Mobile Commerce
Mobile Commerce
AS PER US
Topper’s Voice SYLLAB
C B C S
BBA
III Year V Semester
MOBILE COMMERCE
Study Manual
Important Questions
Short Question & Answers
Choose the Correct Answer
9 /-
`. 1 4
- by -
WELL EXPERIENCED LECTURER
TM
Rahul Publications
Hyderabad. Ph : 66550071, 9391018098
MOBILE COMMERCE
Inspite of many efforts taken to present this book without errors, some errors
might have crept in. Therefore we do not take any legal responsibility for
such errors and omissions. However, if they are brought to our notice, they
will be corrected in the next edition.
Price `. 149/-
O Unit - I
Unit - II
1 - 30
31 - 64
N Unit - III
Unit - IV
65 - 120
121 - 164
T
S
SYLLABUS
UNIT - I
UNIT - II
Types of Mobile clients (mobile phones, PDAs, laptop computers, vehicle-mounted devices,
hybrid devices), Device limitations: considerations for user interface and application design
Device location technology: GPS, triangulation. Mobile client software: Mobile device operating
systems, Micro browsers, Mobile device communications protocols: WAP, i-Mode, Mobile device
page description languages, Mobile device application software.
UNIT - III
Wireless wide area network (WWAN) technology: cellular systems 2G (CDMA, TDMA,
GSM), 2.5G (GPRS, EDGE), 3G (WCDMA/UMTS, CDMA2000), 4G, 5G. Wireless local area
network (WLAN) technology (wi-fi), Wireless metropolitan area network (WMAN) technology
(WIMAX) Wireless personal area network (WPAN) technology (Bluetooth).
UNIT - IV
M-COMMERCE APPLICATIONS
Mobile financial services, Mobile advertising, Mobile Payment, Mobile Ticketing, Mobile product
location and shopping, Mobile business services, Mobile auction, Mobile entertainment, Mobile
office, Mobile distance education.
Contents
Topic Page No.
UNIT - I
1.1 Introduction to Mobile Commerce ...................................................................................... 1
1.1.1 Definition ............................................................................................................... 1
1.1.2 Scope of Mobile Commerce .................................................................................. 2
1.1.3 Benefits & Limitations of M-Commerce ................................................................. 3
1.2 M-Commerce Framework ................................................................................................... 6
1.3 M-Commerce Business Models ........................................................................................... 8
1.4 E-commerce Vs M-Commerce ............................................................................................ 9
1.5 Impact of M-Commerce ....................................................................................................13
UNIT - II
2.1 Types of Mobile Clients (Mobile Phones, PDAs, Laptops, Vehicle Mounted
Devices, Hybrid Devices) ..................................................................................................31
2.2 Device Limitations ............................................................................................................. 35
2.3 Considerations for User Interface and Application Design ................................................. 37
2.4 Device Location Technology, GPS, Triangulation ..............................................................38
2.5 Mobile Client Software-Mobile Device Operating Systems, Micro Browsers ...................... 42
2.6 Mobile Device Communication Protocols, WAP, I-Mode ................................................... 45
2.7 Mobile device page description Languages .......................................................................54
2.8 Mobile device application software ....................................................................................55
I
UNIT - III
3.1 Wireless Wide Area Network (WWAN) Technology ...........................................................65
3.2 Cellular Systems 2G ( CDMA, TDMA, GSM) ....................................................................66
3.3 2.5 G (GPRS,EDGE) ........................................................................................................ 82
3.4 3G (WCDMA/UMTS, CDMA2000) ...................................................................................92
3.5 4G, 5G ...................................................................................................................... 96
3.6 Wireless local area network (WLAN) Technology, (Wi-Fi) ...............................................101
3.7 Wireless Metropolitan area network (WMAN) Technology, WIMAX, Wireless
Personal Area Network (WPAN) technology (Bluetooth).................................................106
UNIT - IV
4.1 Mobile financial services ..................................................................................................121
4.2 Mobile Advertising ..........................................................................................................127
4.3 Mobile Payments .............................................................................................................131
4.4. Mobile Ticketing ..............................................................................................................141
4.5 Mobile Product location and Shopping ...........................................................................146
4.6 Mobile Business services ..................................................................................................147
4.7 Mobile Auction ................................................................................................................149
4.8 Mobile Entertainment .....................................................................................................150
4.9 Mobile Office ..................................................................................................................152
4.10 Mobile Distance Education ..............................................................................................154
II
IMPORTANT QUESTIONS MOBILE COMMERCE
Important Questions
UNIT - I
1. Explain the scope of Mobile Commerce.
Ans :
Refer Unit-I, Q.No. 4
2. What are the benefits of Mobile Commerce? Describe in detail.
Ans :
Refer Unit-I, Q.No. 5
3. Describe the Limitations of Mobile Commerce.
Ans :
Refer Unit-I, Q.No. 6
Ans :
Refer Unit-I, Q.No. 7
Ans :
Refer Unit-I, Q.No. 14
UNIT - II
1. List and explain various types of Mobile Clients.
Ans :
Refer Unit-II, Q.No. 2
Ans :
Refer Unit-II, Q.No. 3
Ans :
Refer Unit-II, Q.No. 7
III
Rahul Publications
BBA III YEAR V SEMESTER
4. List out various most popular platforms of the mobile operating system.
Ans:
Refer Unit-II, Q.No. 13
Ans :
Refer Unit-II, Q.No. 18
Ans :
Refer Unit-II, Q.No. 19
Ans :
Refer Unit-II, Q.No. 30
Ans :
Refer Unit-II, Q.No. 33
UNIT - III
1. What is CDMA? Explain the features of CDMA.
Ans :
Refer Unit-III, Q.No. 6
2. List out various major applications and features of GSM Technology.
Ans :
Refer Unit-III, Q.No. 12
3. Discuss a brief overview of GPRS.
Ans :
Refer Unit-III, Q.No. 15
4. What is EDGE ? What are the key ele-ments of EDGE ?
Ans :
Refer Unit-III, Q.No. 21
IV
Rahul Publications
IMPORTANT QUESTIONS MOBILE COMMERCE
Ans :
Refer Unit-III, Q.No. 25
6. ‘CDMA 2000 incorporated a number of advanced features that are crucial for enhancing
the channel capacity as well as data speed’. Explain.
Ans :
Refer Unit-III, Q.No. 28
Ans :
Refer Unit-III, Q.No. 29
Ans ;
Refer Unit-III, Q.No. 37
Ans :
Refer Unit-III, Q.No. 40
Ans :
Refer Unit-III, Q.No. 45
11. Define Wireless Personal Area Network mean? List out the basic characteristics of WPAN.
Ans :
Refer Unit-III, Q.No. 47
UNIT - IV
1. What is Mobile Banking? List out various mobile banking services.
Ans:
Refer Unit-IV, Q.No. 2
2. Explain the advantages of Mobile banking.
Ans:
Refer Unit-IV, Q.No. 5
V
Rahul Publications
BBA III YEAR V SEMESTER
Ans:
Refer Unit-IV, Q.No. 13
4. Discuss various major mobile payment models with examples.
Ans:
Refer Unit-IV, Q.No. 17
5. Describe various types of mobile payment service providers.
Ans:
Refer Unit-IV, Q.No. 19
6. Discuss the advantages of Mobile Payments.
Ans:
Refer Unit-IV, Q.No. 20
7. What is mean by Mobile Business Services? And Explain how mobile business services
helps to increase more no of customers ?
Ans:
Refer Unit-IV, Q.No. 32
8. Discuss examples of open auction and closed auction.
Ans:
Refer Unit-IV, Q.No. 36
VI
Rahul Publications
UNIT - I MOBILE COMMERCE
1.1 INTRODUCTION TO MOBILE COMMERCE safer as well as cheaper. The reservation of air/rail/
bus tickets through mobile devices saves time and
1.1.1 Definition offers peace of mind to numerous passengers. Such
Q1. Define Mobile Commerce. services are gradually making m-commerce as the
(OR)
transactions.
ns
method of choice for performing digital business
it o
Give a brief note on M-commerce.
Q2. What do you mean by Wireless
Ans : (Imp.) Communication Technology?
li c a
Mobile commerce is based on wireless
(Imp.)
ub
business transactions using handheld mobile devices
which are connected through wireless networks. The
communication technology. The wireless
communication technology has emerged as the new
l
selling goods, making mobile payments,
u P
business transactions may range from buying and
ah
games, using numerous software applications or twisted pair or fibre optic cables for physical
getting mobile tickets. The mobile devices include connection between two or more computing
cellular phones, handheld computers such as devices. In wireless networking, the data transfer
R
palmtops or laptops, pagers, smartphones and
Personal Digital Assistants (PDA). The mobile users
can access internet through these devices without
any wired connection or a computer. Powered with
between computers are facilitated by microwaves,
radio waves or infrared waves. It eliminates the
cumbersome cabling process involving bulky cables
with a significant reduction in labour and material
the emerging technology based on Wireless cost as well as development time. The wireless
Application Protocol (WAP), m-commerce employs networking technology together with wireless
web- ready micro browsers in these mobile devices application protocol provides the backbone of
to surf through the internet anytime, anywhere on mobile commerce applications. In various vertical
earth. markets, such as retail, healthcare, manufacturing
WAP-enabled smartphones equipped with and warehousing, mobile commerce gained
Bluetooth technology offer fax, e-mail and phone acceptance and provided increased productivity
capabilities to the user to facilitate business through the usage of mobile devices. The mobile
transactions while in transit. Such smartphones are handheld devices are used to transmit data in real
becoming so popular that most business houses have time to centralized hosts through wireless networks.
adopted m-commerce as the more efficient method The mobile commerce that employs wireless
of reaching to the customers or communicating with technology, offers some extra advantage over the
other business partners. The content delivery over internet based e-commerce. In e-commerce, the
wireless mobile devices has become much faster, internet provides information anytime of the day,
1
Rahul Publications
BBA III YEAR V SEMESTER
while in m-commerce, the information is available anytime, anywhere. In e-commerce, the information is
available as long as the user is connected with the internet, i.e. connected with the wired network. If the
user is involved with some other activities, i.e. travelling or doing some offline job, which forces him/her to
become disconnected from the internet, the information becomes unavailable. M-commerce removes
such uncertainties
Q3. State the principles of mobile commerce.
Ans :
Mobile commerce is based on wireless mobile communication system, which utilizes digital cellular
technology.
The cellular network consists of a number of cell sites.
Each cell site consists of a stationary base station (a radio frequency transceiver), an adjacent tower
antenna (for transmission and reception of signals) and a surrounding cell (a hexagonalshaped
geographical area).
ns
Each cell is allotted a band of radio frequencies and provides coverage to any portable mobile
tio
device that comes within the geographical range of the cell. Whenever a mobile device such as a
mobile phone or a pager, etc., comes inside a cell, it starts communicating with the base station
using one of the cell frequencies.
l i c a
The base station receives the signal from the mobile device and transmits using the tower antenna
b
to a distant base station for call delivery.
P u
To distinguish signals received from different mobile devices at the same base station, different
access technologies such as Frequency Division Multiple Access (FDMA), Code Division Multiple
ul
Access (CDMA) or Time Division Multiple Access (TDMA) are used. Whenever a mobile user tends
to move away from one cell to another adjacent cell, the cell frequency switching occurs, whereby
ah
the old cell frequency is dropped and the mobile device is automatically allotted a new frequency
corresponding to the adjacent base station.
