Category: Hardware setup

The perfect expansion module for those Ultrabooks

Article

VMultra bundles USB hub, DVD drive, SD slot and 500GB HDD to form ultimate laptop peripheral — Engadget

My Comments

Previously, I have written some articles on the USB-connected expansion modules that can extend the functionality of those Ultrabooks and similar ultraportable computers. Here, I was

This included my reviewing a Sony VAIO Z Series premium ultraportable that was equipped with one of these modules that had an integrated slot-load Blu-Ray player.

But what amazes me about this particular VMultra expansion module is that it is effectively acting as a “storage hub” with an SD card reader, DVD burner and a 500Gb hard disk, thus adding at least three extra drive letters or disk icons to your computer. This also is effectively adding on an external hard disk to the computer for use in keeping “main office” work on the desk while you have “portable” work in the computer. Expect this unit to be equipped with a USB 3.0 host interface as well as a multi-port USB hub that most likely continuously self-powered so you can also charge those gadgets off it.

This could become the start of the expansion module that is more about a virtual system unit for an ultraportable, being equipped with onboard secondary storage, DisplayLink video functionality, audio functionality and the like to be kept as an “at home” or “at office” option.

Multi-volume USB storage devices–a connectivity issue is raised here

The current situation

USB storage device types

Single-volume USB devices

Most USB memory keys and similar devices do present themselves to your computer as a single volume or “logical disk”. In Windows, this would be represented as one drive letter and volume name for the device and a Macintosh would show up one extra drive icon on the Desktop when you plug the device in. These devices do work well with specific-function USB host devices like printers or audio/video equipment.

Multiple-volume USB devices

Kingston Wi-Drive USB data and power port

Single USB socket on Kingston Wi-Drive to connect two logical volumes

But there are devices out there that don’t present themselves as a single logical volume. These can range from a memory key or external hard disk that has been formatted as two logical volumes to USB memory-card drives that have multiple slots for the different card types and devices that have fixed storage and a memory-card drive. It can also include mobile phones and MP3 players that have internal storage but also have a microSD card slot.

The former situation is best represented by the Kingston Wi-Drive which I just reviewed here. It presented itself as two logical volumes – one being a read-only volume for the Wi-Fi access point user interface and another for users to store their data at.

How different hosts handle multiple-volume USB devices

Regular computers

This class of device would show up as two or more different drive letters and volume names in Windows or show up as two or more drive icons on the Macintosh desktop. You may have to make sure each volume is safely dismounted in the operating system before you disconnect the device from the computer.

Specific-purpose devices

NAD C446 Media Tuner with USB memory key

USB memory key used to play music in a NAD C446 Media Tuner

But an increasing number of specific-purpose devices are being equipped with USB ports for connecting USB storage devices to. This typically allows you to print documents or photos held on the USB storage device or play / show audio-video content through the screen and/or speakers attached to or integrated in the host device. Infact this setup is used in cars as a preferred alternative to the multi-disc CD stackers that used to exist in the boot (trunk) or dash.

Some devices even write to the USB storage device, typically to store configurations, recorded audio / video content or locally-cached BD-Live online data.

The main problem with these USB storage devices that present themselves as multiple logical volumes is that most of the specific-purpose devices cannot successfully mount the multiple-logical-volume devices at all.

Typically, they would give up the ghost at such attempts, as I noticed with the Kogan WiFi Digital Radio when I tried to connect the Kingston Wi-Drive which had some music on it to the radio. As well, the host-device manufacturers stipulate that you cannot try to use such storage devices with their devices. One person I talked to tonight mentioned that he had to be careful about how he formatted the USB memory key he used for storing music to play in his car’s stereo system.

What can be done

The idea of mounting multiple volumes of the common file systems could be investigated with these dedicated-purpose devices. Here, it could allow the volumes in the device to be presented as multiple “disks” if multiple suitable volumes exist. They could then be listed using a generic “USB+number” name for unlabelled volumes and the volume name for labelled volumes. Most applications would need to mount and use one volume at a time whereas some applications may allow for concurrent multiple-volume access.

The volume-selection option could be provided as part of selecting the files or folders to work with or, in the case of audio-video applications, the USB port used by the multi-volume storage device could be “split” as extra logical sources for each eligible volume.

Conclusion

This may require a small amount of extra code so that different volumes at a physical interface can be enumerated and made available but the idea of supporting multi-volume USB storage devices by dedicated-purpose host devices could be worth investigating.

Troubleshooting a network printer that you can’t print to

Dell 1130n compact monochrome laser printerYou may find that you cannot use your printer or multifunction from your computer via the network yet find that it can perform standalone tasks such as copying and faxing for example. It is even though the printer used to print from the computer via the same network connection just before the problem surfaced.

In the case of multifunction printers, you may not be able to start a scanning job destined for your computer from the machine’s control surface or, at worst, scan to your computer at all. This is although you previously were able to scan that way before. It can also affect computer-based faxing for fax-equipped multifunction printers.

This is a situation I have ran in to myself with my computer and my inkjet multifunction printer on many occasions. But I have also assisted a small company whom I deal with regularly that faced similar problems with two of their colour laser printers that are connected to their business’s network.

