IMS Service Discovery and Sharing

Recently, while in the dentist’s waiting room I had a bit of time to read another article from the always very interesting Ericsson Review Magazine. In the 2/2008 issue there are lots of articles on IMS. In the article on delivering the optimal end-user experience, the authors describe that their IMS application environment allows to share with other users which IMS applications one is using. This way, one can not only see if it is possible to use a specific application to communicate with someone but it’s also possible to see which applications others are using and thus to discover new services. Kind of a viral marketing approach.

I haven’t read about this in any IMS articles so far and it strikes me as a good idea, not only for the IMS domain. From the article, it’s not quite clear if this is something proprietary of the Ericsson IMS client environment or something that was standardized in 3GPP or OMA. If this is part of an IMS standard and you know where to find it, please leave a note in the comment section.

Book Review: Unified Communication Solutions

Unified Communications – The holy grail of combining information technology and telecommunication. There are lots of different opinions on what exactly UC is and when I was offered to have a look at a book giving an introduction, I couldn't resist.

Unified Communication Solutions – A Practical Business and Technology Approach by David Kim, Michael Gibbs and Bob Decker, published by Nortel press, approaches the topic in four steps. The first part of the book introduces the reader to how the evolution and integration of messaging, voice telephony and business applications forms a Unified Communication Solution. Business processes are streamlined with UC by making business applications interact directly with each other and by improving the interaction between people working on a common project and goal.

The second and third part of the book then show how UC can be used to enhance business processes such as Customer service, Customer relationship management, Supply chain management, enterprise resource planning and sales force automation. Quite a thorough analysis which not only discusses UC but also gives an overview of how companies are run.

UC is not a low hanging fruit, as lots of thought has to go into how to introduce UC applications into business processes and how to secure them. By tying information and communication together, new angles of attack for the bad guys emerge and the final chapter of the book gives an introduction of how to secure VoIP, SIP and UC solutions.

Personally, I've been using some of the UC elements described in this book for a couple of years now. Take my VoIP soft-phone and the IPsec VPN software on my PC for example. I can't remember when I last used a desktop phone as I find headphones and a proper address book for phone numbers navigated with the mouse much more convenient than anything a desktop phone could offer. This has opened totally new ways of working to me as I am no longer bound to a specific place but can do my work from pretty much anywhere where an Internet connection is available. Over an encrypted IPsec tunnel my e-mail, SIP telephony and corporate IM work just as well as at my desk in the office, which I rarely use these days.

Thanks to 3.5G networks now common pretty much everywhere I go, I don't even have to worry much anymore about how to connect. The first question of many callers these days is 'Hey Martin, where are you today', because they know I travel a lot or work from home and simply can't tell the difference from the connection or the caller ID of whether I am in the office or somewhere else. That's UC in action.

What I am still missing in my personal setup is the proper integration of voice telephony in my business applications, i.e. in Microsoft Office and Outlook. But then, what would the world be without some room for improvement?

While the book talks about mobile devices in some places, it's clear that this is not really the authors domain and I think this part of UC was treated a little bit too lightly in the book. (Yes, I know, I work in the mobile domain, so that comment had to come…). Another area that I wished were a bit more  discussed is Web based tools for integrating communication functions into programs and web applications for communication inside the company and with the customers.

All in all, a great book and I managed to read it in about a week. In total, the book has 17 chapters and each can be read in 30 – 60 minutes. That's just the right time that can be set aside every now and then before other matters require attention or that train you are sitting in arrives at where you want to get off.

Smartphones: Units, Revenue, Profits

Recently, David Wood shared a couple of interesting numbers on his blog on the importance and relation of smartphones compared to 'ordinary' phones. In his post he says that while smartphones only account for 10-15% of sales units, the sales revenue is between 20-25% and profits may even exceed 40%.

So far, I wondered if big mobile manufacturers are mainly working on smarthphones as a way to secure their future by developing new features on these platforms and then work on finding ways of implementing them on cheapter platforms. These numbers, however, suggest that even for their running business, smartphones have a major impact on the bottom line, despite the small unit numbers.

Network Based Packet Modification

By now I guess you must have heard of Deep Packet Inspection (DPI), a method of looking at each IP packet passing through a gateway router for the purposes of making statistics or to shape the traffic of users depending on the content of the packet.  A recent article in Heise News now describes what kind of other features such gateways seem to have built in these days. The report states that wireless network operator of O2 (Telefonica) had “accidentally” activated a feature for some time that did not only look inside the packets but also modified their content to prevent email being sent over an encrypted connection.

It’s easier than it sounds: Most email programs encrypt the connection, if they activate it at all, if the SMTP email server tells them at connection establishment that encryption is available. To this end, the server includes a “250 – STARTTLS” notification in the startup information exchange. To prevent the email client from activating encryption, the network based router simply overwrote this string with “250-XXXXXXXA”.

