0% found this document useful (0 votes)
166 views16 pages

Mobile Computing

Mobile computing involves various components of wireless communication including antennas, transmitters, receivers, filters, and amplifiers. A cellular network uses base stations and cells to allow communication as a user moves between areas. Common telecommunication networks include local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). Wireless networking standards like 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac define protocols for wireless transmission speeds and frequencies. WLAN architecture uses basic service sets (BSS) connected by an extended service set (ESS) through an access point and distribution system.

Uploaded by

Abir Chowdhury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
166 views16 pages

Mobile Computing

Mobile computing involves various components of wireless communication including antennas, transmitters, receivers, filters, and amplifiers. A cellular network uses base stations and cells to allow communication as a user moves between areas. Common telecommunication networks include local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). Wireless networking standards like 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac define protocols for wireless transmission speeds and frequencies. WLAN architecture uses basic service sets (BSS) connected by an extended service set (ESS) through an access point and distribution system.

Uploaded by

Abir Chowdhury
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Mobile Computing

1. Explain various components of Wireless Communication ?


1) Antennas - An antenna is a group of metal conductors or elements which are connected to the transmitter or
receiver that convert the electrical current moving in metal conductors to electromagnetic waves or radio waves.
2) Transmitter - It modulates, encodes several base-band signals into higher frequency analog carrier signals.
3) Receiver - It receives modulated signals and reverses the transmitter functions and recovers the base-band
signals.
4) Filters - Rejects unwanted signals like interfering signals lying outside the operating band.
5) Mixers - It is used to achieve frequency conversion at transmitter and receiver.
6) Amplifier - Amplifies the voltage of the signal.
2. What is Celular Network ?
A cellular network is a radio network spread out over land in the form of cells, each of which has a base station
permanently installed. Together, these cells offer broader geographic radio coverage. Therefore, even when the
user equipment (UE), like a mobile phone, is moving through cells during transmission, communication is still
possible.
3. What are the various types of Telecommunication Networks ?
1. LAN: LAN is a local area network and designed for small areas like an office, group of buildings, or a
factory. LANs are used widely because it is easy to design and to troubleshoot. The PCs and the workstations
are connected through the LAN.
2. WAN: WAN is a wide area network that can be private or it can be public leased. It’s used for the network
that covers large distances like cover states of a country. Networks that cover a large city or metropolitan area
also can be included in this category.
3. MAN: MAN is quite a bigger version of LAN. It’s also called Metropolitan Area Network and uses similar
technology as LAN. It’s designed to extend over the whole city. It often means connecting several LANs into a
bigger network or is often one cable.
4. Explain Intranet and Extranet ?
Intranets is a telecommunication network that is designed to be open, but is secured with internal networks
whose web browsing software provides easy point-and-click access by their users to multimedia information on
the internal internet sites.
Whereas Extranets are also a telecommunication network that links intranet resources of a company with other
organizations and individuals.
5. Explain Architecture of Mobile Telecommunication ?
6. Explain Wireless Networking Standards ?
802.1x : This standard enhances the security of local area networks by providing an authentication framework
allowing users to authenticate to a central authority, such as LDAP or Active Directory. In conjunction with
802.11 access technologies, it provides an effective mechanism for controlling access to the wireless local area
network.
802.11a : An extension to the 802.11 standard developed by the IEEE for wireless network technology.
802.11a applies to wireless local area networks and supports a maximum a maximum connect rate of 54 Mbps
throughput in the 5GHz band. This specification is not backwardly compatible with 802.11b/g and requires
special wireless adapters.
802.11b : An extension to the 802.11 standard developed by the IEEE for wireless network technology.
802.11b applies to wireless local area networks and supports a maximum connect rate of 11 Mbps with fallback
to 5.5, 2, and 1 Mbps in the 2.4GHz ISM band. This standard was ratified in 1999.
802.11g : An extension to the 802.11 standard that allows for a maximum connect rate of 54 Mbps while
maintaining compatibility with the 802.11b standard in the 2.4GHz band This specification is compatible and
complimentary to the 802.11b standard.
802.11i : An extension to the 802.11 standard to provide improved security over that which is available under
802.11 extensions. This extension provides for improved encryption methods and for the integration of the
IEEE 802.1x authentication protocol as well as advanced encryption mechanisms such as AES (Advanced
Encryption Standard), for an optional, fully compliant implementation of 802.11i.
802.11n : Uses multiple transmitter and receiver antennas (also known as multiple-input and multiple-output,
or MIMO) to allow for increased data throughput and range. This standard was ratified in 2009. Pre-standard
hardware is commercially available and not compatible with PittNet Wi-Fi.
The following table summarizes the current 802.11 standards that are used in our times –

Standard Frequency Max speed


802.11 2.4 GHz 2 Mbps
802.11a 5 GHz 54 Mbps
802.11b 2.4 GHz 11 Mbps
802.11g 2.4 GHz 54 Mbps
802.11n 2.4 or 5 GHz 600 Mbps
802.11ac 5 GHz 1 Gbps