There are two main problems that can cause you not to print to your network printer even though you could previously print to the same machine.

Driver software and operating-system problems

If the fault occurs with one particular computer rather than all computers and devices that use the same printer driver software, the driver software or its configuration may be balky.

This may happen if you have continuously added and removed many printers from the same computer, something I have encountered as I install and remove many different review-sample printers from my desktop PC through the course of adding content to this Website.

Check and reinstall the driver software

In some cases, this problem can be caused by faulty driver software and you may have to download the latest driver software from the manufacturer’s Website. It is infact a process I encourage people to do when installing new hardware because the software supplied on the CD in the device’s carton may he “rushed out” in a bid to get the device to market quickly.

Check the state of the operating system’s print functionality

Similarly, it may be worth rebooting the computer because the print spooler (the software that manages the printing function) in the operating system may have stalled. On the other hand, you may have to manually start the print spooler. In Windows 7, this would be found by searching for “Services” in the Start Menu’s Search option, whereupon you look in the list for “Print Spooler” and make sure that’s started.

Network interface not working

If this happens with all of the computers in the network, it may be due to the printer itself losing connection with the network. This may also affect other network functions like IP-based faxing, HP ePrint or other Web-based features.

Check for faults with the network

Check for obvious faults with the network connection like faulty Ethernet leads, infrastructure equipment like a router, switch or HomePlug bridge turned off or not functioning or, in the case of Wi-Fi setups, the quality of the wireless signal.

In some cases, you may have to turn the network-infrastructure device off at the AC power for a few seconds because it may have “frozen” due to something like a power surge. Use the network-status option on the printer’s control panel menu to check that it can “see” the network after you check these factors.

Reset the printer’s network connection

Sometimes, you may have to force a network reset on the printer. This can be done through an option that is, again, found on the same setup menu on the printer’s control panel. On the other hand, you may have to simply unplug the machine from the AC power, waiting a few minutes, then plug it back in.

Conclusion

Once you know how to tackle these printer problems, you may then be able to see longer service life from your equipment.

What are the issues involved with updating device firmware

Article

Firmware modders keep legal storm brewing

My comments

There is an increasing trend to design devices as though they are a computer similinar to a regular desktop computer. Here, the operating software for these devices, commonly known as “firmware”, is designed so it can be updated in the location where the device is used.

Typically newer versions of this software are delivered over the Internet, most likely via the manufacturer’s Web site or, in some cases, through device-support forums.

Methods

One common way of delivering this software is to deliver the update as a binary package that you download using your regular computer, then upload to the device in one or more different ways.

This may involve physically transferring the package to the device using removable media which you install in the device. Then you may either restart the device or select a “Firmware Update” menu option to load this software in the device. An example of this may be a digital camera or an MP3 player.

It may also include uploading the software to the device’s Web management interface as is commonly done with wireless routers. On the other hand you may have to run a firmware-update program on your regular computer which delivers the software to your directly-connected device such as a printer or, in some cases, your network-connected device.

Some consumer-focused devices like the Cyrus Lyric network CD receiver or a lot of appliances require you to connect your regular computer to a “debug” port and run a firmware-update program on that computer to install the new firmware. This can be very tedious for ordinary end-users, but a lot of these manufacturers who take this approach presume that the ordinary consumer will run the device with “out-of-the-box” software.

An increasingly-common method that is used for devices that are connected to the Internet is to invoke a firmware-update routine through the setup menu. Here, the device visits a special server run by its manufacturer, checks the version of the firmware on that server and downloads the latest version if it exists on that server. This may be performed as part of the setup routine for a new device or the device may poll the server for new firmware updates at specified times.

Benefits

The main benefit from device firmware that is updated through the device’s lifespan is that there is a chance for the device’s manufacturer to “iron out” bugs that may have been overlooked in the haste to get the device to market as soon as possible. This also includes “tuning” the device’s performance at handling particular tasks as newer algorithms come along.

In some cases, a firmware update may be about improving security, which is part of the increasingly-common “cat and mouse” game between the device manufacturer and the device-modding community. It also is about adding extra functions to the device that it didn’t come with when it was launched. An example of this include Draytek adding 3G wireless-broadband WAN functionality to their VPN routers or supporting newer wireless-broadband modems on these routers.

The security issue has in recent years come to light with respect to distributed denial-of-service attacks caused by the Mirai botnet and with home-network routers running compromised firmware. Here, software engineers are calling out for manufacturers to adopt a similar process to what Apple, Microsoft and Google are doing with their operating systems where security exploits that are identified in the software are rectified as quickly as possible.

The field-updatable firmware packages can allow a device to enjoy a longer service life as newer requirements can be “baked” in to the software and rapidly pushed out to customers. Examples of this can include support for newer peripheral hardware or newer operating standards.

Drawbacks

There may be cases where some functions offered by the device may be broken due to a firmware update; or the device’s user has to learn new operating procedures to perform some of the functions.

As well, firmware updates that are drawn down by the device may chew up bandwidth especially if there are more of the same device to be update. This can also extend to frequently-delivered large firmware updates for the same device.