R
The mobile device switches from previous base station frequency to current base station frequency
and the communication with the new base station continues without interruption. This is known as
cell handover.
1.1.2 Scope of Mobile Commerce
Q4. Explain the scope of Mobile Commerce.
Ans : (Imp.)
Mobile commerce provides instant connectivity between mobile users irrespective of their geographical
location and time of the day. With enormous growth of wireless and mobile technology and rapid penetration
of mobile phones in developing countries worldwide, the scope of m-commerce has increased manifold.
With the advent of super fast 3G access technology that ensures high speed data transfer rates of the
order of 20 Mbps, m-commerce is opening up new vistas of digital media applications. 3G technology,
equipped with WiMax and UMTS standards for high speed mobile broadband internet connectivity,
supports mobile multimedia application delivery at far greater bandwidths. So, it is now possible for
mobile users to watch their favourite TV programmes or download and view famous movies in their
mobile devices while travelling.
2
Rahul Publications
UNIT - I MOBILE COMMERCE
Scope of
Mobile Commerce
ns
it o
Mobile Enterprise Mobile Governance
Applications Services
• Mobile ERP
• Mobile Business
Intelligence (B)
• Mobile Cloud
b
•
•
u
•
ul P
Fig.: Scope of Mobile Commerce
The scope of mobile commerce is all pervasive , and is gradually engulfing all aspects of lives of
ah
modern day citizens. Ranging from mobile banking , mobile browsing and mobile ticketing up to mobile
marketing, mobile advertising and mobile computing, mobile commerce is gradually becoming an integral
part corporate world and common people. With the prices of mobile phone decreasing exponentially and
R
the number of different mobile applications increasing enormously, more and more people will indulge in
m-commerce applications and soon it will become the preferred choice of the digital business world.
7
Q5. What are the benefits of Mobile Commerce? Describe in detail.
Ans : (Imp.)
The main advantage of mobile commerce is that it provides instant connectivity to the Mobile user,
irrespective of his/her geographical location and time of the day. The mobile user can stay connected with
his/her business network and gather information even if he/she is in transit and remotely located away
from the business installation. The same light weight mobile device can be used for making business
transactions or making online payments round-the-clock in a cost-effective way. Highly personalized
information can be delivered in the mobile device in an efficient manner to satisfy numerous needs of a
large number of customers. The major benefits of mobile commerce are as follows:
(i) Anytime Anywhere
Mobile commerce together with wireless communication technology and wireless broadband internet
access, keeps the mobile user connected with the internet while travelling across the globe. The
3
Rahul Publications
BBA III YEAR V SEMESTER
s
round the clock (24 x 7) internet availability
benefits many users to conduct business the user is tracked. The location tracking is
transactions from their homes or from any
other place while on the move and at any
convenient time. Thus m-commerce offers
tio n
also utilized in offering customized services to
the user, such as delivery of discount coupons
that can be cashed in and around of the
greater mobility and flexibility to mobile users
l i
in performing business transactions using their
c a location of the customer. Delivery of regional
maps, driving directions and online directories
are also possible if the location of the mobile
b
handheld mobile devices.
user is known. Another major advantage of
(ii) Cost-effective
P u
The costs of transactions using mobile devices
location tracking is that, in criminal
investigation, the location of the mobile user
ul
are relatively low. The time-critical business
data, such as reports, photographs, etc. can
can be monitored and recorded as part of
the investigation process.
ah
be captured and transmitted easily from the Q6. Describe the Limitations of Mobile
mobile devices without involving any bulky Commerce.
R
expensive equipment. The customer queries
can be attended and support provided
instantly from the mobile device, thus making
customer support more comprehensive. The
SMS-based micro payments facilitate bank
Ans :
Although mobile commerce has some
(Imp.)
4
Rahul Publications
UNIT - I MOBILE COMMERCE
be adopted to prevent unwanted intrusions. The files in mobile devices for future use. The
main disadvantages of mobile commerce are mobile application developers must be
explained in detail below. concerned about the size of their applications
during the development phase.
Mobile Device Limitations
4. Low power backup
1. Small Screen Size
Mobile devices use batteries as their power
Mobile devices have smaller screen size (of supply. Normally, power for a mobile device
the order of 2 by 3 inches) and poor lasts up to 2-3 days, depending on the size of
resolution which makes them inconvenient the device. After this period, the battery should
for browsing applications. Data entry can be be recharged again, and it adds an additional
quite difficult using small combinational burden to the user who has to remember every
keypad that comes with most of the mobile now and then to recharge it.
handheld devices. The wide and high
resolution screens in conventional desktops (i) Wireless Network Limitations
or laptops used in e-commerce applications Mobile commerce depends on wireless
s
offer ease of use in data entry operations as networks which are usually of lower
well as viewing web pages. These larger
screens support 1920 × 1080 resolution and
3D graphics display. Although mobile devices
offer greater mobility and flexibility in
it o n
speed compared to wired networks. In
many cases, wireless networks offer one-
fourth speed of standard wired network.
a
Also, most wireless networks are more
accessing information, the smaller screen size
i
restricts the amount of information that could
l
be presented and offers a less convenient user
b
interface in the form of menu-based scroll-
c common in urban areas and some of
the rural areas might not have wireless
communication facilities. So online
u
mobile services may become unavailable
and click mode of data entry. in some rural areas, and thus the
2.
l
Low speed processor
u P
Most mobile devices come with low-powered
popularity of mobile services may be
suffered. Unless the mobile device is
2.5G or 3G technology compatible, the
ah
processors with much lower processing speed applications will become sluggish and
compared to sophisticated processors (i.e. unreliable compared to wired network
R
core 2 duo or i-core series) used in desktops applications. Atmospheric interference
or laptops. Such low speed processors restrict and fading of signals transmitted through
the download speed in most mobile wireless networks sometimes cause
commerce applications. The applications severe data errors and may even lead
requiring too much processing power should to disconnections.
be avoided as they may become irritably slow
due to low speed processors. Also, keeping (ii) Bandwidth Restrictions
the low processor speed in mind, the mobile A major disadvantage of mobile
websites must be optimized to ensure commerce is the bandwidth limitation,
customer satisfaction. Unnecessary plug-ins, which imposes a limitation on speed of
flash images and animations should be operation in various m-commerce
removed to ensure speed of delivery. applications. Wireless networks use
3. Small memory capacity frequency spectrum to transmit
information across the network.
The mobile devices do not have large storage Regulatory bodies control the use of
space. The memory capacity in mobile available frequency spectrum and
devices is in the order of 5 GB to 10 GB allocate the spectrum to various mobile
compared to 2 TB or higher used in desktops/ operators. In India, the frequency
laptops. So, it is difficult to store large video spectrum were initially allocated and
5
Rahul Publications
BBA III YEAR V SEMESTER
ns
mobile device can gain access to the network. In order to protect the wireless network from
unwanted users, various encryption and authentication techniques should be employed. As
tio
the handheld devices have limited computing power and storage capacity, it is difficult to
employ 256 bit encryption technique that requires enough computing power. However, the
mobile application.
l i a
SIM cards inside a cell phone can include the digital signatures of PKI system. Thus, the PKI
c
system of digital signatures can be integrated in a mobile device that adds to the security of the
ub
1.2 M-COMMERCE FRAMEWORK
Ans :
ul P
Q7. Describe the conceptual framework of mobile commerce.
(Imp.)
ah
The mobile commerce framework consists of the four basic building blocks as follows:
R
(i) Content Management
This component deals with the creation, distribution and management of diverse range of media
rich digital contents that can be browsed through the small screens of the mobile devices. The digital
contents are used in performing various business transactions such as buying and selling of goods,
making online payments, product promos and providing on line customer support. An important
part of content management is the ability to track different content providers and maintain and
manage the relationships among them. The security and authenticity of the contents must be
guaranteed and the access control mechanism must be provided to prevent unwanted users from
misusing the document. The content distribution, rights management and clearing financial
settlements, all come under the purview of content management module.
(ii) Technology Infrastructure
This component deals with the distribution of digital contents and transaction details over wireless
communication networks to customer locations or other business installations. The wireless network
infrastructure provides the very foundation of mobile commerce framework as it fulfils the basic
requirements of data transmission between various business partners while performing any business
transaction. The technology infrastructure includes wireless communication technology, Wireless
Application Protocol (WAP) and mobile security technology. These technologies need to support
digital content distribution, mobile application development and distribution and also provide a
6
Rahul Publications
UNIT - I MOBILE COMMERCE
secure technological platform for mobile billing and prepaid services through the use of mobile
Virtual Private Networks (VPN). Figure 1.2 depicts the Mobile Commerce Framework.
(iii) Application Development
The application development component of mobile commerce framework deals with the diverse
range of mobile commerce applications. The main purpose of these mobile applications is to provide
the product information to the end users, and also to enable them in performing the mobile business
transactions. There are four major categories of mobile applications namely the information
applications, communication applications, entertainment applications and commerce applications.
Several mobile applications, such
Content Management
[Creation, Distribution and Management of Digital Contents]
Business Service Mobile Application Development
Infrastructure • Java ME
• Payment Service • Android
ns
it o
• Location Search Facility Mobile Commerce • Apple iOS
• Security Arrangements • Objective C
• Back End-support
l i c a
Technology Infrastructure
• HTML5
ub
Wireless Networks, Wireless Application Protocol (WAP)
Security protocols, WML, Mobile Browsers
(iv)
ul
Business Service Infrastructure P
Fig.: Mobile Commerce Framework
ah
The business service infrastructure provides the backbone to the mobile commerce framework. It
supports the back office functionalities, such as payment services, location and search facilities and
R
security arrangements of the mobile commerce systems. Production and fulfillment of these services
are beyond the scope of traditional telecom service providers. These services are managed and
delivered by some outside vendors, who have the ability and experience to provide such
functionalities. They maintain the required infrastructure for supporting secured financial transactions
in mobile commerce environments and also provide back-end support for searching and other
facilities. Such back office systems are meant to be flexible enough and also are capable of rapid
deployment of new services. They have a direct impact on end user experience, and have the
greatest influence on the success or failure of the service provider. With the help of such back office
infrastructures, mobile service providers can avoid upfront capital IT expenditure, and also these
managed services offer the service providers the ability to quickly upgrade to the newer technological
environment without any significant investment.
Above four components are the four pillars of mobile commerce framework and all m-commerce
activities revolve around them. Whenever a mobile user tends to download MP3 music or a latest
movie in his/her mobile device, sends an SMS requesting online payment to a bank, submits online
order form requesting purchase in a mobile browser or books a mobile airline ticket, he/she is
indulging in either or all four of the above mobile commerce framework components. In order to
cope with the dynamic nature of the modern day lifestyle, people are demanding more mobility in
accessing their business applications. A properly integrated and well-coordinated mobile commerce
7
Rahul Publications
BBA III YEAR V SEMESTER
framework needs to be developed in order certain percentage fee for each payment
to provide easy-to-use and secure mobile transaction made through the payment
services to end customers. The main purpose application. Alternatively, the user can pay a
of a structured and balanced mobile nominal monthly subscription fee to the
commerce framework is to enable the payment service provider and can use the
organizations to rapidly adapt to the latest service as and when required.
mobile technologies and to ensure customer
loyalty by providing them improved and (ii) Advertiser Model
enhanced services in sync with the growing This model is an extension of traditional e-
market demands. commerce advertiser model and provides
mobile websites which can be viewed by
1.3 M-COMMERCE BUSINESS MODELS mobile users in their handheld mobile
devices. Advertising companies can display
Q8. Describe the briefly about various
their advertising messages in the website and
mobile commerce business models. pay a rental fee to the hosting website for
Ans :
s
displaying their messages. These mobile
advertising websites usually offer some basic
A business model determines the path or
process through which a business organization can
realize some profit. It shows the way by which an
tio n
services such as email service, search engines,
news service or social networking service to
a
the users and post advertising messages in
c
organization can make some investment, add some these sites to enjoy greater coverage. The
b l
service and generate some revenue through sales
i
value to the investment, get a finished product or advertisements often come with purchase
buttons that allow users to purchase the
u
of the product or service. The revenue generated product directly from their mobile devices.
