Bra Att Veta Om Trådlöst

Total Page:16

File Type:pdf, Size:1020Kb

Bra Att Veta Om Trådlöst Bra att veta om trådlöst PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Mon, 03 Jan 2011 16:47:12 UTC Contents Articles Comparison of mobile phone standards 1 3G 6 CDMA2000 11 3GPP Long Term Evolution 13 Router 24 Machine-to-Machine 29 Input/output 32 RS-232 33 RS-422 42 EIA-485 44 Modbus 48 Virtual private network 53 Layer 2 Tunneling Protocol 58 Network address translation 63 Wi-Fi 70 Service set (802.11 network) 80 Wireless access point 82 Wired Equivalent Privacy 84 Wi-Fi Protected Access 88 Power over Ethernet 91 Antenna (radio) 98 References Article Sources and Contributors 114 Image Sources, Licenses and Contributors 118 Article Licenses License 120 Comparison of mobile phone standards 1 Comparison of mobile phone standards Global System for Mobile Communications (GSM, around 80–85 % market share) and IS-95 (around 10–15 % market share[1] ) are the two most prevalent mobile communication technologies. Both technologies have to solve the same problem: to divide the finite RF spectrum among multiple users. TDMA (Time Division Multiple Access—underlying technology used in GSM's 2G) does it by chopping up the channel into sequential time slices. Each user of the channel takes turns to transmit and receive signals. In reality, only one person is actually using the channel at a specific moment. This is analogous to time-sharing on a large computer server. CDMA (Code Division Multiple Access Underlying technology used in GSM's 3G and IS-95's 2G) on the other hand, uses a special type of digital modulation called spread spectrum which spreads the voice data over a very wide channel in pseudorandom fashion. The receiver undoes the randomization to collect the bits together and produce the sound. For comparison, imagine a cocktail party, where couples are talking to each other in a single room. The room represents the available bandwidth. In GSM, a speaker takes turns talking to a listener. The speaker talks for a short time and then stops to let another pair talk. There is never more than one speaker talking in the room, no one has to worry about two conversations mixing. In CDMA, any speaker can talk at any time; however each uses a different language. Each listener can only understand the language of their partner. As more and more couples talk, the background noise (representing the noise floor) gets louder, but because of the difference in languages, conversations do not mix. Comparison table Feature NMT GSM UMTS (3GSM) IS-95 (CDMA CDMA 2000 one) Technology FDMA TDMA W-CDMA CDMA CDMA Generation 1G 2G 3G 2G 3G Digital No Yes Yes Yes Yes Year of First Use 1981 1991 2001 1995 2000 / 2002 Worldwide market 0% 72% 12% 0.6% 12% share *Valid non-biased source still required Roaming Scandinavia Worldwide, 200+ Worldwide Limited Limited countries Handset None SIM card SIM card None RUIM (not interoperability commonly implemented) Operator locking Monopoly Unlockable Unlockable ESN ESN Common Interference None Interferes with some None None None electronics, such as amplifiers Comparison of mobile phone standards 2 Signal Good coverage Good coverage indoors Smaller cells and lower Unlimited cell Unlimited cell size, quality/coverage area due to low on 850/900 MHz. indoors coverage on size, low low transmitter power frequencies Repeaters possible. 2100 MHz; equivalent transmitter power permits large cells 35 km hard limit. coverage indoors and superior permits large cells range to GSM on 850/900 MHz. Frequency Very low density 0.2 MHz = 8 timeslots. 5 MHz = 2 Mbit/s. Each call ? Comparable to ? Comparable to utilization/Call density Each timeslot can hold uses 1.8-12 kbit/s depending UMTS UMTS up to 2 calls through on chosen quality and audio interleaving. complexity. Battery life Low, due to high Very good due to simple Lower due to high demands Lower due to high Lower due to high transmitter protocol, good coverage of WCDMA power control demands of demands of CDMA power (1 watt) and mature, and young chipsets. CDMA power power control and power-efficient chipsets. control. young chipsets. Handoff Hard Hard Soft Soft Soft Breathing No No Yes Yes Yes Intellectual property Scandinavian Concentrated among a Concentrated among a few Qualcomm Qualcomm telecom few manufacturers manufacturers operators Advantages of 2G GSM • GSM is mature; this maturity means a more stable network with robust features. • Less signal deterioration inside buildings. • Ability to use repeaters. • Talktime is generally higher in GSM phones due to the pulse nature of transmission. • The availability of Subscriber Identity Modules allows users to switch networks and handsets at will, aside from a subsidy lock. • GSM covers virtually all parts of the world so international roaming is not a problem. • The much bigger number of subscribers globally creates a better network effect for GSM handset makers, carriers and end users. Disadvantages of 2G GSM • Pulse nature of TDMA transmission used in 2G interferes with some electronics, especially certain audio amplifiers. 