Experiences

One situation that I had observed was the use of a Creative Labs Nomad Jukebox as a music-playout device at the church I go to. Initially, there were problems with using this music play because the previous music-playout device, which was a MiniDisc deck had a time-remaining indicator for the currently-playing track.

Subsequent to the purchase of this music player, Creative Labs delivered a major firmware update across the Nomad Jukebox range and this firmware had a “fuel-gauge” indicator to show how far in to the currently-playing track the unit was as well as a time-remaining indicator. Once the latest firmware was applied to this Nomad Jukebox, it became easier to use the device for the purpose that the church bought it for.

Another example was the Western Digital WDTV Live network media adaptor. Through the time I had the unit, there had been many firmware updates with UPnP AV / DLNA media playback being delivered through one of the updates and full MediaRenderer functionality being delivered at a subsequent update. Similarly, this device acquired Facebook, TuneIn Internet radio and other network-service functionality.

Yet another example was where I reviewed two HP business laser printers for this site. I had noticed that once these printers received firmware updates, they were able to work with HP’s ePrint ecosystem.

Issues

A large software image for a small problem

One main issue with firmware updating is that the company typically needs to deliver a complete firmware image to fix a small problem in the device. This can be annoying as devices have a firmware size equivalent to earlier incarnations of the Windows operating environment and this figure is increasing rapidly.

A direction that may have to be looked at for firmware-update delivery is to implement practices associated with updating regular-computer operating systems. This is where smaller incremental updates are delivered to the device and installed by that device. Apple has headed in to that direction with the iOS and this has become easier for them due to the regular desktop computing system being their founding stone. This direction may not work if the firmware is to be subject to a major rewrite with a changed user-interface.

Making and breaking preferred content distribution mechanisms

The article looked at the issue of field-updatable device software as making or breaking a preferred content-distribution model. There are examples of this with games consoles having their software modified so they can play pirated, homebrew or grey-import games titles; the “jailbreaking” of iOS devices (iPhone, iPad, iPod Touch) so they run software not provided by the iTunes App Store; or DVD and Blu-Ray players modified to play pirated and grey-import movies.

The manufacturers are in a game of “cat and mouse” with these devices with the software-modification community to keep these preferred distribution mechanisms alive. This is especially with devices like printers or games consoles that may be sold at loss-leading prices so that customers buy software or accessories at higher prices through preferred distribution chains.

Limiting “out-of-the-box” functionality unless updates are performed

This can lead to devices and partner software being unable to function fully unless the device is updated.

Some examples of this may include the PlayStation 3 games console package cited in the original article where you needed to download a significant update to play a game that was packaged with the console. Then you had to download extra software on to the console from the game supplier before you could play online.

Another example would be the previously-mentioned HP LaserJet printers which needed to be updated before they could run with the ePrint ecosystem. This situation may happen if the new software requirement was ran out just after the hardware was released.

Update loops

A situation that can occur with devices that implement Internet-based updating is what I call an “update loop” or “update chain”. This is where the device completes many firmware-update cycles before it becomes useable. It has happened with the WDTV Live network media adaptor but can happen with other devices.

What manufacturers could do is to allow a “once and for all” update cycle that obtains and installs the latest firmware. The server software could prepare a software build that is particular to the device’s current firmware and supply that build rather than supplying earlier software builds.

PC-style functionality addition

The trend now is to have our devices work in a similar vein to a regular personal computer, where users can add accessory hardware and software at a later date through the product’s lifecycle.

This is intensified with the “app” ecosystem that has been driven by smartphones and tablets, where users visit an “app store” to download programs to their devices. Similarly, TV manufacturers are integrating programs like Skype in their network-enabled TVs and allowing customers to add on Webcams to these sets for video conferencing.

Here, we could the thinking of adding software functionality to devices either through apps and “drivers” that are downloaded as hardware is installed or subsequent full firmware updates. The former method could work well with devices that can have their functionality evolved by the customer or installer whereas the latter method would work with devices that perform the same function all the time.

What could be looked at with device software management

UPnP Device Management

The UPnP Forum have recently released a DeviceManagement Device Control Protocol which allows for network-based configuration and management of devices. This includes a SoftwareManagement Service which looks after the issue of software delivery for these devices.

This may be of relevance where another device works as a management point for another networked device with no user interface or a limited user interface. An example of this setup may be a regular computer or a tablet running an application that co-ordinates and manages firmware updates for a variety of devices; or an IPTV set-top box that is part of a “triple-play” setup managing the software on the router that is at the network-Internet “edge”.

Use of a network-attached storage to keep device software images

An increasing number of home networks are or will be equipped with a network-attached storage device which shares data held on a hard disk across the local network. One main application for this would be to keep music, picture and video files so that they can be shared across the network.

The industry could look at ways of using these NAS (network attached storage) to track down and keep a local cache of new firmware for devices on the home network. Then the devices can check this resource for newer software images when they need to update their firmware.  This may suit home networks where there are multiple devices running the same software, such as multiple units of the same games console or multiple TVs made by the same manufacturer within a close time frame.

