Monday, January 27, 2020

How Guide Books Help Construct The Tourist Gaze Tourism Essay

How Guide Books Help Construct The Tourist Gaze Tourism Essay How guide books help to construct the tourist gaze and constrain the way tourists see the city. If you really want your life to pass like a movie in front of you, just travel, you can forget your life. Andy Warhol (1975). Tourism is an important aspect in 21st century living as it represents a type of escapism an individual can experience to add spontaneity in ones mundane routine. With mass globalization posing as an ever-growing epidemic, most tourist spots are highly advertised in the media creating what has been known as the tourist gaze. The tourist gaze is summarized very neatly by John Urry (1990), as the process when places are chosen to be gazed upon because there is an anticipation, especially through daydreaming and fantasy, of intense pleasures, either on a different scale or involving different senses from those customarily encountered. Such anticipation is constructed and sustained through a variety of non-tourist practices, such as film, TV, literature, magazines, records and videos, which construct and reinforce that gaze This paper will attempt to explore the different factors of how guidebooks in particular help to construct the tourist gaze and also how it may limit the experience one would have of the city. Urry (1990) introduces a wide variety of themes of which will be closely examined in the process of this essay. To be specific to the question the analysis will be closely related to how guide books and therefore, literature as well as magazines, evoke the different senses that help in instilling th e tourist gaze particularly in contemporary London. The tourist experience is very closely mediated by sight, and by the practices of representation that are part and parcel of travel (Crang, 1997). The city of London represents a region full of history, culture, authentic architecture and modern marvels all of which can easily be beautifully captured as a still image and has been greatly advertised in travel guides. london_mix001.jpg Figure 1: Introductory depiction of multiple aspects in London. The Informative Travelers Guide To London introduced the city of London by means of an image, Figure 1. Spots to visit are chosen because of their value as photographic landmarks. A walk through a city or rather tourism in general becomes in effect a search for the photogenic. (Kubalek, 2008) Photography is a powerful means of evoking ones senses. Figure 1 depicts history, culture, and architecture as well as conveys a sense of patriotism all in one effectively edited shot. The tourist gaze is created as the viewer, most likely foreign to the British culture, is thrust into such an exotic world mentally without even having cross the boarder. Tourism is often about the body-as-seen, displaying, performing and seducing visitors with skill, charm, strength, sexuality and so on. (Urry, 2001) Clearly evident in Figure 1 is a depiction of a British guard in the iconic uniform, which forces the on-looker to envision the ceremony of the changing of the guards. The Changing the Guard at Buckingham Palace is a comprehensive guide book that entails history of the ceremony as well as dissects the facts from the different ranks of the soldiers to the intricacies of his uniform. This example involve what MacCannell(1992, 1999) calls a reconstructed ethnicity as well as a staged authenticity clearly because this ceremony is a major tourist attraction for visitors alike. Not only will they experience an act of British nationalism but also catch a glimpse of a national landmark, Buckingham Palace. National histories tell a story, of a people passing through history, a story often beginning in the mists of time (Bhabha, 1990) Included in the aforementioned guide book is a list of places of attraction within a close vicinity to Buckingham Palace, Houses of Parliament, Big Ben, Piccadilly Circus, St James Palace, 10 Downing Street, The Thames, Trafalgar Square and even Hard Rock Cafe, to name just a few of the great London sights that are a stones throw from Buckingham Palace! (Changing of the Guard, 1990) This is an example in how the tourist gaze can pose as a constraint to the visitors experience of the city. Part of the motive for travelling is to experience the photographs on site, in the real (Dyer, 1995). The book subconsciously guides the tourist and therefore his/her liberty to explore the land is controlled. union-jack-333.jpg Figure 2: The 2012 Olympic Games logo International events, premised upon mass tourism and cosmopolitanism, means that national identity is increasingly conceived of in terms of a location within, and on, a global stage. (Urry, 2001). Visit Britain 2012 is synonymous with images such as that depicted in figure 2 and highly advertised with articles relating to the highly anticipated 2012 Olympic games. The visit London 2012 homepage opens with a description of the Olympic Park, The London 2012 Games are the catalyst for transforming 2.5sq km of land in east London. What was once industrial, contaminated land has been rapidly transformed over the past three years.. Rochee (2000) describes these areas as having the power to transform themselves from being mundane placesà ¢Ã¢â€š ¬Ã‚ ¦ into being there special host city sites that come to occupy a distinct niche within global tourism. The reconstruction of what was once an industrial area into what is portrayed as a place of interest is another way tourist organizations crea te the tourist gaze, by stressing this in tourist manuals they represent the tool that conveys the message. Liberated from the real-world burdens of stores and product manufacturing, brands are free to soar, less as the dissemination of goods and services than as collective hallucinations (Klein, 2000: 22) Product advertising is evident in many travel magazines; one brand in particular that is greatly linked to tourism is the Rimmel franchise. Get the London look! Rimmel claims to be authentic, experimental, fun, accessible to all and uniquely British, offering value for money, with a dash of London glamour. (Rimmel London) By hiring American talent such as actor, Zooey Deschanel as well as musician, Solange Knowles, they represent brand ambassadors who in turn help in the creation of the tourist gaze especially since the advertising has them set in very stereotypical London scenarios, creating again an idealized and stereotypical representations of the place we are visiting (Martwick, 2001) Young aristocrats took Grand Tours in the 17th century primarily for educational reasons, but only since the 1840s did travel start to be of greater interest for a wider part of European society. (Kubalek, 2008) History plays an important part of tourism in general as Roche (2000) explains with the example of the 1851 Great Exhibition at Londons Crystal Palace, the first-ever national tourist event. Although the British population was only 18m, 6m visits were made to the Exhibition, many using the new railways to visit the national capital for the first time. Timeout London. The best of London (2010), has a comprehensive display of the different museums and attractions of which claim to hold great historical and cultural significance to the country. Particularly important in the genealogy of nationalism have also been the founding of national museums and the development of national artists, architects, musicians, playwrights, novelists, historians and archaeologists (McCrone, 1998; K irshenblatt-Giblett, 1998) Also highly publicized in the guide book mentioned earlier is the ever so popular, London Eye observation wheel. The static forms of the tourist gaze, such as that from the balcony vantage point, focuses on the two-dimensional shape, colours and details of the view that is laid out before one and can be moved around with ones eyes (Pratt, 1992: 222) On the wheel the viewer is able to observe Londons other landmarks, for instance the Houses of Parliament, St Pauls Cathedral even The Gherkin. In a sense it gives the viewer the feeling of having some kind of an overview of the city he/she has traveled to (Kubalek, 2008). Although this feeling may be quite rewarding Osborne (2000) explains that the tourist never quite arrives, never completely connects. The significance of other sights interrupts each sight. Every sight signifies all other sights, most still lacking our visit. Kubalek (2008) gives an example to the previous quote by introducing the Southbank, which is the stage for stree t performers. Being right next to the wheel does the static image of watching the view from the wheel contrast to the more interactive experience of walking down the iconic Southbank? Similarly the view through the car windscreen (like the view from one of the rotating glass pods) has also had significant consequences for the nature of the visual glance, enabling the materiality of the city or the landscape to be clearly appreciated (Larsen, 2001) The touristic experience reflects, magnifies and distils everyday life, it infuses the mundane, and vice versa, in relation to the developing and maintaining of an individuals social identities. (McCabe, S., 2002) Consumer psychology, geography and business management studies are essential in the planning of tourism. It is an intentional play by tourist organizations, to make the person believe that their holiday is made by choice, when holiday packages have been planned with great intricacy to benefit the countrys economy. Urry (1990) has found that leisure travel is motivated by a desire to escape ordinary, normal life. The meaningful experiences through travel (MacCannell, 1976) is garnered by a carefully planned plot that guides the tourist in question on a journey that may seem to be of great spontaneity, but is in actual fact carefully planned by greater powers and hence there is clear constraint to the true experience that the tourist encounters. In conclusion, there are many ways tourist guide books create the tourist gaze, be it in ways that may not be seemingly apparent. It is an intricately planned affair of which tourist companies greatly weigh the economic aspects with the environmental as well as the political as so to produce an experience that will create a symbiotic relationship between the visitor, the locals as well as the environment. In order to achieve this, as I have explained in the process if this paper, there are apparent constraints that is embedded psychologically in the minds of the tourist by the way the guide book is presented. They are cumulatively lead to places of interest of which due to careful planning will come to benefit the area economically, socially and sustainably. Tourism is a game, or rather a whole series of games with multiple texts and no single, authentic experience (Urry, 1990) Total words: 1720 words