3G uses W-CDMA now. • Intellectual property is concentrated among a few industry participants, creating barriers to entry for new entrants and limiting competition among phone manufacturers. • GSM has a fixed maximum cell site range of 35 km, which is imposed by technical limitations.[2] Comparison of mobile phone standards 3 Advantages of IS-95 • Capacity is IS-95's biggest asset; it can accommodate more users per MHz of bandwidth than any other technology. • Has no built-in limit to the number of concurrent users. • Uses precise clocks that do not limit the distance a tower can cover.[3] • Consumes less power and covers large areas so cell size in IS-95 is larger. • Able to produce a reasonable call with lower signal (cell phone reception) levels. • Uses soft handoff, reducing the likelihood of dropped calls. • IS-95's variable rate voice coders reduce the rate being transmitted when speaker is not talking, which allows the channel to be packed more efficiently. • Has a well-defined path to higher data rates. Disadvantages of IS-95 • Most technologies are patented and must be licensed from Qualcomm. • Breathing of base stations, where coverage area shrinks under load. As the number of subscribers using a particular site goes up, the range of that site goes down. • Because IS-95 towers interfere with each other, they are normally installed on much shorter towers. Because of this, IS-95 may not perform well in hilly terrain. • IS-95 covers a smaller portion of the world, and IS-95 phones are generally unable to roam internationally. • Manufacturers are often hesitant to release IS-95 devices due to the smaller market, so features are sometimes late in coming to IS-95 devices. • Even barring subsidy locks, CDMA phones are linked by ESN to a specific network, thus phones are typically not portable across providers. Development of the Market Share of Mobile Standards This graphic compares the market shares of the different mobile standards. Cellphone subscribers by technology (left Y axis) and total number of subscribers globally (right Y axis) In a fast growing market, GSM/3GSM (red) grows faster than the market and is gaining market share, the CDMA family (blue) grows at about the same rate as the market, while other technologies (grey) are being phased out. Comparison of mobile phone standards 4 Comparison of wireless Internet standards As a reference, a comparison of mobile and non-mobile wireless Internet standards follows. Comparison of Mobile Internet Access methods ( ) Standard Family Primary Use Radio Tech Downlink Uplink Notes (Mbit/s) (Mbit/s) LTE UMTS/4GSM General 4G OFDMA/MIMO/SC-FDMA 100 (in 50 (in 20 LTE-Advanced update expected 20MHz MHz to offer peak rates of at least 1 bandwidth) bandwidth) Gbit/s fixed speeds and 100 Mbit/s to mobile users. WiMAX 802.16 Mobile Internet MIMO-SOFDMA 128 (in 56 (in WiMAX update IEEE 802.16m 20MHz 20MHz expected to offer peak rates of at bandwidth) bandwidth) least 1 Gbit/s fixed speeds and 100Mbit/s to mobile users. Flash-OFDM Flash-OFDM Mobile Internet Flash-OFDM 5.3 1.8 Mobile range 18miles (30km) mobility up to 10.6 3.6 extended range 34 miles (55km) 200mph 15.9 5.4 (350km/h) HIPERMAN HIPERMAN Mobile Internet OFDM 56.9 56.9 Wi-Fi 802.11 Mobile Internet OFDM/MIMO 288.9* Antenna, RF front end (11n) enhancements and minor protocol timer tweaks have helped deploy long range P2P networks compromising on radial coverage, throughput and/or spectra efficiency (310km [4] [5] & 382km ) (*can support 600 when set at 40MHz channel width). iBurst 802.20 Mobile Internet HC-SDMA/TDD/MIMO 95 36 Cell Radius: 3–12 km Speed: 250kmph Spectral Efficiency: 13 bits/s/Hz/cell Spectrum Reuse Factor: "1" EDGE Evolution GSM Mobile Internet TDMA/FDD 1.9 0.9 3GPP Release 7 UMTS UMTS/3GSM General 3G CDMA/FDD 0.384 0.384 HSDPA widely deployed. W-CDMA CDMA/FDD/MIMO 14.4 5.76 Typical downlink rates today 2 HSDPA+HSUPA 56 22 Mbit/s, ~200 kbit/s uplink; HSPA+ HSPA+ downlink up to 56 Mbit/s. UMTS-TDD UMTS/3GSM Mobile Internet CDMA/TDD 16 16 Reported speeds according to [6] IPWireless using 16QAM modulation similar to HSDPA+HSUPA 1xRTT CDMA2000 Mobile phone CDMA 0.144 0.144 Succeeded by EV-DO for data use, but still is used for voice and as a failover for EV-DO Comparison of mobile phone standards 5 EV-DO 1x Rev. 0 CDMA2000 Mobile Internet CDMA/FDD 2.45 0.15 Rev B note: N is the number of EV-DO 1x Rev.A 3.1 1.8 1.25 MHz chunks of spectrum EV-DO Rev.B 4.9xN 1.8xN used.