It may sound like a practice associated with computing in the “big end of town” where the desire by business IT teams is to maintain standard operating environments; but this technique could be used to keep multiple devices from the same manufacturer up to date without using up bandwidth for firmware updates. As well, with the appropriate protocols, it could allow for a “hands-off” approach when adding new devices to the network or maintaining existing devices.

Conclusion

As more and more dedicated-purpose devices move towards the computing model used by regular computers, we will need to think of issues concerning keeping the software up to date and using the updates to improve the devices.

Lost data on USB drives–can even affect individuals and small business

Articles – From the horse’s mouth

Press Release | Kingston

My Comments

I have had a look at the Kingston press release about the security of data held on USB flash drives and found that it was based on a Ponemon Institute study commissioned by Kingston. The main factor that I had observed was that the survey was based on data that represented the “big end of town” – the larger companies and government departments who typically handle a lot of high-stakes company and customer data.

Here I still find that small businesses and individuals are as at risk from removable-media data theft as are larger organisations. Most of these users would consider secure data storage as storing the confidential data on a USB memory key or external hard disk rather than on the computer’s hard disk. Here, they would keep that memory key or external hard disk locked in a desk drawer, filing cabinet or safe when the data is not needed. If the data isn’t changed or viewed often, like a valuables inventory, the USB memory key or external hard disk may be kept at a bank’s safe-deposit facility.

As well, the typical USB memory key can be attached to one’s keyring that has their house, car and business keys on it and a lot of these users may take advantage of the fact. These key rings are often at risk of loss due to absent-mindedness that can be common amongst us or theft as has been known to happen in the UK and Europe where houses have been broken into in order to steal the keys for powerful or expensive cars that are parked at these houses.

Of course, it is not just government and big business who handle or are responsible for “high-stakes” ultra-confidential data. Small businesses and individuals can also handle this kind of data, whether they provide services to these entities or not.

For example, I had provided technology assistance to a “one-person” business who valued fine art, antiques and collectables. This involved the handling of data relating to the collectable items and who owned the collectable items, as I commissioned newly-bought computers or trained her in computing techniques.

As well, individuals may need to keep copies of information pertaining to personal medical and legal issues where there is a strong emotional link. This information may be considered of high value where it concerns individuals who are in the “public eye” and the tabloid media are hungry for any bit of information about these individuals in order to run that exclusive “scoop”.

A common reality that this “enterprise-focused” article misses is that the typical small-business owner or personal user chooses and purchases their own computer hardware from retail. This is compared to larger organisations who maintain a dedicated IT team who is responsible for purchasing and maintaining the computer and communications technology for that organisation.

For this class of user, I would recommend that they use removable storage that is made by respected brands like Kingston, Verbatim, Sony or SanDisk. It may be worth knowing that some of the good retailers may resell these good brands under their own labels, usually in the premium end of those labels.

I would also recommend that you investigate the use of security-enabled encrypted USB memory keys. Here, I would look for those units that have continual software support from the vendor. This is important if you change your computing platform like what Apple hopes use do or move to newer versions of our current operating systems.

As well, you should make sure that you have good desktop security software on your computer. You could even get by with free programs like AVG or Microsoft Security Essentials. Even Macintosh users should make sure they run good anti-malware software on these computers especially as software threats are targeting this platform as well.

It is also worth making use of strong passwords or other data-locking options that the operating system or USB security software may provide for the confidential data. This may work in conjunction with the common practice of keeping the removable media under lock and key such as in a locked filing cabinet or safe.

What I fear is that a lot of press concerning data security tends to be focused at the big end of town and smaller users tend to be forgotten about. As well, a lot of the good-quality data-security options are often designed and priced out of the range of the small business operator or consumer even though there is a need for this level of data security amongst some of this class of user.

First device to use Wi-Fi technology for host-peripheral connection

Article

HP Intros The First Wi-Fi Mouse For Your PC | eHomeUpgrade

From the horse’s mouth

HP Introduces Wireless PC Accessories to Enhance the Computing Experience

Click here to play YouTube video

My Comments

This mouse is the first to use the Wi-Fi technology as a “personal area network” i.e. to use a network technology to connect peripherals to a host computer. At the moment it requires the host computer to run Windows 7 and implement the “virtual network adaptor” technology in its Wi-Fi chipset.

Furthermore, the host computer needs also to run a device-monitor applet supplied by HP with this mouse. This whole functionality could be improved through the use of code being integrated in Windows 7.

This mouse is expected to have a 9 month battery life which is meant to be longer than with devices that run current Bluetooth technology. I would see that as a coup for Wi-Fi when it comes to applications ranging from mice and keyboards to other “sensor and control” applications like barcode readers used in business; remote controls or health-monitor devices. As well, if the chipsets used in this mouse are implemented in smartphones, PMP / MID devices (iPod Touch, etc) or tablet computers, this could help with improving device runtime when they are used with Wi-Fi networks.

As far as the software is concerned, I would like to have HP avoid “reinventing the wheel” for Wi-Fi mice, keyboards and similar peripherals by making use of “class drivers” that have been defined for USB or Bluetooth human-interface devices.

