collective term, most likely coined by Psion in 1999[1], repre- senting relatively inexpensive small notebooks designed for wireless commu- nication and Internet access.
    [Show full text]
  • Wang Lin.Pdf 791KB Dec 05 2013 05:23:33 PM
    University of Florida Department of Electrical and Computer Engineering EEL 4665/5666 Intelligent Machines Design Laboratory Written Report Student Name: Lin Wang Robot Name: Sh ake Shake Shake E-Mail: [email protected] Instructors: Dr. A. Antonio Arroyo Dr. Eric M. Schwartz TAs: Ryan Chilton Josh Weaver Table of Contents Abstract .......................................................................................................................... 4 Executive Summary ....................................................................................................... 4 Introduction .................................................................................................................... 5 Integrated system ........................................................................................................... 6 Mobile platform ............................................................................................................. 8 Actuation ........................................................................................................................ 9 Sensors ........................................................................................................................... 9 Behaviors ..................................................................................................................... 11 Experimental layout and results ................................................................................... 12 Conclusion ..................................................................................................................
    [Show full text]
  • Activation Code Mobiola Webcam 3 0 19 Shp S60v5
    activation code Mobiola webcam 3 0 19 shp s60v5 Best Dj Mix, Free download the free app, by Igor Akimov, get iTunes now activation code Mobiola webcam 3 0 19 shp s60v5. how to download free movies and is available for download activation code Mobiola webcam 3 0 19 shp s60v5 by. Page moved temporarily --->: DOWNLOAD LINK This driver set is compatible with windows 7 Direct Download, Proteus Professional, a software package for computer-aided activation code Mobiola webcam 3 0 19 shp s60v5 design of, electronic. 24 2012, BurnAware Free is a 2005 South Korean film directed by Aleksei Balabanov and, Brat, Brother 1997 with English subtitles, YouTube. Your Steam wallet allows you to watch directly without, downloading, but there are other tools that could do the job. 4 Quick Ways To Download YouTube Videos, In this articles we will download the free app iGTC, Lite by iMoonlight Software, get iTunes now. iGetter Is A Powerful, Full Featured Download Manager . Downloads are 100% Safe, Free to try 30-day-trial, after 7 days activation code Mobiola webcam 3 0 19 shp s60v5 a registration is required. Alert icon. 14 Sep 2012, iDownloads PLUS is the best of these movies are available to download music directly to your iPhone, iPod touch, I know there is never 2 downloads, at. 4 Sep 2008, FlashGet is a free, timely unlimited. Media Server Software, Mac OS, Training Courses, Hollywood, Movies, Full Version PC Games to download, and play radio; activation code Mobiola webcam 3 0 19 shp s60v5 with lyrics, news, bios, photos, music videos, and live concerts directly to your iPhone, iPod, iPad.
    [Show full text]
  • Mobiola Web Camera 31 8 Activation Key
    Mobiola Web Camera 3.1 8 Activation Key 1 / 4 Mobiola Web Camera 3.1 8 Activation Key 2 / 4 3 / 4 12 янв. 2015 г. - Описание: Скачать mobiola webcam 2 0 0 crack brnoey. Mobiola ... 8 mile 3 rap battles. mobiola web camera 3.1.8 free.. mobiola web camera activation key, mobiola web camera registration activation key, mobiola web camera activation key generator, mobiola .... Mobiola Web Camera 3.1 8 Activation Key >>> DOWNLOAD (Mirror #1). mobiola web camera activation keymobiola web camera for s60 .... Wwigo, where you need to click the leftmost button, "wwigo video" for the server to be able to .... 2.1.2 Warelex Mobiola Web Camera 3.1.8. Size: 4.30MB License: Shareware Price: $19.95 By: SHAPE Services. Mobiola Webcam Lite 3.1.8. Mobile phone as webcam with mobiola web camera 3 Main .... Mobiola Web Camera 3.1 8 Activation Key >>> http://bit.ly/2RRufca mobiola web camera activation key mobiola web camera registration .... [ссылка заблокирована по решению администрации проекта] качай отсюда Mobiola Webcam v3.0.19 там crack в архиве есть, она для .... Version History: Mobiola Web Camera 3.1.8 Download · McFunSoft Inc 6.3 ... Take picture: Touch Panel / Camera button / Search key. Category: mobile - Video.. Mobiola Web Camera 3.1.8 Full Version. Neked Videos Watch the latest Neked videos on MeFeedia Neked Videos shows www.liveneked .... Mobiola web camera serial numbers, cracks and keygens are presented here. ... Mobiola Web Camera For Windows Mobile 3.1.8 serials generator.. Mobiola Web Camera 3.1.8 9 out of 10 based on 31560 ratings of 32800 user reviews Thank you, your message has been sent.
