- NIILM University
Transcription
- NIILM University
ENGINEERING ART CHEMISTRY MECHANICS PHYSICS history psychology Electronic Governance LANGUAGE BIOTECHNOLOGY E C O L O G Y MUSIC EDUCATION GEOGRAPHY agriculture law DESIGN mathematics MEDIA management HEALTH CONTENTS Chapter 1 : History Chapter 2 : E-Government by country Chapter 3 : E-Government- an alternate approach Chapter 4 : National partnership for Rein venting government Chapter 5 : Government to business Chapter 6 : Automobile navigation Chapter 7 : Short Message service Chapter : 8 Technical details Chapter : 9 Multimedia messaging service Chapter : 10 Bluetooth Chapter : 11 List of application Chapter : 12 References 1 Chapter-1 History E-Governance Several dimension and factors influence the definition of e-Governance. The word ―electronic‖ in the term e-Governance implies technology driven governance. E-Governance is the application ofinformation and communication technology (ICT) for delivering government services, exchange of information communication transactions, integration of various standalone systems and services between Government-to-Citizens (G2C), Government-to- Business(G2B),Government-to-Government( G2G) as well as back office processes and interactions within the entire government frame work. Through the e-Governance, the government services will be made available to the citizens in a convenient, efficient and transparent manner. The three main target groups that can be distinguished in governance concepts are Government, citizens and businesses/interest groups. In eGovernance there are no distinct boundaries. Generally four basic models are available-Government to Customer (Citizen), Government to Employees, Government to Government and Government to Business. Difference between e-governance and e-government Both the terms are treated to be the same, however, there is some difference between the two. "E-government" is the use of the ICTs in public administrations- combined with organisational change and new skills- to improve public services and democratic processes and to strengthen support to public". The problem in this definition to be congruence definition of e-governance is that there is no provision for governance of ICTs. As a matter of fact, the governance of ICTs requires most probably a substantial increase in regulation and policy- making capabilities,with all the expertise and opinion-shaping processes among the various social stakeholders of these concerns. So, the perspective of the e-governance is "the use of the technologies that both help governing and have to be governed". E-Governance is the future, many countries are looking forward to for a corruption free government. E-government is one-waycommunication protocol whereas E-governance is twoway communication protocol. The essence of E-governance is to reach the beneficiary and 2 ensure that the services intended to reach the desired individual has been met with. There should be an auto-response system to support the essence of E-governance, whereby the Government realizes the efficacy of its governance. E-governance is by the governed, for the governed and of the governed. Establishing the identity of the end beneficiary is a true challenge in all citizen-centric services. Statistical information published by governments and world bodies do not always reveal the facts. Best form of E-governance cuts down on unwanted interference of too many layers while delivering governmental services. It depends on good infrastructural setup with the support of local processes and parameters for governments to reach their citizens or end beneficiaries. Budget for planning, development and growth can be derived from well laid out Egovernance systems Defining e-Government ‗E-Gov Strategies' (or Digital Government) is defined as ‗The employment of the Internet and the world-wide-web for delivering government information and services to the citizens.‘ (United Nations, 2006; AOEMA, 2005). 'Electronic Government' (or in short 'e-Government') essentially refers to ‗The utilization of Information Technology (IT), Information and Communication Technologies (ICTs), and other web-based telecommunication technologies to improve and/or enhance on the efficiency and effectiveness of service delivery in the public sector.‘ (Jeong, 2007). E-government describes the use of technologies to facilitate the operation of government and the dispersement of government information and services. E-government, short for electronic government, deals heavily with Internet and non-internet applications to aid in governments. Egovernment includes the use of electronics in government as large-scale as the use of telephones and fax machines, as well as surveillance systems, tracking systems such as RFID tags, and even the use of television and radios to provide government-related information and services to the citizens. Examples of e-Government and e-Governance E-Government should enable anyone visiting a city website to communicate and interact with city employees via the Internet with graphical user interfaces (GUI), instant-messaging (IM), 3 audio/video presentations, and in any way more sophisticated than a simple email letter to the address provided at the site and ―the use of technology to enhance the access to and delivery of government services to benefit citizens, business partners and employees. The focus should be on: The use of Information and communication technologies, and particularly the Internet, as a tool to achieve better government. The use of information and communication technologies in all facets of the operations of a government organization. The continuous optimization of service delivery, constituency participation and governance by transforming internal and external relationships through technology, the Internet and new media.[8] Whilst e-Government has traditionally been understood as being centered around the operations of government, e-Governance is understood to extend the scope by including citizen engagement and participation in governance. As such, following in line with the OECD definition of eGovernment, e-Governance can be defined as the use of ICTs as a tool to achieve better governance. Delivery models and activities of e-Government The primary delivery models of e-Government can be divided into: Government-to-Citizen or Government-to-Consumer (G2C) In this model, the G2C model apply the strategy of Customer Relationship Management (CRM) with business concept. By managing their customer (citizen) relationship, the business (government) can provide the needed products and services fulfill the needs from customer (citizen). In United States, the NPR (National Partnership for Reinventing Government) has been implemented from 1993. Government-to-Business (G2B) Government-to-Government (G2G) Government-to-Employees (G2E) 4 Within each of these interaction domains, four kinds of activities take place: pushing information over the Internet, e.g.: regulatory services, general holidays, public hearing schedules, issue briefs, notifications, etc. two-way communications between the agency and the citizen, a business, or another government agency. In this model, users can engage in dialogue with agencies and post problems, comments, or requests to the agency. conducting transactions, e.g.: lodging tax returns, applying for services and grants. governance, e.g.: To enable the citizen transition from passive information access to active citizen participation by: 1. Informing the citizen 2. Representing the citizen 3. Encouraging the citizen to vote 4. Consulting the citizen 5. Involving the citizen Non-internet e-Government While e-government is often thought of as "online government" or "Internet-based government," many non-Internet "electronic government" technologies can be used in this context. Some nonInternet forms include telephone, fax, PDA, SMS text messaging,MMS, wireless networks and services, Bluetooth, CCTV, tracking systems, RFID, biometric identification, road traffic management and regulatory enforcement, identity cards, smart cards and other Near Field Communication applications; polling station technology (where non-online e-voting is being considered), TV and radio-based delivery of government services (e.g., CSMW), email, online community facilities, newsgroups and electronic messaging technologies. 5 mailing lists, online chat, and instant Controversies of e-Government Disadvantages The main disadvantages concerning e-government is the lack of equality in public access to the internet, reliability of information on the web, and hidden agendas of government groups that could influence and bias public opinions. There are many considerations and potential implications of implementing and designing egovernment, including disintermediation of the government and its citizens, impacts on economic, social, and political factors, vulnerability to cyber attacks, and disturbances to the status quo in these areas. See also Electronic leviathan. Hyper-surveillance Increased contact between government and its citizens goes both ways. Once e-government begins to develop and become more sophisticated, citizens will be forced to interact electronically with the government on a larger scale. This could potentially lead to a lack of privacy for civilians as their government obtains more and more information on them. In a worst case scenario, with so much information being passed electronically between government and civilians, a totalitarian-like system could develop. When the government has easy access to countless information on its citizens, personal privacy is lost. Cost Although "a prodigious amount of money has been spent" on the development and implementation of e-government, some say it has yielded only a mediocre product. The outcomes and effects of trial Internet-based governments are often difficult to gauge or unsatisfactory. According to Gartner, Worldwide IT spending is estimated to total $3.6 trillion in 2011 which is 5.1% increase from the year 2010 ($3.4 trillion). Inaccessibility An e-government site that provides web access and support often does not offer the "potential to reach many users including those who live in remote areas, are homebound, have low literacy levels, exist on poverty line incomes. 6 False sense of transparency and accountability Opponents of e-government argue that online governmental transparency is dubious because it is maintained by the governments themselves. Information can be added or removed from the public eye. To this day, very few organizations monitor and provide accountability for these modifications. Those that do so, like the United States‘ OMBWatch and Government Accountability Project, are often nonprofit volunteers. Even the governments themselves do not always keep track of the information they insert and delete. Advantages The ultimate goal of the E-Government is to be able to offer an increased portfolio of public services to citizens in an efficient and cost effective manner. E-government allows for government transparency. Government transparency is important because it allows the public to be informed about what the government is working on as well as the policies they are trying to implement. Simple tasks may be easier to perform through electronic government access. Many changes, such as marital status or address changes can be a long process and take a lot of paper work for citizens. E-government allows these tasks to be performed efficiently with more convenience to individuals. E-government is an easy way for the public to be more involved in political campaigns. It could increase voter awareness, which could lead to an increase in citizen participation in elections. It is convenient and cost-effective for businesses, and the public benefits by getting easy access to the most current information available without having to spend time, energy and money to get it. E-government helps simplify processes and makes access to government information more easily accessible for public sector agencies and citizens. For example, the Indiana Bureau of Motor Vehicles simplified the process of certifying driver records to be admitted in county court proceedings. Indiana became the first state to allow government records to be digitally signed, legally certified and delivered electronically by using Electronic Postmark technology. In addition to its simplicity, e-democracy services can reduce costs. Alabama Department of Conservation & Natural Resources, Wal-Mart and NIC developed an online hunting and fishing license service utilizing an existing computer to automate the licensing process. More than 140,000 licenses were purchased atWal-Mart stores during the first hunting season and the agency estimates it will save $200,000 annually from service. 7 The anticipated benefits of e-government include efficiency, improved services, better accessibility of public services, and more transparency and accountability. 8 Chapter-2 Democratization One goal of e-government will be greater citizen participation. Through the internet, people from all over the country can interact with politicians or public servants and make their voices heard. Blogging and interactive surveys will allow politicians or public servants to see the views of the people they represent on any given issue. Chat rooms can place citizens in real-time contact with elected officials, their offices or provide them with the means to replace them by interacting directly with public servants, allowing voters to have a direct impact and influence in their government. These technologies can create a more transparent government, allowing voters to immediately see how and why their representation in the capital is voting the way they are. This helps voters better decide who to vote for in the future or how to help the public servants become more productive. A government could theoretically move more towards a truedemocracy with the proper application of e-government. Government transparency will give insight to the public on how decisions are made and hold elected officials or public servants accountable for their actions. The public could become a direct and prominent influence in government legislature to some degree. Environmental bonuses Proponents of e-government argue that online government services would lessen the need for hard copy forms. Due to recent pressures from environmentalist groups, the media, and the public, some governments and organizations have turned to the Internet to reduce this paper use. The United States government utilizes the website http://www.forms.gov to provide ―internal government forms for federal employees‖ and thus ―produce significant savings in paper. Speed, efficiency, and convenience E-government allows citizens to interact with computers to achieve objectives at any time and any location, and eliminates the necessity for physical travel to government agents sitting behind desks and windows. Improved accounting and record keeping can be noted through computerization, and information and forms can be easily accessed, equaling quicker processing time. On the administrative side, access to help find or retrieve files and linked information can now be stored in databases versus hardcopies stored in various locations. Individuals with 9 disabilities or conditions no longer have to be mobile to be active in government and can be in the comfort of their own homes. Public approval Recent trials of e-government have been met with acceptance and eagerness from the public. Citizens participate in online discussions of political issues with increasing frequency, and young people, who traditionally display minimal interest in government affairs, are drawn to e-voting procedures. Although internet-based governmental programs have been criticized for lack of reliable privacy policies, studies have shown that people value prosecution of offenders over personal confidentiality. Ninety percent of United States adults approve of Internet tracking systems of criminals, and 57% are willing to forgo some of their personal internet privacy if it leads to the prosecution of criminals or terrorists. Technology-specific e-Government There are also some technology-specific sub-categories of e-government, such as mgovernment (mobile government), u-government (ubiquitous government), and g-government (GIS/GPS applications for e-government. E-government portals and platforms The primary delivery models of e-Government are classified depending on who benefits. In the development of public sector or private sector portals and platforms, a system is created that benefits all constituents. Citizens needing to renew their vehicle registration have a convenient way to accomplish it while already engaged in meeting the regulatory inspection requirement. On behalf of a government partner, business provides what has traditionally, and solely, managed by government and can use this service to generate profit or attract new customers. Government agencies are relieved of the cost and complexity of having to process the transactions. To develop these public sector portals or platforms, governments have the choice to internally develop and manage, outsource, or sign a self-funding contract. The self-funding model creates portals that pay for themselves through convenience fees for certain e-government transactions, known as self-funding portals. 