There is one question that could be asked about this device as in whether it could work over the regular wireless network using the network’s router or access point and sending the data back to the host computer via that local area network, rather than the host PC’s wireless adaptor being virtualised as an access point. This may be of concern with people who run a desktop computer that doesn’t have integrated Wi-Fi but is connected to a the network via Ethernet or HomePlug and this network has a Wi-Fi segment serviced by a wireless router or access point.

A similar setup has been achieved with the myRemote Android app which converts an Android smartphone in to a mouse or remote control for a computer. This one uses the regular wireless network and requires knowledge of the host computer’s IP address and that computer has to run a monitor program downloaded from the myRemote developer’s Web site.

Understanding the new Thunderbolt peripheral-connection technology

Another of the new technologies that Intel has been promoting alongside its “Sandy Bridge” processor architecture has been the “Thunderbolt” peripheral connector.

Capabilities

This connector has a current raw transfer speed of 10Gbps but could have a theoretical maximum is 40Gbps (20Gbps up and 20Gbps down) when both pairs of wires are used. You can use this same “pipe” to pass a DisplayPort-based audio-video stream for a display as well as PCI-Express-based data stream.

There is the ability to daisy-chain 7 Thunderbolt-connected devices but you can have less than 3 metres between the devices at the moment.

Thunderbolt at the moment

This technology will complement USB and other connection technologies but will be like what happened with USB in the mid-90s. This means that it will be an Apple-only technology and this will appear on the latest run of MacBook Pro laptops.

It will appear on PC-based computers in early next year. As far as retrofit opportunities go, Intel had mentioned that it could be available for new motherboards but there was nothing much said about availability as an add-in expansion card.

The main peripheral applications would be external storage subsystems like the LaCie “Little Big Disk” storage array; as well as displays. Such peripherals that have this connection will typically be marketed as being “Thunderbolt-ready”.

What could it offer

Another storage-expansion connection for computing devices

One key application would be to provide a high-bandwidth direct connection between computer devices and one or more external hard-disk storage subsystems. The reason I use the term “computer devices” is because such devices could encompass PVRs which could benefit from capacity expansion, routers and network devices that convert attached external hard-disk subsystems to network-attached storage; as well as the general-purpose computers.

Multifunction devices that are fit for the new generation of compact high-performance computers

There is the possibility for one to exploit the Thunderbolt concept to design a multifunction desktop console unit. Here, this unit could house a screen, audio subsystem, video camera, removable storage such as an optical drive or SDXC card reader and/or a USB hub. Another variant could house a keyboard instead of a screen and connect to one or more external displays using DisplayPort or regular monitor connectors.

This display unit would be connected to an ultracompact system unit that has only the processor, RAM, graphics-processor, network connectivity and a hard disk, plus some USB sockets for a desktop application. On the other hand, this display could serve as a “desktop display” for a subnotebook or ultraportable computer. The USB hub would come in handy for connecting keyboards, mice, USB memory keys and similar devices.

Here, these multifunction devices can be designed so that they are no “second-class citizen” because they have multiple functions. This means they could render the multiple video streams as well as support the high-capacity removable storage technologies like Blu-Ray Disc or SDXC cards.

This is more so as the Intel Sandy Bridge technology makes it feasible for small computers like book-sized ultracompact desktops and notebooks of the “subnotebook” or “ultraportable” class to “have all the fruit” as far as performance goes.

Issues that may be of concern

One main issue that I would have about the Thunderbolt technology is that Intel could limit it to computer applications that are centred around its chipsets. This would make it harder for competing processor designers like AMD or NVidia to implement the technology in their chipset designs. It would also place the same implementation limits on system designers who want to use chipsets that offer improved performance or better value for money alongside Intel processors on their motherboards.

This is like the Intel Wireless Display technology which allows a special display adaptor to connect to an Intel-based laptop computer via a WiFi wireless network and show the pictures on the attached display device. Here, this functionality could only work with computers that have certain Intel chipsets and couldn’t be retroactively applied to older computers.

Another issue would be to encourage implementation in “embedded” and dedicated-purpuse devices like PVRs and routers as well as the general-purpose computers. For some applications like the previously-mentioned storage-expansion application, this could add value and longer service life to these devices.

Conclusion

Once the Thunderbolt technology is implemented in a competitive manner, it could open up a new class of devices and applications for the computing world by making proper use of the “big fat pipe” that it offers.

Faxing and machine-to-machine communications in the IP-based telephony age

The new direction for telephony

There is a new direction for telephony that will be affecting faxing and machine-to-machine communications over the next few years. It is Voice-over-IP which is regular voice telephony carried over an Internet-standard network.

This has been used primarily in large-business telephony but is now becoming a reality with consumers and small organisations. Initially, this technology was being pitched as a way of saving money on long-distance calls but is now becoming part of regular landline telephony.

The main drivers for this direction are the arrival of “naked DSL” Internet services where the telephone wires are used for DSL Internet connection and the customer doesn’t pay the incumbent telephone company for landline telephone service; cable-TV providers stepping to the fore for providing competitive local telephony service; and and the arrival of “single-pipe triple-play” services with multi-channel TV, Internet service and landline telephony delivered over one physical connection as one service package. These services are using the VoIP telephony technology to provide the local landline telephone service.