The mobile payment service is also provided
P
through sales must exceed the operating cost, so
to facilitate mobile purchase directly from the
ul
that the company gets some profit. Business models
specify the mechanism for generating profit margins advertising websites. The advertiser
companies pay a fixed fee to the advertising
ah
and to sustain in the value chain. Thus, business
website for displaying their advertising
models help managers in strategic planning and
messages. Additional revenue is generated for
(i)
R
formulating overall business strategy of the
organization.
Payment Model
each purchase transaction made by the user
through the website.
(iii) Shopping Model
In this model, mobile payment service This model is similar to e-commerce merchant
providers offer mobile payment services that model where retailers create mobile websites
allow users to make cashless payment to display their range of products to the
transactions including banking transactions, mobile devices of the customers. The mobile
share trading, tax/bill payments and ticket or users can browse the mobile websites in their
other retail purchases using credit/debit card WAP enabled mobile screens and select and
or bank PIN. The payment service providers purchase any product of their choice.
have collaboration with banks (or other (iv) Content Provider Model
financial institutions) and/or mobile network
In this model, mobile service providers offer
operators, and accordingly get bank- a host of entertainment contents, such as
controlled mobile payment model or breaking news, weather forecast, traffic
operator controlled mobile payment model. updates, music, mobile games, TV shows,
The payment service provider charges a video content, movies, etc. that could be
8
Rahul Publications
UNIT - I MOBILE COMMERCE
ns
Communicated from one computer to
another without the need for printed orders
it o
E-commerce is trading in products or services and invoices & delays & errors in paper
using computer networks, such as the handling
Internet.
l
Electronic commerce draws on technologies
i c a It is used by organizations that a make a large
no. of regular transactions
ub
such as mobile commerce, electronic funds
transfer, supply chain management, Internet
Example: EDI is used in the large market
chains for transactions with their suppliers
P
marketing, online transaction processing,
3. Internet Commerce
l
electronic data interchange (EDI), inventory
It is use to advertise & make sales of wide
u
management systems, and automated data
range of goods & services.
ah
collection systems.
Modern electronic commerce typically uses This application is for both business to business
& business to consumer transactions.
R
the World Wide Web for at least one part of
the transaction’s life cycle, although it may
also use other technologies such as e-mail.
Definition
Example: The purchase of goods that are
then delivered by post or the booking of
tickets that can be picked up by the clients
when they arrive at the event.
Sharing business information, maintaining Q10. State the features of E-Commerce.
business relationships and conducting business
transactions using computers connected to Ans :
telecommunication network is called E-Commerce. 1. Ubiquity
Categories Internet/Web technology is the marketplace
is extended beyond traditional available
1. Electronic Markets everywhere at work, at home, and
Electronic Markets Present a range of offerings boundaries and is removed from a temporal
available in a market segment so that the and elsewhere via mobile devices, anytime.
purchaser can compare the prices of the geographic location. Marketspace is created;
offerings and make a purchase decision. shopping can take place anywhere. Customer
convenience is enhanced, and shopping costs
Example: Airline Booking System are reduced.
9
Rahul Publications
BBA III YEAR V SEMESTER
ns
E-commerce helps organization to provide
better customer services.
tio
with the user. Dynamically adjusts the
E-commerce helps to simplify the business
experience to the individual, and makes the
processes and makes them faster and
a
consumer a co-participant in the process of
efficient.
5.
delivering goods to the market.
Information density
b l i c
E-commerce reduces the paper work.
E-commerce increases the productivity of
u
The technology Information processing,
storage, and reduces information costs and organizations. It supports “pull” type supply
P
raises quality. Communication costs drop
l
dramatically, while currency, accuracy, and
u
timeliness improve greatly. Information
management. In “pull” type supply
management, a business process starts when
a request comes from a customer and it uses
ah
becomes plentiful, cheap, and accurate. just-in-time manufacturing way.
2. Advantages to Customers
R
6. Personalization/Customization
The Personalization of marketing messages It provides 24×7 support. Customers can
and technology allows personalized messages enquire about a product or service and place
to customization of products and services are orders anytime, anywhere from any location.
be delivered to individuals as well as groups. E-commerce application provides users with
Based on individual characteristics.
more options and quicker delivery of
Q11. State the Advantages & Limitations of products.
E-Commerce.
E-commerce application provides users with
Ans : more options to compare and select the
Advantages of E-commerce cheaper and better options.
E-Commerce advantages can be broadly A customer can put review comments about
classified in three major categories. a product and can see what others are
buying, or see the review comments of other
1. Advantages to Organizations customers before making a final purchase.
2. Advantages to Consumers E-commerce provides options of virtual
3. Advantages to Society auctions.
10
Rahul Publications
UNIT - I MOBILE COMMERCE
s
aspect makes people to opt physical stores
afford the products.
n
for purchases.
it o
E-commerce has enabled rural areas to 5. Product suitability
access services and products, which are People have to rely on electronic images to
otherwise not available to them.
l
E-commerce helps the government to deliver
i c a purchase products. Sometimes, when the
products are delivered, the product may not
match with electronic images. Finally, it may
ub
public services such as healthcare, education,
social services at a reduced cost and in an
not suit the needs of the buyers. The lack of
‘touch and feel’ prevent people from online
improved manner.
l
Limitations of E-Commerce
u P 6.
shopping.
Cultural obstacles
ah
1. Security E-commerce attracts customers from all over
The biggest drawback of e-commerce is the the world. Habits and culture of the people
R
issue of security. People fear to provide
personal and financial information, even
though several improvements have been
made in relation to data encryption. Certain
differ from nation to nation. They also pose
linguistic problems. Thus, differences in
culture create obstacles to both the business
and the consumers.
11
Rahul Publications
BBA III YEAR V SEMESTER
9. Technical limitations
Some protocol is not standardized around the world. Certain software used by vendor to show
electronic images may not be a common one. It may not be possible to browse through a particular
page due to lack of standardized software. Insufficient telecommunication bandwidth may also
pose technical problems.
9. Huge technological cost
It is difficult to merge electronic business with traditional business. Technological infra- structure may
be expensive and huge cost has to be incurred to keep pace with ever changing technology. It is
necessary to allocate more funds for technological advancement to remain competitive in the
electronic world.
Q12. Compare and contrast E-commerce and M-Commerce.
Ans : (Imp.)
S.No. Factors E-commerce M-commerce
1. Mobility E-commerce employs wired networks
for internet connectivity and hence is s
M-commerce employs high frequency wireless
n
networks for providing wireless internet and
tio
restricted inside a building. It offers is completely ubiquitous in nature. It offers any
2. Reliability
anytime connectivity.
i c a
Wired networks are more reliable and
l
suffer less interference and noise. Quality
time anywhere connectivity.
Wireless networks suffer from interference from
adjacent channel frequencies or reflected waves
ub
of data transmitted is better as there is that tend to reduce the intensity and quality of
P
little or no cross -talk. transmission. Special error detection techniques
ah
3. Speed The transmission speed of wired net The transmission speed of modern wireless
works are much higher (of the order networks are usually of the order of 100 Mbps.
4. R Security
of 1000 Mbps)
E-commerce transactions are more
secured as the networks remain well-
M-commerce transactions through wireless
networks are more vulnerable to hacker and
protected inside campus buildings. other security attacks and require stringent
Firewalls and proxy servers are used security arrangements in the form of encryption
to keep confidential business data and firewalls to prevent damage or misuse of
secured in the central server. private data during transmission.
5. Cost The initial network set- up cost is high The initial set-up cost is much lower and
and periodic maintenance is mandatory maintenance cost is minimal.
6. Usability E-commerce is performed through M-commerce is performed through handheld
personal computers or laptops having mobile devices having smaller screens and
larger screens, which are more conve- lower battery life. Also, the small devices have
nient and user-friendly. higher chance of getting lost or stolen, thus
resulting to data loss.
12
Rahul Publications
UNIT - I MOBILE COMMERCE
ns
With rapid advancements of highly
sophisticated mobile applications, mobile
it o
providing instant internet connectivity and gaming business is expanding at a fast rate.
greater mobility to billions of mobile users, Evolutions in technologies like mobile video
m-commerce is redefining the relationship
between customers and goods and service
providers.
ub
It is predicted that in near future, mobile
commerce will largely influence the marketing
key role in the success factor of mobile
entertainment industry. Similarly, in
P
healthcare industry, mobile medical imaging
orientation of almost all the major industry
l
is made possible with the use of 3G wireless
sectors, and hence, will alter the general
u
network. In education industry, mobile
dynamics of the market. In addition to
ah
providing the users with mobility and location learning is introduced in the form of SMS or
tracking, m-commerce applications are text messages.
R
capable of achieving a high level of
personalization and offer interactability with
the individual customer.
In a highly interactive environment, personal
With the introduction of newer display
technologies, such as electronic paper, liquid
crystal display and digital paper, the mobile
electronic readers or e-books have become
profiles, product preferences, home/ office commonplace. A large number of mobile
locations, payment details, etc. can be users have started carrying e-readers to
collected directly from the customer from their download online books or online newspapers
mobile devices to generate an accurate and
while travelling.
personalized database. Conversational
advertising can be delivered directly to the The impact of m-commerce is all-pervasive
mobile handset by a brand to describe the and ever-expanding. With the cost of mobile
benefits of the product. devices going down and introduction of
This is an emerging concept whereby the newer and powerful technologies, more and
mobile user can opt in to receive product more people are indulging in numerous
information from a brand by giving the mobile applications and eventually m-
mobile number to the company. By utilizing commerce will emerge as the most preferred
the location tracking facility of m-commerce, tool for performing business transactions while
special customer zones can be created which in motion.
