Documente Academic
Documente Profesional
Documente Cultură
Perhaps nowhere else in the world is there a more compelling case for Wi-Fi connectivity than in the travel industry.
Airports, train stations, and hotels are the places that travelers are most likely to have spare time on their hands. Business
travelers are keen to make productive use of this “dead” time by answering e-mail or conducting business research on the
Web. Recreational travelers frequently want to send e-mail to or read e-mail from friends and family, catch up with fellow
travelers through instant messaging, or investigate activities at their next destination. Both types of travelers may need
to book accommodations, alert contacts at their destination of expected arrival times, or reserve taxis or shuttles.
Because of the demands and needs of the traveling public, Wi-Fi hotspots in airports and hotels have grown from a
novelty to a necessity. According to the 2008 edition of the iPass Broadband Mobility Index, Wi-Fi hotspots increased
46 percent from mid-2007 to mid-2008. For the first time, European business use of Wi-Fi hotspots eclipsed North
American business use, growing almost 90 percent and accounting for more than 45 percent of all usage worldwide.
Intercity travel venues remained the most popular Wi-Fi hotspots, accounting for 75 percent of sessions globally. Airports
were still the top venue with 40 percent of the overall sessions, with hotels coming in second with almost 35 percent of
the global share. However, hotel Wi-Fi hotspot usage grew faster than airport usage, with approximately 65 percent growth
compared to 30 percent growth for airports. “Commuter transit locations,” such as train stations, also showed strong
growth of approximately 80 percent (iPass 2008).
Besides the time spent in fixed locations like airports and hotels, another source of unproductive time is the time
spent actually traveling on a plane, bus, or train. In response, we’re beginning to see more mobile Wi-Fi hotspots.
In the past, Lufthansa offered in-flight Wi-Fi service on its long-haul fleet. The hotspots were connected to the
Internet via satellites, and the user paid fees similar to other Wi-Fi access services. However, Lufthansa discontinued the
service in 2006 due to low usage. In 2008, a number of airlines began either testing or providing broadband in-flight Wi-Fi
services. American, Canadian, and Virgin America airlines are some of the carriers that began providing these services on
select aircraft models or select flights. These services are based on Aircell’s (aircell.com) ground-to-air Gogo service.
In contrast, JetBlue, Alaska, and Southwest Airlines are relying on Row 44’s (row44.com) satellite service to provide
802.11 b/g Wi-Fi connections. Unlike Aircell’s service, Row 44 is not limited by international borders and is available
throughout North America.
Online File W6.2 Wi-Fi Mesh Networks, Google Talk, and Interoperability
Researchers in India have developed a protocol that will enable wide area coverage of Wi-Fi networks, which are called
Wi-Fi mesh networks. With the conventional Wi-Fi networks that are common in Internet cafés and airports, radio signals
are exchanged between portable devices and the base station, which has a wired connection to the Internet. Their range is
only 100 meters or less. With a Wi-Fi mesh network, several nodes can exchange radio signals with each other as well as
with the devices. The range of a Wi-Fi mesh network is up to 40 kilometers (approximately 25 miles) and at speeds up to
20 times faster than traditional Wi-Fi. This arrangement provides wider geographical Wi-Fi coverage at a lower cost than a
series of conventional Wi-Fi networks, because not all the nodes have to be wired to the Internet.
Another development is Google’s Google Talk service, which allows for voice connections and IM (google.com/talk).
In May 2006, Google and Nokia launched a handheld Internet browsing device that contained Google Talk, which relies on
Wi-Fi instead of cell phone networks. As many as 300 municipalities, including San Francisco; Philadelphia; Suffolk County
in Long Island, New York; and the entire state of Connecticut, plan to offer the Wi-Fi service free of charge. Initially, because
of the different protocols, the device cannot call regular phones. However, cell phone equipment manufacturers, including
Avaya, Cisco Systems, and Motorola, are testing devices that have both Wi-Fi and cell phone network capabilities. For example,
Motorola partnered with eBay’s VoIP provider Skype. Customers with Wi-Fi-enabled mobile phones will have the option of using
Skype’s service in place of a landline service as long as they are within range of a Wi-Fi signal. Once out of Wi-Fi range, the
phones switch to cellular technology. Sales of mobile phones with both cellular and Wi-Fi capability began to grow in 2010.