The next driver that will affect all customers is the national landline telephone system being moved away from the traditional circuit-driven setup to a packet-driven Internet-technology setup. Examples of this are the 21CN project in the United Kingdom and the National Broadband Network project in Australia. The advantage of these projects is to reduce the cost of providing regular voice telephony over short or long distances and to prepare for improved telephony setups like HD wideband voice telephony and video telephony. 

The effect on machine-to-machine applications

This will place a negative effect on machine-to-machine applications like faxing and monitored-alarm setups which are the two main applications that are facing consumers and small organisations. These setups are based on modem-based protocols that are designed for circuit-switched telephone networks like the “plain old telephone service”.

The main effect of this is that the packet-based telephony setups will cause the protocols used in these applications to go “out of step” and lead to communication failure. In the case of a fax machine, the document will either take a long time to go through to the correspondent or the fax transmission won’t succeed. In a monitored-alarm setup, the alarm event that is initiated by the premises-based alarm system will take a long time to register with the monitoring station or at worst won’t register there at all, which is a threat to security and safety – the main reason for these systems in the first place.

Bringing these applications to the IP age

Faxing

The T.37 Fax-over-email solution

Most high-end business-market fax machines are equipped to work according to the T.37 “fax-over-email” protocol. This is a “store-and-forward” method that uses regular SMTP and POP3 Internet email protocols to send hardcopy faxes as TIFF-F (fax-optimised TIFF) image files attached to emails.

This solution requires that the recipient has a T.37-compliant fax machine or computer which is running an email client and software for reading TIFF-F files to receive the files. This may be no mean feat for a general-purpose desktop or laptop computer hut most smartphones and similar devices won’t have software that can read TIFF-F files.  As well, a person can use a scanner attached to a general-purpose computer that has software that can turn out TIFF-F files from the scanner as well as the regular email client to send hardcopy documents to a T.37 fax machine.

Some T.37-compliant fax machines can be set up to work as a T.37 – G3 gateway to forward faxes to regular fax machines. But this requires the sender to send email to an address formatted as “fax-mailbox@service-domail(FAX#fax_number)”, which can be difficult with many popular email clients. Here, these clients may not handle the phone-number data that is held in parenthesis properly or require the user to “go through hoops” to support this function when they manage their address book. It may be easier if the gateway uses a “international-format-fax-number@fax-gateway.service-domain” address format.

As well, the technology could support colour or greyscale photographic images through the use of JPEG or a colour variant of TIFF-F. This point is raised because of most fax-enabled inkjet and colour-laser multi-function printers being equipped with the ability to send and receive colour faxes using the “Super G3” protocol.

The T.38 real-time-fax solution

The T.38 protocol has been introduced as a method of providing “there-and-then” fax transmission over an IP network. At the moment, it requires a gateway device to be connected to a regular fax machine at each end of the link. This could be achieved by the use of a properly-designed VoIP “analogue telephone adaptor” terminal that becomes a T.38 gateway when it is connected to a regular fax machine.

The standard also requires the use of SIP and other call-setup protocols that are used in VoIP to establish the call. The destination information would have to be understood by the gateway picking up the DTMF “touch-tones” from the connected fax machine.

You can use a single ATA for VoIP and T.38 service, with use of distinctive ring + CNG fax tone to “wake up” client fax for incoming calls and use of the CNG fax tone generated by the connected fax machine to enter T.38 mode. But this would require separate T.38 service with separate number to be provisioned for smooth operation.

Another question is whether a network-enabled fax machine can become a T.38 fax endpoint machine or not? As well, would the T.38 protocol support enhanced fax modes like “photo” resolution or colour faxing.

What can be done

Improved provisioning experience

At the moment, most mid-tier consumer and all business multifunction printers have regular fax functionality and network connectivity. As well, some small-business units, especially the units sold by Brother, have T.37 “fax-over-email” functionality as part of the function set.

Typically these features are difficult to provision and use for most home and small-business users. What could be done is to implement a “wizard-based” user experience for the provisioning routine and / or, there could be the ability to download an XML provisioning file from the Internet provider whenever one wants to set up Internet fax.

As well, the industry could adopt a qualification program for Internet-fax equipment that requires a unit to achieve certain requirements such as compliance with known standards before being able to receive the right to display a particular logo of compatibility. This could also extend to the use of service-information files provided by carriers and service providers so that there is little effort required on the behalf of the home or small-business customer to set up their Internet fax service.

Internet fax service as part of a communication service provider’s arsenal

As far as addresses for T.37 fax services go, there could be the ability for a subscriber to be provided with a “virtual fax number” as well as an email address for their T.37 service. This is a telephone number that a person can dial to send faxes to the T.37 mailbox from the regular fax machine. Similarly, there could be support for an SMTP fax-gateway setup that uses a simplified addressing scheme as I have outlined earlier but uses address and password protection to authenticate customers and these would then be related to the “virtual fax number” which is to show on a regular fax machine’s display and  in the fax transmission reports.