Sunday, January 19, 2020

Niccolo Machiavellis The Prince Essay -- Machiaveli Prince Power Essa

Niccolo Machiavelli's The Prince Niccolo Machiavelli's The Prince examines the nature of power and his views of power are still somewhat in existence today. I'll discuss this in this essay, emphasizing the following theses. Machiavelli discusses power over the people, dictatorial power, and power with people, shared power. While it is possible for power with to attain greater prevalence in society, it will not completely eliminate power over. In The Prince, Machiavelli discusses two distinct groups of people, the political elite, including nobles and other princes, and the general public. Today in the United States, the first group, the political elite, includes political leaders, religious leaders, business leaders and the leaders of strong lobbying groups. The composition of the general public has changed little from Machiavelli's time. Machiavelli concentrates on relations between the prince and the political elite. He claims that ambition and dictatorial power drive most nobles and princes. A prince must act with dictatorial power in order to maintain his position. Machiavelli assumes that shared power will not be effective with nobles, since "whether men bear affection depends on themselves, but whether they are afraid will depend on what the ruler does" (Machiavelli, p.60-61). Since the nobles are unforgiving and greedy it would be dangerous if not downright suicidal for a prince to rely on their good will. Equally important, Machiavelli states that a prince, a political leader, has different concerns than the general public. For a prince personal actions, which would be considered immoral or unvirtuous, may save lives or help the prince's country. In this way a prince is not immoral, but instead acts with a morality different in nature from the general public. Machiavelli gives several examples of this. Miserliness is considered a fault. Yet, a miserly prince "will come to be considered more generous when it is realized that his revenues are sufficient to defend himself against enemies that attack him, and to undertake campaigns without imposing special taxes on the people" (p.56). Likewise, starting a war is considered an immoral act by many. Yet, a prince should not allow troubles "to develop in order to avoid fighting a war for wars can not really be avoided, but are merely postponed to the advantage of others" (p.11). Avoiding war may ... ... the ugly political process preceding the results has overshadowed positive results like a lower deficit and improved economy. Clinton is neither feared nor loved by his political opposition, making it difficult for him to produce results without great struggles. The one result remembered by many is that Clinton raised taxes, taking away their property. Thus, Clinton has had difficulty with both appearances and results. One might say that in addition to power, a prince in relations needs political skill with the public. For a politician weaving a good story of one's accomplishments is more important than the accomplishments themselves. Machiavelli's idea of power and how it should be handles as he describes in The Prince can still be used to examine the present. While it's possible to see only the negative uses of power, one can also see the potential for power to promote the common good. Machiavelli would argue that attending to the common good is in a prince's best interests, since it gains the support of the people, something more valuable than any fortress or other expression of power. Works Cited: Machiavelli, Niccolo. The Prince. England: Penguin Classics, 1981.

Saturday, January 11, 2020

Islamic Studies

ISLAMIC STUDIES Topic:- Islamic Principle Of business And Marketing & Present Business Evils GROUP MEMBERS:- Nauman Mushtaq Raja Hammad Ahmed kiani Farhad Shareef Shamsher Ali Daniyal Haider The teaching of Islam describe that Islam is a complete code of life. Since we talking about business and marketing therefore Islam give brief explanation about it. From the Islamic point of Islamic the first priority of business should be pleasing Allah and establishing Halal as a way of life. Seeking profit is not a bad aim, but it should be secondary.By making Allah the goal, and implementing Islamic rules of honesty, truthfulness, and good behavior with customers, Insha Allah, any Muslim business is bound to boom. Following are the characteristic that should need to present in Islamic business and marketing:- (1)Honesty (2)Trust (3)Fair and Kind (4)Truthfulness (5)Justice HONESTY IN BUSINESS The Holy prophet (pbuh) was declared not only Sadiq and Amin but he was an honest business man. This i s proved by Hazrat Khadija who was richest lady of Makkah. She gave a few things to sell and she sends her servant with him.But Holy Prophet (pbuh) proved his honesty brilliantly. Honesty is needed in everything we do. From the domestic work of daily routine or office work to studies, honesty makes the real difference. Honesty makes it easy for us to survive because an honest person is truthful and such a person does not fell into any trouble. The sad fact of the present day is the lack of honesty in people. Lies, and dishonesty has become standard in everyday matters and it is a common perception that no one can get rid of them now.This point of view is wrong, why cannot we live like honest humans? If one thinks that honesty cannot be achieved or truthfulness is a dream now this is wrong, just by practicing Islam truly in its true spirit we can achieve all this without devising any special plans or any complex system of morals. The world today is a big business hub, i. e. it is a b usiness market now. There are some main stock exchanges that control the money inflow and out flow of the world for example, wall street etc. these stock exchanges are actually business centers where whole world trades.Unfortunately, with the Jewish intervention in the business and introduction of riba in business, there has left no honesty and no halal money in the business any more. The best examples of the honesty in business are the prophets of Islam. From Quran we learn that prophet Yusuf a. s. used to look after the financial matters of the state as His own choice. That’s why It is called that honesty is the best policy, indeed honesty is the best policy. When a business man is honest, he will never sell a low quality product and will never earn unjustified profit.Thus, an honest business man will be God fearing and will never ever dodge his customers over the selling. An honest business man will never like to go for unjust means to increase his earnings neither will he ever like to give bribes or accept bribes thus with honesty in business, the curses of bribery and riba can be shunned. Hazrat abu bakar siddique r. a was one of the best and honest business men of Arabia. He was very rich and his financial as well as moral help was appreciated by Muhammad s. a. w. w as well. He was much honored in his region because he was honest in business.There are several examples in the Muslim world who did not only do business honestly but also earned much more than those who like to earn black money. In honest business ALLAH gives His blessings, thus honesty indeed is the best policy. The Prophet has said the honest and truthful businessman will be in Jannah amongst the Prophets the Truthful and the martyrs. Honesty and truthfulness are essential in this business. And when it comes to Muslim businesses, it means building a relationship of trust with customers, which cannot be done with lies and eceit. The Holy Quran already explains the factor of honesty in business and in every matter of life. The Holy Prophet (pbuh) has a great business skill due to which he was offered marriage. But unfortunately our current business values have been changing day by day. Our environment is lacking in honesty. For having a good business policy we should need to be honest. The Holy Prophet (pbuh) said,if you sell goods on lie basis then your goods would be sold with your faith.For instance if there is any medicine who will get expire any shop keeper sell to any uneducated person and he got infection, a person who got infected will complain to doctor not to pharmacy shop keeper. Today lie become the trend we just to sell a 300Rs shirt would lie many time. The Holy Prophet (pbuh) said selling thing upon lie basis would break trust of others. TRUST IN BUSINESS For having a successful business a trust of people is require. This does not mean that only one sided trust is require but from both seller and buyer. This enhances better understanding and good c ommunication.A Unit Trust is an investment vehicle that allows investors to take advantage of investing in a diversified group of stocks which manages risk and exposure to one or a few stocks. It also offers the opportunity to participate in the long-term performance of the stock market. Islamic Unit Trusts add other aspects that are a screening process to remove stocks of companies deemed to be inappropriate for Muslim investors and cleansing or purification of a company’s profits by removing any income derived from non-Shariah complaint sources, such as interest a company would earn on its bank accounts and donating them to charities.Therefore, Islamic unit trust schemes are required to additionally appoint a Shari’ah committee or to ensure that their operations are in accordance with Shari’ah. Islamic Unit Trusts can invest in many financial products in conventional financial markets which are not interest-based, or where the element of interest could be elim inated, such as property funds, commodities, financial options