• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24

"Wireless videophones and high-speed Internet access are a reality with the world's first "Third Generation" mobile serviced, which were launched on October 1st 2001 by NTT DoCoMo in Tokyo, Japan."

Extracts from this document...

Introduction

Executive Summary "Wireless videophones and high-speed Internet access are a reality with the world's first "Third Generation" mobile serviced, which were launched on October 1st 2001 by NTT DoCoMo in Tokyo, Japan." These has symbolized that human had enter a new era in mobile network technology. Facing with the ever advancing technologies, mobile network had integrated deep into our daily life style, cater for the needs to interact between friends and business organizations in a more effective, efficient and convenient way. At this moment, as we are discussing, there is a lot of network companies busily preparing for 3G or the Third Generation in mobile telephone devices. The precursors to this technology had began and entered the markets in year 2001 and 3G itself is due to have proliferated in the earnest by 2005. Singapore Telco, Singtel had announced a trail on the 3G network within CBD area at the last quarter of 2003. If 3G delivers what the developers promise, by 2004 we can look at broadband speeds via our mobile phones, plus a variety of new generation mobile devices that combine PC, PDA, camera, you name it, functionality. With 3G, data speeds will reach upwards of 2 Megabits per second (Mbps), which will give us high speed Web access and superlative quality video access via our trusty mobile communication devices. 3G also promises roaming capability throughout Europe, Asia and North America. 3G devices will deliver all that GPRS (General Packet Radio Services) can do, except a whole lot faster. Just imagine, how about catching up with that important client who never has time for a face to face meeting when he's in a taxi on his way to an airport at the other side of the globe? Consider watching your favourite television programmes on the MRT on your way home from work. How about consider connecting to your network, downloading files, transferring data, zipping off an email? ...read more.

Middle

Traditionally the major service has been voice but there has been an evolutionary step in 3G from Short Messaging Service (SMS) to 3GPP - defined Multimedia Messaging, incorporating digital images and video clips with text or voice annotations. Industry analysts estimate that vendors are currently allocating from $200 billion in research and development resources to specify, design and manufacture infrastructure for evolving 3G networks. Of the 3G licenses currently awarded, more than 90 percent of those operators have specified WCDMA as their core 3G technology. Observers point out that, given this expected dominance of WCDMA as the 3G standard, this technology will undoubtedly receive the majority of R&D funding and will yield the earliest, most extensive and most reliable product availability. What is WCDMA? WCDMA Wideband Code Division Multiplex Access (WCDMA) is the radio frequency technology indicated for all UMTS (Universal Mobile Telecommunication Services) networks, and WCDMA is widely expected to be the dominant technology for 3G networks worldwide. WCDMA supports high capacity, multiple simultaneous services and bit-rate performance of up to 2Mbit/s. But as a wideband (5 MHz channels) technology, WCDMA presents deployment challenges when implemented on narrow frequency allocations. When evaluating WCDMA infrastructure, operators should consider system solutions that provide well-established Third Generation Partnership Project (3GPP)-compatibility and that the resource allocation capabilities follow UMTS traffic class guidelines and Quality of Service attributes, allowing operators to optimize service differentiation. Modular designs allow these solutions to scale quickly to meet escalating network traffic demands. These same design advantages will allow these WCDMA solutions to be adapted to meet the demand for location-based services, personalized messaging and packet data traffic volumes that will define the coming wireless IP networks. These advanced WCDMA systems will also support seamless integration with GSM networks. 3G - Concepts And Technology for Business 3G will be primarily driven by services and applications, not technology, although technologies such as Java, WAP, Bluetooth, SynchML and IPv6 have enabled third party application developments to meet users' end-to-end service needs and expectations. ...read more.

Conclusion

Explaining that " The technology is not yet mature and its complexity has been somewhat underestimated" Generally, there is an uncertainty as to when the upfront investment on the infrastructure can be recovered. M-Commerce According to Durlacher Research, M- Commerce is defined as "any transaction with a monetary value that is conducted via a mobile telecommunications networks" (Durlacher 2000). A somewhat looser approach would be to characterize M-Commerce as the emerging set of applications and services people can access from theie Internet-enabled mobile commerce. Mobile Commerce will not only be an extension of E-Business but will also adds consumer value through personalisation, mobility, availability and ease of use due to its ability to be instantly implemented. Ease of use, trustworthiness and consistency have been the main reasons for establishing the Mobile Electronic Transaction (MeT) initiative, which has created a framework for handling secure mobile electronic transactions via a mobile device whilst ensuring a consistent user experience independent of device, service and network. The object of the MeT initiative is to combat the challenges of keeping these facilities convenient and easy to use, a solution developed through evolving WAP with WAP Identity Module(WIM), Wireless Transport Layer Security (WTLS) and Wireless Public Key Infrastructure (W-PKI). Above all. M-Commerce is about content and giving users access to a myriad of mobile services. Contents can range from news to directory services, directions, shopping and ticketing services, entertainment services, financial services and so forth. Possible sources of revenue include subscription fees, transaction fees, share of traffic charges collected by mobile operator, and various forms of sponsorship such as advertising, referral fees, and commissions. They can be combined in a number of different ways. However, one can generally distinguish between the following core business models: * User Fee Business Models - charge users for the content they access. 1. Subscription Fees 2. Usage Fees * Shopping Business Modes - similar to e-shopping. Using the mobile internet offers those selling companies an opportunity to reach a somewhat different audience. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    of "life cloning" it can encroach further into the victims' general life. In this situation the criminal may not only have falsely obtained state benefits, credit cards, bank accounts, obtained mortgages to purchase property, he/she may have an employment history in the victims name, the criminal may have created fictitious

  2. Social Networking

    We can realize that many people on SNS are meeting with other people before they meet each other face to face. As a result of this when many students begin university; they find themselves with a group of readymade associates.

  1. Computing Project

    ADO Query Function - This function allowed me to create a query in Access and then allowed me to enter the SQL statement into this component and then displayed the results of this query in Delphi. I made a connection string to my Access database, selected the table I wanted to query, and then I wrote the SQL statement.

  2. The impact of the availability of electric information on individuals and society

    that using the internet and a simple personal computer or sometimes even a mobile phone. Changes in the sources of information Paper- based sources of information More and more people are using internet for finding information as it is much faster and more time efficient way to get the information than using books and encyclopaedias.

  1. What is transaction processing?

    Ninety percent of all documents, no matter how they're created, today are eventually printed out, a number expected to decline to about 40 percent in 2005." (www.bernudasun.bm/business.com) As copier replaced carbon paper, making it easier to generate multiple copies of documents, E-mail has increase the amount of time saved by

  2. Smart Card System

    was designed around these principles: * Implementation independence and interoperability * Algorithm independence and extensibility Implementation independence and algorithm independence are complementary: their aim is to let users of the API utilize cryptographic concepts, such as digital signatures and message digests, without concern for the implementations or even the algorithms being used to implement these concepts.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Internal modems are activated when you run a communications program and are turned off when you exit the program. This convenience is especially useful for novice users. These types of modems usually cost less. This is a diagram I have shown below of an internal modem.

  2. System I designed in order to produce a promotion package for her newly formed ...

    It gives the system user's telephone number in case the company needs to get in touch in the case of a problem. Structure 3 This is by far the best design structure as it tells you a lot of details about the potential user.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work