7. What is WEP ?
Wired Equivalent Privacy (WEP) : A security protocol for wireless networks defined within the
802.11b standard. WEP is designed to provide the same level of security as that of a wired network.
Recent reports indicate that the use of WEP alone is insufficient to ensure privacy unless used in
conjunction with other mechanisms for data encryption.
8. What is WPA ?
WPA : Short for Wi-Fi Protected Access, a Wi-Fi standard that was designed to improve upon the
security features of WEP. This technology features improved data encryption through the temporal
key integrity protocol (TKIP) and user authentication through the extensible authentication protocol
(EAP), PEAP – MSChapV2. PittNet Wi-Fi utilizes the WPA protocol.
9. What is Ad Hoc Network Architecture ?
 If there is no access point in WLAN architecture then it will be adhoc architecture.
 It have stand alone network.
 It cannot sends data to other BSS.
 In adhoc architecture, stations can locate the another stations in same BSS but can communicate only if they have
agreement between them.
 It is a peer to peer network topology.
10. Explain WLAN Architecture ?
 Stations: Stations are network components that communicate wirelessly. They might be access points or
endpoints, and each has its own network address.
 Basic Service Set (BSS): It is the Building Block of WLAN. BSS is a set of all stationsthat can communicate
with each other at physical layer. Every BSS has an BSSID which is the MAC address of the access point
servicing the BSS.
 Extended Service Set(ESS): An Extended Service Set (ESS) is a collection of connected BSSs that
communicate with each other. Access Point in an ESS are connected by distributed system. Each ESShas an
SSID which is a 32byte(max) character string.
 Distribution system : In an ESS, the distribution system connects access points. Wired or wireless connectivity
are available. Mesh or its own WDS protocol can be used by a wireless distribution system (WDS). Fixed
wireless is a type of radio transmission used to connect two geographically separated access points.
 Access point : The base station that serves as a connection point for other stations is known as the access
point. The term "access" refers to the stations' network connection, but it could also refer to internet access
because many routers also function as modems. Ethernet cables or wireless connections can be used to
connect access points in an ESS.
11. Advantage and Disadvantages of WLAN ?

Advantages of WLANs
o Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio waves can
penetrate walls, senders and receivers can be placed anywhere.
o Planning: Only wireless ad-hoc networks allow for communication without previous planning, any wired
network needs wiring plans.
o Design: Wireless networks allow for the design of independent, small devices which can for example be
put into a pocket. Cables not only restrict users but also designers of small notepads, PDAs, etc.
o Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc. whereas, networks
requiring a wired infrastructure will usually break down completely in disasters.
o Cost: The cost of installing and maintaining a wireless LAN is on average lower than the cost of installing
and maintaining a traditional wired LAN.
o Ease of Use: Wireless LAN is easy to use and the users need very little new information to take advantage
of WLANs.
Disadvantages of WLANs
o Quality of Services: Quality of wireless LAN is typically lower than wired networks. The main reason for
this is the lower bandwidth due to limitations is radio transmission, higher error rates due to interference
and higher delay/delay variation due to extensive error correction and detection mechanisms.
o Proprietary Solutions: Due to slow standardization procedures, many companies have come up with
proprietary solutions offering standardization functionality plus many enhanced features. Most components
today adhere to the basic standards IEEE 802.11a or 802.11b.
o Restrictions: Several govt. and non-govt. institutions world-wide regulate the operation and restrict
frequencies to minimize interference.
o Global operation: Wireless LAN products are sold in all countries so, national and international
frequency regulations have to be considered.
o Low Power: Devices communicating via a wireless LAN are typically power consuming, also wireless
devices running on battery power. Whereas the LAN design should take this into account and implement
special power saving modes and power management functions.
o License free operation: LAN operators don't want to apply for a special license to be able to use the
product. The equipment must operate in a license free band, such as the 2.4 GHz ISM band.
o Robust transmission technology: If wireless LAN uses radio transmission, many other electrical devices
can interfere with them (such as vacuum cleaner, train engines, hair dryers, etc.).Wireless LAN
transceivers cannot be adjusted for perfect transmission is a standard office or production environment.

12. What are the applications of WLAN ?


Wireless LANs have many applications in the real world. They are frequently used to enhance a
wired network, not to completely replace them. The following describes some of the applications
that are made possible through the power and flexibility of wireless LAN technology.

Healthcare : Doctors and nurses equipped with laptops or PDAs have faster access to patient
data. Furthermore, in an emergency situation they can communicate with other departments
within the hospital by using WLAN in order to provide quick diagnostics. This is an area where
WLAN is allready relatively widely used. As in a majority of cases, WLAN is used to enhance an
allready existing wired network.
Conducting everyday business : In business, people can work productively with customers or
suppliers in meeting rooms - there is no need to leave the room to check if important emails have
arrived or print big files. Instead you can send them from one laptop to another. Senior executives
in meetings can make quicker decisions because they have access to real-time information.
Network managers in older buildings : Network managers in older buildings, such as schools,
hospitals, and warehouses, find WLANs to be a most cost-effective infrastructure solution. When
building a new network or expanding the old in-house network, few if any cables need be drawn
thru the walls and ceilings.
Network managers in dynamic environments : Network managers in dynamic environments
minimize the cost of moves, network extensions, and other changes by eliminating the cost of
cabling and installation. The mobile nature of WLAN allows the building and testing of a new
network before moving to mission-critical surroundings.
13. What are the difference between LAN and WLAN ?