13
Rahul Publications
BBA III YEAR V SEMESTER
n
tio
be preregistered in the bank and also the (iv) Card-based Mobile Payments
network service provider (for the mobile In credit card based mobile payments, the
device of the customer) must have a tie-up
with the bank. When the customer wants to
perform a mobile banking transaction, the
l i c a mobile handset is used as a credit card for
making payments. The credit card issuing
ub
transaction request from the customer first
goes to the premises of the mobile service
bank gives a PIN number to the mobile
handset user. At the time of making payments,
the mobile user initiates the transaction by
l
to the bank. Depending on the type of
u P
provider, and from there it is finally routed
ah
available, namely SMS banking and WAP-
enters the amount to be paid and the
based mobile banking. SMS banking is usually
transaction is completed. The amount is
R
used for non-financial transactions, such as
viewing of balance statement, requesting for
a checkbook, status checking or stopping a
check payment although some banks permit
financial transactions also through SMS
automatically deducted from the credit card
account of the mobile user and credited to
the bank account of the payee business
partner, such as the shop owner.
banking. In SMS banking, an SMS code (v) Mobile Web Payments through WAP
requesting a transaction is sent to a particular
number (as directed by the bank) from the In this mode of mobile payment, the
mobile device of the customer. As soon as payment is made through the web pages
the bank receives the SMS, the required displayed in the micro browser of the mobile
transaction is performed, the information is phone. The web page is displayed following
retrieved (in case of non-financial transaction) Wireless Application Protocol (WAP) and
and sent back to the customer mobile phone associated technology. At the time of making
in the form of another SMS. The entire a purchase, the mobile user types the URL
transaction takes only a few seconds and the of the website of a merchant in the mobile
cost of the transaction is only that of an SMS. device. The website containing various
For different types of transactions different product information is displayed in the micro
SMS codes are used. browser of the mobile handset. The user
14
Rahul Publications
UNIT - I MOBILE COMMERCE
selects a product that he/she intends to buy and places order for the product through the website.
The merchant then sends an invoice to the user. If the user intends to pay through a credit card, he/
she enters the credit card number, which is transmitted to the partner bank through a secured
channel that employs encryption. The partner bank verifies the credit card number, and if found
OK, informs the acquires bank for making the payment. Alternatively, if the user wants to pay
directly from the partner bank in the form of account transfer, he/she enters the PIN number, which
is sent to the partner bank for verification. After successful verification of the PIN, the partner bank
debits the amount from the user’s account and credits to the merchant’s account. In either case, an
SMS is sent to both the user and the merchant confirming the payment. The entire payment
process is simple, quick and user-friendly as they have a similarity to the familiar online payment
systems.
(vi) Mobile Ticketing
Mobile ticketing is a special application of m-commerce which allows users to purchase tickets for
ns
air/rail/bus travel or for any sports/entertainment events from any location and at any time using
mobile phones or any mobile device. The users can avoid tedious and time consuming process of
it o
getting paper tickets after waiting in a long line and the organizations can reduce production,
distribution and infrastructural cost by providing simpler ways to purchase tickets anytime/anywhere.
a
c
Mobile tickets are available for a number of cases, such as mass transit tickets, airline check-in,
l i
movie/theatre shows, sporting events, consumer voucher distribution, and so on. There are a variety
b
of options by which a user can purchase mobile tickets, such as online purchase from merchant
P u
website, from WAP page in the mobile handset, purchase via SMS from the mobile handset, over
the phone from a voice call or through a secure mobile ticketing application. Due to the convenience
ul
it offers to the customers and cost savings it offers to the companies, mobile ticketing is gaining
momentum and more and more people are opting for mobile ticketing. Around 6 million mobile
ah
tickets were sold during 2012 worldwide, and the number is expected to increase manifold to cope
with the ever - increasing demand of the mobile users.
R
(vii) Mobile Computing
Mobile computing is a technology that allows users to perform normal computing operations, such
as internet surfing, document preparation, spread sheeting, preparing PowerPoint presentations,
send/receive e-mails or download MP3 audio files using portable computing devices while in transit.
The portable computing devices include smart phones, personal digital assistants, laptops, ultra
mobile PC or wearable computers. Some of these portable computers have bigger screens compared
to mobile phones and hence overcome the small screen limitations. For example, Apple iPad comes
with an 8" x 10'’ screen, which is suitable for reading e-books as well as viewing websites.
In order to communicate with the external world, mobile computing employs wireless communication
technology. For wireless internet access, Wi-Fi or Wi-Max technology is used that utilizes radio
waves to broadcast internet signal from a wireless router to the surrounding area. Alternatively,
digital cellular technology can be employed that utilizes cellular modem in the form of a data card
that connects to nearby cell towers for high speed broadband internet access. The data card fits into
the PC card slot of the laptop or the notebook computer. Broadband internet access is also provided
to cell phones and PDAs using cellular broadband technology.
15
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
Mobile commerce allows users to conduct business transactions from their handheld mobile devices
while travelling in remote areas. It offers instant connectivity to internet through wireless communication
networks and offers greater mobility and ease of use to numerous mobile users worldwide. Apart from
performing normal e-commerce trading transactions from internet-enabled mobile devices, mobile
commerce offers some highly personalized and interactive services that became possible due to the unique
capabilities of wireless environment and user mobility. Such specialized services can be broadly classified
in following five categories :
location-based services,
ns
tio
mobile banking and payment services,
l i c a
Q16. What are the different types of M-Commerce Services ?
Ans :
ub
1.
u
Location Based Services (LBS) P
There are two types of M-Commerce services. They are :
l
2.
R ah
Information Services.
Q17. Describe the features of location based services (LBS)? What are the positioning system
available for LBS ?
Ans :
Location Based Services utilize the geographic location information of the mobile device/ and offer
a number of personalized information and entertainment services to the mobile customer. The location
information of the mobile device can be retrieved either by using digital cellular network technology or by
employing satellite positioning infrastructure.
Once the geographic location information of the mobile device is determined, a variety of useful
information can be delivered to the customer location. These include local weather reports, local landmark
information such as nearest ATM, banks or stores, delivery of discount coupons or location based games.
Parcel tracking or vehicle tracking in supply chain operations or people tracking in criminal investigation
can be achieved with reasonable accuracy. In healthcare, the location of the nearest hospital can be
identified and utilized for a mobile user in case of emergency.
16
Rahul Publications
UNIT - I MOBILE COMMERCE
Local
Weather
Local Update
People
Billing
Tracking
Local
Landmark
Location Local
Vehicle Location Based
Tracking Tracking Service
Delivery
(LBS) Local
Discount
Offers
Parcel
Tracking Emergency
ns
it o
Services Location
Based
l i c a Games
ub
Fig. : Location Based Services (LBS)
All the above LBS services require accurate positioning of the mobile device. The positioning means
l P
determination of the location of the mobile device with reference to either a coordinate system or address
u
system. In geocoding, the location of a mobile device is expressed in terms of geographic coordinates, i.e.
ah
latitude and longitude. Alternatively, the location can be expressed in terms of street address, block address
or nearby landmark address derived from geographic coordinates.
R
The systems offering positioning of mobile devices are classified in two major categories, namely the
satellite- based positioning system and cellular network-based positioning system. These two systems differ
in technology and infrastructure and offer different levels of reliability and accuracy. In deep mines or in
dense cities, satellite systems may not work well and cellular networks with dense coverage become more
effective. On the other hand, in rural or remote areas, cellular networks become unavailable and satellite
visibility becomes handy.
(i) Satellite Positioning
Satellite positioning systems use a combination of a number of earth orbiting geostationary satellites
and corresponding receiver terminals. The receivers are embedded in mobile handheld devices
and receive radio signals sent from three or more satellites.
The information received from the radio signals are used to calculate the exact position of the
mobile device. Such positional calculations are used in providing the location information about the
mobile device in LBS applications. The satellite positioning systems can provide 10-40 meter accuracy
and are widely used to provide reliable time and location information anywhere on earth whenever
there is a unobstructed line of sight to three or more satellites.
17
Rahul Publications
BBA III YEAR V SEMESTER
ns
services help a stranger in a locality to
quickly locate some useful landmarks,
tio
cell towers, the accuracy can be of the order such as gas stations or ATM counter. In
of several kilometers. In order to improve the some cases, local map showing
a
accuracy of calculations, several implicit important landmarks can be displayed
techniques are employed such as angle of
arrival, time of arrival, observed time
b l
difference, and so on. Such techniques are
i c
to the WAP-enabled mobile device of the
user.
Local discount offers
u
supported by almost all major mobile access
technologies such as GSM, GPRS, 2G or 3G In yet another application of LSB, the
systems.
ul
(iii) Local Information Delivery P discount coupons of any retail outlet can
be delivered to the mobile devices of
potential customers in nearby regions.
ah
The knowledge of the position of a mobile Similarly, the night clubs can send the
user can be utilized to deliver a number of discount offers to some of their drinks
R
highly personalized information. Once the
location of the mobile device is determined,
Geographic Information System (GIS) is
employed to get the basic map data of the
nearby location, such as the information
or the information regarding some late
night events to the mobile users staying
in nearby localities. The news regarding
the occurrence of any social events can
be intimated to the mobile user in the
regarding the man made structures, i.e. form of an SMS.
streets, buildings as well as the geographic
Location-based games
terrains, i.e. rivers or mountains.
Specialized location-specific video games
Local weather update
can be delivered to the mobile device
Local weather information regarding of the user which evolves and progresses
snowfall, rainfall, max./min.temperature along with the movements of the mobile
can be delivered to the user’s mobile players. Such location-based games
device. As the user moves from one utilize some kinds of localization
region to another, the weather report technology like satellite positioning or
gets updated and helps the user to be GPS. Such games are usually urban
aware of the current weather condition. multi-player street games played on city
Also, local traffic situation can be streets through the mobile handset of a
summarized and delivered to the mobile number of players who change their
18
Rahul Publications
UNIT - I MOBILE COMMERCE
ns
users. It provides a mobile GPS sharing
system that allows users to visualize each
it o
a large number of calls from each zone other’s location and thereby share
at different hours of the day. information. It also delivers integrated
Emergency services
l i c a
In cases of emergency, if the user dials a
information about the surrounding location
to the mobile phone of the user to make them
acquainted with the surrounding region.
u
number from the mobile phone, the
b
hospital/police/fire service emergency
Q19. Explain briefly about information
l P
location information of the mobile
phone is utilized and location-based
u
emergency services are delivered. In Ans :
service.
ah
such cases, the nearest appropriate Mobile devices such as mobile phones,
authority (hospital/police station/fire Personal Digital Assistants (PDA), notebooks, laptops
brigade) is alerted and emergency service
R
are often used for getting regular updates of a large
is sent from the centre to the user
variety of information. These include general news,
location in minimal time.
traffic updates, financial news, stock updates,
Q18. Discuss the various products of LBS ? weather forecast, etc. For getting the information,
Ans : the mobile user remotely connects to a central system
1. VZ Navigator from where the information is delivered either in
This is a LBS application provided by Verizon the form of SMS alerts or in the form of regular
Wireless to its mobile customers. It uses LBS websites.
technology to provide customers with maps, Short Messaging Service (SMS) allows the
local search facility and directional service.
exchange of short text messages (160 character
The customer can download the VZ
max) using standard communication protocols
Navigator client application in the GPS-
enabled mobile handset and can start viewing between two mobile devices. This is the most widely
maps and other positional information. The used mobile application, which is used to receive
maps provide colourful display of local information alerts by billions of mobile users across
landmarks, restaurants, ATM counters, the world. SMS service is available in almost all major
hospitals and are accompanied with a voice mobile protocols such as GSM, CDMA or 3G and it
step-by-step directional driving guidelines. is also supported by satellite and landline networks.
19
Rahul Publications
BBA III YEAR V SEMESTER
A number of digital contents, such as news alerts, solutions to the mobile devices of
financial information, stock updates, logos, innumerable patients across the globe.
ringtones, etc. can be delivered through SMS.