Recommended publications
  • Extreme Networks EXOS V12.3.6.2 EAL3+ ST
    Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. Corsec Security, Inc. 3585 Monroe Street 13135 Lee Jackson Memorial Hwy., Suite 220 Santa Clara, CA 95051 Fairfax, VA 22033 Phone: +1 408 579 2800 Phone: +1 703 267 6050 http://www.extremenetworks.com http://www.corsec.c om Security Target , Version 0.9 March 12, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 4 1.1 PURPOSE ................................................................................................................................................................ 4 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 4 1.3 TOE OVERVIEW ................................................................................................................................................... 5 1.3.1 TOE Environment ................................................................................................................................................... 5 1.4 TOE DESCRIPTION .............................................................................................................................................. 6 1.4.1 Architecture .............................................................................................................................................................
    [Show full text]
  • In the United States Bankruptcy Court for the Eastern District of Virginia Richmond Division
    Case 20-32299-KLP Doc 1167 Filed 12/18/20 Entered 12/18/20 15:05:39 Desc Main Document Page 1 of 35 Dennis F. Dunne, Esq. (admitted pro hac vice) Tyler P. Brown, Esq. (VSB No. 28072) Matthew Brod, Esq. (admitted pro hac vice) Justin F. Paget, Esq. (VSB No. 77949) Shivani Shah, Esq. (admitted pro hac vice) Jennifer E. Wuebker, Esq. (VSB No. 91184) MILBANK LLP HUNTON ANDREWS KURTH LLP 55 Hudson Yards Riverfront Plaza, East Tower New York, New York 10001 951 East Byrd Street Telephone: (212) 530-5000 Richmond, Virginia 23219 Facsimile: (212) 530-5219 Telephone: (804) 788-8200 Facsimile: (804) 788-8218 Andrew M. Leblanc, Esq. (pro hac vice) MILBANK LLP 1850 K Street, NW, Suite 1100 Washington, DC 20006 Telephone: (202) 835-7500 Co-Counsel for the Official Committee of Unsecured Creditors IN THE UNITED STATES BANKRUPTCY COURT FOR THE EASTERN DISTRICT OF VIRGINIA RICHMOND DIVISION ) In re: ) Chapter 11 ) INTELSAT S.A., et al.,1 ) Case No. 20-32299 (KLP) ) Debtors. ) (Jointly Administered) ) FIRST SUPPLEMENTAL DECLARATION OF ANDREW M. LEBLANC IN SUPPORT OF APPLICATION OF THE OFFICIAL COMMITTEE OF UNSECURED CREDITORS PURSUANT TO 11 U.S.C. §§ 328(A) AND 1103(A) AND FED. R. BANKR. P. 2014 AND 2016 FOR ENTRY OF AN ORDER AUTHORIZING THE RETENTION AND EMPLOYMENT OF MILBANK LLP AS COUNSEL, EFFECTIVE AS OF MAY 28, 2020 Pursuant to 28 U.S.C. § 1746, I, Andrew M. Leblanc, declare that the following is true to the best of knowledge, information and belief: 1 Due to the large number of Debtors in these chapter 11 cases, for which joint administration has been granted, a complete list of the Debtor entities and the last four digits of their federal tax identification numbers is not provided herein.