Key LAN WLAN


Stands for LAN stands for Local Area Network. WLAN stands for Wireless Local
Area Network.
Connection LAN connections include wired as well as WLAN connections are
Type wireless connection technologies. completely based on wireless
technology.
Cost LAN connections are less expensive and more WLAN connections are more
secure than the wireless connections of WLAN. expensive and considered less
secure than wired connections.
Complexity It is relatively complex to set up a LAN. One It is relatively simple to configure
needs to connect several network devices such and set up a WLAN.
as routers and switches with the help of Ethernet
cables.
Performance LANs provide good performance and the impact WLAN provides high
of weather is limited. performance but may get
impacted in bad weather.
Mobility A LAN has limited mobility. It needs Ethernet to WLAN is highly mobile in
connect devices. nature. No Ethernet is required to
connect the devices to a WLAN.
Interruption LAN connections cannot be interrupted easily. WLAN connections can be
interrupted easily.
Examples Desktops, laptops connected to LAN in an Desktops, laptops connected on
office. WiFi or hotspot based networks.

14. What are the Difference between Wireless Networking and Mobile Computing ?

Wireless Networking Mobile Computing


Wireless refers to the method of transferring Mobile computing refers to computing
information between a computing device and devices that are not restricted to a desktop.
a data source, without a physical connection.
Wireless computing is simply data Mobile computing essentially refers to a
communication without the use of a landline. computing device that is not always
connected to a central network.
Involve a cellular telephone, a two way radio, Include laptops, newly created smart phones
a fixed wireless connection, a laser, or and also PDA’s.
satellite communications
Computing device is continuously connected Communicate with a base location, with or
to the base network. without, a wireless connection.

15. Explain the Characteristics of Mobile Computing ?


1) Portability
2) Social Interactivity
3) Context Sensitivity
4) Connectivity
5) Individual
6) Small Size
7) Wireless Communication
16. What is Bluetooth ?
Bluetooth is an universal for short range wireless voice and data communication. It is a Wireless Personal Area Network
(WPAN) technology and is used for exchanging data over smaller distances. This technology was invented by Ericson in
1994. Bluetooth simply follows the principle of transmitting and receiving data using radio waves. It can be paired with
the other device which has also Bluetooth on but it should be within estimated communication range to connect. When
two devices starts to share data, they form a network called piconet which can further accommodate more than five
devices. Bluetooth Transmission capacity 720 kbps.
17. Explain Bluetooth Protocol Stack ?
 Core protocols − This includes Bluetooth radio, Baseband, Link Manager Protocol (LMP),
Logical Link Control and Adaptation Protocol (L2CAP), and Service Discovery Protocol (SDP).
 Cable Replacement Protocol − This includes Radio Frequency Communications (RFComm)
protocol. It is short for Radio Frontend Component. It provides a serial interface with WAP.
 Adopted Protocols − These are the protocols that are adopted from standard models. The
commonly adopted protocols used in Bluetooth are Point-to-Point Protocol (PPP), Internet
Protocol (IP), User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and
Wireless Application Protocol (WAP).
 AT Commands − ATtention command set.
The following diagram shows the Bluetooth protocol stack −

 Radio − This is a physical layer equivalent protocol that lays down the physical structure and
specifications for transmission of radio waves. It defines air interface, frequency bands, frequency
hopping specifications and modulation techniques.
 Baseband − This protocol takes the services of radio protocol. It defines the addressing scheme,
packet frame format, timing, and power control algorithms.
 Link Manager Protocol (LMP) − LMP establishes logical links between Bluetooth devices and
maintains the links for enabling communications. The other main functions of LMP are device
authentication, message encryption, and negotiation of packet sizes.
 Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP provides adaption between
upper layer frame and baseband layer frame format. L2CAP provides support for both
connection-oriented as well as connectionless services.
 Service Discovery Protocol (SDP)− SDP takes care of service-related queries like device
information so as to establish a connection between contending Bluetooth devices.
18. What are the characteristics of Mobile Computing ?
1. Portability - The Ability to move a device within a learning environment or to different environments with ease.
2. Social Interactivity - The ability to share data and collaboration between users.
3. Context Sensitivity - The ability to gather and respond to real or simulated data unique to a current location,
environment, or time.
4. Connectivity - The ability to be digitally connected for the purpose of communication of data in any environment.
5. Individual - The ability to use the technology to provide scaffolding on difficult activities and lesson customization for
individual learners.
6. Small Size - Mobile devices are also known as handhelds, palmtops and smart phones due to their roughly phone-like
dimensions. A typical mobile device will fit in the average adult's hand or pocket.
7. Wireless Communication - Mobile devices are typically capable of communication with other similar devices, with
stationary computers and systems, with networks and portable phones.
19. Explain Mobile Computing Application Structure ?