If the email program is configured to use optional encryption, the email is transferred without establishment of a secure connection and the user does not notice anything at all. The email transfer only fails if the email program is set to require transport encryption, which for example, has to be set manually in Thunderbird and is thus not used very often. In this case the user gets an error message which is how the whole story was uncovered. The same approach also works to stop encryption being activated between SMTP servers exchanging email allowing to look into email transfers between any two SMTP servers such a router sits in between.

Clearly this kind of packet inspection and modification does not serve traffic shaping purposes…

Trapeze Networks: Giving Wifi an Edge (Literally)

Recently, I came across Trapeze Networks and the name instantly rung a bell. Yes, that's the company Matthew Gast works for, author of THE book on Wifi. Trapeze does a lot beyond the MAC header with Wifi and has a couple of features in their equipment I was not aware one could do with Wifi these days. I was especially amazed by the location tracking features they have put into their equipment.

By triangulation with several access points and some other tricks, it's possible to detect the location of a client device within a few meters. This feature can be put into good use for a number of applications:

  • Access Restrictions: It's possible to restrict network access for a set of users to specific parts of the coverage area, i.e. one can use the same Wifi infrastructure for both employees and guests. Besides restricting guests to pure Internet access it is also possible to limit their access to meeting rooms. This is not done on a per access point limitation but by triangulation, which means permission to use the network can be granted for a location that is much smaller than the coverage area of an access point. It's also possible to limit access to the network to the building, and stop anyone from accessing the network from the parking lot nearby.
  • Equipment Tracking: The location of active and passive WLAN Tags  (e.g. have a look at AeroScout) can be monitored to track the location of equipment or devices.
  • Find rouge access points: One of the biggest threats to company security is employees bringing their own Wifi access points from home and connecting them to the network. If not properly secured they can be an open door into the company's intranet for anyone in range. With localization, the Trapeze access points can not only detect the presence of such access points and warn the network administrator but also include the approximate location of the equipment in the message.
  • Find unwanted devices or attackers: In case outsiders try to penetrate your network, the system can not only warn the administrator of such attacks but again include the location of the attacker, which is an invaluable help in large campus wide networks. Trapeze says their access points and controllers can detect over 200 different types of Wifi attacks and warn the administrator. The system even offers the possibility to "shoot back". I am not quite sure what that means in practice but I am sure it would be fun to find out more about this feature.

Also quite amazing are their tools for site surveys, maintaining the network, their features for VoIP over Wifi for QoS on the air interface (WMM), optimized routing of VoIP calls through the network, their 802.11n implementation in their new MP-432 access points, which by the way look like smoke detectors, etc. If you want to check out their site, bring some time, there is tons of good information to be discovered there.

Carnival of the Mobilists at Always On Real-Time Access

Cotm-button
Chetan Sharma has taken over the Carnival of the Mobilists this week on this blog Always On Real-Time Access. As always, the carnival is diverse, entertaining and thought provoking, so head over and enjoy! The two posts that especially stood out for me personally this week were James Cooper's report on mobile Internet use in South Africa and C. Enrequie Ortiz's short enty on one click for effective use of bar codes and NFC.

RIM’s European Advertisment Campain for the Young and Cool

It's interesting to see how RIM attempts to push their Blackberrys beyond their core market, email business users, and how it advertises the new models. It's funny when you come across the same poster in different countries in different languages, it's almost like a deja vu. Below are two examples of the same poster, one from the U.K. and the other from Italy.

While Michael Mace says RIM is not in the same market as Apple except for some overlap, it seems to me that this overlap is not that small anymore. With their campaign they are definitely trying to increase the overlap, just as Apple tries to add functionality to appeal to business users to increase the overlap in their favor.

I think even before this advertising campaign, RIM has already moved beyond the typical business user anyway. When I was in the US recently, I saw lots of definitely "non-business" people carrying a Blackberry. Maybe that's because there is not a lot of choice. In operator stores, there was the iPhone, a couple of Blackberry variants and a couple of very low end phones. Nothing much in between.

Bb-uk
Bb-italy

Opera Mini on Entry Level Devices

Today, a friend showed me Opera Mini on his new 'Nokia 3110 Evolve', an entry level phone with supposedly a slow processor (compared to Nseries phones) and a screen resolution of 'only' 128×160 pixels. Since he's using OperaMini it was a good opportunity for me to find out how practicable web browsing is on this phone compared to higher end phones. After upgrading from the default OperaMini 2 to OperaMini 4, the browing behavior is the same as on my N95 including the overview mode and zoom in functionality. Concerning browsing speed and scrolling through the page I didn't notice any uncomfortable delay after pressing a button. Even scrolling quickly through a long page is very quick as well. I didn't quite expect such a smooth behavior. Great stuff, kudos to both Nokia and OperaMini!