Information Center
1001010
World
Transit Wide Web
Management
Information
Wireless Phone
and Mobile Devices
Pole Signs
Source: Used with permission of NextBus Information Systems, Inc. Copyright (c) 2005.
Chapter Six: Mobile Commerce and Ubiquitous Computing 6-5
Introduction
Mobile solutions play a major role in warehouse management. Warehouses are the center of manufacturing, retail, service
and other organizations. To run a successful operation, managers need to ensure that materials, goods, and products flow
effortlessly throughout the warehouse. Companies can achieve this with the help of warehouse management systems
(WMS) software and a mobile data collection and communication system.
Your warehouse plays a key role in ensuring that your company meets its productivity goals. A WMS that includes
inventory management, receiving, storing, picking, and shipping solutions enables you to move goods and information
through your warehouse, distribution center, stockroom or store, at a greater speed with no errors.
WMS tools can help you move and store inventory at maximum efficiency and minimum cost. Faster order cycles and
cost savings are just some of the other benefits of the technologies. Major benefits include: streamlining processes to
move items faster and store them more efficiently, reducing inventories and labor costs, and increasing accuracy and
customer satisfaction. This online file will list some mobile warehouse applications. For information on WMS, see
searchmanufacturingerp.techtarget.com/tutorial/Warehouse-management-systems-software-guide and
prospectasoftware.com/Resources/sap_wm.pdf.
Many companies offer sensor network-based solutions. One example is Banner Engineering (bannerengineering.com).
Banner Engineering’s SureCross product line offers reliable wireless industrial I/O monitoring and control solutions for
most applications, including:
◗ Factory automation
◗ Process automation
◗ Agriculture and irrigation
◗ Water and wastewater monitoring landfill and biomass
◗ Tank level monitoring
◗ Material handling
The following are some sample applications.
1. Production line notification (factory automation). The flexibility and ease-of-use for these products makes it easy
to integrate the SureCross product line into any existing indoor or outdoor facility. A sensor system lets managers,
technicians, and clerks know when they are needed on the production line.
2. Delivery truck arrival notification. A wireless sensor network is mounted above the loading dock to detect when a
delivery truck has arrived at the facility. When the sensor detects a truck in the loading dock, the wireless network
sends a signal that lights up several blinking color lights mounted at strategic locations to notify personnel.
3. Call for a forklift. Sensors call the forklift to bring parts to the assembly line when they sense a forthcoming need.
Thus, parts arrive just-it-time; no waiting time.
4. Material handling. Throughout an assembly plant, conveyor systems carry subassemblies to the assembly line. For
process and control monitoring, sensors need to detect if a carrier is full or empty. Using a wireless sensor network to
detect the presence of product makes data gathering and network maintenance easier and less costly.
5. Bin risk. Applying lean manufacturing principles in existing assembly facilities is increasingly common (e.g., in mass
customization) with manufacturers looking to speed up production times by eliminating mistakes made when the
wrong parts are selected. Using a wireless sensor network and lighted indicators makes picking the correct parts faster
and it improves manufacturing efficiency.
6. Automated guided vehicle. An automated guided vehicle (AGV) delivers assembly line parts to workstations when
the parts are needed. Remote, self-contained push buttons attached to SureCross Wireless Nodes can be placed at
assembly line workstations to signal a wireless gateway-equipped automated guide vehicle (AGV) for replenishment of
assembly parts.
7. Wireless perimeter guard. Storing large items outdoors presents a potential risk of property damage through
vandalism or loss from theft. Using a solar-powered wireless alert system prevents damage or loss by alerting security
personnel when someone has entered your outdoor storage area without clearance.