10 Social networking services are an emerging area for e-democracy. The social networking entry point is within the citizens‘ environment and the engagement is on the citizens‘ terms. Proponents of e-government perceive government use of social networking as a medium to help government act more like the public it serves. Examples can be found at almost every state government portal throughFacebook, Twitter, and YouTube widgets. Government and its agents also have the opportunity to follow citizens to monitor satisfaction with services they receive. Through ListServs, RSS feeds, mobile messaging, micro-blogging services and blogs, government and its agencies can share information to citizens who share common interests and concerns. Government is also beginning to Twitter. In the state of Rhode Island, TreasurerFrank T. Caprio is offering daily tweets of the state‘s cash flow. Interested people can sign up at here. For a full list of state agencies with Twitter feeds, visit NIC. For more information, visit transparent-gov.com. N e-Government Readiness Index There are several international rankings of e-government maturity. The Eurostat rankings, Economist, Brown University, and the UN e-Government Readiness Index are among the most frequently cited. The United Nations Public Administration Network conducts a bi-annual eGovernment survey which includes a section titled e-Government Readiness. It is a comparative ranking of the countries of the world according to two primary indicators: i) the state of egovernment readiness; and ii) the extent of e-participation. Constructing a model for the measurement of digitized services, the Survey assesses the 191 member states of the UN according to a quantitative composite index of e-government readiness based on website assessment; telecommunication infrastructure and human resource endowment. 11 The following is the list of the top 50 countries according to the UN's 2012 e-Government Readiness Index. Rank Country Index 1 South Korea 0.9283 2 Netherlands 0.9125 3 United Kingdom 0.8960 4 Denmark 0.8889 5 United States 0.8687 6 France 0.8635 7 Sweden 0.8599 8 Norway 0.8593 9 Finland 0.8505 10 Singapore 0.8474 12 Rank Country Index 11 Canada 0.8430 12 Australia 0.8390 13 New Zealand 0.8381 14 Liechtenstein 0.8264 15 Switzerland 0.8134 16 Israel 0.8100 17 Germany 0.8079 18 Japan 0.8019 19 Luxembourg 0.8014 20 Estonia 0.7987 21 Austria 0.7840 13 Rank Country Index 22 Iceland 0.7835 23 Spain 0.7770 24 Belgium 0.7718 25 Slovenia 0.7492 26 Monaco 0.7468 27 United Arab Emirates 0.7344 28 Lithuania 0.7333 29 Croatia 0.7328 30 Hungary 0.7208 31 Italy 0.7190 32 Portugal 0.7165 14 Rank Country Index 33 Ireland 0.7194 34 Malta 0.7131 35 Bahrain 0.6946 36 Greece 0.6872 37 Kazakhstan 0.6844 38 Chile 0.6769 39 Malaysia 0.6703 40 Saudi Arabia 0.6658 41 Latvia 0.6604 42 Colombia 0.6572 43 Barbados 0.6566 15 Rank Country Index 44 Cyprus 0.6508 45 Czech Republic 0.6491 46 Poland 0.6441 47 Qatar 0.6405 48 Antigua and Barbuda 0.6345 49 Russian Federation 0.6315 50 Uruguay 0.6315 16 Chapter-3 E-Government By Country In Africa As the rest of the world keeps embracing the benefits of e-government, Africa has of late shown significant milestones in developing similar electronic government platforms. There are various countries that has shown progress in the recent years: In Kenya The transition period from the KANU government to the NARC government(December 2002), marked the full realization of the e-government aspect, as the nation was set to tap the great potential of ICT-in service delivery to its subjects .Nonetheless,it was in January 2004 when, after the executive (cabinet) session, that a Directorate of e-government was established.The newly created department had the duty to draw the plan of action; for future ICT implementations. Like many other African nations, Kenya has embraced the high mobile penetration rate within its population.This is attributed to the ubiquity aspect, that is provided by mobile phones-such that even people living in remote areas that could not be having the traditional telecommunications' networks, they can now communicate with ease.It is noted that this has a great impact on the governments' strategies in reaching out to its citizens. Given that about 70% of the population owns mobile phones, leading mobile network operators like Safaricom have taken a great step in offering services that meets citizens' demands. Such services include Kipokezi service(that allows subscribers to do online chatting and also exchange electronic mails via standard mobile phones)-and then M-Pesa; the mobile bank(that allows the subscribers to send and receive electronic cash). This has even appealed to the majority of Kenyans, as it supports the branchless members of the society too, in doing normal and secure businesses via M-Pesa. The recent IMF report reveals that MPESA transactions in Kenya exceeded those carried out by Western Union worldwide. 17 In Asia In Bangladesh eGovernment web portal has been developed to provide more convenient access to various government service and information through one window In India In India, the e-Governance initiatives are broadly managed under the umbrella of the NeGP initiative. In Malaysia In Malaysia, the e-Government efforts are undertaken by the Malaysian government, under the umbrella of Multimedia Super Corridor (MSC) and e-Government flagships, which was launched in mid-1996, by Dr Mahathir Mohamad (1981-2003), by the then Prime Minister of Malaysia (Jeong & Nor Fadzlina, 2007). Electronic government is an initiative aimed at reinventing how the government works. It seeks to improve both how the government operates, as well as how it deliver services to the people (Ibrahim Ariff & Goh Chen Chuan, 2000). In Pakistan In Pakistan, the Government of Pakistan's e-government directorate is committed to building a robust e-network framework that essentially allows the government to be more responsive in delivering public services to citizens and businesses. In Sri Lanka Sri Lanka have taken some initiative actions to provide the benefits of e-Government to the citizens. In Europe eGovernment shows significant advancement in Europe. For more information see eGovernment in Europe. 18 In Russia On the Federal Law «On providing state and municipal services» (2010), the strategy on development of Information Society in the Russian Federation, approved by the President (2008), the Federal target programme «Electronic Russia» (2002 – 2010 years), approved by the Government (2002), the State Programme «Information Society» (2010), the Procedure on development and approval of administrative regulations execution of public functions (public services), approved by the Government (2005), the concept of administrative reform in the Russian Federation in 2006 - 2010 respectively, approved by the Government (2005),on other orders, resolutions and acts in the Russian Federation was created electronic government (or egovernment). The main target on creating of e-government lies in the field of providing the equal opportunities for all the Russians in spite of their living place and their incomes and make more effective system of public administration. So e-government are created for reaching the useful system of public management accommodating the individual interests of every citizen by participation through ICTs in public policy-making. Nowadays Russian e-government includes such systems as 1. The united interagency Interacting system using for providing of state and municipal services, exchange of information and data between participants of interagency interacting, quick approval of state and municipal decisions, etc. 2. The united system for authentication and authorization providing evidence of the rights of all participants of e-government. 3. United portal of state and municipal services and functions which is the «single window» for all information and services assured by government and municipals. The portal of public services is one of the key elements of the project to create «electronic government» in the country. The portal provides a single point of access to all references on state and municipal services through the Internet and provides citizens and organizations the opportunity to receive these services electronically. Monthly visits by users of the public services portal range between 200,000 and 700,000. For example, citizens are now able to get or exchange a driver license through this portal. 19 4. Head system providing utilization of electronic signature. Other systems located on cloud services. Today Russian e-government elements are demanded in the spheres of e-governance, e-services (e-health, e-education, e-library, etc.), e-commerce, e-democracy (web-election, Russian public initiative). By the United Nations E-Government Survey 2012: E-Government for the People Russia became one of the 7 emerging leaders in e-government development, took 9th place in rating of e-government development in largest population countries, took 8th rank in Top eparticipation leaders, after Norway, Sweden and Chile, Advancing 32 positions in the world rankings, the Russian Federation became the leader of e-government in Eastern Europe. Evolution of ICT in the Russian Federation provided the raising of Russia in E-government development index to the 27 place. In the Middle East In the United Arab Emirates, the Emirates eGovernment is designed for e-government operations. The e-Government was also established in Saudi Arabia, and it offers online government services and transactions. In North America In Canada The current Clerk of the Privy Council – the head of the federal public service, has made workplace renewal a pillar of overall public service renewal. Key to workplace renewal is the adoption of collaborative networked tools. An example of such as tool is GCPEDIA – a wiki platform for federal public servants. Other tools include GCconnex, a social networking tool, and GCforums, a discussion board system. In the United States The election of Barack Obama as President of the United States has become associated with the effective use of Internet technologies during his campaign, and in the implementation of his new government in 2009. On January 21, 2009, newly elected President Obama signed one of his first memorandums – the Memorandum for the Heads of Executive Departments and Agencies on Transparency and Open GovernmentIn the memo, President Obama called for an unprecedented level of openness 20 in Government, asking agencies to "ensure the public trust and establish a system of transparency, public participation, and collaboration. The memo further "directs the Chief Technology Officer, in coordination with the Director of the Office of Management and Budget (OMB) and the Administrator of General Services (GSA), to coordinate the development by appropriate executive departments and agencies [and] to take specific actions implementing the principles set forth in the memorandum. President Obama‘s memorandum centered around the idea of increasing transparency throughout various different federal departments and agencies. By enabling public websites like recovery.gov and data.gov to distribute more information to the American population, the administration believes that it will gain greater citizen participation. Recently[ this initiative has crossed several key milestones and continues to make a significant amount of progress. Certain government information is still[ and will continue to be, considered privileged, and this issue remains at the center of the debate. Additionally, technology is still not accessible by all Americans. The National Broadband Plan hopes to counter this limit, but many Americans are still without access to internet, which would be required to use these services. Some Americans live in rural areas without access, while others are not financially able to support a connection. 21 Chapter-4 E-Government – An Alternative Approach Recent government policy updates have seen a shift away from e-Government towards a much more radical focus on transforming the whole relationship between the public sector and users of public services. This new approach is referred to as Transformational Government Transformation programs differ from traditional e-Government programs in four major ways: They take a whole-of-government view of the relationship between the public sector and the citizen or business user. They include initiatives to e-enable the frontline public services: that is, staff involved in direct personal delivery of services such as education and healthcare – rather than just looking at transactional services which can be e-enabled on an end-to-end basis. They take a whole-of-government view of the most efficient way managing the cost base of government. They focus on the "citizen" not the "customer". That is, they seek to engage with the citizens as owners of and participants in the creation of public services, not as passive recipients of services. Information and communications technology Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audiovisual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997and in the revised National Curriculum for England, Wales and Northern Ireland in 2000. As of September 2013, the term "ICT" in the UK National Curriculum has been replaced by the broader term "computing" 22 The term ICT is now also used to refer to the convergence of audio-visual and telephone networks with computer networks through a single cabling or link system. There are large economic incentives (huge cost savings due to elimination of the telephone network) to merge the audio-visual, building management and telephone network with the computer network system using a single unified system of cabling, signal distribution and management. The term Infocommunications is sometimes used interchangeably with ICT. In fact Infocommunications is the expansion oftelecommunications with information processing and content handling functions on a common digital technology base. For a comparison of these and other terms, see. The ICT Development Index compares the level of ICT use and access across the world. Global Costs of IT The total money spent on IT worldwide has been most recently estimated as US $3.5 trillion, and is currently growing at 5% p.a. – doubling every 15 years. IT costs, as a percentage of corporate revenue, have grown 50% since 2002, putting a strain on IT budgets. Today, when looking at companies‘ IT budgets, 75% are recurrent costs, used to ―keep the lights on‖ in the IT department, and 25% are cost of new initiatives for technology development. The average IT budget has the following breakdown 31% – personnel costs (internal) 29% – software costs (external/purchasing category) 26% – hardware costs (external/purchasing category) 14% – costs of external service providers (external/services) The WSIS Process and the stocktaking process On 21 December 2001, the United Nations General Assembly by approving Resolution 56/183 endorsed the holding of the World Summit on the Information Society (WSIS) to discuss on information society opportunities and challenges. According to this resolution, the General Assembly related the Summit to the United Nations Millennium Declaration to implement ICT to facilitate achieving Millennium Development Goals. It also emphasize on the multistakeholder approach to use all stakeholders including civil society and private sector beside the governments. The resolution gave ITU the leading managerial role to organize the event in cooperation with other UN bodies as well as the other international organizations and the host countries and recommended that preparations for the Summit take place through an open-ended 23 intergovernmental Preparatory Committee – or PrepCom – that would define the agenda of the Summit, decide on the modalities of the participation of other stakeholders, and finalize both the draft Declaration of Principles and the draft Plan of Action. In 2003 at Geneva, delegates from 175 countries took part in the first phase of WSIS where they adopted a Declaration of Principles. This is a road map for achieving an information society accessible to all and based on shared knowledge. A Plan of Action sets out a goal of bringing 50 percent of the world's population online by 2015. The second phase took place from November 16 through 18, 2005, in Tunis, Tunisia. It resulted in agreement on the Tunis Commitmentand the Tunis Agenda for the Information Society, and the creation of the Internet Governance Forum. The WSIS Stocktaking Process The WSIS Stocktaking Process is a follow-up to WSIS. Its purpose is to provide a register of activities carried out by governments, international organizations, the business sector, civil society and other entities, in order to highlight the progress made since that landmark event. Following § 120 of TAIS, ITU has been maintaining the WSIS Stocktaking database as a publicly accessible system providing information on ICT-related initiatives and projects with reference to the 11 WSIS Action Lines. Furthermore, regular reporting on WSIS Stocktaking is the outcome of the Tunis phase of the Summit, which was launched in order to serve as a tool for assisting with the WSIS follow-up. The purpose of the regular reports is to update stakeholders on the various activities related to the 11 Action Lines identified in the Geneva Plan of Action, that was approved during First Phase of the WSIS. The WSIS+10 High-Level Event will be held from 13 to 17 April 2014 in Sharm el-Sheikh. This event will be an extended version of the WSIS Forum. It is designed to review the progress made in the implementation of the WSIS outcomes under the mandates of participating agencies, and to take stock of achievements in the last 10 years based on reports of WSIS Stakeholders, including those submitted by countries, Action Line Facilitators and other stakeholders. The event will review the WSIS Outcomes (2003 and 2005) related to the WSIS Action Lines with the view of developing proposals on a new vision beyond 2015, potentially including new 24 targets. This process will take into account the decisions of the 68th Session of the UN General Assembly. Open Consultation Process The Open Consultation Process is an open and inclusive consultation among WSIS Stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations) focused on developing multistakeholder consensus on two draft Outcome Documents, the thematic aspects, and innovations on the format of the Event. WSIS + 10 The WSIS+10 High-Level Event will be held from 13 to 17 April 2014 in Sharm el-Sheikh. This event will be an extended version of the WSIS Forum. It is designed to review the progress made in the implementation of the WSIS outcomes under the mandates of participating agencies, and to take stock of achievements in the last 10 years based on reports of WSIS Stakeholders, including those submitted by countries, Action Line Facilitators and other stakeholders. The event will review the WSIS Outcomes (2003 and 2005) related to the WSIS Action Lines with the view of developing proposals on a new vision beyond 2015, potentially including new targets. This process will take into account the decisions of the 68th Session of the UN General Assembly. Open Consultation Process The Open Consultation Process is an open and inclusive consultation among WSIS Stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations) focused on developing multistakeholder consensus on two draft Outcome Documents, the thematic aspects, and innovations on the format of the Event. WSIS PROJECT PRIZES 2014 The WSIS Project Prizes 2014 contest provides a platform to identify and showcase success stories and models that could be easily replicated; empower communities at the local level; give a chance to all stakeholders working on WSIS to participate in the contest, and particularly recognize the efforts of stakeholders for their added value to the society and commitment towards achieving WSIS goals. Apllications can be submitted for the contest of WSIS Project Prizes 2014 until 1 November 2013. 