    [Show full text]
  • Wingate Manual
    Wingate manual So read on to find out what to do after you ve installed WinGate, and how to go about configuring your LAN to get your client machines connecting to the. WinGate is highly capable web proxy software for Windows: caching, intercepting, forward and reverse proxy with https inspection and SSL offload, SOCKS ​WinGate VPN · ​Kaspersky AV for WinGate · ​PureSight for WinGate · ​Lumen. Your license agreement with Qbik New Zealand Limited, which is included with WinGate 3 (“the Software”), specifies the permitted and prohibited uses of the. Install WinGate 7 and have your network up and running in about 5 minutes. This video demonstrates how. WinGate Proxy Server is a sophisticated integrated Internet gateway and Advance => Network => Settings => Manual Proxy Configuration. Control and manage Internet access with WinGate, a sophisticated Internet gateway and communications server designed to meet the control, security and. Wingate Tutorial - Download as Word Doc .doc /.docx), PDF File .pdf), Text Select manual settings Goto edit settings Edit ip settings Set your ip adress as. WinGate is software designed to calibrate canal check gates for flow measurement. WinGate can analyze radial gates and slide gates. The current version is. Manual. WINGATE®. Configuration Tool for UNIGATE®. Deutschmann Automation GmbH & Co. KG | hmann. This manual covers two models - E and E Wingate Option. Watch therefore, for which sections apply to your bike. Monark E and E Wingate. The NCDPI Licensure Form and instructions are also available online at our website under "Forms," then “Licensure” for your convenience. Application. Library LibGuides. Policy Manual Cataloging. Library LibGuides. Policy Manual E-Resources.
    [Show full text]
  • <Document Title>
    TLS Specification for Storage Systems Version 1.0.1 ABSTRACT: This document specifies the requirements and guidance for use of the Transport Layer Security (TLS) protocol in conjunction with data storage technologies. The requirements are intended to facilitate secure interoperability of storage clients and servers as well as non-storage technologies that may have similar interoperability needs. This document was developed with the expectation that future versions of SMI-S and CDMI could leverage these requirements to ensure consistency between these standards as well as to more rapidly adjust the security functionality in these standards. This document has been released and approved by the SNIA. The SNIA believes that the ideas, methodologies and technologies described in this document accurately represent the SNIA goals and are appropriate for widespread distribution. Suggestion for revision should be directed to http://www.snia.org/feedback/. SNIA Technical Position November 20, 2014 USAGE The SNIA hereby grants permission for individuals to use this document for personal use only, and for corporations and other business entities to use this document for internal use only (including internal copying, distribution, and display) provided that: 1. Any text, diagram, chart, table or definition reproduced shall be reproduced in its entirety with no alteration, and, 2. Any document, printed or electronic, in which material from this document (or any portion hereof) is reproduced shall acknowledge the SNIA copyright on that material, and shall credit the SNIA for granting permission for its reuse. Other than as explicitly provided above, you may not make any commercial use of this document, sell any or this entire document, or distribute this document to third parties.
    [Show full text]
  • Network Devices Configuration Guide for Packetfence Version 6.5.0 Network Devices Configuration Guide by Inverse Inc
    Network Devices Configuration Guide for PacketFence version 6.5.0 Network Devices Configuration Guide by Inverse Inc. Version 6.5.0 - Jan 2017 Copyright © 2017 Inverse inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". The fonts used in this guide are licensed under the SIL Open Font License, Version 1.1. This license is available with a FAQ at: http:// scripts.sil.org/OFL Copyright © Łukasz Dziedzic, http://www.latofonts.com, with Reserved Font Name: "Lato". Copyright © Raph Levien, http://levien.com/, with Reserved Font Name: "Inconsolata". Table of Contents About this Guide ............................................................................................................... 1 Other sources of information ..................................................................................... 1 Note on Inline enforcement support ................................................................................... 2 List of supported Network Devices ..................................................................................... 3 Switch configuration .......................................................................................................... 4 Assumptions ............................................................................................................