and futures and forward transactions in foreign currency. They can take advantage of international markets growth by giving priority to equity investments in Islamic banks and financial institutions, stock markets ofMuslim countries; and companies managed under the Islamic system. The manager of a Unit Trust mutual fund would typically invest the pooled money in a portfolio which may include the asset classes such as cash, bonds and deposits, shares, property and commodities; tangible assets represent more than 51% of the portfolio. Islamic Unit Trusts have also a wide range of investment options based on growth and income, open-ended, redeemable, etc. Their investments can cover international equity markets, currencies and properties.A Mudarabah fund can invest in a specific business activity on the basis of profit and loss sharing; Murabahah fund invest in companies whose transactions are undertaken on a cost-plus basi s; Through Musharakah the Unit Trust and the third party contribute funds in a joint venture, producing equity participation; And in Ijarah fund, the Islamic Trust finances equipment, building or entire project for a third party against an agreed rental. Besides, there will be no restriction to stop non-Muslims investing in an Islamic Unit Trust.A good analogy with Islamic Unit Trusts is one of ethical and green Unit Trusts. Here the universe of investable securities is limited by certain criteria based on moral and ethical considerations (muamalah. com; 2009). An ethical investment is the principle of investing in companies which make a positive contribution to the world and avoiding those which harm the world, its people or its wildlife. Society's increasing awareness of its environmental and social responsibilities is impacting on financial services, more and more investments based on ethical principles are now available.Some may think that the restrictions imposed by ethical inv estment with strict criteria may result in weaker performance; however ethical funds have often matched or beaten their non-ethical counterparts. Ethical investments are generally made through managed funds such as unit trusts which specialty is to seek profits for investors while conforming to certain ethical criteria such as that the company is not involved in activities like illegal armaments, gambling or pornography, or that it doesn’t produce or distribute alcohol, tobacco or drugs.Before buying shares of companies in a chosen sector, an ethical fund manager will run checks on that company to find out if it has interests in a number of areas according to pre-determined criteria. Accordingly, clients who invest in ethical funds can be sure that their money will be invested in companies that engage in legal and ethical activities. Islamic Unit Trusts investments are also based on specific criteria based on morality, the main criteria is to not deal in transactions which in volve the paying and receiving of interest.Islamic Unit Trusts should be run on a transparent and modern corporate basis and up-to-date accounting and within a legal framework in conformity with the Shari’ah. In the same way the decision to invest in the case of ethical unit trusts is made by the fund managers, based on information received from various professional bodies and specially constituted committees of reference, the decision in the case of Islamic unit trusts is conditioned by the a binding approval from the Shari’ah Boards which consist of established religious scholars who make a decision based on the interpretations of particular operations and contexts.A person can earn money by two means; one is agriculture and the other is business. If business is not done according to the ethics then there will always be inflation and shortage of goods. As it can be seen in the case of many commodities like wheat, sugar etc. It is due to the stocking in, speculation a nd the selfishness of some businessmen. The government has also become a trader itself, while the shariah has stopped the Islamic government from trading. As it can be seen that business is an important part of life, the Prophet Muhammad (P.B. U. H) said, â€Å"People get 9/10 of their daily bread by trade. † Islam explains the concept of righteous trade by telling business ethics. If trade or any other thing is done against the morals and creed then this will lead to the bad end on the day of resurrection. Also by the law the person guilty of illegal business would end up nowhere. Islam emphasizes on the importance of the business ethics a lot. Allah says in the Quran, â€Å"they say that buying is also like interest but Allah has declared buying as permissible and interest as forbidden. And â€Å"When you buy or sell then make someone a witness of it. † The Holy Prophet Muhammad (P. B. U. H) said, â€Å"If trade was not there then you would have become a burden on others. † He also said that â€Å"A trader is the guardian of the means of daily bread and a keeper of the dignity of himself and other people. † The Holy Prophet Muhammad (P. B. U. H) encouraged the trust worthy traders by these words, â€Å"A trustworthy and truthful merchant shall be with the prophets and the truthful and the martyrs and the righteous. â€Å"God shows mercy to a person who is kindly when he sells, when he buys and when he makes a claim† The prophet emphasized on the truthfulness and the righteousness of the businessmen a lot. He said that â€Å"Verily, merchants shall be raised up sinners on the day of resurrection, except he who fears God, and is good, and speaks the truth. As Muslims, we have to adhere to ethical standards, not only in business but also in all aspects of life. Both business and ethics are interrelated. There is a reference to this point in the Qur'an, â€Å"For you in the Messenger of Allah is a fine example to follow. Al lah Almighty says, â€Å"To the Madyan people (we sent) Shu'aib, one of their own brethren: he said: ‘O my people! Worship Allah. You have no other god but Him. And give not short measure or weight. I see you in prosperity, but I fear for you the penalty of a day that will compass (you) all rounds. And O my people! Give just measure and weight, nor withhold from the people the things that are their due: commit not evil in the land with intent to do mischief. That which is left you by Allah is best for you, if you (but) believed!But I am not set over you to keep watch! † At one Place Hazrat Ali said, if you dog your friend then don’t think you had brilliantly dodged but think that how much he still trust upon you. FAIR IN BUSINESS Fair is another quality which is also needed for business. WE shouldn’t concern with business whether it is small or big, but we should be fair and kind with people and people with you. The Holy Qur'an and Prophet Mohammad (PBUH) have made it clear that a Muslim must be honest and upright in his business and monetary dealing.Also the true Muslim should keep his word and fulfill his promises, shun fraud and avoid deceit and perfidy, encroach not upon the rights of others, nor take part in wrongful litigation. Also a good Muslim does not give false testimony, and abstains from making unlawful money as from usury and graft. According to Islam whoever is not free from these vices, is not a true believer but a renegade and a worthless transgressor. And the Qur'an is rich with verses that confirm all this. Allah says in the Quran, â€Å"Eat not up each other's property by unfair nd dishonest means. † Allah forbids all unclean and corrupt means of making money, such as, dishonest trading, gambling, and bribery. And the Holy Quran has explained and described such practices in many of its verses. He says, â€Å"Woe to those that deal in fraud, – those who, when they have to receive by measure from men, exact full measure, but when they have to give by measure or weight to men, give less than due. Do they not think that they will be asked on a Mighty Day when (all) mankind will stand before the Lord of the lords. Another example is given in the coming verse, where Allah urges Muslims to be very particular about their trusts and about other people's rights. â€Å"Allah does command you to render back your trust, to those to whom they are due. † Major principles of fair business dealings According to Islam, the following things must be avoided to commence fair business. 1. No fraud or deceit, the Prophet (P. B. U. H) is reported to have said, â€Å"When a sale is held, say, there’s no cheating† 2. Sellers must avoid making too many oaths when selling merchandise. The Prophet (P. B. U.H) is reported to have said, â€Å"Be careful of excessive oaths in a sale. Though it finds markets, it reduces abundance. † 3. Mutual consent is necessary. The Prophet (P. B . U. H) is reported to have said, â€Å"The sale is complete when the two involved depart with mutual consent. † 4. Be strict in regard to weights and measures. The Prophet (P. B. U. H) said, â€Å"When people cheat in weight and measures, their provision is cut off from them. † He told the owners of measures and weights, â€Å"You have been entrusted with affairs over which some nations before you were destroyed. † 5. The Prophet (P.B. U. H) forbade monopolies. â€Å"Whoever monopolizes is a sinner. † 6. Free enterprise, the price of the commodities should not be fixed unless there is a situation of crisis or extreme necessity. 7. Hoarding merchandise in order to increase the prices is forbidden. 