Each tier is distributed to a different place or places in a network. These tiers do not necessarily
correspond to physical locations on various computers on a network, but rather to logical layers of
the application.
1. Presentation Layer (UI):
o This layer presents data to the user and optionally permits data manipulation and
data entry, also this layer requests the data form Business layer.
o This layer accomplished through use of Dynamic HTML and client-side data
sources and data cursors.
2. Application Layer (AL):
o The business logic acts as the server for client requests from workstations. It acts
according Business rules fetch or insert data through the Data Layer.
o In turn, it determines what data is needed (and where it is located) and acts as a
client in relation to a third tier of programming that might be located on a local or
mainframe computer.
o Because these middle-tier components are not tied to a specific client, they can be
used by all applications and can be moved to different locations, as response time
and other rules require.
3. Data Access Layer (DA):
o The third tier of the 3-tier system is made up of the DBMS that provides all the data
for the above two layers.
o This is the actual DBMS access layer.
o Avoiding dependencies on the storage mechanisms allows for updates or changes
without the application tier clients being affected by or even aware of the change.

20. What is Cellular Mobile Communication ? Explain its features ?


Cellular network is an underlying technology for mobile phones, personal communication systems, wireless networking
etc. The technology is developed for mobile radio telephone to replace high power transmitter/receiver systems. Cellular
networks use lower power, shorter range and more transmitters for data transmission.
Features of Cellular Systems
Wireless Cellular Systems solves the problem of spectral congestion and increases user capacity. The
features of cellular systems are as follows −
 Offer very high capacity in a limited spectrum.
 Reuse of radio channel in different cells.
 Enable a fixed number of channels to serve an arbitrarily large number of users by reusing the channel
throughout the coverage region.
 Communication is always between mobile and base station (not directly between mobiles).
 Each cellular base station is allocated a group of radio channels within a small geographic area called a cell.
 Neighbouring cells are assigned different channel groups.
 By limiting the coverage area to within the boundary of the cell, the channel groups may be reused to cover
different cells.
 Keep interference levels within tolerable limits.
 Frequency reuse or frequency planning.
 Organization of Wireless Cellular Network.
21. Advantages of Hexagon Cell over a square cell ?
SQUARE:
A square cell has four neighbors at distance d and four at distance Root 2 d
 Better if all adjacent antennas equidistant
 Simplifies choosing and switching to new antenna
A hexagon cell shape is highly recommended for its easy coverage and calculations. It offers the
following advantages –

 Provides equidistant antennas


 Distance from center to vertex equals length of side

22. Describe Generations of Cellular Communication Generations ?


1G (1st Generation):
 First-time calling was introduced in mobile systems.
 It used analog signals.
 It used an FDD scheme and typically allocated a bandwidth of 25 Mhz.
 The coverage area was small.
 No roaming support between various operators.
 Low sound quality.
 Speed:- 2.4 kbps.
2G (2nd Generation) :
 Shifted from analog to digital.
 It supported voice and SMS both.
 Supported all 4 sectors of the wireless industry namely Digital cellular, Mobile Data, PCS,
WLAN,
 Moderate mobile data service.
 2G WLAN provided a high data rate & large area coverage.
 Speed:- 64 kbps.
2.5G came after 2G which used the concept of GPRS. Streaming was also introduced and mail
services too. Then came 2.75G or EDGE which was faster in providing services than 2.5G. It gave
faster internet speed up to 128kbps and also used edge connection.
3G (3rd Generation) :
 The Internet system was improved.
 Better system and capacity.
 Offers high-speed wireless internet.
 The connection used was UMTS and WCMA.
 Speed:- 2mbps.
4G (4th Generation) :
 IP-based protocols.
 LTE (Long term evaluation) was mainly for the internet.
 Vo-LTE (Voice over LTE) is for both voice and the internet.
 Freedom and flexibility to select any desired service with reasonable QoS.
 High usability.
 Supports multimedia service at a low transmission cost.
 HD Quality Streaming.
 Speed:-100mbps.
5G (5th Generation):
 Higher data rates.
 Connectivity will be more fast and more secure,
 Data Latency will be reduced to a great level.
 Massive network capacity.
 It is 30 times faster than 4G.
 There would be more flexibility in the network.
23. What is GSM ?
GSM stands for Global System for Mobile Communication. GSM is an open and digital cellular technology used for
mobile communication. It uses 4 different frequency bands of 850 MHz, 900 MHz, 1800 MHz and 1900 MHz . It uses the
combination of FDMA and TDMA.
Features of GSM are :