The T.38 real-time-fax service could simply be provided by a VoIP or triple-play communications provider as a secondary fax-only number which works with T.38-compliant fax gateways or endpoints. This could be provided with a T.37-compliant Internet fax mailbox that can lead to such services as controlled transmission or reception setups such as “receive all faxes when you start business” or “transmit international faxes I send on local morning time”.

Equipment and software design considerations

A network-enabled fax terminal should support both the T.37 and T.38 network-fax protocols as well as the Super G3 protocols for circuit-based communications. As well, the setup experience for these machines should be simplified, preferably wizard-driven and with service-host interaction, so that people who don’t have much computer experience can get these machines going for Internet fax. This can be augmented by support for standardised XML-based service-manifest files that are downloaded from the service host.

The same machines could also support the storage of fax addresses as regular numbers or Internet-format email addresses and could simplify the construction of Internet-based fax addresses for regular number-based addresses based on however the T.37 fax server expects such addresses to be formed. This should then simplify the management of the one-touch or speed-dial address book that is part of the typical fax machine’s feature set. As well, email software should support the ability to send and view T.37 fax-over-email messages and support “sub-addressing” and address construction for T.37 fax gateway servers.

Monitored alarms

The main method that is being used for adapting an existing  monitored alarm infrastructure to an IP-based environment is to use a VoIP analogue-telephony-adaptor terminal that is programmed to be a “virtual modem” endpoint. Here, the alarm uses the standard modem protocol to signal the event to the ATA and this device forwards the event message to the control centre using an industry-standard message packet.

On the other hand, a network-enabled alarm system could be connected to the network and sends the event message via its network interface. This also includes existing systems that are designed to be future-proof by allowing a network interface kit to be installed at a later date.

There will also be the desire to provide this kind of network integration to this class of device in order to support enhanced monitoring functionality or building automation. The latter application would bode well with the “green impetus” in order to provide functionality such as synchronised control of lighting and heating / air-conditioning.

Another benefit is that a monitored alarm setup can be upgraded with new firmware without the need for a technician to visit the installation. This is in the same way that computers and mobile phones can be “patched” with software fixes by them connecting to a server to get the necessary software.

What needs to happen

Customers need to know what to do concerning evolving their monitored security or safety services to the Internet-driven world and view it as being important for all such services, not just for high-perceived-risk installations. As well, any monitored-alarm equipment that is pitched at the residential or small-business user has to have inherent IP-based monitoring or have support for the feature at a later date.

Equipment design considerations

The alarm-system industry needs to provide panels that either have inherent support for IP-based  signalling or can be upgraded to this function at a minimal cost through its service life. This is understanding that a typical alarm installation is seen by its users as a “backbone” device in the same context as a central-heating boiler or furnace and is therefore expected to have a service life of at least 10 or more years.

This should mean that a hardware upgrade should be in the form of a card being installed in to the existing alarm panel or a software upgrade is provisioned by, at the most, one visit from a technician.

Conclusion

As telephony systems move towards the packet-driven IP telephony space, the traditional machine-to-machine applications that face most users need to be evolved to support the Internet-based networks. This includes improved in the way these services are set up so that most people can provision them in a competitive manner rather than being tied to a particular carrier or operator.

Understanding the new DisplayPort video-connection standard

A few years ago, the VESA consortium who manage standards concerning video display equipment have released the DisplayPort video connection standard to connect a computer or similar device to a display. This has yielded increased improvement over the legacy VGA, DVI and HDMI standards that are currently in use for this purpose.

At the moment, it has been mainly deployed by Apple in their recent-issue Macintosh computers and monitors and I have known that the iMac all-in-one computers have the ability to work as a DisplayPort monitor. Now, other manufacturers are releasing laptop and desktop computers as well as aftermarket graphics cards equipped with this connection in to their model lineups. This is also being augmented with a trickle of monitors and “business” projectors that come with this connection and this trickle will turn in to a flood as this connector comes down the model lineups.

Improvements

Small-size connector

There is a standard connector that is similar to a USB plug for applications where space doesn’t matter like display cards or most regular monitor and projector designs. This connector also has a “latching” design that allows for high-reliability connections in applications where this is desired.

Then there was a “MiniDisplayPort” connector that is half the size of this connector and is intended for applications where space is limited like laptop computers, sleek monitors and ultra-low-profile computer housings. This is actually the standard being implemented by Apple in their current-issue Macintosh platform hardware.

Single pipe

This standard, like the SCART and HDMI video-connection standards, allows for a single pipe for high-resolution video, digital audio and bi-directional communications. Some applications like multi-function monitors with integrated sound, Webcams and USB hubs; touchscreen displays and projectors with integrated cursor-control functionality will benefit from this functionality because there is only one cable needed between the host device and the display.

The latest version (1.2) of this standard also allows for multi-display setups from one connection on the host, whether as a daisy-chain or in a “hub and spoke” manner. This then allows for simplifying multi-monitor display arrangements or monitor / projector setups.

It is also worth knowing that the DisplayPort standard also allows for IP-based network connectivity between the host and the display, which could benefit those displays that have some form of network functionality.