    [Show full text]
  • Page 15.Indd
    TECHNO SUPPLEMENT NEWSDAY THURSDAY APRIL 24, 2014 15 Lucky Brand offers a broad range of agricultural machinery Through innovation and a standard of excellence, Lucky Brand has come to be unrolled into various other cities including Bulawayo, Gweru and Mutare. the dates for these projects to be effected are yet to be finalized. This will be a force to reckon with in the industry as evidenced by its continuous Gentech is responsible for the full back up services, repairs and spares for see the nation taking huge strides towards addressing the issue of power growth and expansion drive despite the harsh economic conditions. The all of the products the firm offers. shortages through such efforts of Lucky Brand. The firm’s drive is to ensure firm has grown to be strategically positioned as the largest distributor of Lucky Brand through its various strategic partners is pioneering the going that power is availed to virtually everyone. According to Lucky Brand, solar generators, water pumps and solar products among other products green revolution through its solar and gas products. Zimbabwe typically power is the answer to today’s crippling power shortages. With this in through having partnerships with various strategic manufacturers whilst being characterized with high sunshine hours making it an ideal mind, Lucky Brand is coming up with a concept of low cost portable solar creating a broad network of local distributors. The firm is also making its geographical location for solar powered systems, one product of interest is plug and play kits. The kits will range from basic lighting to small systems mark in the mining and construction sectors by providing the respective the Lucky Brand solar geyser which has been well received in the market.
    [Show full text]
  • By: Rahul Tyagi
    By: Rahul Tyagi [Hack the Hackers Before They Hack You] 1 Legal Disclaimer 2 Any proceedings and or activities related to the material contained within this volume are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. Neither writer of this book, review analyzers, the publisher, nor anyone else affiliated in any way, is going to admit any responsibility for your proceedings, actions or trials. 3 About The Author Rahul Tyagi is a sovereign Computer Security Consultant and has state-of-the-art familiarity in the field of computer. Tyagi is however, more well recognized for his ETHICAL HACKING website www.ethicalhacking.do.am ranked 244th in the world by www.alexia.com ,and stood first in security websites by www.ucoz.com ,Over 45,000 visits has been incurred on his website and on the increase day by day.
    [Show full text]
  • A Foggy Desert
    A FOGGY DESERT: EQUITABLE INFORMATION FLOW FOR A FOGWATER SYSTEM IN SOUTHWEST MOROCCO by LESLIE LYNN DODSON B.A. P SYCHOLOGY , L AKE FOREST COLLEGE , 1982 M.S. J OURNALISM , N ORTHWESTERN UNIVERSITY , 1986 A thesis submitted to the Faculty of the Graduate School of the University of Colorado Boulder in partial fulfillment of the requirement for the degree of Doctor of Philosophy College of Engineering and Applied Science ATLAS Institute 2014 This thesis entitled: A Foggy Desert: Equitable Information Flow for a Fogwater System in Southwest Morocco Written by Leslie Lynn Dodson has been approved for the ATLAS Institute ______________________________________ John K. Bennett, Ph.D. (Chair) ______________________________________ S. Revi Sterling, Ph.D. (Co-Chair) Date __________________ The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. IRB protocol # 12-0664 ii ABSTRACT Leslie Lynn Dodson (Ph.D., Technology, Media, and Society; ATLAS Institute) A Foggy Desert: Equitable Information Flow for a Fogwater System in Southwest Morocco Directed by Professor John K. Bennett and Sarah Revi Sterling This dissertation describes the design, implementation and evaluation of a gender- inclusive information system linking rural women in Agni Hiya, Morocco and water project managers from the Association Dar Si-Hmad. This research was motivated by an interest in exploring the linkages between information and communication technologies (ICT), climate change, natural resource management and women’s participation in community development in the drought-ridden Aït Baamrane region of southwest Morocco.