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • TLS Security Upgrade Effective Thursday, May 3, 2018
    TLS Security Upgrade Effective Thursday, May 3, 2018 You May Need to Upgrade Your Browser/Operating System to Ensure Online and Mobile Banking Functionality. Apple Bank is informing you of a change to our security protocol. We will be officially retiring TLS 1.0 security protocol support on all of our services and upgrading to TLS 1.1 or higher to align with industry best practices and ensure that your data continues to be highly secure. TLS stands for “Transport Layer Security.” It is a protocol that provides privacy and data integrity between two communicating applications. It’s the most widely deployed security protocol used today, and is used for web browsers and other applications that require data to be securely exchanged over a network. On or before May 3, 2018, we will disable the TLS 1.0 encryption protocol, which may prevent users like you from accessing some or all of your online and mobile banking functionality. This means that you may need to upgrade your browser/operating system to disable TLS 1.0 and use TLS 1.1 or higher. This security upgrade will not affect you in any other way. We want to make this process as smooth as possible for you with specific instructions below. Our primary goal for users is to maintain the highest possible security standards and help keep your data secure. Depending on your browser/device, you may need to upgrade to the following versions that support TLS 1.1 or higher. Browser • Microsoft Internet Explorer (IE): version 11 and higher • Microsoft Edge: all versions • Mozilla Firefox: version
    [Show full text]
  • Eminem 1 Eminem
    Eminem 1 Eminem Eminem Eminem performing live at the DJ Hero Party in Los Angeles, June 1, 2009 Background information Birth name Marshall Bruce Mathers III Born October 17, 1972 Saint Joseph, Missouri, U.S. Origin Warren, Michigan, U.S. Genres Hip hop Occupations Rapper Record producer Actor Songwriter Years active 1995–present Labels Interscope, Aftermath Associated acts Dr. Dre, D12, Royce da 5'9", 50 Cent, Obie Trice Website [www.eminem.com www.eminem.com] Marshall Bruce Mathers III (born October 17, 1972),[1] better known by his stage name Eminem, is an American rapper, record producer, and actor. Eminem quickly gained popularity in 1999 with his major-label debut album, The Slim Shady LP, which won a Grammy Award for Best Rap Album. The following album, The Marshall Mathers LP, became the fastest-selling solo album in United States history.[2] It brought Eminem increased popularity, including his own record label, Shady Records, and brought his group project, D12, to mainstream recognition. The Marshall Mathers LP and his third album, The Eminem Show, also won Grammy Awards, making Eminem the first artist to win Best Rap Album for three consecutive LPs. He then won the award again in 2010 for his album Relapse and in 2011 for his album Recovery, giving him a total of 13 Grammys in his career. In 2003, he won the Academy Award for Best Original Song for "Lose Yourself" from the film, 8 Mile, in which he also played the lead. "Lose Yourself" would go on to become the longest running No. 1 hip hop single.[3] Eminem then went on hiatus after touring in 2005.
    [Show full text]
  • Glossaire Des Protocoles Réseau
    Glossaire des protocoles réseau - EDITION LIVRES POUR TOUS - http://www.livrespourtous.com/ Mai 2009 A ALOHAnet ALOHAnet, également connu sous le nom ALOHA, est le premier réseau de transmission de données faisant appel à un média unique. Il a été développé par l'université d'Hawaii. Il a été mis en service en 1970 pour permettre les transmissions de données par radio entre les îles. Bien que ce réseau ne soit plus utilisé, ses concepts ont été repris par l'Ethernet. Histoire C'est Norman Abramson qui est à l'origine du projet. L'un des buts était de créer un réseau à faible coût d'exploitation pour permettre la réservation des chambres d'hôtels dispersés dans l'archipel d'Hawaï. Pour pallier l'absence de lignes de transmissions, l'idée fut d'utiliser les ondes radiofréquences. Au lieu d'attribuer une fréquence à chaque transmission comme on le faisait avec les technologies de l'époque, tout le monde utiliserait la même fréquence. Un seul support (l'éther) et une seule fréquence allaient donner des collisions entre paquets de données. Le but était de mettre au point des protocoles permettant de résoudre les collisions qui se comportent comme des perturbations analogues à des parasites. Les techniques de réémission permettent ainsi d'obtenir un réseau fiable sur un support qui ne l'est pas. APIPA APIPA (Automatic Private Internet Protocol Addressing) ou IPv4LL est un processus qui permet à un système d'exploitation de s'attribuer automatiquement une adresse IP, lorsque le serveur DHCP est hors service. APIPA utilise la plage d'adresses IP 169.254.0.0/16 (qu'on peut également noter 169.254.0.0/255.255.0.0), c'est-à-dire la plage dont les adresses vont de 169.254.0.0 à 169.254.255.255.