25 The contest of WSIS Project Prizes 2014 is organized into four phases to be held from 5 September 2013 until 13 April 2014. On the latter date 18 winners of WSIS Project Prizes will be honored, recognized and presented with an award during WSIS Project Prizes 2014 Ceremony at the WSIS+10 High-Level Event. 26 Chapter-5 National Partnership For Reinventing Government The National Partnership for Reinventing Government (NPR), originally the National Performance Review, was an interagency task force to reform the way the United States federal government works in the Clinton Administration. The NPR was created on March 3, 1993. It was the eleventh federal reform effort in the 20th century. In early 1998, the National Performance Review was renamed to the National Partnership for Reinventing Government Morley Winograd was appointed as the Senior Policy Advisor to Vice President Al Gore and Director of the National Partnership for Reinventing Government in December 1997 History The NPR was the Clinton-Gore Administration's interagency task force to reform and streamline the way the United States federal government functions. It was the eleventh federal reform effort in the twentieth century The creation of the National Partnership for Reinventing Government was announced during U.S. President Bill Clinton's address on March 3, 1993 to a special joint session of the United States CongressThis initiative was a reinvention of an effort formerly known as the National Performance Review, and consisted of a proposed six-month efficiency review of the federal government spearheaded by U.S. Vice President Al Gore. The aim for the initiative was to create a government that ―works better, costs less, and gets results Americans care about. However, Vice President Gore went beyond preparing a report to lead an effort that evolved into the longest-running and , arguably, most successful reform effort in U.S. history to date. In the address to a joint session of Congress on March 3, 1993, President Clinton provided rationale for implementing the NPR: ―The conditions which brought us as a nation to this point are well known. Two decades of low productivity growth and stagnant wages, persistent unemployment and underemployment, years of huge government and declining investment in our future, exploding health care costs, and lack of coverage for millions of Americans, legions 27 of poor children, education and job training opportunities inadequate to the demands of this tough global economy. The stated intention of the NPR was to ―invent government that puts people first, by: serving its customers, empowering its employees, and fostering excellence.‖ In order to achieve this, the objectives of the NPR were to ―create a clear sense of mission; delegate authority and responsibility; replace regulations with incentives; develop budget-based outcomes; and measure [our] success by customer satisfaction.‖ Clinton‘s address on March 3 was a call to arms aimed at both branches of government and the political parties. His proposition to establish and implement the NPR consisted of four components, detailing the shift from 1) consumption to investment in both the public and private sectors, 2) changing the rhetoric of public decision making so that it honors work and families, 3) substantially reducing federal debt, and 4) administering government spending and cuts. Gore presented the report of his National Performance Review to President Clinton and the public on September 7, 1993. Gore cited the long term goal was to ―change the very culture of the federal government,‖ and designated ―optimism‖ and ―effective communication‖ as the keys to success of the NPR. In September 1993, the National Performance Review issued its initial report, noting that successful organizations—businesses, city and state governments, and organizations of the federal government—do four things well. These four things became the recipe for reinventing government: 1) Put customers first; 2) Cut red tape; 3) Empower employees to get results; 4) Cut back to basics. Background In March 1993 Clinton stated that he planned to ―reinvent government‖ when he declared that ―Our goal is to make the entire federal government less expensive and more efficient, and to change the culture of our national bureaucracy away from complacency and entitlement toward initiative and empowerment. After this, Clinton put the project into Vice President Al Gore‘s hands with a six month deadline for a proposal for the plan. The National Performance Review (NPR), which was later renamed the National Partnership for Reinventing Government released its first report in September of 1993, which contained 384 recommendations for improving 28 bureaucracy‘s performance across the entire federal governmentThe report was the product of months‘ worth of consultation of various government departments and meetings within Clinton‘s bureaucracy, which narrowed down 2,000 pages of proposals to the final report NPR promised to save the federal government about $108 billion: $40.4 billion from a ‗smaller bureaucracy,‘ $36.4 billion from program changes and $22.5 billion from streamlining contracting processesEach of the recommendations would fall into three categories: whether it required legislative action, presidential action, or internal bureaucratic reform. Major branches of bureaucracy that were targeted were the US Department of Agriculture, the Department of the Interior, the Agency for International Development (AID), Health and Human Services (HHS), the Department of Labor, and Housing and Urban Development (HUD). The first-year status report of the NPR claimed that, pending Congressional action, likely savings would amount to about $12.2 billion in 1994 In 1993, Congress rejected many key provisions of the NPR downsizing when it came to individual departmental cuts, proving that NPR could not sustain its reforms without modest congressional support. As Donald Kettl points out, the NPR‘s biggest hurdle was that ―although it had a strategy leading to the release of its report on September 7, 1993, it had no strategy for September 8 and afterward.‖ [9] Still, key legislation successfully passed throughout the reform effort was the NPR‘s procurement reforms — the Federal Acquisition Streamlining Act of 1994, the Federal Acquisition Reform Act of 1995, and the Clinger-Cohen Act in 1996. In a September 1996 pamphlet, Gore wrote that the federal government had reduced its workforce by nearly 24,000 as of January 1996, and that thirteen of the fourteen departments had reduced the size of their workforce In addition, thousands of field offices that were considered ‗obsolete‘ closed. September 1997, Gore reported that 2.8 million people left the welfare rolls between 1993 and 1997. Toward the end of Clinton‘s first term, the task of the NPR became less to ―review and recommend‖ and more to ―support agencies in their reinventing goals,‖ reflected in the change of the senior advisor from Elaine Kamarck to Morley Winograd. It was also around this time that the name change occurred to reflect more engagement with relevant public institutions such as student loans, the IRS, and emergency preparedness. 29 NPR and the Department of Housing and Urban Development The original 168-page report of the National Performance Review made a total of 255 agencyspecific recommendations, 10 of which were directed at the Department of Housing and Urban Development (HUD). The report recommended that HUD eliminate their annual budget reviews and work with congress to change rent rules that would create strong incentives for people to move from public housing as soon as they find jobs. NPR and defense spending According to military strategist Isaiah Wilson III, there were two phases to the National Performance Review, the second of which was commenced on January 3, 1995 by Vice President Al Gore,The aim of Phase 2 was to ―examine the basic mission of government…to find and eliminate things that don‘t need to be done by the government.‖ While another focus of the NPR was to cut down on red tape bureaucracy, in regards to the adjustments made to the Defense Department, Wilson argues that a fundamental step towards actual reinvention was skipped. The Arms Export Control Act, which is viewed as the essential piece of legislation regarding the trading of arms and related technologies, has remained essentially untouched since 1976 even after phase 2 of the NPR. The NPR also aimed to improve general customer satisfaction with all dealings involving the federal government. In terms of foreign military sales, however, there is a dilemma of whether or not the federal government‘s main ―customer‖ should be the foreign nations purchasing arms and technologies or the American taxpayer who in part pays for the service provided by the defense department. NPR and the Government Printing Office Apart from Defense spending, the NPR also narrowed its sights on government printing, namely the operation of the Government Printing Office (GPO). According to recommendations made by the NPR, the GPO was seen as a monopoly on government printing and was responsible for great spending waste. The three specific recommendations read as follow: 1. Authorize the executive branch to establish a printing policy that will eliminate the current printing monopoly. 2. Ensure public access to federal information. 30 3. Develop integrated electronic access to government information and services.[ NPR and the Executive Branch One way Vice President Al Gore intended to put his plan into action was by reducing the number of workers in the executive branch. Many agencies saw the downsizing as detrimental to their efficiency because it left them "shorthanded in the delivery of programs and services." However, Gore recognized that a smaller workforce would allow agencies to focus on customer service instead of managing an unnecessary amount of workers. This emphasis on customer service coincides with Gore's determination to focus on what the citizens want from the government.[ Aside from diminishing the size of executive agencies, the report also suggests ―redefin[ing] the role of the institutional presidency‖ by reducing the management role. This would involve ―devolving management authority to the lowest level possible and shift[ing] accountability from the President to agency ‗customers. In this case, lowest level refers to the interagency committees; however, management duties would be assigned to ―the politically appointed leadership in the departments and agencies NPR and National Service In addition to its association with executive branch reform, the NPR‘s reinvention movement is tightly bound to the idea of national service. In the words of President Bill Clinton, ―National Service is nothing less than the American way to change America. It is rooted in the concept of community: the simple idea that every one of us, no matter how many privileges with which we are born, can still be enriched by the contributions of the least of us. Because National Service is so closely tied to the American citizens, Clinton and Gore recognized its role in government reinvention since a main purpose of the NPR is to respond to the needs of the people. In 1993, the Corporation for National Service (CNS) was created to further ―develop and expand the President‘s reinvention themes Like the ideals of the National Performance Review, the main goal of the CNS was to yield fast results. Likewise, the CNS was dedicated to producing ―wellinformed decisions without delay, keep[ing] staffing lean and flexible, multiply[ing] resources, and delegat[ing] authority and responsibility in-house and in the field. NPR and streamlining Many attempts at reducing red tape involved streamlining grant processes and listening to the recommendations of the NPR. The U.S. Department of Commerce "streamlin[ed] the internal 31 grants process" in order to reduce the amount of paperwork involved in applications for financial assistance. The Department of Transportation has transitioned to electronic submission of grant forms. The Alamo Federal Executive Board Reinvention Lab in Texas works to "remove unnecessary regulations… so that intergovernmental employees may work together as partners" and eliminate problems together. Hammer award The Hammer Award was created by Vice President Gore to recognize government efficiency as a part of the program. Made simply of a $6 hammer, a striped ribbon and an aluminum-framed note from Gore, the award parodies the Pentagon's infamous bloated hardware costs, including a famous perception of a $436 hammer. 32 Chapter-6 Government-To-Business Government-to-Business (abbreviated G2B) is the online non-commercial interaction between local and central government and the commercial business sector, rather than private individuals (G2C), with the purpose of providing businesses information and advice on e-business 'best practices'. Government-to-government Government-to-Government (abbreviated G2G) is the online non-commercial interaction between Government organisations, departments, and authorities and other Government organisations, departments, and authorities. Its use is common in the UK, along with G2C, the online non-commercial interaction of local and central Government and private individuals, and G2B the online non-commercial interaction of local and central Government and the commercial business sector. G2G systems generally come in one of two types: Internal facing - joining up a single Governments departments, agencies, organisations and authorities - examples include the integration aspect of the Government Gateway, and the UK NHS Connecting for Health Data SPINE. External facing - joining up multiple Governments IS systems - an example would include the integration aspect of the Schengen Information System (SIS), developed to meet the requirements of the Schengen Agreement. Government-to-employees (abbreviated G2E) is the online interactions through instantaneous communication tools betweengovernment units and their employees. G2E is one out of the four primary delivery models of e-Government. G2E is an effective way to provide E-learning to the employees, bring them together and to promote knowledge sharing among them. It also gives employees the possibility of accessing information in regard to compensation and benefit policies, training and learning opportunities and civil rights laws. G2E services also includes software for maintaining personnel information and records of employees. 33 G2E is adopted in many countries including the United States, Hong Kong and New Zealand. A personal digital assistant (PDA), also known as a palmtop computer, or personal data assistant, is a mobile device that functions as a personal information manager. PDAs are largely considered obsolete with the widespread adoption of smartphones Nearly all current PDAs have the ability to connect to the Internet. A PDA has an electronic visual display, enabling it to include a web browser, all current models also have audio capabilities enabling use as a portable media player, and also enabling most of them to be used as mobile phones. Most PDAs can access the Internet, intranets or extranets via Wi- Fi or Wireless Wide Area Networks. Most PDAs employ touchscreen technology. The first PDA was released in 1984 by Psion, the Organizer II. Followed by Psion's Series 3, in 1991, which began to resemble the more familiar PDA style. It also had a full keyboard. The term PDA was first used on January 7, 1992 by Apple Computer CEO John Sculley at the Consumer Electronics Show in Las Vegas, Nevada, referring to the Apple Newton. In 1994, IBM introduced the first PDA with full mobile phone functionality, the IBM Simon, which can also be considered the first smartphone. Then in 1996, Nokia introduced a PDA with full mobile phone functionality, the 9000 Communicator, which became the world's best-selling PDA. The Communicator spawned a new category of PDAs: the "PDA phone", now called "smartphone". Another early entrant in this market was Palm, with a line of PDA products which began in March 1996. 