8. Retail traffic analysis. Large retail stores require an easy-to-install wireline and wireless sensor solution for
monitoring customer traffic in various parts of the store. These monitors generate statistics that are analyzed and can
help optimize placement of products and advertising, thus increasing sales.
9. Railcar axle mover. In grain stations and ports, railcar axle movers push railway cars so that train engines are not
needed. A railcar mobile wheel monitoring system detects the railcar wheels and triggers an axle pushing arm to
activate, pushing the railcars to the next loading or unloading station.
For details on these and other applications, see bannerengineering.com/en-US/wireless/surecross_web_appnotes and
motorola.com/Business/US-EN/Business+Product+and+Services.
Chapter Six: Mobile Commerce and Ubiquitous Computing 6-9
WEP
Wired equivalent privacy (WEP) is a security protocol for Wi-Fi networks that encrypts the communications between a
mobile device and the wireless access point. WEP provides weak encryption, meaning that it is secured against casual
hacking as long as the person setting up the network turns on the encryption. Unfortunately, many small business owners
and home owners operating a WLAN fail to do just that.
Although WEP offers a measure of security, the trade-off is inconvenience. In order to employ WEP, all Wi-Fi users
must be educated on how it works, their computers must be reconfigured to connect to the network, and the encryption
code must be changed frequently. Additionally, every authorized user must be given the encryption key, which means that
a lot of people will be carrying around the keys to the network. In larger companies, if a hacker can gain access to the
encryption key or can get through the WEP security in some other way—which is easily done with readily available soft-
ware, such as Aircrack-ng (aircrack-ng.org/doku.php) or WEPCrack (wepcrack.sourceforge.net)—the damage is often greater,
because companies have a habit of installing their wireless access points behind their firewalls.
There are alternatives to WEP. If a company is concerned about the security of wireless data communications, it can
use VPN technology to create a secure connection over the wireless link. Also, a new Wi-Fi security standard—Wi-Fi
Protective Access (WPA)—is under development. This standard has the backing of the Wireless Fidelity Alliance and the
Institute of Electrical and Electronics Engineers (IEEE). WPA provides enhanced encryption and supports user authentica-
tion, something that was missing from WEP. The alliance has already begun certifying Wi-Fi products with WPA security. The
WPA encryption was cracked in 2007, and experts recommend using WPA2 when securing wireless networks (Vamosi 2008).
SIM-Based Authentication
GSM and its 2.5G–4.0G counterparts all include SIM. This module is usually implemented as a smart card that contains an
authentication key along with other vital information about the subscriber. The authentication key also is stored on a
“home location registry,” which can be thought of as a database that is part of the mobile network. When the phone is
turned on, the user is asked to enter a PIN number. This protects the cell phone against illegal use if it happens to be
stolen or lost. If the PIN is correct, the cell phone and the network engage in a “challenge-response” process of authenti-
cation. A network authentication center sends a random number to the cell phone’s SIM. The SIM computes a “signed
response” by combining the random number with its authentication key. The signed response is sent over the network
to the authentication center, which performs the same computation using a copy of the authentication key stored on the
home-location registry. If the signed response matches the value computed by the authentication center, then the cell
phone is authenticated. After that, communication takes place through “symmetric encryption,” using a key generated by
both the authentication center and the SIM.
Although SIM cards protect against unauthorized use of a particular subscriber’s account, they do not prevent the use
of a stolen cell phone. If a thief steals a phone, the thief can simply replace the existing SIM card with another one and
sell it on the open market. The police in Amsterdam employed an interesting method to thwart this practice. Using a cell
phone’s International Mobile Equipment Identity number, the police are able to track down the mobile phone number
being used on the stolen phone. Once the number is known, the police employ a special computer program to send out an
SMS message to the stolen phone every three minutes. The message reads, “This handset was nicked [stolen]; buying or
selling it is a crime. The Police.” Obviously, this makes the stolen phone a lot less attractive to prospective buyers.