    [Show full text]
  • For Official Use Only
    FOR OFFICIAL USE ONLY Supplemental to the 304th MI Bn Periodic Newsletter Sample Overview: al Qaida-Like Mobile Discussions & Potential Creative Uses By 304th MI Bn OSINT Team October 16, 2008 This is a draft FOUO product .r The above examples ofNokia Map Functions are displayed in a Pro Islamic State ofIraq (al Qaida) Discussion thread at http://www.muslm.net/vb/showthread.php?p=I797473 with software description and download instructions. Posting date March 24,2008. FOR OFFICIAL USB 0 LV Overview Terrorists and persons sympathetic to terrorism recommend a variety of different mobile to web technologies, software, and Voice over Internet Protocol (VoIP)1 for their mobile phone use. Some of the tactics are old, some of the tactics are still emerging, and some tactics may emerge from hacker, activist, and criminal non-terrorist use. This paper briefly covers a few examples of terrorist use and potential use of mobile to web and web to mobile technologies and tactics from an open source perspective. The paper includes the following five topics: Pro Terrorist Propaganda Mobile Interfaces, Mobile Phone GPS for Movements, Ops, Targeting, and Exploitation, The Mobile Phone as a Surveillance Tool, Voice Changers for Terrorist Phone Calls, a Red Teaming Perspective on the Potential Terrorist Use of Twitter, and a sample of software that is recommended on one pro terrorist website for mobile phone activities. There are numerous possibilities that are not covered in this paper due to time and research constraints. For example, Google Earth, Mobile GPS Mashups2 and Mobile Phone Number Spoofing techniques are not addressed in this paper but are certainly worth Open Source Intelligence (OSINT) consideration and probably deserve a paper (if not a book) unto itself.
    [Show full text]
  • Mobiola Web Camera 31 8 Activation Key
    1 / 2 Mobiola Web Camera 31 8 Activation Key When,,searching,,for,,Mobiola,,Web,,Cam,,3.1.8,,do,,not,,include,,words,,such,,as,,serial,,,number,,,key .... Instagram Hacker small crack in cement foundation 7. ... you can download on iOS and Android smartphones and tablets and also Windows 8 Phone and later. ... Mar 31, 2019 · Update for instagram hacking software. net is one of the online Instagram ... 2 Activation Code mobiola web camera pc cracked .. Mobiola WebCamera for Symbian, free and safe download. Mobiola WebCamera latest version: Turn your phone into a webcam. License. Trial .... netsupport manager with crack, netsupport manager free download with crack, ... HD Online Player (Mobiola Web Camera 31 8 Activation K). Download WebCamera and enjoy it on your iPhone, iPad, and iPod touch. ... Download the desktop versions at mobiola.com ... celtic fan 1 , 08/31/2020 .... Works with iOS, Android, Windows, and OSX. instagram hacker crack - how to hack instagram using ... Part 8: #8 Best Instagram Hack Tool - Highster Mobile.. Mobiola Web Camera For BlackBerry With Serial KEy, Diponk 27 Blog ... Download Free Activation Key For Mobiola Webcamera crack, torrent ... コメント. 2019-05-06 01:09:31 Ngrlsqdf ... https://tunanfiri.site123.me/blog/mobiola-web-camera-activation-key-generator ... 2019-05-07 04:08:17 Hbsnhzru. Nissan Navigation System 2013 Year Dvd V6 11 Download Torrent 20 ▻ DOWNLOAD. ... Mobiola Web Camera 31 8 Activation Key. HHD Software Device Monitoring Studio 6.2 + Crack Keygen/Serial.. HHD Serial ... HD Online Player (Mobiola Web Camera 31 8 Activation K). Mobiola free Camera serial Burrp Version, your crack, USB Webcam ..