4. Jasmine Mobile News
Jasmine News is a leading mobile news
Mobile provider in Sri Lanka that currently has more
News
than 1,70,000 subscribers who pay $ 0.30
Delivery
per month for getting the service. Jasmine
sends brief news headlines on general topics
including politics, law, sports, current events,
business and entertainment, in the form of
Traffic
Information
SMS to the mobile devices of the subscribers.
Mobile News
Browsing Services Update Jasmine also has a website that displays news
headlines and limited length contents on
current topics that can be displayed on the
micro-browsers of WAP-enabled mobile
Weather
ns
devices. Jasmine supports English, Tamil and
Sinhala languages and wide popularity of
tio
Forecast Jasmine news among mobile users forced
other prominent media houses of Sri Lanka,
P
delivering current news to the mobile device
l
of the subscriber either in the form of SMS
u
news alerts, through specialized applications
Mobile traffic news update is an important
mobile application which delivers live traffic
update in the mobile devices of people on
ah
or using mobile versions of media websites. the move. Such traffic updates provide
A recent study showed that a majority of information regarding traffic congestions in
busy intersections, available parking spaces,
R
mobile users prefer to access news through
mobile devices rather than from television, road blocks and diversions caused by any
radio, newspaper or other media. emergency situations and suggest alternative
routes.
2. Verve Wireless
6. Google Maps for Mobile
California-based Verve Wireless in one of the
pioneers in mobile news delivery. It maintains Google Map is a web mapping application,
a proprietary Verve Gateway that allows local which delivers maps of different categories,
media and news companies to seamlessly such as political maps of different countries,
extend their reach to mobile devices across street maps for a selected area, highway route
the globe and across all mobile distribution maps, satellite/aerial view of the world, etc.
channels. The maps are embedded in websites, which
can be downloaded any time, totally free of
3. AT & T Mobile News
cost. Google Maps for Mobile is a java
AT&T, world’s leading carrier of mobile and application that can deliver Google Maps in
wireless services, has launched a specialized any java-based mobile phone or mobile
mobile news application meant for healthcare device. It supports GPS like location-based
industry. The service, known as AT&T For services that utilizes location information
Health (SM), supports delivery of healthcare received from the nearest cell site.
20
Rahul Publications
UNIT - I MOBILE COMMERCE
7. Tom Tom Navigator the day and travellers and event organizers
can plan accordingly to face those weather
Tom Tom Navigator is an automotive
conditions. Weather updates are particularly
navigation system and digital mapping service
important for users on the move so that they
that can be installed in mobile devices, such
can prepare themselves for any type of
as personal digital assistants, smartphones,
weather hazards.
mobile phones, palm devices or pocket PCs.
It is manufactured by a well-known Dutch 10. Mobile Browsing
manufacturing company and is available in
Mobile browsing refers to internet surfing by
US, UK, Europe, Africa, Middle-East and
mobile users through their mobile devices.
South-East Asia. It can use GPS receivers built
Mobile commerce offers instant internet
into the mobile device or can use external
connectivity in the mobile devices using
bluetooth receivers. The main screen can be
wireless digital cellular technology 24 x 7 and
personalized by the users to include
at any geographic location. Mobile users surf
frequently used functions and also users can
the internet in the micro browsers in their
report mapping corrections.
mobile devices and research has shown that
8. Sygic
This is an Australian company that provides
ns
a significant percentage of mobile users prefer
to use their mobile device more for net
it o
surfing than for any other use, such as making
real time traffic updates along with voice phone calls or so.
guided step-by-step navigation directions in
mobile devices. It enables users to receive
i
detailed and live traffic information via their
smartphones. The company maintains a
l c a Apart from net surfing, mobile browsers are
also used for e-mailing, making online
payments or booking online tickets. Whatever
ub
database to store real-time traffic information
on traffic congestion, major road works, road
is the reason, mobile internet browsing has
become an important aspect of m-commerce
closures, incidents and accidents. The
l P
information is assimilated in the application
u
and is delivered to the mobile devices along
and more and more people have started
spending a considerable amount of time in
viewing web pages in their mobile devices
ah
with suggestions regarding alternative routes while travelling. In spite of the smaller size
to avoid delay. It also delivers mobile maps and lower resolution of the mobile browsers,
statistics has shown that a considerable
R
to drivers to keep them dynamically informed
about traffic conditions in nearby regions. This number of people finds mobile browsers
is Australia’s first-ever national traffic and more comfortable than any other form of
navigational service available to mobile internet surfing. With a global increase in cell
devices of the drivers. phone ownership and rapid growth of
wireless mobile applications, experts predict
9. Weather Forecast that in near future, mobile devices will
Weather forecasting is the science of dominate the field of web browsing.
predicting state of weather in a future time in
a particular locality and plays an important
role in planning of tours and events in
numerous business and personal occasions.
It collects quantitative data about current state
of atmosphere such as humidity, barometric
pressure, sky condition, temperature, etc. and
analyses the data scientifically to project future
state of atmosphere. Such weather forecasts
can predict amount of rain, snowfall,
temperature, wind chill, etc. at any time of
21
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
Mobile Commerce, also known as m-commerce, is defined as the process of performing business
transactions using handheld mobile devices which are connected through wireless networks. The business
transactions may range from buying and selling goods, making mobile payments, downloading audio/
video contents, playing online games, using numerous software applications or getting mobile tickets. The
mobile devices include cellular phones, handheld computers such as palmtops or laptops, pagers,
smartphones and Personal Digital Assistants (PDA). The mobile users can access internet through these
devices without any wired connection or a computer. Powered with the emerging technology based on
Wireless Application Protocol (WAP), m-commerce employs web- ready micro browsers in these mobile
devices to surf through the internet anytime, anywhere on earth.
2. Wireless Communication Technology?
ns
tio
Ans :
a
Mobile commerce is based on wireless communication technology. The wireless communication
c
technology has emerged as the new choice of modern corporate world. The wireless networking has
l i
some distinct advantages over traditional wired networking that employs co-axial, twisted pair or fibre
ub
optic cables for physical connection between two or more computing devices. In wireless networking, the
data transfer between computers are facilitated by microwaves, radio waves or infrared waves. It eliminates
the cumbersome cabling process involving bulky cables with a significant reduction in labour and material
P
cost as well as development time. The wireless networking technology together with wireless application
l
protocol provides the backbone of mobile commerce applications. In various vertical markets, such as
u
retail, healthcare, manufacturing and warehousing, mobile commerce gained acceptance and provided
ah
increased productivity through the usage of mobile devices. The mobile handheld devices are used to
transmit data in real time to centralized hosts through wireless networks.
3.
Ans :
R
Principles of Mobile Commerce.
Mobile commerce is based on wireless mobile communication system, which utilizes digital cellular
technology.
The cellular network consists of a number of cell sites.
Each cell site consists of a stationary base station (a radio frequency transceiver), an adjacent tower
antenna (for transmission and reception of signals) and a surrounding cell (a hexagonalshaped
geographical area).
Each cell is allotted a band of radio frequencies and provides coverage to any portable mobile
device that comes within the geographical range of the cell. Whenever a mobile device such as a
mobile phone or a pager, etc., comes inside a cell, it starts communicating with the base station
using one of the cell frequencies.
The base station receives the signal from the mobile device and transmits using the tower antenna
to a distant base station for call delivery.
22
Rahul Publications
UNIT - I MOBILE COMMERCE
Ans :
(i) Anytime Anywhere
Mobile commerce together with wireless communication technology and wireless broadband internet
access, keeps the mobile user connected with the internet while travelling across the globe. The
business information is available to the mobile user any time of the day and anywhere around the
globe. This anytime/anywhere internet access makes business transactions more flexible and customer
communications more efficient, which in turn improves the productivity of the company and increases
customer satisfaction. The valuable market information, stock/share prices, inventory position, delivery
schedule, etc. are instantly available at the fingertips. Handheld devices, such as Blackberry, etc.
work on internet mode and allow users to continuously send/receive electronic mail, download
news alerts, stock prices and receive weather updates. The round the clock (24 x 7) internet availability
benefits many users to conduct business transactions from their homes or from any other place
ns
while on the move and at any convenient time. Thus m-commerce offers greater mobility and
flexibility to mobile users in performing business transactions using their handheld mobile devices.
(ii) Cost-effective
a it o
The costs of transactions using mobile devices are relatively low. The time-critical business data,
b l i c
such as reports, photographs, etc. can be captured and transmitted easily from the mobile devices
without involving any bulky expensive equipment. The customer queries can be attended and
support provided instantly from the mobile device, thus making customer support more
P u
comprehensive. The SMS-based micro payments facilitate bank account transfer within a few seconds
and at the cost of an SMS. Contact less smartcard-based mobile payments provide a low cost
ul
alternative for toll tax payments in mass transit systems. In case of mobile billing, users can pay for
electricity bills, telephone bills, petrol, grocery, etc. through their mobile phones. The payments
ah
made in the mobile phones for such items will appear as part of their mobile phone bills, thus
eliminating the need for a third party payment mechanism such as, credit cards. This reduces the
R
cost of payment to a large extent.
(iii) Personalized Service
Mobile commerce offers a number of personalized services to the mobile users depending on their
various requirements and purposes. The digital cellular technology can monitor the location of user
performing mobile transactions. Knowledge of the user’s location may be used to deliver timely
and useful contents such as product availability and discount information to the potential customer.
Timely information, such as flight schedules and flight availability can be delivered to the user at the
last minute.
5. Limitations of Mobile Commerce.
Ans :
1. Small Screen Size
Mobile devices have smaller screen size (of the order of 2 by 3 inches) and poor resolution which
makes them inconvenient for browsing applications. Data entry can be quite difficult using small
combinational keypad that comes with most of the mobile handheld devices. The wide and high
23
Rahul Publications
BBA III YEAR V SEMESTER
resolution screens in conventional desktops or laptops used in e-commerce applications offer ease
of use in data entry operations as well as viewing web pages. These larger screens support 1920 ×
1080 resolution and 3D graphics display. Although mobile devices offer greater mobility and flexibility
in accessing information, the smaller screen size restricts the amount of information that could be
presented and offers a less convenient user interface in the form of menu-based scroll-and click
mode of data entry.
2. Low speed processor
Most mobile devices come with low-powered processors with much lower processing speed compared
to sophisticated processors (i.e. core 2 duo or i-core series) used in desktops or laptops. Such low
speed processors restrict the download speed in most mobile commerce applications. The applications
requiring too much processing power should be avoided as they may become irritably slow due to
low speed processors. Also, keeping the low processor speed in mind, the mobile websites must be
optimized to ensure customer satisfaction. Unnecessary plug-ins, flash images and animations should
be removed to ensure speed of delivery.
ns
tio
The mobile devices do not have large storage space. The memory capacity in mobile devices is in
the order of 5 GB to 10 GB compared to 2 TB or higher used in desktops/laptops. So, it is difficult
l i c a
to store large video files in mobile devices for future use. The mobile application developers must
be concerned about the size of their applications during the development phase.
6. Payment Model.
ub
Ans :
l P
In this model, mobile payment service providers offer mobile payment services that allow users to
u
ah
make cashless payment transactions including banking transactions, share trading, tax/bill payments and
ticket or other retail purchases using credit/debit card or bank PIN. The payment service providers have
R
collaboration with banks (or other financial institutions) and/or mobile network operators, and accordingly
get bank-controlled mobile payment model or operator controlled mobile payment model. The payment
service provider charges a certain percentage fee for each payment transaction made through the payment
application. Alternatively, the user can pay a nominal monthly subscription fee to the payment service
provider and can use the service as and when required.