8. Transaction of forbidden (Haram) items, such as intoxicants, is forbidden. Fraud and dishonesty in business Prophet Muhammad (P. B. U. H) has stressed the importance of honesty in most of his sermons, saying, â€Å"Remember, there is no faith in him who is n ot trustworthy; there is no place for him in religion who cares not for his ledged word or promise. He (PBUH) also said, â€Å"The signs of a hypocrite are three, when he speaks, he is false, when he promises, he fails; and when he is trusted, he plays false. † Condemning those who cheat in business Prophet Mohammad (PBUH) has said, â€Å"He who cheats is not of us. Deceitfulness and fraud are things that lead one to Hell. † Once Prophet Muhammad (P. B. U. H) came upon a heap of corn in the market of Medina and thrust his hand onto it. His fingers felt damp. On being asked, the trader replied that rain had fallen upon it. The Prophet (P. B. U.H) observed, â€Å"Why did you not then keep (the wet portion of) it above the dry corn, so that men may see it? He, who deceives, is not one of us. † Thus traders who deceive by showing to customers a false sample or by concealing from them the defects of the product they're selling are not true Muslims in the judgment of Allah Prophet (PBUH) and, they are going to end up in hell. Prophet Muhammad (P. B. U. H) said, â€Å"The seller must explain to the buyer the defects, if any, in the quality of the article offered for sale. Should this not be done, the seller will permanently be caught in the Wrath of Allah. In short, all manner of deceit and dishonesty in business is prohibited in Islam. The Holy Prophet has expressed his strong dislike for those who do so. The Prophet's general advice to all people was that, â€Å"What is lawful is clear and what is unlawful is clear, but between them are certain doubtful things which many people do not recognize. He who guards against the doubtful things keep his religion and his honor blameless, but he who falls into doubtful things falls into what is unlawful, just as a shepherd who pastures his flocks round a sanctuary will soon pasture them in it.Every king has a sanctuary, and God's sanctuary is the things he had declared unlawful. â€Å"Before the Proph et invited his people towards Islam, it was his truthfulness and trustworthiness which had earned for Muhammad (S. A. W. ) the glorious titles of â€Å"Sadiq† (truthful) and â€Å"Amin†. Therefore, one must follow the teachings of the Holy Prophet (P. B. U. H) in regard to business and all other aspects of life; to become a good Businessman and hence, a better Muslim. Islam puts certain conditions and restrictions to obviate the chances of bitterness between the employer and employees.Islam encourages and promotes the spirit of love and brotherhood between them. According to the Islamic teachings it is the religious and moral responsibility of the employer to take care of the overall welfare and betterment of his employees. Fair wages, good working conditions, suitable work and excellent brotherly treatment should be provided to the workers. The last Prophet of Allah (sws) has explained this principle in the following words: Those are your brothers [workers under you] who are around you, Allah has placed them under you.So, if anyone of you has someone under him, he should feed him out of what he himself eats, clothe him like what he himself puts on, and let him not put so much burden on him that he is not able to bear, [and if that be the case], then lend your help to him. The Prophet (sws) also said: I will be foe to three persons on the Last Day: one of them being the one who, when he employs a person that has accomplished his duty, does not give him his due. The Prophet (sws) is also reported to have said: The wages of the laborers must be paid to him before the sweat dries upon his body. TRUTHFULNESS IN BUSINESSIn order to earn profit and making things Halal truthfulness is essential. People to buy things where ethics like truthfulness is present. Islam encourages truthfulness in business transactions and raises the status of a truthful merchant so much so that he will be at par with the holy warriors and martyrs, in the Hereafter. The Prophe t (sws) is reported to have said: The truthful merchant [is rewarded by being ranked] on the Day of Resurrection with prophets, veracious souls, martyrs and pious people. The Prophet (sws) has also exhorted the believers to strictly adhere to truthfulness in business transactions.He says: The seller and the buyer have the right to keep or return the goods as long as they have not parted or till they part; and if both the parties spoke the truth and described the defects and qualities [of the goods], then they would be blessed in their transaction, and if they told lies or hid something, then the blessings of their transaction would be lost. The tradition implies that Allah blesses business dealings if both the buyer and the seller are true to each other. Telling lies and hiding facts will result in the loss of divine blessing. A tradition reads. The Holy Prophet said: ‘Traders are wicked people’.The Companions asked: ‘O Messenger, has Allah not permitted business? ’ The Messenger replied: ‘Of course He has declared trading lawful. But they (i. e. the traders) will swear by Allah and do evil, they will not speak but tell lies’. JUSTICE IN BUSINESS The Quran also emphasizes on the concept of justice. It is another types of ethics which is deeply needed for running on the business. The Holy Prophet (PBUH) said, He who deals unfairly with others can never become useful member of society. Among the set of values the Qur'an and the Prophet's sayings emphasize are the concepts of justice and benevolence.The concept of justice (‘Adl) occupies a central place in the economic system of Islam. This value is prescribed in legal, social, moral and economic dealings. It is to be practiced with individuals, orphans, wives, tribes, communities and nations and even with peaceful enemies. It is applicable to speaking, giving witness, acting as a guardian, writing an agreement, arbitrating between parties, dealing with other people, j udging in a court of law and making business transactions. The concept of justice in an economic context encompasses fairness, equity, balance and equilibrium, symmetry and impartiality.The Quranic verses address individuals not only in their personal capacity but also in their capacity of being rulers, administrators, directors, employers, and all who deal with others. Justice, like truth, is a Divine virtue. Islam does not compromise on this value as it does not compromise on truth. While the Qur'an lays great emphasis on the value of justice, the Prophet has repeatedly persuaded the Muslims to stick to the value of Ihsan, which stands for benevolence, generosity, proficiency and magnanimity. The absence of ‘Adl inflicts harm and disturbs peace and harmony, but the absence of Ihsan does not harm anybody.It implies a more liberal treatment than justice demands. It begins where the limits of justice end. Absolute justice is a legal requirement and, therefore, essential, but th e Prophet, in line with the Quranic requirement, has persuaded his followers to behave magnanimously in claiming their rights and be generous in discharging their duty. ‘While ‘Adl eliminates injustice and exploitation and strikes a real balance between rights and responsibilities in society, Ihsan decorates the society with generosity, kindness, mercy, forgiveness, self sacrifice, mutual cooperation and affection. Adl is the primary condition for setting up an Islamic government, while Ihsan plays a vital role in building up a truly Islamic society; the former is a legal phenomenon while the latter is moral and religious. When we say that prices must be just, or fair, does this justice or fairness involve a moral value? Wholesale prices for all the dealers are almost the same. Can we then justify price variations at different centres? In Islamic law, if anybody charges an extraordinarily high price, it is termed as grave deception and is unacceptable.The Ottoman Code of Civil Law defines grave deception as higher than 5% (profit) on goods, 10% on animals and 20% on immovable property. The concept lays down the rate of profit but not the sale price. As a matter of fact, the wholesale price alone does not determine the sale price. It is determined by locality, standard of intramural decoration, packing, service, environment and other overhead costs. A trader has to add all the incurred and accrued expenses to the wholesale price, in addition to a profit for himself/herself.What rate of profit he should charge is determined largely by market forces and the nature of the competition, given a normal or prevailing price. All this proves that the concept of a just price is not a moral concept except where monopolies or oligopolies arbitrarily fix an unrealistically high price quite out of proportion with costs. The concept of the right to justice is mentioned repeatedly in the Qur'an. There is quite a lot of detail in the passages relating to the freedom to justice.In Islam there are two concepts which are considered, Ihsan and Adl. While Adl is typical of monotheistic religions, referring to the need for balance and equality when judging and individual, in Islam perhaps the more important term is Ihsan. Ihsan refers to making up an imbalance or an injustice by returning or giving back something to the person that is at disadvantage. As such, it is not only important to treat all people equally, but to allow those that are at an objective disadvantage compensation.These relate to the two most basic attributes of God, mercy and compassion (Al-Rahman and Al-Rahim. ) These two concepts are often compared to the love of a mother to her offspring. A parent must love equally all of his offspring, but if one of them has a handicap or requires special attention Ihsan dictates that a loving parent will give that child more to help him make his way in life. In the ideal Islamic society, the concept of justice necessarily reflects helping the disadvantaged, like widows, orphans, and those living with handicaps or in poverty. If Musharakah principle† was applied to a bank which holds a huge amount of depositors’ money and no interest rates permitted to earn income, banks will be forced to invest in different projects whether it is new or current. But the bank here is exposed to a risk of loss! It encourages a bank to diversify its investments since interest is prohibited and that leads to a growth in the economy since money is injected in several business and projects. If the economy grows on average, the investment pool will make profit.Banks here make income from investment not form interest by lending money. No interest rates for the depositors but their income increase in line with the growth in the economy. Thus, Islamic system based in â€Å"cooperative† (Sharing) and does not favor rich people. But it works on the principle of sharing which in a way or another leads to justice. The current news is that Sweden government is awarded as best governance. When people asked reason behind this success. They replied, we followed the Hazrat Umar (R. A) Rule of law.