34 Typical features A typical PDA has a touchscreen for entering data, a memory card slot for data storage, and IrDA, Bluetooth and/or Wi-Fi. However, some PDAs may not have a touch screen, using softkeys, a directional pad, and a numeric keypad or a thumb keyboard for input; this is typically seen on telephones that are incidentally PDAs. In order to have the functions expected of a PDA, a device's software typically includes an appointment calendar, a to-do list, anaddress book for contacts, a calculator, and some sort of memo (or "note") program. PDAs with wireless data connections also typically include an email client and a Web browser. Touch screen Many of the original PDAs, such as the Apple Newton and Palm Pilot, featured a touchscreen for user interaction, having only a few buttons—usually reserved for shortcuts to often-used programs. Some touchscreen PDAs, including Windows Mobile devices, had a detachable stylus to facilitate making selections. The user interacts with the device by tapping the screen to select buttons or issue commands, or by dragging a finger (or the stylus) on the screen to make selections or scroll. Typical methods of entering text on touchscreen PDAs include: A virtual keyboard, where a keyboard is shown on the touchscreen. Text is entered by tapping the on-screen keyboard with a finger or stylus. An external keyboard connected via USB, Infrared port, or Bluetooth. Some users may choose a chorded keyboard for one-handed use. Handwriting recognition, where letters or words are written on the touchscreen, and the PDA converts the input to text. Recognition and computation of handwritten horizontal and vertical formulas, such as "1 + 2 =", may also be a feature. Stroke recognition allows the user to make a predefined set of strokes on the touchscreen, sometimes in a special input area, representing the various characters to be input. The strokes are often simplified character shapes, making them easier for the device to recognize. One widely known stroke recognition system is Palm's Graffiti. 35 Despite rigorous research and development projects, end-users experience mixed results with handwriting recognition systems. Some find it frustrating and inaccurate, while others are satisfied with the quality of the recognition. Touchscreen PDAs intended for business use, such as the BlackBerry and Palm Treo, usually also offer full keyboards and scroll wheels or thumbwheels to facilitate data entry and navigation. Many touchscreen PDAs support some form of external keyboard as well. Specialized folding keyboards, which offer a full-sized keyboard but collapse into a compact size for transport, are available for many models. External keyboards may attach to the PDA directly, using a cable, or may use wireless technology such as infrared or Bluetooth to connect to the PDA. Newer PDAs, such as the HTC HD2, Apple iPhone, Apple iPod Touch, and Palm Pre, Palm Pre Plus, Palm Pixi, Palm Pixi Plus, Google Android (operating system) include more advanced forms of touchscreen that can register multiple touches simultaneously. These "multi-touch" displays allow for more sophisticated interfaces using various gestures entered with one or more fingers. Memory cards Although many early PDAs did not have memory card slots, now most have either some form of Secure Digital (SD) slot or aCompactFlash slot. Although designed for memory, Secure Digital Input/Output (SDIO) and CompactFlash cards are available that provide accessories like Wi-Fi or digital cameras, if the device can support them. Some PDAs also have a USB port, mainly for USB flash drivesSome PDAs use microSD cards, which are electronically compatible with SD cards, but have a much smaller physical size. Wired connectivity While early PDAs connected to a user's personal computer via serial ports or another proprietary connection many today connect via a USB cable. Older PDAs were unable to connect to each other via USB, as their implementations of USB didn't support acting as the "host". Some early PDAs were able to connect to the Internet indirectly by means of an external modem connected via the PDA's serial port or "sync" connector or directly by using an expansion card that provided an Ethernet port. 36 Wireless connectivity Most modern PDAs have Bluetooth, a popular wireless protocol for mobile devices. Bluetooth can be used to connect keyboards, headsets, GPS receivers, and other nearby accessories. It's also possible to transfer files between PDAs that have Bluetooth. Many modern PDAs have Wi-Fi wireless network connectivity and can connect to Wi-Fi hotspots. All smartphones, and some other modern PDAs, can connect to Wireless Wide Area Networks, such as those provided by cellular telecommunications companies. Older PDAs from the 90s to 2006 typically had an IrDA (infrared) port allowing short-range, line-of-sight wireless communication. Few current models use this technology, as it has been supplanted by Bluetooth and Wi-Fi. IrDA allows communication between two PDAs, or between a PDA and any device with an IrDA port or adapter. Some printers have IrDA receivers,[11] allowing IrDA-equipped PDAs to print to them, if the PDA's operating system supports it. Universal PDA keyboards designed for these older PDAs use infrared technology.Infrared technology is low-cost and has the advantage of being allowed aboard. Synchronization Most PDAs can synchronize their data with applications on a user's computer. This allows the user to update contact, schedule, or other information on their computer, using software such as Microsoft Outlook or ACT!, and have that same data transferred to PDA—or transfer updated information from the PDA back to the computer. This eliminates the need for the user to update their data in two places. Synchronization also prevents the loss of information stored on the device if it is lost, stolen, or destroyed. When the PDA is repaired or replaced, it can be "re-synced" with the computer, restoring the user's data. Some users find that data input is quicker on their computer than on their PDA, since text input via a touchscreen or small-scale keyboard is slower than a full-size keyboard. Transferring data to a PDA via the computer is therefore a lot quicker than having to manually input all data on the handheld device. 37 Most PDAs come with the ability to synchronize to a computer. This is done through synchronization software provided with the handheld, or sometime with the computer's operating system. Examples of synchronization software include: HotSync Manager, for Palm OS PDAs 'Microsoft ActiveSync, used by Windows XP and older Windows operating systems to synchronize with Windows Mobile, Pocket PC, and Windows CE PDAs, as well as PDAs running iOS, Palm OS, and Symbian Microsoft Windows Mobile Device Center for Windows Vista, which supports Microsoft Windows Mobile and Pocket PC devices. Apple iTunes, used on Mac OS X and Microsoft Windows to sync iOS devices (such as the iPhone and iPod touch) iSync, included with Mac OS X, can synchronize many SyncML-enabled PDAs BlackBerry Desktop Software, used to sync BlackBerry devices. These programs allow the PDA to be synchronized with a personal information manager, which may be part of the computer's operating system, provided with the PDA, or sold separately by a third party. For example, the RIM BlackBerry comes with RIM'sDesktop Manager program, which can synchronize to both Microsoft Outlook and ACT!. Other PDAs come only with their own proprietary software. For example, some early Palm OS PDAs came only with Palm Desktop, while later Palm PDAs—such as the Treo 650—have the ability to sync to Palm Desktop or Microsoft Outlook. Microsoft's ActiveSync and Windows Mobile Device Center only synchronize with Microsoft Outlook or a Microsoft Exchange server Third-party synchronization software is also available for some PDAs from companies like CommonTime[12] and CompanionLink. Third-party software can be used to synchronize PDAs to other personal information managers that are not supported by the PDA manufacturers (for example, GoldMine and IBM Lotus Notes). Wireless synchronization Some PDAs can synchronize some or all of their data using their wireless networking capabilities, rather than having to be directly connected to a personal computer via a cable. 38 Apple iOS devices, like the iPhone, iPod Touch, and iPad, can use Apple's iCloud service (formerly MobileMe) to synchronize calendar, address book, mail account, Internet bookmark, and other data with one or more Macintosh or Windows computers using Wi-Fi or cellular data connections. Devices running Palm's webOS or Google's Android operating system primarily sync with the cloud. For example, if Gmail is used, information in contacts, email, and calendar can be synchronized between the phone and Google's servers. RIM sells BlackBerry Enterprise Server to corporations so that corporate BlackBerry users can wirelessly synchronize their PDAs with the company's Microsoft Exchange Server, IBM Lotus Domino, or Novell GroupWise servers. Email, calendar entries, contacts, tasks, and memos kept on the company's server are automatically synchronized with the BlackBerry. 39 Chapter-7 Automobile Navigation Some PDAs include Global Positioning System (GPS) receivers; this is particularly true of smartphones. Other PDAs are compatible with external GPS-receiver add-ons that use the PDA's processor and screen to display location information. PDAs with GPS functionality can be used for automotive navigation. PDAs are increasingly being fitted as standard on new cars. PDA-based GPS can also display traffic conditions, perform dynamic routing, and show known locations of roadside mobile radar guns. TomTom, Garmin, and iGO offer GPS navigation software for PDAs. Ruggedized PDAs Some businesses and government organizations rely upon rugged PDAs, sometimes known as enterprise digital assistants (EDAs), for mobile data applications. EDAs often have extra features for data capture, such as barcode readers, radio-frequency identification(RFID) readers, magnetic stripe card readers, or smart card readers. Typical applications include: military: notably U.S. Army supply chain management in warehouses package delivery route accounting medical treatment and recordkeeping in hospitals facilities maintenance and management parking enforcement access control and security capital asset maintenance meter reading by utilities "wireless waitress" applications in restaurants and hospitality venues 40 infection control audit and surveillance within healthcare environments taxicab allocation and routing. Medical and scientific uses Many companies have developed PDA products aimed at the medical profession's unique needs, such as drug databases, treatment information, and medical news. Services such as AvantGo translate medical journals into PDA-readable formats. WardWatch organizes medical records, providing reminders of information such as the treatment regimens of patients to doctors making wardrounds. Pendragon and Syware provide tools for conducting research with, allowing the user to enter data into a centralized database using their PDA. Microsoft Visual Studio and Sun Java also provide programming tools for developing survey instruments on the handheld. These development tools allow for integration with SQL databases that are stored on the handheld and can be synchronized with a desktop- or server-based database. PDAs have been shown to aid diagnosis and drug selection and some studies have concluded that when patients use PDAs to record their symptoms, they communicate more effectively with hospitals during follow-up visits. The development of Sensor Web technology may lead to wearable bodily sensors to monitor ongoing conditions, like diabetes orepilepsy, which would alert patients and doctors when treatment is required using wireless communication and PDAs. Educational uses As mobile technology becomes more common, it is increasingly being used as a learning tool. Some educational institutions have embraced M-Learning, integrating PDAs into their teaching practices. PDAs and handheld devices are allowed in many classrooms for digital note-taking. Students can spell-check, modify, and amend their class notes on the PDA. Some educators distribute course material through the Internet or infrared file-sharing functions of the PDA. Textbook publishers have begun to release e-books, or electronic textbooks, which can be uploaded directly to a PDA, reducing the number of textbooks students must carry Software companies have developed PDA 41 programs to meet the instructional needs of educational institutions, such as dictionaries,thesauri, word processing software, encyclopedias, and digital lesson planners. Recreational uses PDAs may be used by music enthusiasts to play a variety of music file formats. Many PDAs include the functionality of an MP3 player. Road rally enthusiasts can use PDAs to calculate distance, speed, and time. This information may be used for navigation, or the PDA's GPS functions can be used for navigation. Underwater divers can use PDAs to plan breathing gas mixtures and decompression schedules using software such as "V-Planner." As of today, any smartphone can do this as well. Lists of PDAs Popular consumer PDAs Acer N Series AlphaSmart Amida Simputer BlackBerry Fujitsu Siemens Computers Pocket LOOX HP iPAQ Huawei series HTC (Dopod, Qtek)'s series of Windows Mobile PDA/phones I-mate iPod touch, which also plays music, video, and games Palm, Inc. smartphones under Palm OS and under the successor WebOS (Pre, and Pixi). PocketMail (email PDA with built-in acoustic coupler) Royal Discontinued PDAs Atari Portfolio 42 Casio Pocket Viewer Dell Axim E-TEN GMate Yopy Handspring (company) iPAQ HP Jornada Pocket PC LifeDrive NEC MobilePro Osaris running EPOC OS distributed by Oregon Scientific Palm (PDA) (Tungsten E2, TX, Treo, Zire Handheld) Philips Nino Psion Roland PMA-5 (Personal Music Assistant) Sharp Wizard and Sharp Zaurus Sony CLIÉ Sony Magic Link with the Magic Cap operating system Tapwave Zodiac Toshiba e310 Rugged PDAs Pidion (Bluebird Soft Inc.) M3 Mobileecom instruments Getac Motorola (Symbol Technologies) Intermec Psion Teklogix Datalogic Mobile CatchwellHoneywell (Hand Held Products) Skeye (Hoeft & Wessel AG) 43 Trimble Navigation Handheld Group American Industrial Systems (Mil-Spec, IP67) Unitech Two Technologies, Inc (Ultra Rugged Handheld Computers) Android Automotive navigation system Construction field computing Desknote Graffiti (Palm OS) Hipster PDA Information appliance iOS Laptop Medical calculator Mobile software MLearning Mobile Web Netbook Palm OS Pen computer Personal area network Personal communicator Personal Information Display Personal information management Personal navigation assistant (PNA) Screen protector Sena Cases Smartphone 44 Subnotebook Tablet computer Timex Datalink Ultra-mobile PC Virtual assistance Wearable computer 45 Chapter-8 Short Message Service Short Message Service Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems. It uses standardized communications protocols to allow fixed line ormobile phone devices to exchange short text messages. SMS is the most widely used data application, with an estimated 3.5 billion active users, or about 80% of all mobile phone subscribers at the end of 2010. The term "SMS" is used for all types of short text messaging and the user activity itself in many parts of the world. SMS is also employed in direct marketing, known as SMS marketing. SMS as used on modern handsets originated from radio telegraphy in radio memo pagers using standardized phone protocols. These were defined in 1985 as part of the Global System for Mobile Communications (GSM) series of standards as a means of sending messages of up to 160 charactersto and from GSM mobile handsets. Though most SMS messages are mobile-to-mobile text messages, support for the service has expanded to include other mobile technologies, such as ANSI CDMA networks and Digital AMPS, as well as satellite and landlinenetworks 46 Initial concept SMS messages sent monthly in USA (billion) Adding text messaging functionality to mobile devices began in the early 1980s. The first action plan of the CEPT Group GSM was approved in December 1982, requesting "The services and facilities offered in the public switched telephone networks and public data networks... should be available in the mobile system This plan included the exchange of text messages either directly between mobile stations, or transmitted via Message Handling Systems widely in use at that time. The SMS concept was developed in the Franco-German GSM cooperation in 1984 by Friedhelm Hillebrand and Bernard Ghillebaert. The GSM is optimized for telephony, since this was identified as its main application. The key idea for SMS was to use this telephone-optimized system, and to transport messages on the signaling paths needed to control the telephone traffic during time periods when no signaling traffic existed. In this way, unused resources in the system could be used to transport messages at minimal cost. However, it was necessary to limit the length of the messages to 128 bytes (later improved to 160 seven-bit characters) so that the messages could fit into the existing signaling formats. Based on his personal observations and on analysis of the typical lengths of postcard and Telex messages, Hillebrand argued that 160 characters was sufficient to express most messages succinctly. 