7. Advertiser Model
Ans :
This model is an extension of traditional e-commerce advertiser model and provides mobile websites
which can be viewed by mobile users in their handheld mobile devices. Advertising companies can display
their advertising messages in the website and pay a rental fee to the hosting website for displaying their
messages. These mobile advertising websites usually offer some basic services such as email service, search
engines, news service or social networking service to the users and post advertising messages in these sites
to enjoy greater coverage. The advertisements often come with purchase buttons that allow users to
purchase the product directly from their mobile devices. The mobile payment service is also provided to
facilitate mobile purchase directly from the advertising websites. The advertiser companies pay a fixed fee
24
Rahul Publications
UNIT - I MOBILE COMMERCE
to the advertising website for displaying their advertising messages. Additional revenue is generated for
each purchase transaction made by the user through the website.
ns
Electronic commerce, commonly known as E-commerce is trading in products or services using
it o
computer networks, such as the Internet.
Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer,
i a
supply chain management, Internet marketing, online transaction processing, electronic data
c
interchange (EDI), inventory management systems, and automated data collection systems.
l
ub
Modern electronic commerce typically uses the World Wide Web for at least one part of the
transaction’s life cycle, although it may also use other technologies such as e-mail.
Definition
ul P
Sharing business information, maintaining business relationships and conducting business transactions
ah
using computers connected to telecommunication network is called E-Commerce.
10. Compare and contrast E-commerce and M-Commerce.
Ans :
S.No.
1.
R Factors
Mobility
E-commerce
E-commerce employs wired networks
M-commerce
M-commerce employs high frequency wireless
for internet connectivity and hence is networks for providing wireless internet and
restricted inside a building. It offers is completely ubiquitous in nature. It offers any
anytime connectivity. time anywhere connectivity.
2. Reliability Wired networks are more reliable and Wireless networks suffer from interference from
suffer less interference and noise. Quality adjacent channel frequencies or reflected waves
of data transmitted is better as there is that tend to reduce the intensity and quality of
little or no cross -talk. transmission. Special error detection techniques
are employed to eliminate errors in transmission
and improve signal quality.
25
Rahul Publications
BBA III YEAR V SEMESTER
3. Speed The transmission speed of wired net The transmission speed of modern wireless
works are much higher (of the order networks are usually of the order of 100 Mbps.
of 1000 Mbps)
4. Security E-commerce transactions are more M-commerce transactions through wireless
secured as the networks remain well- networks are more vulnerable to hacker and
protected inside campus buildings. other security attacks and require stringent
Firewalls and proxy servers are used security arrangements in the form of encryption
to keep confidential business data and firewalls to prevent damage or misuse of
secured in the central server. private data during transmission.
11. Mobile Banking.
Ans :
ns
Mobile banking is the process of performing banking transactions such as balance checking, account
tio
transfer, bill payments, credit card-based payments, etc. through a mobile device, such as a mobile phone
or a Personal Digital Assistant (PDA). Such transactions could be performed from any remote locations
l i c a
and at any time of the day irrespective of the normal working hours of the bank. In order to avail the
mobile banking facility, the customer must have an account in the bank, the mobile phone number must
ub
be preregistered in the bank and also the network service provider (for the mobile device of the customer)
must have a tie-up with the bank. When the customer wants to perform a mobile banking transaction, the
P
transaction request from the customer first goes to the premises of the mobile service provider, and from
l
there it is finally routed to the bank. Depending on the type of transaction, two types of mobile banking
u
are available, namely SMS banking and WAP-based mobile banking. SMS banking is usually used for
ah
non-financial transactions, such as viewing of balance statement, requesting for a checkbook, status checking
or stopping a check payment although some banks permit financial transactions also through SMS banking.
R
In SMS banking, an SMS code requesting a transaction is sent to a particular number (as directed by the
bank) from the mobile device of the customer. As soon as the bank receives the SMS, the required
transaction is performed, the information is retrieved (in case of non-financial transaction) and sent back
to the customer mobile phone in the form of another SMS. The entire transaction takes only a few
seconds and the cost of the transaction is only that of an SMS. For different types of transactions different
SMS codes are used.
12. Mobile Ticketing
Ans :
Mobile ticketing is a special application of m-commerce which allows users to purchase tickets for
air/rail/bus travel or for any sports/entertainment events from any location and at any time using mobile
phones or any mobile device. The users can avoid tedious and time consuming process of getting paper
tickets after waiting in a long line and the organizations can reduce production, distribution and infrastructural
cost by providing simpler ways to purchase tickets anytime/anywhere. Mobile tickets are available for a
number of cases, such as mass transit tickets, airline check-in, movie/theatre shows, sporting events,
consumer voucher distribution, and so on. There are a variety of options by which a user can purchase
26
Rahul Publications
UNIT - I MOBILE COMMERCE
mobile tickets, such as online purchase from merchant website, from WAP page in the mobile handset,
purchase via SMS from the mobile handset, over the phone from a voice call or through a secure mobile
ticketing application. Due to the convenience it offers to the customers and cost savings it offers to the
companies, mobile ticketing is gaining momentum and more and more people are opting for mobile
ticketing.
13. Mobile Computing.
Ans :
Mobile computing is a technology that allows users to perform normal computing operations, such
as internet surfing, document preparation, spread sheeting, preparing PowerPoint presentations, send/
receive e-mails or download MP3 audio files using portable computing devices while in transit. The portable
computing devices include smart phones, personal digital assistants, laptops, ultra mobile PC or wearable
computers. Some of these portable computers have bigger screens compared to mobile phones and
s
hence overcome the small screen limitations. For example, Apple iPad comes with an 8" x 10'’ screen,
n
which is suitable for reading e-books as well as viewing websites.
a it o
b l i c
P u
ul
R ah
27
Rahul Publications
BBA III YEAR V SEMESTER
n
tio
as . [c]
(a) investment broking (b) portfolio management
5.
(c) contract broking
Mobile wallets are known as
l i c a
(d) money transfer
[b]
(a) wallets
(c) bank accounts
ub (b) e-wallets
(d) mobile account
6.
(a) TCP/IP
ul
Mobile devices send request through
P protocol
(b) HTTP
[b]
ah
(c) FTP (d) UDP
7.
8.
A
(c)
R
(a) MID
is a small multimedia enabled mobile device
Smart phone
A mobile browser is also known as
(b) UMPC
(d) None
.
[a]
[a]
(a) Micro browser (b) Mobile web
(c) www (d) None
9. The platform used by e-commerce and m-commerce is . [b]
(a) One-time (b) Webstores
(c) Websites (d) None
10. Mobile portals are referred as . [a]
(a) Portable portals (b) Transferable portals
(c) Moving portals (d) Wireless portals
28
Rahul Publications
UNIT - I MOBILE COMMERCE
2. perctange of user use smart phone for buying and selling of products.
a it o
10. A mobile browser is also known as
b l i c
ANSWERS
1. Buy or sell
P u
2.
3.
89%
ul
Communication
4.
5.
6.
ah
Mobile phones
R
Mobile browsing
Mobile accounting
7. C-wallets
8. Theoretical and empercial
9. MID
10. Micro browser
29
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
Mobile Commerce, also known as m-commerce, is defined as the process of performing business
transactions using handheld mobile devices which are connected through wireless networks.
2. Expand WAP.
Ans :
Wireless Application Protocol.
3. Expand CDMA.
Ans :
ns
tio
Code Division Multiple Access
a
4. Expand TDMA.
Ans :
Time Division Multiple Access
b l i c
5. Define E-Commerce.
P u
Ans :
ul
Electronic commerce, commonly known as E-commerce is trading in products or services using
ah
computer networks, such as the Internet.
6.
Ans : R
Define Mobile Payments.
Mobile payment is an alternative payment system where the mobile user makes payment using the
mobile device for a wide range of services or goods.
30
Rahul Publications
UNIT - II MOBILE COMMERCE
s
Q1. What is a mobile client? What are the one dashboard that can be accessed from
features of a mobile client.
n
any device.
it o
Ans : A mobile client offers the following benefits
Improved customization
a
A mobile client is a technology designed to
extend the features of a company’s mobile
l
telephone system. The technology makes it easier
for employees to:
P u
Separate personal and business communi- These include but are not limited to selective
silent mode, ring tone filtering, and switching
ul
Manage business calls while out of the office
Transition smoothly from using a company
easily between private and business phone
profiles.
ah
desktop computer to a mobile device More ways to communicate
A mobile client is designed to make it easier A mobile client makes it easier to bridge the
R
to integrate portable devices into a company’s
communication workflows.
A mobile client is invaluable if your company
has a largely mobile workforce, or if has a team
divide between desktop and mobile
communication. For example, a mobile client
allows users to take voice messages from their
computer, or receive mobile calls as though
they were inside the corporate network.
structure where people shift dynamically across
mobile and desktop devices. Using this technology, Q2. List and explain various types of Mobile
your people can easily keep track of their Clients.
communications, and your customers and clients
will be presented with a unified and consistent Ans : (Imp.)
corporate face. Following are the types of Mobile Clients :
Features 1. Mobile Phones
A mobile client allows your company to: 2. PDA’s
Maintain a centralized list of contacts across
3. Laptop computers
desktop and computer devices.
4. Vehicle mounted devices
Easily route business calls to a mobile device
from your corporate switchboard. 5. Hybrid devices
31
Rahul Publications
BBA III YEAR V SEMESTER
ns
a small physical keyboard, and some had an
electronically sensitive pad on which
tio
in a pocket. These phones used primitive handwriting could be received. Original uses
RFID and wireless systems to carry signals for a personal digital assistant included
from a cabled PSTN endpoint.
i
Later, mobile phones belonging to the Global
System for Mobile Communications (GSM)
l c a schedule and address book storage and
retrieval and note-entering. However, many
types of applications were written for PDAs.
network became capable of sending and
ub
receiving text messages. As these devices Features
l P
evolved, they became smaller and more
features were added, such as multimedia
u
messaging service (MMS), which allowed
The ascent in the quantity of PDA clients
has required the assembling of various
frill just as opening of administration
ah
users to send and receive images. focuses that acknowledge PDAs for fix.
Most of these MMS-capable devices were also
These organizations’ master fix faculty
R
equipped with cameras, which allowed users
to capture photos, add captions, and send
them to friends and relatives who also had
MMS-capable phones.
are talented in dealing with various issues
and potential parts substitution.
Convenient advanced aides, or PDAs,
are perhaps the most recent bit of must-
Along with the texting and camera features,
cell phones started to be made with a limited have innovation for a huge number of
capability to access the Internet, known as clients.
“data services.” The earliest phone browsers
PDAs are pocket-sized gadgets that may
were proprietary and only allowed for the
consolidate a mobile phone, camera,
use of a small subsection of the Internet,
organizer, Web program and many
allowing users to access items like weather,
news, and sports updates. other helpful highlights for business and
individual use.
Eventually, phone makers started to engineer
these phones to access the entire Internet, In any case, there are a few significant
and webmasters for all sorts of businesses, focal points and weaknesses to
government offices and other domain holders possessing a PDA that forthcoming
started to make web sites responsive to access purchasers ought to weigh prior to
by mobile phones. The trend, called choosing.