Friday, January 3, 2020

Wireless Technologies Phones - Free Essay Example

Sample details Pages: 21 Words: 6181 Downloads: 8 Date added: 2017/06/26 Category Statistics Essay Did you like this example? CHAPTER I INTRODUCTION Don’t waste time! Our writers will create an original "Wireless Technologies Phones" essay for you Create order 1.1 Project Background Wireless technologies are becoming more and more popular around the world. Consumers appreciate the wireless lifestyle, relieving them of the well known cable chaos that tends to grow under their desk. Nowadays, the world would virtually stop if wireless communications suddenly became unavailable. Both our way of life and the global economy are highly dependent on the flow of information through wireless mediums like television and radio. Cell phones have become highly available during the last decade. Now virtually everyone owns a cell phone, making people available almost wherever they are. Many companies are highly dependent on their employees having cell phones, some companies have even decided not to employ stationary phone systems but instead use cell phones exclusively throughout the organization. New wireless technologies are introduced at an increasing rate. During the last few years the IEEE 802.11 technologies have started to spread rapidly, enabling consumers to set up th eir own wireless networks. This constitutes an important change in how wireless communications are made available to consumers. Wireless networks are no longer provided by big corporations alone, they can just as well be implemented by individuals. Our society is becoming more and more dependent on wireless communications as new areas of use are introduced. The Bluetooth wireless technology is also spreading rapidly. The number of Bluetooth chipsets shipped per year has doubled from 2002 to a total of 69 million chipsets in 2003. The majority of these Bluetooth chipsets are used in mobile phones. An interesting aspect is that consumers are highly dependent on having a cell phone, and the Bluetooth technology is included in the majority of new cell phones. The Bluetooth technology will therefore spread because of the general need for cell phones. As an increasing number of useful Bluetooth applications become available, many consumers will already have Bluetooth devices and be ready to start using Bluetooth PANs (Personal Area Networks) where all their Bluetooth devices communicate with one another. The number of Java enabled mobile phones worldwide is over 250 million and the number of Java enabled mobile phones will continue to increase. Java enabled mobile phones have already been on the market for some years. Due to the very resource constrained mobile phones available a few years ago, Java applications were not very sophisticated and did not hit the mass-market the way many had hoped. As seen in the rest of the software and hardware industry, games play an important role in driving the development of both hardware and software forward. It is therefore interesting to see that a large market has emerged lately for Java games targeting mobile devices. Processing power, available memory, screen size, and screen resolution are increasing as new Java enabled mobile devices enter the market. Newly released Java applications are accordingly sophisticated, and will help to spread the Java technology usage even further. The Java APIs for Bluetooth Wireless Technology (JABWT) ties the Java technology and the Bluetooth technology together. JABWT is made available in some of the latest smart phones and will probably be available also in low-end cell phones in the future. One can easily imagine different scenarios where JABWT would be useful, e.g. the functionality of existing Java games is extended to support multi-player games using Bluetooth connectivity. Other interesting scenarios emerge as well, such as a consumer using a Java Bluetooth enabled mobile phone to pay for a soda by connecting to a Bluetooth enabled soda vending-machine. A good prediction is that JABWT will first find its use in multi-player Java games, making the Java and Bluetooth technologies well-known to consumers. Thereafter we will probably see other types of Java Bluetooth applications, such as small-amount payment applications. This thesis gives a broad overview of Java and Bluetooth technologies, and a mobile peer-to-peer application that allows users to share their files such as text, images music within a small Bluetooth network in a synchronized way. 1.2 Aim of the Project This project is designed to develop a personalized mobile file sharing system that allow users to share their resources without the aid of any central server. 1.3 Motivation of the Project With the availability of peer-to-peer mobile services operating on content sets, the need for a personalized file sharing Application rises. This project overcomes the requirements specified above by designing a personalized file sharing system that not only allows people to share files to the strangers in a mobile peer-to-peer mobile network, but also identifies the secure mobile devices in an ad-hoc mobile social network which allows people to share and personalize the file sharing experience with the strangers in the network. 1.4 Expected outcome of the project The Outcome of this project is to design a system that provides methods to share their files within the users in an adhoc network by identifying the secure mobile devices. The user not only shares there files with known entities but also has provisions to share the image, text and music files with unknown entities. 1.5. Introduction to Bluetooth Bluetooth is a wireless communication protocol. Bluetooth is an always-on, short-range radio hookup that resides on a microchip. We can use Bluetooth to communicate to other Bluetooth-enabled devices. It was initially developed by Swedish mobile phone maker Ericsson in 1994 as a way to let laptop computers make calls over a mobile phone. Since then, several thousand companies have signed on to make Bluetooth the low-power short-range wireless standard for a wide range of devices. Industry observers expect Bluetooth to be installed in billions of devices by 2005. The concept behind Bluetooth is to provide a universal short-range wireless capability. Using the 2.4 GHz band, available globally for unlicensed low-power uses, two Bluetooth devices within 10 m of each other can share up to 720 Kbps of capacity. Bluetooth is intended to support an open-ended list of applications, including data (such as schedules and telephone numbers), audio, graphics, and even video. For example, audio devices can include headsets, cordless and standard phones, home stereos, and digital MP3 players. Following are some examples of the capabilities that Bluetooth can provide consumers: Make calls from a wireless headset connected remotely to a cell phone; Eliminate cables linking computers to printers, keyboards, and the mouse; Hook up MP3 players wirelessly to other machines to download music; Set up home networks so that a couch potato can remotely monitor air conditioning, the oven, and childrens Internet surfing; Call home from a remote location to turn appliances on and off, set the alarm, and monitor activity. 1.5.1 Applications of Bluetooth Bluetooth is designed to operate in an environment of many users. Up to eight devices can communicate in a small network called a piconet. Ten of these piconets can coexist in the same coverage range of the Bluetooth radio. To provide security, each link is encoded and protected against eavesdropping and interference. Bluetooth provides support for three general application areas using short-range wireless connectivity: Data and voice access points Bluetooth facilitates real-time voice and data transmissions by providing effortless wireless connection of portable and stationary communications devices; Cable replacement Bluetooth eliminates the need for numerous, often proprietary cable attachments for connection of practically any kind of communications device. Connections are instant and are maintained even when devices are not within line of sight. The range of each radio is approximately 10 m, but can be extended to 100 m with an optional amplifier; Ad hoc networking A device equipped with a Bluetooth radio can establish instant connection to another Bluetooth radio as soon as it comes into range. 