47 SMS could be implemented in every mobile station by updating its software. Hence, a large base of SMS capable terminals and networks existed when people began to use SMS. A new network element required was a specialized short message service center, and enhancements were required to the radio capacity and network transport infrastructure to accommodate growing SMS traffic. Early development The technical development of SMS was a multinational collaboration supporting the framework of standards bodies. Through these organizations the technology was made freely available to the whole world The first proposal which initiated the development of SMS was made by a contribution of Germany and France into the GSM group meeting in February 1985 in Oslo .This proposal was further elaborated in GSM subgroup WP1 Services (Chairman Martine Alvernhe, France Telecom) based on a contribution from Germany. There were also initial discussions in the subgroup WP3 network aspects chaired by Jan Audestad (Telenor). The result was approved by the main GSM group in a June '85 document which was distributed to industry. The input documents on SMS had been prepared by Friedhelm Hillebrand (Deutsche Telekom) with contributions from Bernard Ghillebaert (France Télécom). The definition that Friedhelm Hillebrand and Bernard Ghillebaert brought into GSM called for the provision of a message transmission service of alphanumeric messages to mobile users "with acknowledgement capabilities". The last three words transformed SMS into something much more useful than the prevailing messaging paging that some in GSM might have had in mind. SMS was considered in the main GSM group as a possible service for the new digital cellular system. In GSM document ―Services and Facilities to be provided in the GSM System both mobile-originated and mobile-terminated short messages appear on the table of GSM teleservices. The discussions on the GSM services were concluded in the recommendation GSM 02.03 ―TeleServices supported by a GSMPLMN Here a rudimentary description of the three services was given: 48 1. Short message Mobile Terminated (SMS-MT)/ Point-to-Point: the ability of a network to transmit a Short Message to a mobile phone. The message can be sent by phone or by a software application. 2. Short message Mobile Originated (SMS-MO)/ Point-to-Point: the ability of a network to transmit a Short Message sent by a mobile phone. The message can be sent to a phone or to a software application. 3. Short message Cell Broadcast. The material elaborated in GSM and its WP1 subgroup was handed over in Spring 1987 to a new GSM body called IDEG (the Implementation of Data and Telematic Services Experts Group), which had its kickoff in May 1987 under the chairmanship of Friedhelm Hillebrand (German Telecom). The technical standard known today was largely created by IDEG (later WP4) as the two recommendations GSM 03.40 (the two point-to-point services merged) and GSM 03.41 (cell broadcast). WP4 created a Drafting Group Message Handling (DGMH), which was responsible for the specification of SMS. Finn Trosby of Telenor chaired the draft group through its first 3 years, in which the design of SMS was established. DGMH had five to eight participants, and Finn Trosby mentions as major contributors Kevin Holley, Eija Altonen, Didier Luizard and Alan Cox. The first action plan mentions for the first time the Technical Specification 03.40 ―Technical Realisation of the Short Message Service‖. Responsible editor was Finn Trosby. The first and very rudimentary draft of the technical specification was completed in November 1987 However, drafts useful for the manufacturers followed at a later stage in the period. A comprehensive description of the work in this period is given in. The work on the draft specification continued in the following few years, where Kevin Holley of Cellnet (now Telefónica O2 UK) played a leading role. Besides the completion of the main specification GSM 03.40, the detailed protocol specifications on the system interfaces also needed to be completed. Support in other architectures The Mobile Application Part (MAP) of the SS7 protocol included support for the transport of Short Messages through the Core Network from its inception MAP Phase 2 expanded support for SMS by introducing a separate operation code for Mobile Terminated Short Message 49 transport. Since Phase 2, there have been no changes to the Short Message operation packages in MAP, although other operation packages have been enhanced to support CAMEL SMS control. From 3GPP Releases 99 and 4 onwards, CAMEL Phase 3 introduced the ability for the Intelligent Network (IN) to control aspects of the Mobile Originated Short Message Service, while CAMEL Phase 4, as part of 3GPP Release 5 and onwards, provides the IN with the ability to control the Mobile Terminated service.[23] CAMEL allows the gsmSCP to block the submission (MO) or delivery (MT) of Short Messages, route messages to destinations other than that specified by the user, and perform real-time billing for the use of the service. Prior to standardized CAMEL control of the Short Message Service, IN control relied on switch vendor specific extensions to the Intelligent Network Application Part (INAP) of SS7. Early implementations The first SMS message was sent over the Vodafone GSM network in the United Kingdom on 3 December 1992, from Neil Papworthof Sema Group (now Mavenir Systems) using a personal computer to Richard Jarvis of Vodafone using an Orbitel 901 handset. The text of the message was ―Merry Christmas The first commercial deployment of a short message service center (SMSC) was by Aldiscon part of Logica (now part of Acision) with Telia (now TeliaSonera) in Sweden in 1993 followed by Fleet Call (now Nextel) in the US, Telenor in Norway and BT Cellnet (now O2 UK) later in 1993. All first installations of SMS gateways were for network notifications sent to mobile phones, usually to inform of voice mail messages. The first commercially sold SMS service was offered to consumers, as a person-to-person text messaging service by Radiolinja (now part of Elisa) in Finland in 1993. Most early GSM mobile phone handsets did not support the ability to send SMS text messages, and Nokia was the only handset manufacturer whose total GSM phone line in 1993 supported user-sending of SMS text messages. Initial growth was slow, with customers in 1995 sending on average only 0.4 messages per GSM customer per month. One factor in the slow takeup of SMS was that operators were slow to set up charging systems, especially for prepaid subscribers, and eliminate billing fraud which was possible by changing SMSC settings on individual handsets to use the SMSCs of other operators Initially, networks in the UK only allowed customers to send messages to other users on the same network, limiting the usefulness of the service. This restriction was lifted in 1999. 50 Over time, this issue was eliminated by switch billing instead of billing at the SMSC and by new features within SMSCs to allow blocking of foreign mobile users sending messages through it. By the end of 2000, the average number of messages reached 35 per user per month, and by Christmas Day 2006, over 205 million messages were sent in the UK alone. It is also alleged that the fact that roaming customers, in the early days, rarely received bills for their SMSs after holidays abroad which gave a boost to text messaging as an alternative to voice calls Text messaging outside GSM SMS was originally designed as part of GSM, but is now available on a wide range of networks, including 3G networks. However, not all text messaging systems use SMS, and some notable alternative implementations of the concept include J-Phone's SkyMail andNTT Docomo's Short Mail, both in Japan. Email messaging from phones, as popularized by NTT Docomo's imode and the RIMBlackBerry, also typically uses standard mail protocols such as SMTP over TCP/IP. SMS today In 2010, 6.1 trillion SMS text messages were sent. This translates into an average of 193000 SMS per second.[31] SMS has become a massive commercial industry, earning $114.6 billion globally in 2010. The global average price for an SMS message is $0.11, while mobile networks charge each other interconnect fees of at least $0.04 when connecting between different phone networks While SMS is still a growing market, traditional SMS are becoming increasingly challenged by alternative messaging services available on smartphones with data connections, especially in Western countries where these services are growing in popularity. 51 Chapter-9 Technical Details GSM The Short Message Service—Point to Point (SMS-PP)—was originally defined in GSM recommendation 03.40, which is now maintained in 3GPP as TS 23.040 GSM 03.41 (now 3GPP TS 23.041) defines the Short Message Service—Cell Broadcast (SMS-CB), which allows messages (advertising, public information, etc.) to be broadcast to all mobile users in a specified geographical area Messages are sent to a short message service center (SMSC), which provides a ―store and forward‖ mechanism. It attempts to send messages to the SMSC's recipients. If a recipient is not reachable, the SMSC queues the message for later retry. Some SMSCs also provide a ―forward and forget‖ option where transmission is tried only once. Both mobile terminated (MT, for messages sent to a mobile handset) and mobile originating (MO, for those sent from the mobile handset) operations are supported. Message delivery is ―best effort,‖ so there are no guarantees that a message will actually be delivered to its recipient, but delay or complete loss of a message is uncommon, typically affecting less than 5 percent of messages Some providers allow users to request delivery reports, either via the SMS settings of most modern phones, or by prefixing each message with *0# or *N#. However, the exact meaning of confirmations varies from reaching the network, to being queued for sending, to being sent, to receiving a confirmation of receipt from the target device, and users are often not informed of the specific type of success being reported. SMS is a stateless communication protocol in which every SMS message is considered entirely independent of other messages. Enterprise applications using SMS as a data bearer require that session management be maintained external to the protocol. Message size Transmission of short messages between the SMSC and the handset is done whenever using the Mobile Application Part (MAP) of theSS7 protocol. Messages are sent with the MAP MOand MT-ForwardSM operations, whose payload length is limited by the constraints of the signaling protocol to precisely 140 octets (140 octets = 140 * 8 bits = 1120 bits). Short messages 52 can be encoded using a variety of alphabets: the default GSM 7-bit alphabet, the 8-bit data alphabet, and the 16-bit UCS-2 alphabet. Depending on which alphabet the subscriber has configured in the handset, this leads to the maximum individual short message sizes of 160 7-bitcharacters, 140 8-bit characters, or 70 16bit characters. GSM 7-bit alphabet support is mandatory for GSM handsets and network elements but characters in languages such as Arabic, Chinese, Korean, Japanese, or Cyrillic alphabet languages (e.g., Russian, Serbian, Bulgarian, etc.) must be encoded using the 16bit UCS-2 character encoding (see Unicode). Routing data and other metadatais additional to the payload size. Larger content (concatenated SMS, multipart or segmented SMS, or "long SMS") can be sent using multiple messages, in which case each message will start with a User Data Header (UDH) containing segmentation information. Since UDH is part of the payload, the number of available characters per segment is lower: 153 for 7-bit encoding, 134 for 8-bit encoding and 67 for 16-bit encoding. The receiving handset is then responsible for reassembling the message and presenting it to the user as one long message. While the standard theoretically permits up to 255 segments, 6 to 8 segment messages are the practical maximum, and long messages are often billed as equivalent to multiple SMS messages. Some providers have offered length-oriented pricing schemes for messages, however, the phenomenon is disappearing. Gateway providers SMS gateway providers facilitate SMS traffic between businesses and mobile subscribers, including mission-critical messages, SMS for enterprises, content delivery, and entertainment services involving SMS, e.g. TV voting. Considering SMS messaging performance and cost, as well as the level of messaging services, SMS gateway providers can be classified as aggregators or SS7 providers. The aggregator model is based on multiple agreements with mobile carriers to exchange twoway SMS traffic into and out of the operator's SMSC, also known as local termination model. Aggregators lack direct access into the SS7 protocol, which is the protocol where the SMS messages are exchanged. SMS messages are delivered to the operator's SMSC, but not the subscriber's handset; the SMSC takes care of further handling of the message through the SS7 network. 53 Another type of SMS gateway provider is based on SS7 connectivity to route SMS messages, also known as international termination model. The advantage of this model is the ability to route data directly through SS7, which gives the provider total control and visibility of the complete path during SMS routing. This means SMS messages can be sent directly to and from recipients without having to go through the SMSCs of other mobile operators. Therefore, it is possible to avoid delays and message losses, offering full delivery guarantees of messages and optimized routing. This model is particularly efficient when used in mission-critical messaging and SMS used in corporate communications. Interconnectivity with other networks Message Service Centers communicate with the Public Land Mobile Network (PLMN) or PSTN via Interworking and Gateway MSCs. Subscriber-originated messages are transported from a handset to a service center, and may be destined for mobile users, subscribers on a fixed network, or Value-Added Service Providers (VASPs), also known as application-terminated. Subscriber-terminated messages are transported from the service center to the destination handset, and may originate from mobile users, from fixed network subscribers, or from other sources such as VASPs. On some carriers nonsubscribers can send messages to a subscriber's phone using an Email-toSMS gateway. Additionally, many carriers, including AT&T Mobility, T-Mobile USA,[42] Sprint and Verizon Wireless, offer the ability to do this through their respective websites. For example, an AT&T subscriber whose phone number was 555-555-5555 would receive emails addressed to [email protected] as text messages. Subscribers can easily reply to these SMS messages, and the SMS reply is sent back to the original email address. Sending email to SMS is free for the sender, but the recipient is subject to the standard delivery charges. Only the first 160 characters of an email message can be delivered to a phone, and only 160 characters can be sent from a phone. Text-enabled fixed-line handsets are required to receive messages in text format. However, messages can be delivered to nonenabled phones using text-to-speech conversion. 