Increased performance

High-resolution, High colour depth (digital photo and video)

Increased distance between host and display

The distance between the host device and the display has been increased to 15 metres without the need for repeaters or amplifiers. This would benefit large video-display setups where the display computer would need to be away from the display screen or projector unit, such as meeting rooms, churches, cinemas and the like.

Adaptors available for legacy displays

If you buy a DisplayPort-equipped computer or retrofit your desktop computer with a DisplayPort-equipped video card, you can still connect your computer or video card to your existing monitor. This is feasible through the availability of DisplayPort – VGA / DVI / HDMI adaptors.

Issues to be careful of

Use of DisplayPort – HDMI adaptors

If you want full proper HDMI operation such as “single-pipe audio” with a DisplayPort-HDMI adaptor, you will need to make sure that the DisplayPort host computer is capable of DP++ behaviour. This is to ensure that the proper logic is going to occur between the host device and the HDMI display setup which may include a separate HDMI “sink” device for sound like a home-theatre receiver.

DisplayPort 1.2 multi-display setups

A DisplayPort setup which is established in a daisy-chain fashion requires a DP 1.2 host at the head of the chain and DP 1.2 monitors down the chain, but a DP 1.1a monitor can be used as the last display in the chain. Alternatively, DP 1.1a monitors can be used as the “spokes” displays in a DP 1.2 setup if they are connected directly to the hub.

It is also worth knowing that the DisplayPort 1.2 multi-monitor setups support “multi-streaming” with displays showing different images from one host. This can suit most multi-display applications such as editing environments, “extra-wide desktops” or “operator screens” for projector setups where each monitor must have different video.

What to look for

If you want to make sure that your system can support the display requirements of now and the future, make sure that the display subsystem can support DisplayPort 1.2 with DP++ functionality. This can cater for multi-screen displays, the current crop of HDMI-equipped display and audio hardware amongst other things.

Whenever you buy or specify a DisplayPort monitor for a multi-screen display or as an “operator screen” for your DisplayPort projector, make sure that it supports at least DisplayPort 1.2. You can get by with a DisplayPort 1.1a monitor or projector at the end of a “daisy-chain” setup on as a “spoke” from a hub-based setup with a DisplayPort 1.2 hub.

Conclusion

Once you are aware of the caveats outlined above when buying or specifying DisplayPort hardware, you can be sure that you can benefit from the DisplayPort standard offers.

Why buy a network-enabled printer instead of a direct-connected printer?

Most printer manufacturers are supplying printers and multifunction printer (all-in-one) devices that can connect to computers via a network as well as via a USB port in price ranges that most consumers and small businesses can afford.

This function has initially been provided to higher-end business-grade equipment primarily as a way of integrating them in to the business’s network and allowing them to be used by all the computers in that workplace. Now that home networks are becoming increasingly common primarily due to broadband Internet and Wi-Fi networking, this function is becoming commonly available in all but the cheapest equipment in most manufacturers’ product ranges.

You may think that a direct-connect printer is the only type of printer that you need for your home or small-business computer but it may be worth thinking about the advantages of the network-connected units now that this feature is available at an increasingly-affordable price. Similarly you may think of using a direct-connect printer with a print server such as the functionality integrated in to many recent-model routers. But there may be limitations in how this setup works, especially with the multifunction devices that are increasingly being deployed.

Many computers – few printers

You will typically end up with many computers but fewer printers in your home or small business and may find that there are particular printers that offer capabilities that are unique to them.

A network printer allows each computer to benefit from that printer’s capabilities without any need to shift the unit around or disconnect and reconnect USB cables. You also move away from the temptation to buy and maintain many cheaper printers for each computer and end up saving money in the long run.

This can allow you to invest in printers that are good for particular needs rather than a fleet of machines that effectively do the same job. A good example of this would be a medical clinic’s setup where there is a networked monochrome laser printer that turns out health-insurance forms, patient receipts and similar documents very quickly for a group of reception-desk computers and a networked colour inkjet multifunction printer that does general-purpose printing where speed isn’t necessary.

Network-capable multifunction printers expose all of their functions to the networks rather than just the printing function. This can allow for increased flexibility when it comes to scanning or “drawing-down” images from memory cards because these functions end up being shared by all the computer users. If the machine has fax functionality, there is the ability to “print-to-fax” via the network whenever you want to send a fax from one of the computers.

The “new home-computing environment”

We are also starting to see the arrival of the “new home-computing environment” where the computers in the household are laptops that are connected via Wi-Fi wireless to a wireless router. This has allowed users to use the computers anywhere in the house rather than just in the study or home office.

A network-enabled printer can allow you to avoid the need to locate the printer and connect laptop computers to it whenever you wish to print anything. Rather, you can start a print job from the laptop that you are using at the location you are using it at. You also benefit from the increased flexibility of locating the printer wherever you wish, especially if you use Wi-Fi wireless or HomePlug powerline networking to connect the printer to the network.

Conclusion

So if you are wanting to choose a printer that provides for flexibility in your network environment, it would be worth it to consider units that are network enabled.