1.5.2 Protocol Architecture Bluetooth is defined as a layered protocol architecture consisting of core protocols, cable replacement and telephony control protocols, and adopted protocols. The core protocols form a five-layer stack consisting of the following elements: Radio Specifies details of the air interface, including frequency, the use of frequency hopping, modulation scheme, and transmit power. Baseband Concerned with connection establishment within a piconet, addressing, packet format, timing, and power control. Link manager protocol (LMP) Responsible for link setup between Bluetooth devices and ongoing link management. This includes security aspects such as authentication and encryption, plus the control and negotiation of baseband packet sizes. Logical link control and adaptation protocol (L2CAP) Adapts upper-layer protocols to the baseband layer. L2CAP provides both connectionless and connection-oriented services. Service discovery protocol (SDP) Device information, services, and the characteristics of the services can be queried to enable the establishment of a connection between two or more Bluetooth devices. RFCOMM is the cable replacement protocol included in the Bluetooth specification. RFCOMM presents a virtual serial port that is designed to make replacement of cable technologies as transparent as possible. Serial ports are one of the most common types of communications interfaces used with computing and communications devices. Hence, RFCOMM enables the replacement of serial port cables with the minimum of modification of existing devices. RFCOMM provides for binary data transport and emulates EIA-232 control signals over the Bluetooth base band layer. EIA-232 (formerly known as RS-232) is a widely used serial port interface standard. The adopted protocols are defined in specifications issued by other standards-making organizations and incorporated into the overall Bluetooth architecture. The Bluetooth strategy is to invent only necessary protocols and use existing standards whenever possible. These are the adopted protocols: PPP The point-to-point protocol is an Internet standard protocol for transporting IP datagrams over a point-to-point link; TCP/UDP/IP These are the foundation protocols of the TCP/IP protocol suite; OBEX The object exchange protocol is a session-level protocol developed by the Infrared Data Association (IrDA) for the exchange of objects. OBEX provides functionality similar to that of HTTP, but in a simpler fashion. It also provides a model for representing objects and operations. Examples of content formats transferred by OBEX are vCard and vCalendar, which provide the format of an electronic business card and personal calendar entries and scheduling information, respectively; WAE/WAP Bluetooth incorporates the wireless application environment and the wireless application protocol into its architecture. 1.5.3 Bluetooth Usage Models A number of usage models are defined in Bluetooth profile documents. In essence, a usage model is a set of protocols that implement a particular Bluetooth-based application. Each profile defines the protocols and protocol features supporting a particular usage model. Following are the highest-priority usage models: File transfer The file transfer usage model supports the transfer of directories, files, documents, images, and streaming media formats. This usage model also includes the capability to browse folders on a remote device; Internet bridge With this usage model, a PC is wirelessly connected to a mobile phone or cordless modem to provide dial-up networking and fax capabilities. For dial-up networking, AT commands are used to control the mobile phone or modem, and another protocol stack (such as PPP over RFCOMM) is used for data transfer. For fax transfer, the fax software operates directly over RFCOMM; LAN access This usage model enables devices on a piconet to access a LAN. Once connected, a device functions as if it were directly connected (wired) to the LAN; Synchronization This model provides a device-to-device synchronization of PIM (personal information management) information, such as phone book, calendar, message, and note information. IrMC (Ir mobile communications) is an IrDA protocol that provides client/server capability for transferring updated PIM information from one device to another; Three-in-one phone Telephone handsets that implement this usage model may act as a cordless phone connecting to a voice base station, as an intercom device for connecting to other telephones, and as a cellular phone; Headset The headset can act as a remote devices audio input and output interface. 1.5.4 Advantages Bluetooth has a lot to offer with an increasingly difficult market place. Bluetooth helps to bring with it the promise of freedom from the cables and simplicity in networking that has yet to be matched by LAN (Local Area Network). In the key marketplace, of wireless and handheld devices, the closest competitor to Bluetooth is infrared. Infrared holds many key features, although the line of sight it provides doesnt go through walls or through obstacles like that of the Bluetooth technology. Unlike infrared, Bluetooth isnt a line of sight and it provides ranges of up to 100 meters. Bluetooth is also low power and low processing with an overhead protocol. What this means, is that its ideal for integration into small battery powered devices. To put it short, the applications with Bluetooth are virtually endless. Disadvantages Bluetooth has several positive features and one would be extremely hard pressed to find downsides when given the current competition. The only real downsides are the data rate and security. Infrared can have data rates of up to 4 MBps, which provides very fast rates for data transfer, while Bluetooth only offers 1 MBps. For this very reason, infrared has yet to be dispensed with completely and is considered by many to be the complimentary technology to that of Bluetooth. Infrared has inherent security due to its line of sight. The greater range and radio frequency (RF) of Bluetooth makAe it much more open to interception and attack. For this reason, security is a very key aspect to the Bluetooth specification. Although there are very few disadvantages, Bluetooth still remains the best for short range wireless technology. Those who have tried it love it, and they know for a fact that Bluetooth will be around for years to come. 1.5.5 Chat In a Bluetooth Chat application, well develop a JABWT-based chat room application, called Chat, for mobile devices that must support the J2ME MIDP 1.0 profile. Users who have a JABWT-capable device can use this application to chat with their nearby friends in an IRC fashion. It searches and joins any existing chat room within the Bluetooth effective range, or creates a new chat room in the nearby Bluetooth range. We use the words chat room to represent a virtual chat room thats formed by a network of Chat applications. Users can start messaging with each other within the same virtual chat room when theres more than one party connected to each other. If one user sends a message over the air, all parties of the chat room will receive the message. Users can join and leave the chat room at anytime. For our convenience we assumes like Theres only one chat room that exists within effective Bluetooth range. There is no security imposed when joining a chat room. Users run one instance of Chat on a device at any given time. Before we dig into the source code, lets look at some of the Bluetooth application design issues. JABWT does a good job of providing a familiar API to J2ME developers for accessing Bluetooth facilities. JABWT is integrated with the J2ME Generic Connection Framework. As a result, Bluetooth network programming is very similar to a stream-based connection model. Like many other network protocols, the Bluetooth connection model employs a client/server architecture. Our Chat application, on the other hand, operates in a peer-to-peer manner. Each running instance of Chat (or a node) can serve as a client and a server at the same time. It behaves as a client when Chat starts up; it searches and connects to existing running Chat devices. Once connected, it makes itself available for future clients to connect to. In such cases, it serves as a server for future client connections. To logically represent an active Chat node, we use the concept of endpoint to encapsulate all the connectivity attributes of a node. An endpoint represents a unique message delivery destination and source regardless of whether it is a server or a client. A Bluetooth connection differs from a regular socket connection by its unique device and service discovery processes. Bluetooth applications typically start the device discovery process to identify connectable devices, which is followed by a service discovery process to obtain a reference (URL) to suitable services. To hide these complexities from the Graphical User Interface (GUI) elements, a network layer is introduced to serve as a faade to the Bluetooth API. This design is comparable to the Model-Viewer-Controller model where the Viewer component is decoupled from the Model component. The GUI can access Bluetooth connectivity via a simplified interface, which does all the discovery and connection establishment behind the scenes. This network layer also provides the functionality to send messages to and receive messages from other endpoints. A call back interface is in place to report any network activity back to the GUI. The Bluetooth Network is explain below. The communication channel between each connected Chat endpoint is a structured data stream connection. We put together a simple protocol to coordinate the activity between each endpoint. This protocol includes the following features: Initial handshake: Each point must handshake with each other when the connection is first established. This ensures that the connecting device is a Chat node rather than a mistakenly connected application. During the handshake, we also exchange the screen names of the users Delivery of text message: Each sent text message is delivered to all endpoints connected to the Chat network. Termination handshake: If the user quits the chat room gracefully, a termination token is sent to all the other endpoints to indicate its intention. We can clean up the necessary network and runtime resources associated with the leaving endpoint upon receiving this token. However, if the user walks away from effective range and becomes inaccessible, a termination token is not sent. Other active endpoints will discover the leaving party is inaccessible when the connections are lost, and they will clean up the resources. 