54 Short messages can send binary content such as ringtones or logos, as well as Over-the-air programming (OTA) or configuration data. Such uses are a vendor-specific extension of the GSM specification and there are multiple competing standards, although Nokia'sSmart Messaging is common. An alternative way for sending such binary content is EMS messaging, which is standardized and not dependent on vendors. SMS is used for M2M (Machine to Machine) communication. For instance, there is an LED display machine controlled by SMS, and some vehicle tracking companies use SMS for their data transport or telemetry needs. SMS usage for these purposes is slowly being superseded by GPRS services owing to their lower overall cost. GPRS is offered by smaller telco players as a route of sending SMS text to reduce the cost of SMS texting internationally. AT commands Many mobile and satellite transceiver units support the sending and receiving of SMS using an extended version of the Hayes command set, a specific command language originally developed for the Hayes Smartmodem 300-baud modem in 1977 The connection between the terminal equipment and the transceiver can be realized with a serial cable (e.g., USB), a Bluetooth link, aninfrared link, etc. Common AT commands include AT+CMGS (send message), AT+CMSS (send message from storage), AT+CMGL (list messages) and AT+CMGR (read message). However, not all modern devices support receiving of messages if the message storage (for instance the device's internal memory) is not accessible using AT commands. Premium-rated short messages Short messages may be used normally to provide premium rate services to subscribers of a telephone network. Mobile-terminated short messages can be used to deliver digital content such as news alerts, financial information, logos, and ring tones. The first premium-rate media content delivered via the SMS system was the world's first paid downloadable ringing tones, as commercially launched by Saunalahti (later Jippii Group, now part of Elisa Grous, in 1998. Initially only Nokia branded phones could handle them. By 2002 the ringtone business globally had exceeded $1 billion of service revenues, and nearly $5 billion by 2008 Today, they are also used to pay 55 smaller payments online—for example, for file-sharing services, in mobile application stores, or VIP section entrance. Outside the online world, one can buy a bus ticket or beverages from ATM, pay a parking ticket, order a store catalog or some goods (e.g., discount movie DVDs), and much more. Premium-rated messages are also used in Donors Message Service to collect money for charities and foundations. DMS was first launched at April 1, 2004, and is very popular in the Czech Republic. For example, the Czech people sent over 1.5 million messages to help South Asia recover from the 2004 Indian Ocean Earthquake. The Value-added service provider (VASP) providing the content submits the message to the mobile operator's SMSC(s) using anTCP/IP protocol such as the short message peer-to-peer protocol (SMPP) or the External Machine Interface (EMI). The SMSC delivers the text using the normal Mobile Terminated delivery procedure. The subscribers are charged extra for receiving this premium content; the revenue is typically divided between the mobile network operator and the VASP either through revenue share or a fixed transport fee. Submission to the SMSC is usually handled by a third party. Mobile-originated short messages may also be used in a premium-rated manner for services such as televoting. In this case, the VASP providing the service obtains a short code from the telephone network operator, and subscribers send texts to that number. The payouts to the carriers vary by carrier; percentages paid are greatest on the lowest-priced premium SMS services. Most information providers should expect to pay about 45 percent of the cost of the premium SMS up front to the carrier. The submission of the text to the SMSC is identical to a standard MO Short Message submission, but once the text is at the SMSC, the Service Center (SC) identifies the Short Code as a premium service. The SC will then direct the content of the text message to the VASP, typically using an IP protocol such as SMPP or EMI. Subscribers are charged a premium for the sending of such messages, with the revenue typically shared between the network operator and the VASP. Short codes only work within one country, they are not international. An alternative to inbound SMS is based on long numbers (international number format, e.g. +44 762 480 5000), which can be used in place of short codes for SMS reception in several applications, such as TV voting, product promotions and campaigns. Long numbers work 56 internationally, allow businesses to use their own numbers, rather than short codes, which are usually shared across many brands. Additionally, long numbers are nonpremium inbound numbers. Threaded SMS Threaded SMS is a visual styling orientation of SMS message history that arranges messages to and from a contact in chronological order on a single screen. Visually, this style of representation provides a back-and-forth chat-like history for each individual contact. Hierarchical-threading at the conversation-level (as typical in blogs and on-line messaging boards)is not widely supported by SMS messaging clients. This limitation is due to the fact that there is no session identifier or subject-line passed back and forth between sent and received messages in the header data (as specified by SMS protocol) from which the client device can properly thread an incoming message to a specific dialogue, or even to a specific message within a dialogue. Most smart phone text-messaging-clients are able to create some contextual threading of "group messages" which narrows the context of the thread around the common interests shared by group members. On the other hand, advanced enterprise messaging applications which push messages from a remote server often display a dynamically changing reply number (multiple numbers used by the same sender), which is used along with the sender's phone number to create sessiontracking capabilities analogous to the functionality that cookies provide for web-browsing. As one pervasive example, this technique is used to extend the functionality of many Instant Messenger (IM) applications such that they are able to communicate over two-way dialogues with the much larger SMS user-base. In cases where multiple reply numbers are used by the enterprise server to maintain the dialogue, the visual conversation threading on the client may be separated into multiple threads. Application-to-Person (A2P) SMS While SMS reached its popularity as a person-to-person messaging, another type of SMS is growing fast: application-to-person (A2P) messaging. A2P is a type of SMS sent from a subscriber to an application or sent from an application to a subscriber. It is commonly used by financial institutions, airlines, hotel booking sites, social networks, and other organizations sending SMS from their systems to their customers. According to research in 2011, A2P traffic is growing faster than P2P messaging traffic. 57 Satellite phone networks All commercial satellite phone networks except ACeS and OptusSat support SMS While early Iridium handsets only support incoming SMS, later models can also send messages. The price per message varies for different networks. Unlike some mobile phone networks, there is no extra charge for sending international SMS or to send one to a different satellite phone network. SMS can sometimes be sent from areas where the signal is too poor to make a voice call. Satellite phone networks usually have web-based or email-based SMS portals where one can send free SMS to phones on that particular network. Unreliability Unlike dedicated texting systems like the Simple Network Paging Protocol and Motorola's ReFLEX protocol. SMS message delivery is not guaranteed, and many implementations provide no mechanism through which a sender can determine whether an SMS message has been delivered in a timely manner. SMS messages are generally treated as lower-priority traffic than voice, and various studies have shown that around 1% to 5% of messages are lost entirely, even during normal operation conditions, and others may not be delivered until long after their relevance has passed. The use of SMS as an emergency notification service in particular has been starkly criticized Vulnerabilities The Global Service for Mobile communications (GSM), with the greatest worldwide number of users, succumbs to several security vulnerabilities. In the GSM, only the airway traffic between the Mobile Station (MS) and the Base Transceiver Station (BTS) is optionally encrypted with a weak and broken stream cipher (A5/1 or A5/2). The authentication is unilateral and also vulnerable. There are also many other security vulnerabilities and shortcomings. Such vulnerabilities are inherent to SMS as one of the superior and well-tried services with a global availability in the GSM networks. SMS messaging has some extra security vulnerabilities due to its store-and-forward feature, and the problem of fake SMS that can be conducted via the Internet. When a user is roaming, SMS content passes through different networks, perhaps including the Internet, and is exposed to various vulnerabilities and attacks. Another concern arises when an adversary gets access to a phone and reads the previous unprotected messages. In October 2005, researchers from Pennsylvania State University published an analysis of 58 vulnerabilities in SMS-capable cellular networks. The researchers speculated that attackers might exploit the open functionality of these networks to disrupt them or cause them to fail, possibly on a nationwide scale. SMS spoofing The GSM industry has identified a number of potential fraud attacks on mobile operators that can be delivered via abuse of SMS messaging services. The most serious of threats is SMS Spoofing. SMS Spoofing occurs when a fraudster manipulates address information in order to impersonate a user that has roamed onto a foreign network and is submitting messages to the home network. Frequently, these messages are addressed to destinations outside the home network—with the home SMSC essentially being ―hijacked‖ to send messages into other networks. The only sure way of detecting and blocking spoofed messages is to screen incoming mobileoriginated messages to verify that the sender is a valid subscriber and that the message is coming from a valid and correct location. This can be implemented by adding an intelligent routing function to the network that can query originating subscriber details from the HLR before the message is submitted for delivery. This kind of intelligent routing function is beyond the capabilities of legacy messaging infrastructure. Limitation In an effort to limit telemarketers who had taken to bombarding users with hordes of unsolicited messages India introduced new regulations in September 2011, including a cap of 3,000 SMS messages per subscriber per month, or an average of 100 per subscriber per day. Due to representations received from some of the service providers and consumers, TRAI (Telecom Regulatory Authority of India) has raised this limit to 200 SMS messages per sim per day in case of prepaid services, and up to 6,000 SMS messages per sim per month in case of postpaid services with effect from 1 November 2011. However it was ruled unconstitutional by the Delhi high court but there are some limitations. 59 Flash SMS A Flash SMS is a type of SMS that appears directly on the main screen without user interaction and is not automatically stored in the inbox. It can be useful in emergencies such as a fire alarm or cases of confidentiality, as in delivering one-time passwords. Silent SMS Silent messages, also known as ―silent tms‖, ―stealth sms‖ or ―stealth ping‖, are employed nowadays to locate a person and thus to create a complete movement profile. They do not show up on a display, nor trigger any acoustical signal when received. Their primary purpose was to deliver special services of the network operator to any cell phone. The mobile provider, often at the behest of the police, will capture data such as subscriber identification IMSI. In Germany in 2010 almost half a million ―silent SMSs‖ were sent by the federal police, customs and the secret service "Verfassungsschutz" (offices for protection of the constitution). Comparison of mobile phone standards SMS language Telegram Text messaging Thumbing GSM 03.40 Short Message Service Center (SMSC) Short message service technical realisation (GSM) SMS gateway (sending text to or from devices other than phones) SMS hubbing SMS home routing Multimedia Messaging Service (MMS) Extended Messaging Service Enhanced Messaging Service (EMS) 60 Chapter-10 Multimedia Messaging Service Multimedia Messaging Service A multimedia message on a mobile phone. Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from mobile phones. It extends the core SMS (Short Message Service) capability that allowed exchange of text messages only up to 160 characters in length. The most popular use is to send photographs from camera-equipped handsets, although it is also popular as a method of delivering news and entertainment content including videos, pictures, text pages and ringtones. The standard is developed by the Open Mobile Alliance (OMA), although during development it was part of the 3GPP and WAP groups. Multimedia messaging services were first developed as a captive technology that would enable service providers to "collect a fee every time anyone snaps a photo Early MMS deployments were plagued by technical issues and frequent consumer disappointments, such as having sent an MMS message, receiving a confirmation it had been 61 sent, being billed for the MMS message, to find that it had not been delivered to the intended recipient. Pictures would often arrive in the wrong formats, and other media elements might be removed such as a video clip arriving without its sound. At the MMS World Congress in 2004 in Vienna, all European mobile operator representatives who had launched MMS, admitted their MMS services were not making money for their networks. Also on all networks at the time, the most common uses were various adult oriented services that had been deployed using MMS. China was one of the early markets to make MMS a major commercial success partly as the penetration rate of personal computers was modest but MMS-capable cameraphones spread rapidly. The chairman and CEO of China Mobile said at the GSM Association Mobile Asia Congress in 2009 that MMS in China is now a mature service on par with SMS text messaging. Europe's most advanced MMS market has been Norway and in 2008 the Norwegian MMS usage level had passed 84% of all mobile phone subscribers. Norwegian mobile subscribers average one MMS sent per week. By 2008 worldwide MMS usage level had passed 1.3 billion active users who generated 50 billion MMS messages and produced annual revenues of 26 billion dollars. Technical description MMS messages are delivered in a completely different way from SMS. The first step is for the sending device to encode the multimedia content in a fashion similar to sending a MIME e-mail (MIME content formats are defined in the MMS Message Encapsulation specification). The message is then forwarded to the carrier's MMS store and forward server, known as the MMSC (Multimedia Messaging Service Centre). If the receiver is on another carrier, the relay forwards the message to the recipient's carrier using the Internet.[5] Once the MMSC has received a message, it first determines whether the receiver's handset is "MMS capable", that it supports the standards for receiving MMS. If so, the content is extracted and sent to a temporary storage server with an HTTP front-end. An SMS "control message" containing the URL of the content is then sent to the recipient's handset to trigger the receiver's WAP browser to open and receive the content from the embedded URL. Several other messages are exchanged to indicate status of the delivery attempt. Before delivering content, 62 some MMSCs also include a conversion service that will attempt to modify the multimedia content into a format suitable for the receiver. This is known as "content adaptation". If the receiver's handset is not MMS capable, the message is usually delivered to a web based service from where the content can be viewed from a normal internet browser. The URL for the content is usually sent to the receiver's phone in a normal text message. This behaviour is usually known as the "legacy experience" since content can still be received by a phone number, even if the phone itself does not support MMS. The method for determining whether a handset is MMS capable is not specified by the standards. A database is usually maintained by the operator, and in it each mobile phone number is marked as being associated with a legacy handset or not. It can be a touch 'hit or miss', since customers can change their handset at will and this database is not usually updated dynamically. MMS does not utilize one's own operator maintained data plan to distribute multimedia content. Operator maintained data plans are only used when message included links (if any) are explicitly clicked. E-mail and web-based gateways to the MMS (and SMS) system are common. On the reception side, the content servers can typically receive service requests both from WAP and normal HTTP browsers, so delivery via the web is simple. For sending from external sources to handsets, most carriers allow MIME encoded message to be sent to the receiver's phone number with a special domain. An example of this would be [email protected], where PTN is the public telephone number. Typically the special domain name is carrier specific. 63 Challenges There are some interesting challenges with MMS that do not exist with SMS: Handset configuration can cause problems sending and receiving MMS messages. Content adaptation: Multimedia content created by one brand of MMS phone may not be entirely compatible with the capabilities of the recipient's MMS phone. In the MMS architecture, the recipient MMSC is responsible for providing for content adaptation (e.g., image resizing, audio codec transcoding, etc.), if this feature is enabled by the mobile network operator. When content adaptation is supported by a network operator, its MMS subscribers enjoy compatibility with a larger network of MMS users than would otherwise be available. Distribution lists: Current MMS specifications do not include distribution lists nor methods by which large numbers of recipients can be conveniently addressed, particularly by content providers, called Value-added service providers (VASPs) in 3GPP. Since most SMSC vendors have adopted FTP as an ad-hoc method by which large distribution lists are transferred to the SMSC prior to being used in a bulk-messaging SMS submission, it is expected that MMSC vendors will also adopt FTP. Bulk messaging: The flow of peer-to-peer MMS messaging involves several over-the-air transactions that become inefficient when MMS is used to send messages to large numbers of subscribers, as is typically the case for VASPs. For example, when one MMS message is 64 submitted to a very large number of recipients, it is possible to receive a delivery report and read-reply report for each and every recipient. Future MMS specification work is likely to optimize and reduce the transactional overhead for the bulk-messaging case. Handset Configuration: Unlike SMS, MMS requires a number of handset parameters to be set. Poor handset configuration is often blamed as the first point of failure for many users. Service settings are sometimes preconfigured on the handset, but mobile operators are now looking at new device management technologies as a means of delivering the necessary settings for data services (MMS, WAP, etc.) via over-the-air programming (OTA). WAP Push: Few mobile network operators offer direct connectivity to their MMSCs for content providers. This has resulted in many content providers using WAP push as the only method available to deliver 'rich content' to mobile handsets. WAP push enables 'rich content' to be delivered to a handset by specifying the URL (via binary SMS) of a precompiled MMS, hosted on a content provider's web server. A consequence is that the receiver who pays WAP per kb or minute (as opposed to a flat monthly fee) pays for receiving the MMS, as opposed to only paying for sending one, and also paying a different rate. Although the standard does not specify a maximum size for a message, 300 kB is the current recommended size used by networks due to some limitations on the WAP gateway side Interfaces 65 Chapter-11 Bluetooth Bluetooth Bluetooth Developed by Bluetooth Special Interest Group Industry Mobile personal area networks Compatible Mobile hardware computers, Laptop computers Physical Up to 50 metres phones, Personal range Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength microwave transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, building personal area networks (PANs). Invented by telecom vendor Ericsson in 1994 it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 19,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. Bluetooth was standardized as IEEE 802.15.1, but the standard is no longer maintained. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards 66 defined by the SIG. ] A network of patents is required to implement the technology, which is licensed only for that qualifying device. Name and logo Bluetooth logo The word "Bluetooth" is an anglicized version of the Scandinavian Blåtand/Blåtann, the epithet of the tenth-century king Harald Bluetooth who united dissonant Danish tribes into a single kingdom, according to legend, introducing Christianity as well. The idea of this name was proposed in 1997 by Jim Kardach who developed a system that would allow mobile phones to communicate with computers (at the time he was reading Frans Gunnar Bengtsson's historical novelThe Long Ships about Vikings and king Harald Bluetooth).[7][8] The implication is that Bluetooth does the same with communications protocols, uniting them into one universal standard. Implementation Bluetooth operates in the range of 2400–2483.5 MHz (including guard bands). This is in the globally unlicensed (but not unregulated) Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band. Bluetooth uses a radio technology called frequency-hopping spread spectrum. The transmitted data is divided into packets and each packet is transmitted on one of the 79 designated Bluetooth channels. Each channel has a bandwidth of 1 MHz. The first 67 channel starts at 2402 MHz and continues up to 2480 MHz in 1 MHz steps. It usually performs 1600 hops per second, with Adaptive Frequency-Hopping (AFH) enabled Originally Gaussian frequency-shift keying (GFSK) modulation was the only modulation scheme available; subsequently, since the introduction of Bluetooth 2.0+EDR, π/4-DQPSK and 8DPSK modulation may also be used between compatible devices. Devices functioning with GFSK are said to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. The term Enhanced Data Rate (EDR) is used to describe π/4-DPSK and 8DPSK schemes, each giving 2 and 3 Mbit/s respectively. The combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a "BR/EDR radio". Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate with up to 7 slaves in a piconet; all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 µs intervals. Two clock ticks make up a slot of 625 µs; two slots make up a slot pair of 1250 µs. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the master transmit will begin in even slots and the slave transmit in odd slots. Communication and connection A master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad-hoc computer network using Bluetooth technology), though not all devices reach this maximum. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone will necessarily begin as master, as initiator of the connection; but may subsequently prefer to be slave). The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices simultaneously play the master role in one piconet and the slave role in another. At any given time, data can be transferred between the master and one other device (except for the little-used broadcast mode. The master chooses which slave device to address; typically, it switches rapidly from one device to another in around-robin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed to listen in each receive 68 slot, being a master is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of more than one master is difficult. The specification is vague as to required behavior in scatternets. Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Uses Bluetooth is a standard wire-replacement communications protocol primarily designed for low power consumption, with a short range (power-class-dependent, but effective ranges vary in practice; see table below) based on low-cost transceiver microchips in each device. Because the devices use a radio (broadcast) communications system, they do not have to be in visual line of sight of each other, however a quasi optical wireless path must be viable. Maximum permitted power Typ. Range Class (m) (mW) (dBm) Class 1 100 20 ~100[14] Class 2 2.5 4 ~10[14] Class 3 1 0 ~1[14] The effective range varies due to propagation conditions, material coverage, production sample variations, antenna configurations and battery conditions. Most Bluetooth applications are in indoor conditions, where attenuation of walls and signal fading due to signal reflections will cause the range to be far lower than the specified line-of-sight ranges of the Bluetooth products. Most Bluetooth applications are battery powered Class 2 devices, with little difference in range whether the other end of the link is a Class 1 or Class 2 device as the lower powered device tends to set the range limit. In some cases the effective range of the data link can be extended when a 69 Class 2 devices is connecting to a Class 1 transceiver with both higher sensitivity and transmission power than a typical Class 2 device. Mostly however the Class 1 devices have a similar sensitivity to Class 2 devices. Connecting two Class 1 devices with both high sensitivity and high power can allow ranges far in excess of the typical 100m, depending on the throughput required by the application. Some such devices allow open field ranges of up to 1 km and beyond between two similar devices without exceeding legal emission limits. Version Data rate Maximum application throughput Version 1.2 1 Mbit/s >80 kbit/s Version 2.0 + EDR 3 Mbit/s >80 kbit/s Version 3.0 + HS 24 Mbit/s See Version 3.0+HS. Version 4.0 24 Mbit/s See Version 4.0LE. While the Bluetooth Core Specification does mandate minima for range, the range of the technology is application specific and is not limited. Manufacturers may tune their implementations to the range needed for individual use cases. Bluetooth profiles To use Bluetooth wireless technology, a device has to be able to interpret certain Bluetooth profiles, which are definitions of possible applications and specify general behaviors that Bluetooth enabled devices use to communicate with other Bluetooth devices. These profiles include settings to parametrize and to control the communication from start. Adherence to profiles saves the time for transmitting the parameters anew before the bi-directional link becomes effective. There are a wide range of Bluetooth profiles that describe many different types of applications or use cases for devices. 70 Chapter-12 List of Applications Phone Headset A typical Bluetooth mobile phone headset. Wireless control of and communication between a mobile phone and a handsfreeheadset. This was one of the earliest applications to become popular. Wireless control of and communication between a mobile phone and a Bluetooth compatible car stereo system. Wireless Bluetooth headset and Intercom. Idiomatically, a headset is sometimes called "a Bluetooth". Wireless networking between PCs in a confined space and where little bandwidth is required. Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX. 71 Replacement of previous wired RS-232 serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices. For controls where infrared was often used. For low bandwidth applications where higher USB bandwidth is not required and cable-free connection desired. Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices. Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks. Three seventh and eighth generation game consoles, Nintendo's Wii. and Sony's PlayStation 3, use Bluetooth for their respective wireless controllers. Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem. Short range transmission of health sensor data from medical devices to mobile phone, set-top box or dedicated telehealthdevices. Allowing a DECT phone to ring and answer calls on behalf of a nearby mobile phone. Real-time location systems (RTLS), are used to track and identify the location of objects in real-time using ―Nodes‖ or ―tags‖ attached to, or embedded in the objects tracked, and ―Readers‖ that receive and process the wireless signals from these tags to determine their locations. Personal security application on mobile phones for prevention of theft or loss of items. The protected item has a Bluetooth marker (e.g. a tag) that is in constant communication with the phone. If the connection is broken (the marker is out of range of the phone) then an alarm is raised. This can also be used as a man overboard alarm. A product using this technology has been available since 2009. Calgary, Alberta, Canada's Roads Traffic division uses data collected from travelers' Bluetooth devices to predict travel times and road congestion for motorists. Bluetooth vs. Wi-Fi (IEEE 802.11) Bluetooth and Wi-Fi (the brand name for products using IEEE 802.11 standards) have some similar applications: setting up networks, printing, or transferring files. Wi-Fi is intended as a replacement for high speed cabling for general local area network access in work areas. This 72 category of applications is sometimes called wireless local area networks (WLAN). Bluetooth was intended for portable equipment and its applications. The category of applications is outlined as the wireless personal area network (WPAN). Bluetooth is a replacement for cabling in a variety of personally carried applications in any setting and also works for fixed location applications such as smart energy functionality in the home (thermostats, etc.). Wi-Fi and Bluetooth are to some extent complementary in their applications and usage. Wi-Fi is usually access point-centered, with an asymmetrical client-server connection with all traffic routed through the access point, while Bluetooth is usually symmetrical, between two Bluetooth devices. Bluetooth serves well in simple applications where two devices need to connect with minimal configuration like a button press, as in headsets and remote controls, while Wi-Fi suits better in applications where some degree of client configuration is possible and high speeds are required, especially for network access through an access node. However, Bluetooth access points do exist and ad-hoc connections are possible with Wi-Fi though not as simply as with Bluetooth. Wi-Fi Directwas recently developed to add a more Bluetooth-like ad-hoc functionality to Wi-Fi. Devices A Bluetooth USB dongle with a 100 m range. Bluetooth exists in many products, such as telephones, tablets, media players, Lego Mindstorms NXT, PlayStation 3, PS Vita, the Nintendo Wii, and some high definitionheadsets, modems, and watches.[27] The technology is useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer 73 sound data with telephones (i.e., with a Bluetooth headset) or byte data with hand-held computers (transferring files). Bluetooth protocols simplify the discovery and setup of services between devices. Bluetooth devices can advertise all of the services they provide. This makes using services easier because more of the security, network address and permission configuration can be automated than with many other network types. Computer requirements A typical Bluetooth USB dongle. An internal notebook Bluetooth card (14×36×4 mm). A personal computer that does not have embedded Bluetooth can be used with a Bluetooth adapter that will enable the PC to communicate with other Bluetooth devices. While 74 some desktop computers and most recent laptops come with a built-in Bluetooth radio, others will require an external one in the form of a dongle. Unlike its predecessor, IrDA, which requires a separate adapter for each device, Bluetooth allows multiple devices to communicate with a computer over a single adapter. Operating system implementation Apple products have worked with Bluetooth since Mac OS X v10.2 which was released in 2002. For Microsoft platforms, Windows XP Service Pack 2 and SP3 releases work natively with Bluetooth 1.1, 2.0 and 2.0+EDR.[31] Previous versions required users to install their Bluetooth adapter's own drivers, which were not directly supported by Microsoft Microsoft's own Bluetooth dongles (packaged with their Bluetooth computer devices) have no external drivers and thus require at least Windows XP Service Pack 2. Windows Vista RTM/SP1 with the Feature Pack for Wireless or Windows Vista SP2 work with Bluetooth 2.1+EDR Windows 7 works with Bluetooth 2.1+EDR and Extended Inquiry Response (EIR). The Windows XP and Windows Vista/Windows 7 Bluetooth stacks support the following Bluetooth profiles natively: PAN, SPP, DUN, HID, HCRP. The Windows XP stack can be replaced by a third party stack which may support more profiles or newer versions of Bluetooth. The Windows Vista/Windows 7 Bluetooth stack supports vendor-supplied additional profiles without requiring the Microsoft stack to be replaced. Linux has two popular Bluetooth stacks, BlueZ and Affix. The BlueZ stack is included with most Linux kernels and was originally developed by Qualcomm. The Affix stack was developed by Nokia. FreeBSD features Bluetooth since its 5.0 release. NetBSDfeatures Bluetooth since its 4.0 release. Its Bluetooth stack has been ported to OpenBSD as well. Specifications and features The Bluetooth specification was developed as a cable replacement in 1994 by Jaap Haartsen and Sven Mattisson, who were working for Ericsson in Lund, Sweden.[34] The specification is based on frequency-hopping spread spectrum technology. 75 The specifications were formalized by the Bluetooth Special Interest Group (SIG). The SIG was formally announced on 20 May 1998. Today it has a membership of over 19,000 companies worldwide. It was established by Ericsson, IBM, Intel, Toshiba and Nokia, and later joined by many other companies. All versions of the Bluetooth standards are designed for downward compatibility. That lets the latest standard cover all older versions. Bluetooth v1.0 and v1.0B Versions 1.0 and 1.0B had many problems, and manufacturers had difficulty making their products interoperable. Versions 1.0 and 1.0B also included mandatory Bluetooth hardware device address (BD_ADDR) transmission in the Connecting process (rendering anonymity impossible at the protocol level), which was a major setback for certain services planned for use in Bluetooth environments. Bluetooth v1.1 Many errors found in the 1.0B specifications were fixed. Added possibility of non-encrypted channels. Received Signal Strength Indicator (RSSI). Bluetooth v1.2 Major enhancements include the following: Faster Connection and Discovery Adaptive frequency-hopping spread spectrum (AFH), which improves resistance to radio frequency interference by avoiding the use of crowded frequencies in the hopping sequence. Higher transmission speeds in practice, up to 721 kbit/s, than in v1.1. Extended Synchronous Connections (eSCO), which improve voice quality of audio links by allowing retransmissions of corrupted packets, and may optionally increase audio latency to provide better concurrent data transfer. Host Controller Interface (HCI) operation with three-wire UART. Ratified as IEEE Standard 802.15.1–2005 Introduced Flow Control and Retransmission Modes for L2CAP. 76 Bluetooth v2.0 + EDR This version of the Bluetooth Core Specification was released in 2004. The main difference is the introduction of an Enhanced Data Rate (EDR) for faster data transfer. The nominal rate of EDR is about 3 Mbit/s, although the practical data transfer rate is 2.1 Mbit/s. EDR uses a combination of GFSK and Phase Shift Keying modulation (PSK) with two variants, π/4DQPSK and 8DPSK.