    [Show full text]
  • Manufacturer Device Model Consumers Count Apple Iphone
    Manufacturer Device Model Consumers Count Apple iPhone 24,666,239 Apple iPad 13,155,907 samsung SM-J500M 1,079,744 Apple iPod touch 1,070,538 samsung SM-G531H 1,043,553 samsung SM-G935F 1,026,327 samsung SM-T113 894,096 samsung SM-J700M 888,680 motorola MotoG3 860,116 samsung SM-J700F 847,315 samsung SM-G920F 834,655 samsung SM-G900F 827,050 samsung SM-G610F 786,659 HUAWEI ALE-L21 783,180 OPPO A37f 701,488 samsung SM-G955U 699,321 samsung SM-G930F 685,195 samsung SM-J510FN 673,415 samsung SM-G950U 654,635 samsung SM-G530H 651,695 samsung SM-J710F 647,723 motorola Moto G (4) 640,091 samsung SM-T110 627,013 samsung SM-J200G 611,728 OPPO A1601 588,226 samsung SM-G925F 571,858 samsung SM-G930V 557,813 samsung SM-A510F 533,209 ZTE Z981 532,290 samsung GT-I9300 516,580 samsung SM-J320FN 511,109 Xiaomi Redmi Note 4 507,119 samsung GT-I9505 504,325 samsung GT-I9060I 488,253 samsung SM-J120H 472,748 samsung SM-G900V 458,996 Xiaomi Redmi Note 3 435,822 samsung SM-A310F 435,163 samsung SM-T560 435,042 motorola XT1069 433,667 motorola Moto G Play 422,147 LGE LG-K430 406,009 samsung GT-I9500 392,674 Xiaomi Redmi 3S 388,092 samsung SM-J700H 384,922 samsung SM-G532G 384,884 samsung SM-N9005 382,982 samsung SM-G531F 382,728 motorola XT1033 380,899 Generic Android 7.0 374,405 motorola XT1068 373,075 samsung SM-J500FN 372,029 samsung SM-J320M 366,049 samsung SM-J105B 351,985 samsung SM-T230 348,374 samsung SM-T280 347,350 samsung SM-T113NU 341,313 samsung SM-T350 338,525 samsung SM-G935V 337,090 samsung SM-J500F 332,972 samsung SM-J320F 329,165 motorola
    [Show full text]
  • Mobile Phoneuse
    FOROFHETAL USB ONLY Supplementaltothe 304thMl Bn PeriodicNewsletter SampleOverview: alQaida-Like Mobile Discussions& PotentialCreative Uses By 304th Ml Bn OSINTTeam October16, 2008 This is a draft FOUOproduct The above examplesof Nokia Map Functions are displayed in a Pro Islamic State of lraq (aI Qaida) Discussion thread at http ://www,muslm.nethb/showthread.ohp ?o= I 797473 with sofruare description and download instructions. Posting date March 24, 2008. FCIROFFrcIAL USE O}TLY Overview Terroristsand personssympathetic to terrorismrecommend a varietyof differentmobile to webtechnologies, software, and Voiceover InternetProtocol (VolP)r for theirmobile phoneuse. Someof the tacticsare old,some of the tacticsare stillemerging, and some tacticsmay emerge from hacker, activist, and criminalnon-terrorist use. This paper brieflycovers a few examplesof terroristuse and potentialuse of mobileto web and webto mobiletechnologies and tactics from an opensource perspective. The paper includesthe followingfive topics: Pro TenoristPropaganda Mobile lnterfaces, Mobile Phone GPSfor Movements,Ops, Targeting,and Exploitation,The MobilePhone as a SurueillanceTool, VoiceChangers for Terroist Phone Calls,a Red Teaming Perspectiveon the PotentialTerroristUse of Twifter,and a sampleof softwarethat is recommendedon one proterrorist website for mobilephone activities. There are numerouspossibilities that are not coveredin this paperdue to time and research constraints.For example, Google Earth, Mobile GPS Mashups2 and MobilePhone NumberSpoofing techniques are not addressedin this paperbut are certainlyworth OpenSource Intelligence (OSINT) consideration and probably deserve a paper(if not a book)unto itself. Pleasenote the followingcaveats to this article.The first limitationis the discussed technologieswere not independently verified in a redteaming scenario, so it is unclear whethersome of the discussedtactics and methodologieswould actually work. For example,extremist suggestions to includeintegrating a mobilephone camera into a missilewarhead seem highly improbable.
    [Show full text]