 Supports international roaming


 Clear voice clarity
 Ability to support multiple handheld devices.
 Spectral / frequency efficiency
 Low powered handheld devices.
 Ease of accessing network
 International ISDN compatibility.
 Low service cost.
 New features and services.
24. What are the services of a GSM ?
Teleservices
The abilities of a Bearer Service are used by a Teleservice to transport data. These services are further transited in the
following ways −
Voice Calls: The most basic Teleservice supported by GSM is telephony. This includes full-rate speech at 13 kbps and
emergency calls, where the nearest emergency-service provider is notified by dialing three digits.
Videotext and Facsmile: Another group of teleservices includes Videotext access, Teletex transmission, Facsmile
alternate speech and Facsmile Group 3, Automatic Facsmile Group, 3 etc.
Short Text Messages: Short Messaging Service (SMS) service is a text messaging service that allows sending and
receiving text messages on your GSM mobile phone. In addition to simple text messages, other text data including news,
sports, financial, language, and location-based data can also be transmitted.
Bearer Services
Data services or Bearer Services are used through a GSM phone. to receive and send data is the essential building block
leading to widespread mobile Internet access and mobile data transfer. GSM currently has a data transfer rate of 9.6k.
New developments that will push up data transfer rates for GSM users are HSCSD (high speed circuit switched data) and
GPRS (general packet radio service) are now available.
Supplementary Services
Supplementary services are additional services that are provided in addition to teleservices and bearer services. These
services include caller identification, call forwarding, call waiting, multi-party conversations, and barring of outgoing
(international) calls, among others. A brief description of supplementary services is given here –

Conferencing, Call Waiting, Call Hold, Call Forwarding, Call Barring, Number Identification,
Advice of Charge (AoC), Closed User Groups (CUGs), supplementary services data (USSD)
25. Describe the Architecture of GSM ?

The GSM architecture is made up of three central systems. The following are the primary
components of the GSM architecture:

1. BSS : BSS stands for Base Station Subsystem. BSS handles traffic and signaling between a
mobile phone and the network switching subsystem. BSS having two
components BTS and BSC.
2. NSS : NSS stands for Network and Switching Subsystem. NSS is the core network of GSM.
That carried out call and mobility management functions for mobile phone present in network.
NSS have different components like VLR, HLR and EIR.
3. OSS : OSS stands for Operating Subsystem. OSS is a functional entity which the network
operator monitor and control the system. OMC is the part of OSS. Purpose of OSS is to offer
the customer cost-effective support for all GSM related maintenance services.
 MS : MS stands for Mobile System. MS comprises user equipment and software needed for communication with
a mobile network.
 BTS : BTS stands for Base Transceiver Station which facilitates wireless communication
between user equipment and a network. Every tower has BTS.
 BSC : BSC stands for Base Station Controller. BSC has multiple BTS. You can consider
the BSC as a local exchange of your area which has multiple towers and multiple towers
have BTS.
 MSC : MSC stands for Mobile Switching Center. MSC is associated with communication
switching functions such as call setup, call release and routing. Call tracing, call forwarding
all functions are performed at the MSC level. MSC is having further components like
VLR, HLR, AUC, EIR and PSTN.
 VLR : VLR stands for Visitor Location Register. VLR is a database which contains the
exact location of all mobile subscribers currently present in the service area of MSC. If you
are going from one state to another state then your entry is marked into the database of
VLR.
 HLR : HLR stands for Home Location Register. HLR is a database containing pertinent
data regarding subscribers authorized to use a GSM network.. If you purchase SIM card
from in the HLR. HLR is like a home which contains all data like your ID proof, which
plan you are taking, which caller tune you are using etc.
 OMC : OMC stands for Operation Maintenance Center. OMC monitor and maintain the
performance of each MS, BSC and MSC within a GSM system.
 AUC : AUC stands for Authentication Center. AUC authenticates the mobile subscriber
that wants to connect in the network.
 EIR : EIR stands for Equipment Identity Register. EIR is a database that keeps the record
of all allowed or banned in the network. If you are banned in the network them you can’t
enter the network, and you can’t make the calls.
 PSTN : PSTN stands for Public Switched Telephone Network. PSTN connects with MSC.
PSTN originally a network of fixed line analog telephone systems. Now almost entirely
digital in its core network and includes mobile and other networks as well as fixed
telephones. The earlier landline phones which places at our home is nothing but PSTN.

26. Describe Security in GSM ?


GSM allows three-band phones to be used seamlessly in more than 160 countries. In GSM, security is implemented in
three entities:
1) Subscriber identity module (SIM) contains authentication key Ki (64-bit), ciphering key (Kc) generating algorithm, and
authentication algorithm. SIM is a single chip computer containing the operating system (OS), the file system, and
applications. SIM is protected by a PIN and owned by an operator. SIM applications can be written with a SIM tool kit.
2) GSM handset contains ciphering algorithm.
3) Network uses algorithms and IDs that are stored in the authentication center.
Degree of security in GSM is higher basic security mechanisms are:
a) Access control and authentication :It prevents access by unregistered users.
b) Encryption: It prevents unauthorized listening.
c) Confidentiality: It prevents subscriber’s location discloser.
27. Describe GPRS ?
General Packet Radio Service (GPRS) is a packet-based mobile data service on the global system for mobile
communications (GSM) of 3G and 2G cellular communication systems. It is a non-voice, high-speed and useful packet-
switching technology intended for GSM networks.
Advantages
 High-speed: GPRS offers an optimum speed of 171.2 kbps, which is almost three times quicker than the
data transfer speed of fixed telecommunications networks. Also, it is ten times faster than the existing GSM
network services
 Instant connection and immediate data transfer: GPRS provides instantaneous and steady connections,
which permit data to be sent wherever and whenever required
 Cost-effective solution: Minimizes the incremental expenditure required for providing data services. This
in turn enables increase in the penetration of data services amongst business and consumer users
Goals Of GPRS:
 Consistent IP services
 Leverage industry investment in IP
 Open Architecture
 Service innovation independent of infrastructure
Services Offered:
 SMS messaging and broadcasting
 Push-to-talk over cellular
 Instant messaging and presence
 Multimedia messaging service
 Point-to-Point and Point-to-Multipoint services
28. Explain Architecture of GPRS ?