32
Rahul Publications
UNIT - II MOBILE COMMERCE
Advantages Interruption
Availability PDAs may likewise turn into an
One of the primary preferences of interruption when they’re not satisfying
possessing a PDA is the capacity to stay an authentic need. The capacity to be
in contact with individuals through constantly associated can prompt sat
email, text informing and telephone. around riding the Web, settling on
Since PDAs are so convenient and telephone decisions or messing around.
networks so broad, clients can take them Some business clients whine of being
anyplace. “available to come in to work” when
their colleagues and bosses can reach
Association
them whenever.
Another advantage of possessing a PDA
is expanded association. Schedule and Restricted in Scope
rundown applications make it simple to PDAs are restricted in degree. They are
monitor arrangements, make notes in a neither PC substitutions nor would they
hurry and document past discussions or be able to be successfully used to
other information.
s
supplant mobile phones. PDAs are not
n
furnished to manage miniature
it o
Status
preparing capacities.
For some PDA clients, the gadget has
the additional advantage of meaning a
specific status. Organization gave PDAs
l i c
might be held for more significant level a Time constraint
PDAs are not generally the best response
to business arrangements. Paper-based
ub
representatives and can come to connote
a place of power or significance. For
coordinators are a more reasonable
choice since PDAs are hard to utilize,
P
individual clients, having the most recent information passage is abnormal, they
PDA might be an indication of riches or
l
innovative information.
u
are moderate and beginner clients
discover them superfluously unpre-
ah
Broad Internet Connectivity dictable.
For occupied people, the primary 3. Laptop Computers
R
preferred position of getting a PDA is
being able to remain associated through A laptop may be a pc that will be easily
email, calls, text informing and different carried to a variety of locations. It’s also called
courier applications. These are worked a transportable pc. It can run an equivalent
with broad organization network so set of software and a set of files as that of a
clients can get to the Internet anyplace personal computer. A laptop features a built-
they are. in monitor, keyboard, touchpad, and
speakers and may be powered by a
Disadvantages chargeable battery. It had been first invented
Cost by British designer Bill Moggridge. A laptop
One of the greatest hindrances of a PDA is employed widely thanks to its portable
nature.
is the expense. Other than paying for
the gadget itself, most PDAs require the Advantages
purchaser to buy in to a utilization
(i) Mobility
contract. This includes a month to month
bill and the chance of overage charges The main advantage of a laptop, as
if the client outperforms his designated compared with a stationary computer,
free telephone minutes or information is its mobility. The lightweight, compact
limits. size, the built-in battery within the laptop
33
Rahul Publications
BBA III YEAR V SEMESTER
tio
Fi. (iv) Highly insecure
a
(iv) Offline operation The laptops are generally stolen thanks
i
The laptop is additionally convenient to
l c
use for all types of presentations. In this
b
case, you are doing not dependent upon
to their heavy cost. The thieves may
misuse the stolen business data or
personal data which will convince be very
P u
the technical equipment of the venue.
As the laptop can work offline from its
dangerous. Hence, both the physical
protection of laptops and the
mains.
ul
battery so no need to connect from the safeguarding of knowledge are very
important.
ah
(v) Health issues
(v) Instant
Prolonged use of laptops can cause RSI
R
Usually carrying a laptop means your
thanks to their flat keyboard and
ticket to instant access to information,
trackpad pointing devices. The
be it personal or professional. It results
integrated screen of the Laptop often
in better collaboration between co- causes the users to hunch for a far better
workers or students. view than can cause neck or spinal
Disadvantages injuries.
(i) Frequent Upgrades (vi) Durability
The laptops are difficult to upgrade Thanks to their high portability laptops
thanks to their integrated design. The are subject to more wear and tear.
sole parts which will be upgraded are Laptop components like screen hinges,
hard disc and memory as these are the latches, and power jacks are susceptible
sole parts that are accessible to the user. to deteriorate gradually thanks to
It’s very difficult to repair it. As every ordinary use.
laptop has its own proprietary design 4. Vehicle mounted Devices
and construction, they’re difficult to Vehicle-mounted devices or Vehicle-mounted
upgrade. Additionally, they need a high computers are digital devices that are designed
maintenance cost too. to perform multiple business-specific
34
Rahul Publications
UNIT - II MOBILE COMMERCE
ns
devices can be transformed onto a tablet by
rotating, sliding or folding the keyboard within
it o
with the latest data and information, can
or behind the frame of the system. The
compute precise results leaving no room for
detachable variants can disengage their
human error and manage large-scale
inventories with efficiency.
Industries that Make Use of Vehicle-Mounted
ul
Transportation & Logistics
Manufacturing P recovery and hybrid hosting. As a result, they
find extensive applications across various
industries, including education, banking,
ah
financial services and insurance (BFSI),
Construction telecommunication, manufacturing and
transportation.
R
Distribution
Oil & Gas
2.2 DEVICE LIMITATIONS
Supply chain
Q3. List out the major device limitations of
Characteristics of Vehicle-Mounted
mobile commerce technology.
Devices:
The Must-haves Ans : (Imp.)
Durability Mobile technology devices come with
strengths, but also limitations. These strengths and
Flexibility to connect to any additional
limitations play out in good mobile user experiences.
peripherals & accessories
(i) Small Screen
Light weight
In spite of the modern trend towards larger-
Easy deployment
screen phones, what makes mobile phones
Simple integration so convenient and portable is their small size.
Variety of display sizes Compared with desktop and even laptop
screens, phone screens accommodate a lot
Shock and vibration resistance less content. As a result, screen size is a serious
35
Rahul Publications
BBA III YEAR V SEMESTER
limitation for mobile devices. The content memorability and discoverability. On the
displayed above the fold on a 30 inch other hand, it’s hard to type proficiently on a
monitor requires 5 screen fulls on a small 4- tiny virtual keyboard and it’s easy to
inch screen. Thus, mobile users must accidentally touch the wrong target.
(1) incur a higher interaction cost in order
(v) Variable Connectivity
to access the same amount of
information. Even in the era of fast cellular networks and
(2) rely on their short-term memory to ubiquitous Wi-Fi, coverage is not universal
refer to information that is not visible or equally good. Phone users frequently
on the screen. It’s thus not surprising complain about connectivity problems. Every
that mobile content is twice as difficult. new page load translates into a significant
Portable = Interruptible waiting time when the network does not
cooperate.
(ii) Mobile technology devices are portable
Most fit easily in a pocket or purse and they If you want users to finish their tasks on your
s
tend to follow us everywhere. Because we mobile site or in your app, mind the waiting
n
use phones in a variety of contexts and time. Design pages that are light, yet contain
tio
situations, we are more likely to as much information as possible, to avoid
be interrupted when using such devices: an many back–and–forth trips from client to
a
external event in the outside environment server. Minimize the number of steps and,
may demand our attention and require us to
stop whatever we were doing on the small
b l i
screen. As a result, attention on mobile is c (vi)
ultimately, the number of page loads.
No Hover State
u
often fragmented and sessions on mobile
devices are short. In fact, the average mobile
session duration is 72 seconds. In
P
Visible
ul
comparison, our own studies show that on
desktop, the average session is 150 seconds:
visual means. It may be nested in sub-
sections or child pages, but the content
ah
more than twice as large. is nonetheless accessed from visible
(iii) Single Window navigational elements such as buttons
R
Although some device manufactures are trying
to accommodate multiple windows on the
screen at the same time, the limited size of
the mobile screen makes that goal quite
or links.
Convention
By relying on mobile design conventions
unpractical, even with today’s larger-screen you may hide content and only display
phones. The vast majority of users only see a it when the user employ certain gestures
single window (and thus a single application such as swipe or shake, or when the user
or website) at a time; they cannot split the drags content around such as pull-to-
screen (as on the desktop) and work with two refresh.
different apps simultaneously.
(vii) Slow and Error-Prone Typing
(iv) Touchscreen
Touchscreens come with many blessings and Typing on a touch keyboard is a slow and
sins. Gestures represent a hidden, alternate error-prone exercise so make sure to keep
user interface (UI), that, when built with the your form fields to an absolute minimum and
right affordances, can make the interaction pre-select clever defaults. Furthermore, you
fluid and efficient and can save screen real need to consider how you deal with errors in
estate. But they also suffer from low data.
36
Rahul Publications
UNIT - II MOBILE COMMERCE
(viii) Inaccurate Clicks The following are the golden rules stated by
Theo Mandel that must be followed during the
On touch devices people use their fingers to
design of the interface.
click links and buttons on the screen, which
significantly decrease the accuracy of clicks. Place the user in control
This is also known as the “fat finger problem”. Define the interaction modes in such a
In practice, this means you must consider way that does not force the user into
the size and proximity of all clickable unnecessary or undesired actions
elements, making sure they’re large enough The user should be able to easily enter and
to reliably touch with a human finger and far exit the mode with little or no effort.
enough apart that users won’t accidentally
Provide for flexible interaction
touch the wrong element.
Different people will use different interaction
2.3 CONSIDERATIONS FOR USER INTERFACE mechanisms, some might use keyboard
commands, some might use mouse, some
AND APPLICATION DESIGN
might use touch screen, etc, Hence all
Q4. What is the need of user interface?
ns
interaction mechanisms should be provided.
it o
Ans : (Imp.) Allow user interaction to be interrup-
table and undoable
a
User interface is the front-end application view
When a user is doing a sequence of actions
to which user interacts in order to use the software.
The software becomes more popular if its user
interface is:
l
Simple to use Streamline interaction as skill level
advances and allow the interaction to
ahu
Responsive in short time
Clear to understand
be customized
Advanced or highly skilled user should be
R
Consistent on all interface screens provided a chance to customize the interface
as user wants which allows different
Types interaction mechanisms so that user doesn’t
There are two types of User Interface: feel bored while using the same interaction
mechanism.
1. Command Line Interface
Hide technical internals from casual
Command Line Interface provides a users
command prompt, where the user types the
command and feeds to the system. The user The user should not be aware of the internal
technical details of the system. He should
needs to remember the syntax of the
interact with the interface just to do his work.
command and its use.
Design for direct interaction with
2. Graphical User Interface
objects that appear on screen
Graphical User Interface provides the simple The user should be able to use the objects
interactive interface to interact with the and manipulate the objects that are present
system. GUI can be a combination of both on the screen to perform a necessary task.
hardware and software. Using GUI, user By this, the user feels easy to control over
interprets the software. the screen.
37
Rahul Publications
BBA III YEAR V SEMESTER
Q5. Explain User Interface designing toolkit that allows the creation of windows,
Process. menus, device interaction, error messages,
commands, and many other elements of an
Ans : (Imp.)
interactive environment can be used for
The analysis and design process of a user completing the construction of an interface.
interface is iterative and can be represented by a
4. Interface Validation
spiral model. The analysis and design process of user
interface consists of four framework activities. This phase focuses on testing the interface.
The interface should be in such a way that it
1. User, task, environmental analysis, and
should be able to perform tasks correctly and
modeling
it should be able to handle a variety of tasks.
