Solved

interface

Posted on 2002-03-06
3
200 Views
Last Modified: 2010-04-26
can you connect a PC to cell phone and connect to the internet ? or make call ?
0
Comment
Question by:drive491
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Author Comment

by:drive491
ID: 6846529
whats the name of the interface ?
0
 
LVL 4

Expert Comment

by:1175089
ID: 6846618
You can use IrDA to communicate between devices /PC<-> Cell phone/. I use Motorola P7389 with IrDA interface. You must load appropriate driver and your PC will find the phone like as modem. This is a sample from the motorola's .INF file:
---------------------------------------
; Windows Modem Setup File
; Copyright (c) 1993-1995 Microsoft Corporation
; Manufacturer: Motorola
; version 0.3, modified 12-13-99 by KFV and CLS

[Version]
Signature="$CHICAGO$"
Class=Modem
Provider=%Mfg%
ClassGUID={4D36E96D-E325-11CE-BFC1-08002BE10318}

[Manufacturer]
%Mfg% = Models

[Models]
%Modem1% = Modem1, INFRARED\MOT0001
%Modem2% = Modem2, INFRARED\MOT0002

...
0
 
LVL 11

Accepted Solution

by:
RoadWarrior earned 300 total points
ID: 6846983
Many Nokia phones have a built in serial bus that lets one use the phone digitally with a software modem package and special adapter cord. The adapter cord has a rs232 converter in and plugs into the bus of the phone and the serial port of the PC.

Another way of using a cellphone is to have a PCMCIA (PC CARD) celllphone modem, these hook into the handsfree phone sockets, you will need an adapter according to which phone you haver, I believe these only work with analogue phones.

regards,

Road Warrior

 
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question