In GSM architecture there is one component called BSC. But in GPRS there is one component is added to BSC called
PCU. PCU stands for Packet Control Unit. If signal comes to BSC and that signal contains data, then PCU routes to the
SGSN. Interface is used between BSC and PCU is FRI interface. After signal comes to SGSN, it delivers the data packet
to the GGSN. GGSN routes the data packet to the data network (PDN- Predefined Data Network).

Task of SGSN :
1. Packet Delivery
2. Mobility management
 apply/ sign off of terminals
 localization
3. LLC (Logical Link Control) management
4. Authentication
5. billing
Task of GGSN :
1. Mediator between GPRS between backbone and external data networks.
2. Saves current data for the SGSN address of the participant as well as their profile and data for
authentication and invoice.
29. Describe UMTS ?
Universal mobile telecommunication system (UMTS) refers to the third generation (3G) mobile network built on the
global GSM standard, compatible with data transfer up to 2 megabits per second.

UMTS Applications
 Streaming / Download (Video, Audio)
 Videoconferences.
 Fast Internet / Intranet.
 Mobile E-Commerce (M-Commerce)
 Remote Login
 Background Class applications
 Multimedia-Messaging, E-Mail
 FTP Access
 Mobile Entertainment (Games)
Advantages of UMTS
 UMTS could be a successor to 2G based GSM advances counting GPRS and EDGE . Gaining
a 3rd title 3GSM since it could be a 3G relocation for GSM
 Support 2Mbit/s information rates.
 Higher Information rates at lower incremental costs.
 Benefits of programmed universal wandering also necessarily security and charging capacities,
permitting administrators emigrate from 2G to 3G whereas holding numerous of their existing
back-office frameworks
 Gives administrators the adaptability to present unused mixed media administrations to trade
clients and buyers
 This not as it were gives client a valuable phone but moreover deciphers higher incomes for
the administrator.
Disadvantages of UMTS
 It is more expensive than GSM.
 Universal Mobile Telecommunication System has poor video experience.
 Universal Mobile Telecommunication System still not broadband.

30. Explain Architecture of UMTS ?


1. User Equipment (UE): The User Equipment or UE is the name given to what was previous termed the mobile, or
cellphone. The new name was chosen because the considerably greater functionality that the UE could have. It could also
be anything between a mobile phone used for talking to a data terminal attached to a computer with no voice capability.
2. Radio Network Subsystem (RNS): The RNS also known as the UMTS Radio Access Network, UTRAN, is the
equivalent of the previous Base Station Subsystem or BSS in GSM. It provides and manages the air interfacefor the
overall network.
3. Core Network: The core network provides all the central processing and management for the system. It is the
equivalent of the GSM Network Switching Subsystem or NSS. It Consist of MSC, EIR, CGSN, HLR, AUC, GMSC.