[38] EDR can provide a lower power consumption through a reduced duty cycle. The specification is published as "Bluetooth v2.0 + EDR" which implies that EDR is an optional feature. Aside from EDR, there are other minor improvements to the 2.0 specification, and products may claim compliance to "Bluetooth v2.0" without supporting the higher data rate. At least one commercial device states "Bluetooth v2.0 without EDR" on its data sheet Bluetooth v2.1 + EDR Bluetooth Core Specification Version 2.1 + EDR was adopted by the Bluetooth SIG on 26 July 2007. The headline feature of 2.1 is secure simple pairing (SSP): this improves the pairing experience for Bluetooth devices, while increasing the use and strength of security. See the section on Pairing below for more details 2.1 allows various other improvements, including "Extended inquiry response" (EIR), which provides more information during the inquiry procedure to allow better filtering of devices before connection; and sniff subrating, which reduces the power consumption in low-power mode. Bluetooth v3.0 + HS Version 3.0 + HS of the Bluetooth Core Specification was adopted by the Bluetooth SIG on 21 April 2009. Bluetooth 3.0+HS provides theoretical data transfer speeds of up to 24 Mbit/s, though not over the Bluetooth link itself. Instead, the Bluetooth link is used for negotiation and establishment, and the high data rate traffic is carried over a collocated 802.11 link. The main new feature is AMP (Alternative MAC/PHY), the addition of 802.11 as a high speed transport. The High-Speed part of the specification is not mandatory, and hence only devices 77 sporting the "+HS" will actually support the Bluetooth over 802.11 high-speed data transfer. A Bluetooth 3.0 device without the "+HS" suffix will not support High Speed, and needs to only support a feature introduced in Core Specification Version 3.0 or earlier Core Specification Addendum 1. L2CAP Enhanced modes Enhanced Retransmission Mode (ERTM) implements reliable L2CAP channel, while Streaming Mode (SM) implements unreliable channel with no retransmission or flow control. Introduced in Core Specification Addendum 1. Alternative MAC/PHY Enables the use of alternative MAC and PHYs for transporting Bluetooth profile data. The Bluetooth radio is still used for device discovery, initial connection and profile configuration, however when large quantities of data need to be sent, the high speed alternative MAC PHY 802.11 (typically associated with Wi-Fi) will be used to transport the data. This means that the proven low power connection models of Bluetooth are used when the system is idle, and the faster radio is used when large quantities of data need to be sent. AMP links require enhanced L2CAP modes. Unicast Connectionless Data Permits service data to be sent without establishing an explicit L2CAP channel. It is intended for use by applications that require low latency between user action and reconnection/transmission of data. This is only appropriate for small amounts of data. Enhanced Power Control Updates the power control feature to remove the open loop power control, and also to clarify ambiguities in power control introduced by the new modulation schemes added for EDR. Enhanced power control removes the ambiguities by specifying the behaviour that is expected. The feature also adds closed loop power control, meaning RSSI filtering can start as the response is received. Additionally, a "go straight to maximum power" request has been introduced. This is expected to deal with the headset link loss issue typically observed when a user puts their phone into a pocket on the opposite side to the headset. 78 Ultra-wideband The high speed (AMP) feature of Bluetooth v3.0 was originally intended for UWB, but the WiMedia Alliance, the body responsible for the flavor of UWB intended for Bluetooth, announced in March 2009 that it was disbanding, and ultimately UWB was omitted from the Core v3.0 specification.[43] On 16 March 2009, the WiMedia Alliance announced it was entering into technology transfer agreements for the WiMedia Ultra-wideband (UWB) specifications. WiMedia has transferred all current and future specifications, including work on future high speed and power optimized implementations, to the Bluetooth Special Interest Group (SIG), Wireless USB Promoter Group and the USB Implementers Forum. After the successful completion of the technology transfer, marketing and related administrative items, the WiMedia Alliance will cease operations. In October 2009 the Bluetooth Special Interest Group suspended development of UWB as part of the alternative MAC/PHY, Bluetooth v3.0 + HS solution. A small, but significant, number of former WiMedia members had not and would not sign up to the necessary agreements for the IP transfer. The Bluetooth SIG is now in the process of evaluating other options for its longer term roadmap. Bluetooth Smart (v4.0) The Bluetooth SIG completed the Bluetooth Core Specification version 4.0 (called Bluetooth Smart) and has been adopted as of 30 June 2010. It includes Classic Bluetooth, Bluetooth high speed and Bluetooth low energy protocols. Bluetooth high speed is based on Wi-Fi, and Classic Bluetooth consists of legacy Bluetooth protocols. Bluetooth low energy (BLE), previously known as WiBree is a subset of Bluetooth v4.0 with an entirely new protocol stack for rapid build-up of simple links. As an alternative to the Bluetooth standard protocols that were introduced in Bluetooth v1.0 to v3.0, it is aimed at very low power applications running off a coin cell. Chip designs allow for two types of implementation, dual-mode, single-mode and enhanced 79 past versions. The provisional names Wibree and Bluetooth ULP (Ultra Low Power) were abandoned and the BLE name was used for a while. In late 2011, new logos ―Bluetooth Smart Ready‖ for hosts and ―Bluetooth Smart‖ for sensors were introduced as the general-public face of BLE. In a single mode implementation the low energy protocol stack is implemented solely. CSR, Nordic Semiconductor andTexas Instruments[56] have released single mode Bluetooth low energy solutions. In a dual-mode implementation, Bluetooth low energy functionality is integrated into an existing Classic Bluetooth controller. Currently (2011-03) the following semiconductor companies have announced the availability of chips meeting the standard:Qualcomm-Atheros, CSR, Broadcom and Texas Instruments. The compliant architecture shares all of Classic Bluetooth‘s existing radio and functionality resulting in a negligible cost increase compared to Classic Bluetooth. Cost-reduced single-mode chips, which enable highly integrated and compact devices, feature a lightweight Link Layer providing ultra-low power idle mode operation, simple device discovery, and reliable point-to-multipoint data transfer with advanced power-save and secure encrypted connections at the lowest possible cost. General improvements in version 4.0 include the changes necessary to facilitate BLE modes, as well the Generic Attribute Profile (GATT) and Security Manager (SM) services with AES Encryption. Core Specification Addendum 2 was unveiled in December 2011; it contains improvements to the audio Host Controller Interface and to the High Speed (802.11) Protocol Adaptation Layer. Core Specification Addendum 3 revision 2 has an adoption date of July 24, 2012. Core Specification Addendum 4 has an adoption date of February 12, 2013. 80 Bluetooth specification Version 4.1 was officially announced in December 4, 2013. Technical information Bluetooth protocol stack Bluetooth Protocol Stack Bluetooth is defined as a layer protocol architecture consisting of core protocols, cable replacement protocols, telephony control protocols, and adopted protocols.[60]Mandatory protocols for all Bluetooth stacks are: LMP, L2CAP and SDP. In addition, devices that communicate with Bluetooth almost universally can use these protocols:HCI and RFCOMM. LMP The Link Management Protocol (LMP) is used for set-up and control of the radio link between two devices. Implemented on the controller. AVRCP Audio/Video Remote Control Profile. AVRCP is designed to provide a standard interface to control TVs, hi-fi equipment, or others to allow a single remote control (or other device) to control all the A/V equipment to which a user has access. It may be used in concert with A2DP or VDP Commonly used in car navigation systems to control streaming Bluetooth audio. Adopted versions 1.0, 1.3, 1.4 & 1.5 L2CAP The Logical Link Control and Adaptation Protocol (L2CAP) Used to multiplex multiple logical connections between two devices using different higher level protocols. Provides segmentation and reassembly of on-air packets. 81 In Basic mode, L2CAP provides packets with a payload configurable up to 64 kB, with 672 bytes as the default MTU, and 48 bytes as the minimum mandatory supported MTU. In Retransmission and Flow Control modes, L2CAP can be configured either for isochronous data or reliable data per channel by performing retransmissions and CRC checks. Bluetooth Core Specification Addendum 1 adds two additional L2CAP modes to the core specification. These modes effectively deprecate original Retransmission and Flow Control modes: Enhanced Retransmission Mode (ERTM): This mode is an improved version of the original retransmission mode. This mode provides a reliable L2CAP channel. Streaming Mode (SM): This is a very simple mode, with no retransmission or flow control. This mode provides an unreliable L2CAP channel. Reliability in any of these modes is optionally and/or additionally guaranteed by the lower layer Bluetooth BDR/EDR air interface by configuring the number of retransmissions and flush timeout (time after which the radio will flush packets). In-order sequencing is guaranteed by the lower layer. Only L2CAP channels configured in ERTM or SM may be operated over AMP logical links. SDP The Service Discovery Protocol (SDP) allows a device to discover services offered by other devices, and their associated parameters. For example, when you use a mobile phone with a Bluetooth headset, the phone uses SDP to determine which Bluetooth profiles the headset can use (Headset Profile, Hands Free Profile, Advanced Audio Distribution Profile (A2DP) etc.) and the protocol multiplexer settings needed for the phone to connect to the headset using each of them. Each service is identified by a Universally Unique Identifier (UUID), with 82 official services (Bluetooth profiles) assigned a short form UUID (16 bits rather than the full 128). RFCOMM Radio Frequency Communications (RFCOMM) is a cable replacement protocol used to generate a virtual serial data stream. RFCOMM provides for binary data transport and emulates EIA-232 (formerly RS-232) control signals over the Bluetooth baseband layer, i.e. it is a serial port emulation. RFCOMM provides a simple reliable data stream to the user, similar to TCP. It is used directly by many telephony related profiles as a carrier for AT commands, as well as being a transport layer for OBEX over Bluetooth. Many Bluetooth applications use RFCOMM because of its widespread support and publicly available API on most operating systems. Additionally, applications that used a serial port to communicate can be quickly ported to use RFCOMM. BNEP The Bluetooth Network Encapsulation Protocol (BNEP) is used for transferring another protocol stack's data via an L2CAP channel. Its main purpose is the transmission of IP packets in the Personal Area Networking Profile. BNEP performs a similar function to SNAP in Wireless LAN. AVCTP The Audio/Video Control Transport Protocol (AVCTP) is used by the remote control profile to transfer AV/C commands over an L2CAP channel. The music control buttons on a stereo headset use this protocol to control the music player. AVDTP The Audio/Video Distribution Transport Protocol (AVDTP) is used by the advanced audio distribution profile to stream music to stereo headsets over an L2CAP channel. Intended to be used by video distribution profile in the bluetooth transmission. 83 TCS The Telephony Control Protocol – Binary (TCS BIN) is the bit-oriented protocol that defines the call control signaling for the establishment of voice and data calls between Bluetooth devices. Additionally, "TCS BIN defines mobility management procedures for handling groups of Bluetooth TCS devices." TCS-BIN is only used by the cordless telephony profile, which failed to attract implementers. As such it is only of historical interest. Adopted protocols Adopted protocols are defined by other standards-making organizations and incorporated into Bluetooth‘s protocol stack, allowing Bluetooth to code protocols only when necessary. The adopted protocols include: Point-to-Point Protocol (PPP) Internet standard protocol for transporting IP datagrams over a point-to-point link. TCP/IP/UDP Foundation Protocols for TCP/IP protocol suite Object Exchange Protocol (OBEX) Session-layer protocol for the exchange of objects, providing a model for object and operation representation Wireless Application Environment/Wireless Application Protocol (WAE/WAP) WAE specifies an application framework for wireless devices and WAP is an open standard to provide mobile users access to telephony and information services. Baseband error correction Depending on packet type, individual packets may be protected by error correction, either 1/3 rate forward error correction (FEC) or 2/3 rate. In addition, packets with CRC will be retransmitted until acknowledged by automatic repeat request (ARQ). 84 Setting up connections Any Bluetooth device in discoverable mode will transmit the following information on demand: Device name Device class List of services Technical information (for example: device features, manufacturer, Bluetooth specification used, clock offset) Any device may perform an inquiry to find other devices to connect to, and any device can be configured to respond to such inquiries. However, if the device trying to connect knows the address of the device, it always responds to direct connection requests and transmits the information shown in the list above if requested. Use of a device's services may require pairing or acceptance by its owner, but the connection itself can be initiated by any device and held until it goes out of range. Some devices can be connected to only one device at a time, and connecting to them prevents them from connecting to other devices and appearing in inquiries until they disconnect from the other device. Every device has a unique 48-bit address. However, these addresses are generally not shown in inquiries. Instead, friendly Bluetooth names are used, which can be set by the user. This name appears when another user scans for devices and in lists of paired devices. Most phones have the Bluetooth name set to the manufacturer and model of the phone by default. Most phones and laptops show only the Bluetooth names and special programs are required to get additional information about remote devices. This 85 can be confusing as, for example, there could be several phones in range named T610 (see Bluejacking). Pairing and bonding Motivation Many of the services offered over Bluetooth can expose private data or allow the connecting party to control the Bluetooth device. For security reasons it is necessary to be able to recognize specific devices and thus enable control over which devices are allowed to connect to a given Bluetooth device. At the same time, it is useful for Bluetooth devices to be able to establish a connection without user intervention (for example, as soon as they are in range). To resolve this conflict, Bluetooth uses a process called bonding, and a bond is generated through a process called pairing. The pairing process is triggered either by a specific request from a user to generate a bond (for example, the user explicitly requests to "Add a Bluetooth device"), or it is triggered automatically when connecting to a service where (for the first time) the identity of a device is required for security purposes. These two cases are referred to as dedicated bonding and general bonding respectively. Pairing often involves some level of user interaction; this user interaction is the basis for confirming the identity of the devices. Once pairing successfully completes, a bond will have been formed between the two devices, enabling those two devices to connect to each other in the future without requiring the pairing process in order to confirm the identity of the devices. When desired, the bonding relationship can later be removed by the user. 86 References 1. Jeong Chun Hai @Ibrahim. (2007). Fundamental of Development Administration. Selangor: Scholar Press. ISBN 978-967-5-04508-0 2. United Nations Department of Economic and Social Affairs. "United Nations EGovernment Survey 2012". UN. Retrieved 2010-04-30. 3. Kaylor, C., Deshazo, R. and Van Eck, D. The essence of e-governance is " The enhanced value for stakeholders through transformation" Gauging e-government: A report on implementing services among American cities. Government Information Quarterly, 18 (2001), 293–307. 4. Deloitte Research – Public Sector Institute At the Dawn of e-Government: The Citizen as Customer, 2000 5. OECD. The e-government imperative: main findings, Policy Brief, Public Affairs Division, Public Affairs and Communications Directorate, OECD, 2003 6. Grima-Izquierdo, C. (2010). A generic architecture for e-Government and e-Democracy: requirements, design and security risk analysis. Ed. LAP Publishing. 7. Koh, C.E., Prybutok, V.R. (2003). "The three-ring model and development of an instrument for measuring dimensions of e-government functions". Journal of Computer Information Systems 33 (3): 34–9. 8. Gartner Group, ―Key Issues in E-Government Strategy and Management,‖ Research Notes, Key Issues, 23 May 2000 9. Larsen, B., & Milakovich, M. (January 1, 2005). Citizen Relationship Management and E-Government. Lecture Notes in Computer Science, 3591, 57–68 10. Mary Maureen Brown. "Electronic Government" Jack Rabin (ed.). Encyclopedia of Public Administration and Public Policy, Marcel Dekker, 2003, pp. 427–432 ISBN 0824742400. 11. Shailendra C. Jain Palvia and Sushil S. Sharma (2007). "E-Government and EGovernance: Definitions/Domain Framework and Status around the World" (PDF). ICEG. Retrieved 2008-07-10. 12. Atkinson, Robert D.; Castro, Daniel (2008). Digital Quality of Life (PDF). The Information Technology and Innovation Foundation. pp. 137–145. 87 13. Lyman, Jay (2006-02-01). "AT&T Sued for Role in Aiding US Government Surveillance". TechNewsWorld. Retrieved 2009-02-28. 14. Singel, Ryan (2007-08-06). "Analysis: New Law Gives Government Six Months to Turn Internet and Phone Systems into Permanent Spying Architecture". Wired. Retrieved 2008-02-28. 15. "The pros and cons of e-government". Economist. 2008-02-14. Retrieved 2009-02-28. 16. "Global IT Spending". Gartner. 2011-01-11. Retrieved 2011-02-24. 88 “The lesson content has been compiled from various sources in public domain including but not limited to the internet for the convenience of the users. The university has no proprietary right on the same.” 9, Km Milestone, NH-65, Kaithal - 136027, Haryana Website: www.niilmuniversity.in