1.5.5.1 Implementation Consideration The NetLayer class, which implements the Chat networking layer, does most of the Bluetooth-related work and provides the following functionality: Initializes the Bluetooth stack Registers Chat services to the Bluetooth device Searches for nearby devices Searches for Chat services on nearby devices Establishes endpoint connectivity for found Chat services Manages the life cycle of all endpoints The Bluetooth stack can be initialized by calling LocalDevice. getLocalDevice(). LocalDevice is a singleton that uniquely represents the underlying Bluetooth device implementation. You can use the LocalDevice instance to gain access to other Bluetooth features including: Discovery agent (via getDiscoveryAgent()) Bluetooth physical network address (via getBluetoothAddress()) SDDB (via getRecord() and updateRecord()) The Chat NetLayers initial work is to create and register a Chat service to a local device. A Bluetooth service is an entry point for other Bluetooth clients to access available functionalities. Since each Chat endpoint can serve as a server, it must register its service in order to make this server available to other Chat clients. JABWT utilizes the MIDP Generic Connection Framework to instantiate a server connection. A Chat application needs to instantiate a Serial Port Profile connection, basically a stream-based connection that allows two Chat applications to exchange data using Java input and output streams. A Chat server connection is created. After a server connection is created, the service is not yet available to external clients (it is not discoverable). What has happened is that JABWT created a corresponding ServiceRecord for this service. A ServiceRecord is a collection of attributes that describes our service, and these attributes are searchable by clients. We can use localDevice.getRecord( server ) to retrieve the newly created ServiceRecord. You may notice that the ServiceRecord is not empty at this point; it is already populated with some default values that are assigned by the JABWT implementation based on the connection string and the implementation configuration when we perform Connector.open(). The server.acceptAndOpen() method notifies the Bluetooth implementation that the application is ready to accept incoming connections and make the service available. This also instructs the underlying implementation to store the ServiceRecord object in the SDDB, which occurs when server.acceptAndOpen() is first invoked. Notice that only the attributes stored in the SDDB can be seen and queried by other Bluetooth clients. Any subsequent change to the ServiceRecord must be reflected in the SDDB by using localDevice.updateRecord(). Now our Chat application is ready to accept a connection. But what if your friends are already chatting prior to the start of your Chat? If there is an existing chat room available, Chat should join the existing network by searching for other Chat services on each individual device and connecting to their services. Three steps must be taken to perform this action. Search for an available device. For each available device, search for available and matching services. For each available and matching service, connect to the service and perform the initial handshake. DiscoveryAgent, another singleton in JABWT, can help us find other devices and services. There are two other options for retrieving connectable devices, a cached devices list and a pre known devices list. Cached devices are remote devices that have been discovered in a previous inquiry. Pre known are remote devices that are preconfigured in BCC. In our example, we choose to ignore both cached and pre known devices. We want to retrieve the most up-to-date list of active Chat devices at the moment Chat is launched. Therefore, our Chat application always initiates a new search for all surrounding devices. Devices can be searchable in two modes, General Inquiry Access Code (GIAC) and Limited Inquiry Access Code (LIAC). When a device is set to GIAC, it basically means I want to be discovered all the time. Devices that provide public and permanent services fall into this category. Printers and fax machines are examples of GIAC devices. On the other hand, LIAC discovery mode means I want to be discovered for a short period of time, as requested by my user. Devices that provide on-demand connectivity will fall into this category. Examples are multiple player game consoles, mobile modems, and our Chat program. The device discovery and service discovery processes are performed in an asynchronous manner. A Bluetooth application must provide a callback object for the JABWT implementation to notify when devices or services are found. This callback object implements the DiscoveryListener interface. When a device is found, the deviceDiscovered() method is invoked. We do some basic filtering to narrow down the candidate devices for our Chat application and ignore other unrelated devices. When all candidate devices are discovered, the device search is completed and the searchCompleted() method is invoked. We initiate the service discovery process using DiscoveryAgent .searchServices(). This is where the ServiceRecord attributes become useful. ServiceRecord is not only a description of the services, but also a query of constraints during service discovery. The second parameter of searchServices() allows us to specify which attributes and values the services must have in order for us to discover them. We can provide the UUID for the service that we registered earlier and it narrows down the exact matching candidate services on a remote device. This mechanism not only improves the performance of the discovery process, but also reduces the possibility of conflict. Once the desired service (Chat service) is found, we can retrieve the corresponding connection URL and establish the physical connection. To further validate that the connected service is indeed a Chat service, we immediately perform a handshake with the other party by sending a handshake signal (SIGNAL_HANDSHAKE) and exchanging the user screen name. Receiving parties must respond with an acknowledgment (SIGNAL_HANDSHAKE_ACK) to confirm the request.. To logically represent all the parties in the chat room, we introduce class EndPoint. From the application-level perspective, an endpoint encapsulates information for each actively connected Chat user and device. Chat uses EndPoint to identify which user to send a message to, and from which user a message is received. This abstraction allows us to hide the JABWT complexity from the GUI application. Endpoints are created when a connection is established between two Chat devices. Once created, we attach a reading thread and sending thread to the endpoint to manage the traffic between two endpoints. From this point on, two endpoints exchange user-entered messages (using SIGNAL_MESSAGE) until a termination signal is received. Implementation of this protocol can be found in the Reader and Sender classes. When a user exits Chat, the application sends the last message a termination token (SIGNAL_TERMINATE) to all connected parties. This token signals that the endpoint is no longer active. All receiving parties must return an acknowledgment (SIGNAL_TERMINATE_ACK) and remove the leaving endpoint from the active endpoint list. An endpoint can also be removed when the connectivity is dropped, which suggests the user has left the chat room without an explicit exit command (possibly due to a users walking away from the Bluetooth effective range). Our GUI, based on the MIDP LCDUI API, provides a simple interface to send and receive messages. All received messages from all connected users are displayed sequentially on the screen, which creates a virtual chat room environment. When there are more messages to display than can fit onto one screen, older messages will roll off the upper edge. In this example application, users are not able to scroll back to see the past messages. Pressing the Write command takes users to a message-editing mode. Pressing the Send command sends the currently entered message to the chat room; all other connected users are able to see the message. To quit the chat room, pressing the Exit command sends a termination token to all other parties. 1.5 Literature Survey There are a number of related research projects related to the music sharing. Their similarities and differences from our project are described as follows. tunA [TUNA, 2004], researched by Media Lab Europe is probably the closest relative of our system. It explored the possibilities of a system which enables people to share their music and to communicate with others nearby while they are on the go. tunA focuses on synchronized music sharing while our system focuses on personalized music sharing. Soundpryer [SOUNDPRYER, 2002], made by the Mobility Studio of the Interactive Institute in Sweden which focuses on a shared music experience between nearby cars and focuses on personal mobile music uses in urban settings. Unlike our system, Soundpryer does not include tight synchronization of that shared audio as part of their concept and implementation, and users do not choose which cars they are connected to. Sotto Voce [SottoVoice, 2002], a Xerox PARC project, is an electronic guidebook which attempts to promote a shared activity between museum visitors by allowing them to eavesdrop on the descriptive audio passages that another is listening to. The system is a hack in that no content is streamed all devices have identical local content. Bubbles [Bubbles, 2003], a Telenor RD project, is a mobile audio player that allows users to exchange audio files with nearby peers. It functions much like a mobile file trading application: Users swap files over HTTP but there is no infrastructure to join the audio experience among those users. Push!music [PUSH, 2005], a software developed on PDAs, which focuses on the concept of media ecology, using agents to make songs migrate from one device to another in accordance to users music consumption habits. The methodology in A peer to peer network file sharing system in mobile phones is going to focus on mobile file sharing system. The mobile file sharing system allows users to share their resources like images, text, audio files without any aid of the central server. This system not only allows