 Mobile switching centre (MSC): This was essentially the same as that within GSM, and it
managed the circuit switched calls under way.
 Gateway MSC (GMSC): This was effectively the interface to the external networks.
 Serving GPRS Support Node (SGSN): As the name implies, this entity was first developed when
GPRS was introduced, and its use has been carried over into the UMTS network architecture. The
SGSN provided a number of functions within the UMTS network architecture.
 Gateway GPRS Support Node (GGSN): Like the SGSN, this entity was also first introduced into
the GPRS network. The Gateway GPRS Support Node (GGSN) was the central element within the
UMTS packet switched network. It handled inter-working between the UMTS packet switched network
and external packet switched networks, and could be considered as a very sophisticated router. In
operation, when the GGSN received data addressed to a specific user, it checked if the user was
active and then forwarded the data to the SGSN serving the particular UE.
 Equipment identity register (EIR): The EIR was the entity that decided whether a given UE
equipment could be allowed onto the network. Each UE equipment had a number known as the
International Mobile Equipment Identity. This number, as mentioned above, was installed in the
equipment and was checked by the network during registration.
 Authentication centre (AuC) : The AuC was a protected database that contained the secret key
also contained in the user's USIM card.
31. Describe SDR (Software Defined Radio) ?
 A software defined radio is one that can be configured to any radio or frequency standard through the use of software.
 The phone should automatically switch from operating on CDMA frequency to a TDMA frequency whenever it is
required.
 The user can download Digital Signal Processing Software (DSPS) describing the desired elemental components with
Digital Signal Processing Hardware (DSPH) of only 1 terminal.
 An SDR is a radio communication system where components that have typically been implemented in hardware such
as mixers, filters, amplifiers, modulators, detectors, are instead implemented in software.
Benefits Of SDR :
 SDR gives freedom to user to select the most appropriate air interface to be used based on channel conditions, traffic,
cost.
 SDR reduces the amount of software.
 It reduces the amount of industrial waste.
 An SDR can provide software control of a variety of modulation techniques, wideband or narrowband operations,
security mechanisms.
 Software-defined radios have significant utility for cell phone services, which must serve a wide variety of changing
radio protocols in real time.
Advantages:
 Unlimited global roaming.
 One terminal for many service.
 New services provided without needing to upgrade hardware.
 Bugs fixed without need to recall the product.
32. What are the M-Commerce Applications ?
 Mobile Banking: Using a mobile website or application to perform all your banking functions. It
is one step ahead of online banking and has become commonplace these days. For example, in
Nigeria, the majority of banking transactions happen on mobile phones.
 Mobile Ticketing and Booking: Making bookings and receiving your tickets on the mobile. The
digital ticket or boarding pass is sent directly to your phone after you make the payment from it.
Even in India now IRTC and other services provide m-ticketing services.
 E-bills: This includes mobile vouchers, mobile coupons to be redeemed and even loyalty points
or cards system.
 Auctions: Online auctions having now been developed to be made available via mobile phones as well.
 Stock Market Reports and even stock market trading over mobile applications.
33. Advantages and Disadvantages of M-Commerce ?
Advantages:
 It provides a very convenient and easy to use the system to conduct business transactions.
 Mobile commerce has a very wide reach. A huge part of the world’s population has a mobile phone in
their pocket. So the sheer size of the market is tremendous.
 M-commerce also helps businesses target customers according to their location, service provider, the
type of device they use and various other criteria. This can be a good marketing tool.
 The costs of the company also reduced. This is due to the streamlined processes, now transaction cost,
low carrying cost and low order processing cost as well.
Disadvantages:
 The existing technology to set up an m-commerce business is very expensive. It has great start-
up costs and many complications arise.
 In developing countries, the networks and service providers are not reliable. It is not most suitable for
data transfer.
 Then there is the issue of security. There are many concerns about the safety of the customer’s private
information. And the possibility of a data leak is very daunting.

34. Explain Structure of M-Commerce ?

1. Mobile commerce applications: A content provider implements an application by providing two sets of programs:
client-side programs, such as a user interface on a micro browser, and server-side programs, such as database accesses
and updating.
2. Mobile stations: Mobile stations present user interfaces to the end users, who specify their requests on the interfaces.
The mobile stations then relay user requests to the other components and display the processing results later using the
interfaces.
3. Mobile middleware: The major purpose of mobile middleware is to seamlessly and transparently map Internet
contents to mobile stations that support a wide variety of operating systems, mark up languages, micro browsers, and
protocols. Most mobile middleware also encrypts the communication in order to provide some level of security for
transactions.
4. Wireless networks: Mobile commerce is possible mainly because of the availability of wireless networks. User
requests are delivered to either the closest wireless access point (in a wireless local area network environment) or a base
station (in a cellular network environment).
5. Wired networks: This component is optional for a mobile commerce system. However, most computers (servers)
usually reside on wired networks, such as the Internet, so user requests are routed to these servers using transport and/or
security mechanisms provided by wired networks.
6. Host computers: This component is similar to the one used in electronic commerce, which includes three kinds of
software. User requests are generally acted upon in this component.
35. What is B2C ?
B2C, short for “business-to-consumer”, is a commerce model between a business and an individual consumer. While B2C
applies to any type of direct-to-consumer selling, it has come to be associated with running an online store, also known as
ecommerce or retailing. Advantages of B2C application are :
• Purchasing is faster and more convenient.
• Prices change instantaneously as per the market requirements.
36. What are the B2C Applications ?
37. What is B2B ?
B2B (business-to-business), a type of electronic commerce (e-commerce), is the exchange of products, services or
information between businesses, rather than between businesses and consumers (B2C). A B2B transaction is conducted
between two companies, such as wholesalers and online retailers.
38. What are the B2B Applications ?

