• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24

"Wireless videophones and high-speed Internet access are a reality with the world's first "Third Generation" mobile serviced, which were launched on October 1st 2001 by NTT DoCoMo in Tokyo, Japan."

Extracts from this document...

Introduction

Executive Summary "Wireless videophones and high-speed Internet access are a reality with the world's first "Third Generation" mobile serviced, which were launched on October 1st 2001 by NTT DoCoMo in Tokyo, Japan." These has symbolized that human had enter a new era in mobile network technology. Facing with the ever advancing technologies, mobile network had integrated deep into our daily life style, cater for the needs to interact between friends and business organizations in a more effective, efficient and convenient way. At this moment, as we are discussing, there is a lot of network companies busily preparing for 3G or the Third Generation in mobile telephone devices. The precursors to this technology had began and entered the markets in year 2001 and 3G itself is due to have proliferated in the earnest by 2005. Singapore Telco, Singtel had announced a trail on the 3G network within CBD area at the last quarter of 2003. If 3G delivers what the developers promise, by 2004 we can look at broadband speeds via our mobile phones, plus a variety of new generation mobile devices that combine PC, PDA, camera, you name it, functionality. With 3G, data speeds will reach upwards of 2 Megabits per second (Mbps), which will give us high speed Web access and superlative quality video access via our trusty mobile communication devices. 3G also promises roaming capability throughout Europe, Asia and North America. 3G devices will deliver all that GPRS (General Packet Radio Services) can do, except a whole lot faster. Just imagine, how about catching up with that important client who never has time for a face to face meeting when he's in a taxi on his way to an airport at the other side of the globe? Consider watching your favourite television programmes on the MRT on your way home from work. How about consider connecting to your network, downloading files, transferring data, zipping off an email? ...read more.

Middle

Traditionally the major service has been voice but there has been an evolutionary step in 3G from Short Messaging Service (SMS) to 3GPP - defined Multimedia Messaging, incorporating digital images and video clips with text or voice annotations. Industry analysts estimate that vendors are currently allocating from $200 billion in research and development resources to specify, design and manufacture infrastructure for evolving 3G networks. Of the 3G licenses currently awarded, more than 90 percent of those operators have specified WCDMA as their core 3G technology. Observers point out that, given this expected dominance of WCDMA as the 3G standard, this technology will undoubtedly receive the majority of R&D funding and will yield the earliest, most extensive and most reliable product availability. What is WCDMA? WCDMA Wideband Code Division Multiplex Access (WCDMA) is the radio frequency technology indicated for all UMTS (Universal Mobile Telecommunication Services) networks, and WCDMA is widely expected to be the dominant technology for 3G networks worldwide. WCDMA supports high capacity, multiple simultaneous services and bit-rate performance of up to 2Mbit/s. But as a wideband (5 MHz channels) technology, WCDMA presents deployment challenges when implemented on narrow frequency allocations. When evaluating WCDMA infrastructure, operators should consider system solutions that provide well-established Third Generation Partnership Project (3GPP)-compatibility and that the resource allocation capabilities follow UMTS traffic class guidelines and Quality of Service attributes, allowing operators to optimize service differentiation. Modular designs allow these solutions to scale quickly to meet escalating network traffic demands. These same design advantages will allow these WCDMA solutions to be adapted to meet the demand for location-based services, personalized messaging and packet data traffic volumes that will define the coming wireless IP networks. These advanced WCDMA systems will also support seamless integration with GSM networks. 3G - Concepts And Technology for Business 3G will be primarily driven by services and applications, not technology, although technologies such as Java, WAP, Bluetooth, SynchML and IPv6 have enabled third party application developments to meet users' end-to-end service needs and expectations. ...read more.

Conclusion

Explaining that " The technology is not yet mature and its complexity has been somewhat underestimated" Generally, there is an uncertainty as to when the upfront investment on the infrastructure can be recovered. M-Commerce According to Durlacher Research, M- Commerce is defined as "any transaction with a monetary value that is conducted via a mobile telecommunications networks" (Durlacher 2000). A somewhat looser approach would be to characterize M-Commerce as the emerging set of applications and services people can access from theie Internet-enabled mobile commerce. Mobile Commerce will not only be an extension of E-Business but will also adds consumer value through personalisation, mobility, availability and ease of use due to its ability to be instantly implemented. Ease of use, trustworthiness and consistency have been the main reasons for establishing the Mobile Electronic Transaction (MeT) initiative, which has created a framework for handling secure mobile electronic transactions via a mobile device whilst ensuring a consistent user experience independent of device, service and network. The object of the MeT initiative is to combat the challenges of keeping these facilities convenient and easy to use, a solution developed through evolving WAP with WAP Identity Module(WIM), Wireless Transport Layer Security (WTLS) and Wireless Public Key Infrastructure (W-PKI). Above all. M-Commerce is about content and giving users access to a myriad of mobile services. Contents can range from news to directory services, directions, shopping and ticketing services, entertainment services, financial services and so forth. Possible sources of revenue include subscription fees, transaction fees, share of traffic charges collected by mobile operator, and various forms of sponsorship such as advertising, referral fees, and commissions. They can be combined in a number of different ways. However, one can generally distinguish between the following core business models: * User Fee Business Models - charge users for the content they access. 1. Subscription Fees 2. Usage Fees * Shopping Business Modes - similar to e-shopping. Using the mobile internet offers those selling companies an opportunity to reach a somewhat different audience. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    companies, committed other crimes in the victims name and may owe taxes to the government, the opportunities for the criminal having obtained the victims identity are extensive and surprisingly easy to accomplish. Where companies are the victim of Identity Theft they may after the fact, discover that vast amount of

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    PAN could be wired with a USB pen or even a wireless PAN can be setup using technologies such as IRDA, Bluetooth and zigbee. Bluetooth standard is related to PAN because it is a wireless protocol which exchanges data over short distances from fixed and mobile devices which make up the PAN.

  1. The impact of the availability of electric information on individuals and society

    The problem with those is that it's very hard and expensive to reach the final target group of customers using those methods of communication, which means that loads of money is being wasted on nothing. While nowadays non-public organisations can advertise themselves in much cheaper and more efficient way using

  2. I have been given the task to design a database for a company called ...

    * Data on the parcel which the customer is sending, this will include, parcel ID, width of parcel, length of parcel, height of parcel, total dimensions, weight and price which will be calculated by the computer. * Data on the customer, this will include, customer ID, customer's title, customer's surname,

  1. Flexible Architectures in Communication Security Application

    In Chapter 4, we introduce the architectural extensions to support fast cryptographic processing. In Chapter 5, we present the CryptoManiac design, detailing the processor architecture, the system architecture, and the instruction set. We then examine performance results in Chapter 6.

  2. System I designed in order to produce a promotion package for her newly formed ...

    How can I get data from another program into Word without starting the source program? By default, when you insert database information or attach it as a mail merge data source, Word uses DDE to read the data file. DDE automatically starts the source program (such as Microsoft Excel)

  1. Computer systems assignment 1

    Windows XP can run and is compatible with a lot of applications which makes it useful in everyday life. The main purpose of it is multimedia for people who like to enjoy themselves. It offers various applications which are already built in such as Windows Media Player which is able

  2. Smart Card System

    Since the user must have a different key for every person they communicate with, they must trust each and every person with one of their secret keys. This means that in practical implementations, secure communication can only take place between people with some kind of prior relationship, be it personal or professional.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work