people to share their files to stranger but also identified the mobile devices in the mobile social network. CHAPTER II OVERVIEW OF THE SYSTEM 2.1 System Preliminary Design The Wireless Service subsystem will let mobile phones communicate with each other when they are in range. Since the devices use Bluetooth protocol which is a radio communications system, so they do not have to be in line of sight of each other, and can even be in other rooms, as long as the received transmission is powerful enough. There are three types of power class dependent with different ranges: 1 metre, 10 metres, 100 metres. The model that the Wireless Service subsystem uses for communication is a Client-Host architecture illustrated in figure. The role of a Host can communicate with up to 7 devices playing the role of a Client using Wireless Service Subsystem. The Host refers to Tune-in Host subsystem and Client refers to Tune-in Client subsystem. This network with a group of up to 8 devices (1 Host + 7 Clients) is called a piconet. A piconet is an ad-hoc computer network of devices using Bluetooth technology protocols to allow one host device to interconnect with up to seven active client devices (because a three-bit MAC address is used). Up to 255 further Client devices can be deactivated, or parked, which the Host device can bring into active status at any time. At any given time, data can be transferred between the Host and one Client, but the Host switches rapidly from Client to Client in a round-robin fashion. To set up a connection, a Client can would perform an inquiry to find any available device to connect, and any Host can be configured to respond to such inquiries. Tune-in Host requires its owner to accept but the connection itself can be held until it goes out of range. With the use of mobile file sharing system, it can create ad-hoc mobile social network which allows people to share the music experience, image and chat with the strangers surrounding. Person can listen to their own music just like an iPod or portable MP3 player, but they can also tune in and listen to what other people are listening to on their mobile phone using Bluetooth. This enables someone to be, for example, sitting across a train or a bus from someone they are tuned into, and each person could be nodding heads, gesturing, or dancing in perfect synchrony, just as if they were both listening to the same standard FM radio station. We believe that listening to the same song in synchrony could better enable people to feel like they are part of a community even if they are strangers to each other. Chat: User searches and joins any existing chat host within the Bluetooth effective range, or creates a new chat room if its the first active Chat in that range. We use the words chat room to represent a virtual chat room thats formed by a network of Chat applications Sharing songs: User can share the songs through mobile phone connected wirelessly among people who happen to be in the same physical space. If a user is listening to a particular song, other users nearby can connect and listen to the same song at the same time. Audio Synchronization: The audio stream timing/delay algorithm enables the audio playback to be perfectly synchronized on the source and any destination devices, so that people tuned into a particular persons device can be listening to exactly what the other person is listening to. Ad-hoc Bluetooth Network Connectivity: Mobile devices embedded with Bluetooth can communicate and share audio via adhoc Bluetooth wireless network connections. Personal Profile: Users can store personal profile information in their programs and set permissions for which parameters can be shared with other people that might be tuning in. 2.2 Functionality 2.3 Feasibility Study 2.4 System Plan 2.5 Hardware Specifications Processor Type: Pentium IV Speed: 1.6 GHz Ram: 256 MB RAM Hard Disk Drive: 40 GB Network Adapter: Bluetooth Dongle 2.6 Software Specifications Operating System: Windows Programming Language: JAVA, J2ME Tools : Sun Java Wireless Toolkit CHAPTER III DESIGN OF THE SYSTEM 3.1 Architectural Design Architecture of the System File Sharing System is GUI Interface in order to make the system more user friendly. It allow user to View images, Text, play music using Audio Player, tune-in to other devices and profile setting. Image is used to transfer the images across the network from the host to the client which is in need of it. And the chat application is used to create a communication link between the host and the client so that they share the information between them. Audio Player controls the rendering of time based media data. It provides the methods to manage the Players life cycle, controls the playback progress, allows user to control media. The Buffer Handler will be used as a data source for Audio Player to play media. File Access System accesses to local drive of users mobile phone to acquire music. The acquired music will be stored in a buffer. This Buffer Handler provides information regarding the music. The Wireless Service, Tune-in Client and Tune-in Host can detect and locate the nearby devices. Tune-in Host is used by the device which shares file and send the buffer to the connected Tune-in Client. Tune-in Client is used to search for the nearby devices which are based on the users music preference. 3.2 Modular Design The following modules are to be developed to design a peer to peer mobile file sharing system in a mobile phone, Module 1 : File Sharing System Module 2 : Chat Application Module 3 : Tune In System Module 4 : Personal Profile File Sharing System In this module Mobile File sharing system is illustrates how a host can select music from local mobile phone in localized mobile adhoc network and listening the music, how a host can transfer images to the near by client. A user can access the media control in this system. Chat Tune In System In this module how a client can search the nearby mobile phone available for connecting using Bluetooth. A user can view the hosts profile or Tune in to the hosts music. Defining the Use Case Model Use case modeling is a way to elicited and document requirements. The use case model provides a prime source for objects and classes. This will be the primary input to the functional, non-functional requirements and class modeling we define in later section. Typically, Use case modeling proceeds as follows Find a candidate system boundary Find the actors Find the use cases There are four components of this model. i. System boundary: a box drawn around the use cases to denote the edge or boundary of the system being modeled ii. Actors: roles played by people or things that use the system iii. Use cases: things that the actors can do with the system iv. Relationships: meaningful relationships between actors and use cases We will first identify the system boundary in the system by actors and use cases. Use cases will be identified by use case diagrams. As we find the actors and use cases, the system boundary will become more and more sharply defined. In this way, the use case model for our music sharing system will be constructed. 3.3 UML Diagrams CHAPTER IV IMPLEMENTATION AND TESTING 4.1 Modules Implementation 4.2 Testing CHAPTER V RESULTS AND DISCUSSION 5.1 Expected and obtained results 5.2 Results Analysis 5.3 Screen Shots CHAPTER VI CONCLUSION AND FUTURE WORK 6.1 Conclusion 6.2 Future Work The choice of technologies for the implementation of this File Sharing System should make it feasible to port it to another J2ME version, probably the future version. Two latest base configurations in J2ME are used to develop the system. The latest versions of Connected Limited Device Configuration (CLDC) are version 1.1 and Mobile Information Device Profile (MIDP) are version 2.0. They define a core set of the Java API for applications running on small devices with limited capabilities like mobile phones, and personal digital assistants (PDAs). In addition, the system has been divided into a number of subsystems like images, chat music where each subsystem focuses on a different aspect of the functionality of the system as a whole. If a particular functionality of the system need to be modified, only the corresponding subsystem is need to be modified. 6.2 Using other Wireless Protocols Our system uses Bluetooth as a wireless protocol, but the idea of sharing music in a wireless network can be extended to the use of other wireless protocols. One of the interesting wireless protocols is General Packet Radio Service (GPRS). GPRS can be a key for the Mobile Music Sharing system to succeed since its penetration is high. Nearly every mobile in the market support GPRS and GPRS services like MMS and WAP are broadly used nowadays. To use this instead, it would be necessary to re-implement the Wireless Service Subsystem. Point-to- point (PTP) service will be used to discover an active device and peer-to-peer music transfer. Another interesting wireless protocol that can be considered is Wi-Fi. Wi-Fi allows connectivity in peer-to-peer mode, which enables devices to connect directly with each other and transfer music with higher bandwidth than Bluetooth and GPRS. CHAPTER VII REFERENCES [1] Bassoli, A., Cullinan, C., Moore, J. and Agamanolis, S., TunA: a Mobile Music Experience to foster local interactions, poster at Ubicomp 2003, Seattle, USA [2] Fredrik Axelsson, Mattias stergren, SoundPryer: Joint Music Listening on the Road, presented inthe international workshop on mobile music technology, 2004. [3] Maria Hakansson, Mattias Jacobsson, Lars Erik Holmquist, Designing a Mobile Music Sharing System Based on Emergent Properties, on aug 05. [4] Klemm A, LIndemann C, Waldhorst O.P, A Special purpose peer to peer file sharing system on mobile adhoc network, in IEEE Vehicular Conference in oct 04.