39. Difference between B2B & B2C ?

BASIS FOR B2B B2C


COMPARISON
Meaning The selling of goods and services The transaction in which business
between two business entities is sells the goods and services to the
known as Business to Business or consumer is called Business to
B2B. Consumer or B2C.
Customer Company End user
Focus on Relationship Product
Quantity of Large Small
merchandise
Relationship Supplier - Manufacturer Retailer - Consumer
Manufacturer - Wholesaler
Wholesaler - Retailer
Relationship Long term Short term
horizon
Buying and Selling Lengthy Short
cycle
Buying Decision Planned and Logical, based on Emotional, based on want and
needs. desire.
Creation of Brand Trust and Mutual Relationship Advertising and Promotion
Value

40. Difference Between M-Commerce and E-Commerce ?

S.No. E-commerce M-commerce


01. In general, e-commerce activities M-commerce activities are performed
are performed with the help of with the help of mobile devices like
desktop computers and laptops. smartphones, tablets, PDA’s (Personal
Digital Assistant) etc.
02. It is broad term which refers doing It is subcategory of ecommerce which
shopping and making payments does the same this via mobile devices.
online with help of electronic
devices like Laptop and computers.
03. In e-commerce the use of internet is But in case of m-commerce some
mandatory activities can be performed without
internet also.
04. E-commerce devices are not easy to M-commerce devices are easy to carry
carry and portability point of view it and portability point of view it is good.
is not so good.
05. In e-commerce location tracking In m-commerce location tracking
capabilities are limited due to the capabilities is so good as mobile apps
non-portability of devices. track and identify user locations with the
help of GPS technology, Wi-Fi, and so
on.
06. E-commerce fails in push In m-commerce push notification can be
notification. achieved.
07. Examples of E-commerce includes Examples of M-commerce includes
Amazon, Flipkart, Quikr, Olx mobile banking like paytm, in-app
websites. purchasing Amazon mobile app.
41. Describe Mobile Payment System ?
A mobile payment is a contactless way of paying that involves a mobile device such as a mobile phone, a smart watch, or
a tablet. These devices might run mobile wallet apps or peer-to-peer mobile payment apps. Or, they might enable
transactions via SMS.
Types of Mobile Payment :
1. Mobile wallet: Mobile wallet services include apps like Google Pay, Apple Pay, and Samsung Pay. These services run
on computers, smartphones, tablets, and smartwatches, and link to a customer’s credit card, debit card, or bank account.
Once a person sets up their mobile wallet account, they can use these devices much like they’d use a credit card.
2. Mobile peer-to-peer: This type of transaction, which runs on platforms like Zelle, PayPal, Venmo, and CashApp,
allows individuals to transfer money to other individuals via a mobile app or a web page. Some of these services—most
notably PayPal—enjoy wide acceptance from small business retailers. This means you can pay a business owner using
PayPal instead of using a credit card.
3. SMS payments: SMS payments let people make payments by sending an SMS to a specific phone number. Americans,
who largely own smartphones, rarely make SMS payments. In parts of the developing world, however, SMS payments are
prevalent and widely trusted.
4. Mobile ecommerce: This category, also known as m-commerce, describes any type of transaction one makes on a
mobile device. If a shopper makes a purchase on their mobile device’s browser or on a merchant’s proprietary app, that
qualifies as a mobile ecommerce payment.
5. Mobile point of sale: Customers can insert a credit card into the chip reader, swipe, or tap their card or mobile device
to the reader for a NFC transaction. At this point, your point-of-sale software takes over, transmitting payment data to
financial institutions and transferring money to your account.
42. Advantage and Disadvantages of Mobile Payment System ?
Advantages :
1. Convenience: Mobile payments eliminate a barrier to finalizing a customer’s purchases. Customers can pay
conveniently by tapping a phone or credit card at a point of sale, or they can make online transactions using their payment
apps.
2. Speed: Financial institutions process mobile payments in the blink of an eye. This makes mobile checkout as fast as a
credit card transaction—if not faster.
3. Popularity: More customers are spending more money using mobile payments. In 2021, global consumers spent
billions via mobile payments. Financial analysts expect this figure to more than triple within the next five years.
4. Security: Mobile payments are among the most secure forms of commerce. That’s because they’re performed on
mobile devices that tend to require some form of authentication, typically in the form of a fingerprint, facial recognition,
or a passcode. The devices also encrypt their transmissions, giving thieves a very minimal chance of intercepting
customer data.
Disadvantages:
1. Necessary to have a smartphone: Unfortunately, not all cellphones are enabled to use Contactless technology,
although in recent years practically all brands have enabled it.
2. Depends on the phone's battery: Like any electronic device, both your and your customer’s cellphones need to have a
charged battery in order to close the transaction.
3. Transaction limits on peer-to-peer transactions: Many mobile wallet providers place a limit on their users’ person-
to-person transactions
43. Characteristics of Mobile Payment System ?
1. Universal: It must be widely accepted in many countries and businesses and also allow payment in both
physical stores and online.
2. Regulated: To ensure this universality, it must comply with regulations and the most common international
standards.
3. Secure: The transaction must be secured, as well as the means and devices that may be involved in the
payment process.
4. Practical and simple: The means of payment must be easy to understand and execute, procedures that are
not strictly necessary must be eliminated.
5. Cheap: A high fee or a complex operational infrastructure (terminals, computer systems, etc.) can
become barriers to implementing any payment channel.
6. Rich user experience : New technologies offer the possibility to improve this payment

experience: real-time purchases, chance to finance purchases, sending notifications or offers,

etc.

44.

You might also like