    [Show full text]
  • Protokollsupport
    Reference Guide WinRoute Pro 4.1 SE För version 4.1 Build 22 och sinare Tiny Software Inc. Contents Innehållsförteckning Läs mig först 2 Beskrivning av WinRoute 5 WinRoute sammanfattning...................................................................................... 6 Omfattande protokollsupport .................................................................................. 9 NAT-router............................................................................................................ 10 Introduktion i NAT .................................................................................... 11 Hur NAT fungerar...................................................................................... 12 WinRoutes struktur .................................................................................... 13 Att ställa in NAT på båda gränssnitten ...................................................... 15 Portmappning - paketbefordran ................................................................. 18 Portmappning för system med flera hem (flera IP-adresser)...................... 21 Multi-NAT ................................................................................................. 22 Gränssnittstabell......................................................................................... 24 VPN-support .............................................................................................. 24 Brandvägg med paketfilter.................................................................................... 25 Översikt
    [Show full text]
  • The Complete Guide to Social Media from the Social Media Guys
    The Complete Guide to Social Media From The Social Media Guys PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Mon, 08 Nov 2010 19:01:07 UTC Contents Articles Social media 1 Social web 6 Social media measurement 8 Social media marketing 9 Social media optimization 11 Social network service 12 Digg 24 Facebook 33 LinkedIn 48 MySpace 52 Newsvine 70 Reddit 74 StumbleUpon 80 Twitter 84 YouTube 98 XING 112 References Article Sources and Contributors 115 Image Sources, Licenses and Contributors 123 Article Licenses License 125 Social media 1 Social media Social media are media for social interaction, using highly accessible and scalable publishing techniques. Social media uses web-based technologies to turn communication into interactive dialogues. Andreas Kaplan and Michael Haenlein define social media as "a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, which allows the creation and exchange of user-generated content."[1] Businesses also refer to social media as consumer-generated media (CGM). Social media utilization is believed to be a driving force in defining the current time period as the Attention Age. A common thread running through all definitions of social media is a blending of technology and social interaction for the co-creation of value. Distinction from industrial media People gain information, education, news, etc., by electronic media and print media. Social media are distinct from industrial or traditional media, such as newspapers, television, and film. They are relatively inexpensive and accessible to enable anyone (even private individuals) to publish or access information, compared to industrial media, which generally require significant resources to publish information.
    [Show full text]
  • Is India Ready to Seize a USD 4.5 Trillion M2M Opportunity?
    Machine-to-Machine: Vision 2020 Is India ready to seize a USD 4.5 trillion M2M opportunity? TeleTech 2013 www.deloitte.com/in Contents Foreword 3 Message from Industry Mentor 4 Overview 5 M2M from the Telecom Operators Perspective 9 M2M in Automobile 14 M2M in Agriculture 24 M2M in Home Appliances 29 M2M in Industrial Products Manufacturing 35 M2M in Energy & Utilities 40 M2M in Healthcare Sector 48 M2M in Retail Sector 53 About Deloitte 57 About CII 58 About MIT School of Telecom Management 59 2 Foreword Machine-to-machine (M2M) would make those things However, for M2M to gain acceptance among the possible and affordable, which are currently not feasible general populace, service providers and others players in to be delivered, in a vast country like India. Technologies the value chain are required to deliver applications that that enable M2M communication such as GPS unit, bring tangible value to peoples’ lives. RFID, GPRS modules, etc. have much to offer to the developing world towards improving quality of life. In Several barriers, however, have the potential to fact, these next-generation communication technologies slowdown the development and adoption of M2M may well originate in the larger growth markets of the applications. Deployment of IPv6, sensor energy, developing world, particularly – China and India. standards in terms of security, privacy and architecture, current low-cost business models, network upgrades M2M can help in achieving many Millennium and regulatory compliances will pose challenges for all Development Goals of the United Nations through players in the M2M ecosystem. Since M2M technologies useful applications for medical diagnosis and treatment, would cater to several industries such as healthcare, cleaner water, improved sanitation, energy conservation, education, automotive, agriculture, telecom networks the export of commodities and food security.
    [Show full text]