Initially, the focus is based on the profile of It should achieve all the user’s requirements.
users who will interact with the system, i.e. It should be easy to use and easy to learn.
understanding, skill and knowledge, type of Users should accept the interface as a useful
user, etc, based on the user’s profile users one in their work.
are made into categories. From each category
requirements are gathered. Based on the
requirements developer understand how to
ns
2.4 DEVICE LOCATION TECHNOLOGY, GPS,
tio
TRIANGULATION
develop the interface. Once all the
requirements are gathered a detailed analysis Q6. What is Location Tracking ?
is conducted. In the analysis part, the tasks
that the user performs to establish the goals
of the system are identified, described and
li c a (OR)
Explain the Concept of Location
elaborated.
ub Ans :
Tracking ?
2. Interface Design
l P
The goal of this phase is to define the set of
u
interface objects and actions i.e. Control
Location tracking refers to technologies that
physically locate and electronically record and track
ah
mechanisms that enable the user to perform the movement of people or objects. Location
desired tasks. Indicate how these control tracking technology is in use every day with GPS
R
mechanisms affect the system. Specify the
action sequence of tasks and subtasks, also
called a user scenario. Indicate the state of
the system when the user performs a
navigation, locations located on digital pictures and
searching for businesses nearby using common
apps. While location tracking is often associated with
smartphone use since smartphones have a GPS
chip, there are other ways location tracking is done.
particular task. Always follow the three golden
rules stated by Theo Mandel. Design issues The Global Positioning System (GPS) is
such as response time, command and action location tracking technology that uses data from 24
structure, error handling, and help facilities satellites orbiting the earth. A GPS satellite calculates
are considered as the design model is refined. location by timing how long it takes a radio signal
This phase serves as the foundation for the traveling to reach either a fixed or mobile tracking
implementation phase. device on earth such as a GPS navigation device
built into your car or a smartphone with a GPS chip.
3. Interface construction and implemen-
tation Using multiple satellites, a GPS device can
identify it’s longitude and latitude location and
The implementation activity begins with the display the information to the person using the
creation of prototype (model) that enables device or send the information to a software app or
usage scenarios to be evaluated. As iterative program. A common everyday example is a use of
design process continues a User Interface Internet and mobile map applications on
38
Rahul Publications
UNIT - II MOBILE COMMERCE
smartphones that can calculate your current position your pocket, and activity monitors all have some
using your GPS location and show where you’re location tracking capability, which makes the tracking
located on a map. Because your location of people’s locations and every move a debated
coordinates are sent to a map application, your privacy issue as well.
location is now known by the application, which is
Q7. How does Location Technology Track
location tracking.
the Movements?
Some GPS devices don’t send your location
anywhere, they just record your location and keep Ans : (Imp.)
a record of where you are and where you’ve been. There are several mechanisms inside a typical
Car navigation systems are a commonly used mobile device that can provide location information.
location tracking systems that don’t send your The most common are GPS, RFID, Wi-Fi and
location to anyone, but do keep a record of your cellular technology. We’ll explain these in more detail
location history on the navigation system memory. in the next section, but they all operate on similar
Your “previous destinations” option is a list of principles.
locations you’ve traveled to that you used your A mobile device communicates with other
navigation system for guidance. If you drove
somewhere and didn’t use the navigation system
ns
devices and hubs – such as satellites, routers and
towers – to function. Because the mobile device is
it o
for directions, it likely doesn’t have a record of your pinging off of multiple communication hubs, its
travel. precise location can be triangulated.
b
captured by the smartphone. Sometimes it’s incorporate more than one of these technologies.
P u
necessary to allow an app to use your location for
the app to function. For example, if you want an
(i) GPS
The Global Positioning System is an array
ul
app to tell you the weather in your current location,
you have to give the app permission to obtain your
of satellites that exist solely to help find things
across the planet. Any device with a GPS
ah
location from your smartphone GPS circuit. If you
receiver (which includes most smartphones)
do allow the app permission, the app can obtain
can ping the satellites with that receiver. This
R
your location when it wants to and send your
location back to the app computers that record will cause it to communicate with at least four
information. You might not have a username and satellites, and the satellites can compare the
account with a weather app, but some apps want signal delay to pinpoint where the signal
to use your location and know who you are. originated. This allows your phone to know
exactly where you are and provide turn-by-
Location tracking has many beneficial uses.
turn navigation. A common business use case
Commercial businesses track expensive machinery,
is GPS fleet tracking software, which
fleets of vehicles, and product shipments, seeking
businesses use to remotely keep tabs on their
to prevent equipment inventory loss. Hospitals track
company vehicles and their drivers’
patients to improve efficiency in busy ERs and to
performance.
safeguard infants in maternity wards and allow only
the parents to carry the infants using location (ii) Wi-Fi
tracking devices.
Wi-Fi location tracking is a bit different from
Additional uses for location tracking include other methods. Typically, a device only
wearable gadgets and apps for parents to track their connects to one Wi-Fi network at a time. This
kids and for law enforcement tracks offenders. The eliminates the possibility of triangulation.
cameras you see at red lights, the cell phone app in Instead, this form of location tracking uses IP
39
Rahul Publications
BBA III YEAR V SEMESTER
tio
devices. Businesses with remote work
(iv) RFID
forces often rely on geographic data to
RFID tracking is effectively a combination of
these other methods. The RFID scanner
l i c a
ensure workers are where they need to be.
Fraud Prevention
b
typically has a static location. When it pings
An LBS creates another level of security by
u
off of other networks, the location of the
matching a customer’s location to a credit card
scanner can be logged. When the RFID
ul P
scanner is activated, it can tag its location
when it records the access. This can identify
transaction. Tying the smartphone’s location
to a credit card allows you to flag transactions
made across several geographic locations over
ah
the location of the device accessing the a short time.
scanner.
Q9. What is GPS? And how it is useful in
Ans :
R
Q8. What are the uses of Location based
services.
40
Rahul Publications
UNIT - II MOBILE COMMERCE
it o
and proof of delivery fleets can streamline
1. Improved Safety administrative processes so their team can
The safety of your drivers is no doubt a top
i c
priority for your organization. This starts with
having well-maintained vehicles but should
l a 4.
focus on getting the job done.
Increased Productivity
ub
also focus on monitoring driver behavior and
ensuring that safe driving practices are being
Increasing productivity is a time and money
saver. With a GPS fleet tracking system,
P
businesses can monitor time spent at job sites
followed.
l
or at loading bays and work to ensure drivers
u
Most GPS trackers also have built-in are more productive. Also, by ensuring the
ah
accelerometers and can alert drivers and nearest vehicle is routed to a job, businesses
managers to patterns of poor driving can eliminate waste.
behaviors, such as harsh braking, harsh
R
acceleration, harsh cornering and speeding.
When equipped with AI-enabled dashcams,
fleet managers can go even deeper with
visibility into distracted driving, tailgating and
5. Theft Recovery
Vehicles and equipment are some of the most
valuable assets your business owns.
Therefore, it should come as no surprise theft
recovery is one of the top benefits of GPS
red-light violations.
tracking.
2. Minimize Fuel Costs
When you have GPS tracking installed on
With GPS tracking, fleet owners can your vehicles and other assets, your company
understand when and how their vehicles are can easily monitor the location and set
being operated. Speeding and other poor calendar templates for expected use and
driving behaviors, such as harsh acceleration, quickly identify unusual or unauthorized use.
can decrease fuel efficiency increasing costs.
Get instant alerts when a vehicle or piece of
Unauthorized vehicle use can also significantly equipment is operating outside its designated
increase fuel costs. A GPS tracking system can location or hours of operation. If a vehicle is
alert management to unauthorized use via stolen, location tracking can help authorities
time-of-use restrictions and calendar recover the asset, reducing expensive
templates. replacement and insurance costs.
41
Rahul Publications
BBA III YEAR V SEMESTER
s
Triangulation is a method for calculating a
launched in 2008.
n
position that relies on a known distance between
2. Bada (Samsung Electronics)
tio
two measuring apparatuses and the measured angles
from those two points to an object. This works using Bada is a Samsung mobile operating system
the angle-side-angle triangle congruency theorem
to the find the location of an object.
ub
Triangulation is widely used in wireless mobile
communication to find the location of a cell phone
offers many mobile features, such as 3-D
graphics, application installation, and
multipoint-touch.
l P
user. Triangulation is utilized in cruise navigation,
radar systems, GPS systems in vehicles and other
u
such mobile devices. A triangulation mechanism can
3. BlackBerry OS
The BlackBerry operating system is a mobile
ah
be affected by the presence of steel structures, water operating system developed by Research In
towers, communication posts and signal jammers. Motion (RIM). This operating system was
R
Using two or more points to determine the location
of radio transmitter or cell phone user give much
more reliable results than relying on just one.
designed specifically for BlackBerry handheld
devices. This operating system is beneficial for
the corporate users because it provides
synchronization with Microsoft Exchange,
Novell Group Wise email, Lotus Domino, and
2.5 MOBILE CLIENT SOFTWARE-MOBILE DEVICE other business software when used with the
OPERATING SYSTEMS, MICRO BROWSERS BlackBerry Enterprise Server.
Q12. What is Mobile Operating System? 4. iPhone OS / iOS
42
Rahul Publications
UNIT - II MOBILE COMMERCE
ns
it o
The harmony operating system is the latest Keeps record of CPU status.
mobile operating system that was developed
3. Device Management
8.
by Huawei for the use of its devices. It is
designed primarily for IoT devices.
Palm OS
l i c a The processes may require devices for their
use. This management is done by the OS.
u
The palm operating system is a mobile
operating system that was developed b The OS:
Allocates and deallocates devices to
P
by Palm Ltd for use on personal digital
l
assistants (PADs). It was introduced in 1996.
u
Palm OS is also known as the Garnet OS.
different processes.
keep records of the devices.
ah
Decides which process can use which
9. WebOS (Palm/HP) device for how much time.
R
The WebOS is a mobile operating system that
was developed by Palm. It based on
the Linux Kernel. The HP uses this operating
system in its mobile and touchpads.
4. File Management
The files on a system are stored in different
directories. The OS:
Q14. What are the functions of Operating keeps records of the status and locations
System? of files.
Ans : Allocates and deallocates resources.
43
Rahul Publications
BBA III YEAR V SEMESTER
keeping a record of system perfor- Q16. List out the components of a Mobile
mance. Operating System
Communication between different Ans :
software etc.
The components of a mobile OS are same as
Q15. What are the features of Mobile a basic OS. The components are as follows:
operating system.
1. Kernel
Ans : (Imp.)
A kernel is the core/heart of an OS. It contains
Features all the functions and operations to manage
1. Easy to use the working of OS.
The buttons and features should be easy to The OS executes various process so that the
use. more over, the functionalities should not statements will execute and connect the
application program to the hardware.
be very compilicated.
Features should be powerful and useful.
ns
Whenever a process executes it uses memory,
space and other resources as well.
tio
2. Good app store 3. Interrupt
An app is one of the basic part of an OS.
Good and useful apps forms an important
b
part of an OS. basically a signal which the device generates
to request the CPU. Moreover, whenever an
3. Good battery life
P u
The apps should be simple and interactive.
interrupt occurs the CPU temporarily stops
executing its current process.
ul
Power is one of the main requirement of a 4. Memory Management
ah
smartphone.
It is the management of the main or primary
They require power for processors sensors etc. memory. Furthermore, whatever program is
role.
R
Therefore, the battery holds a very important
44
Rahul Publications
UNIT - II MOBILE COMMERCE
s
remember any commands. PROTOCOLS, WAP, I-MODE
Q17. Define Micro Browser. List out its
advantages.
it o n
Q18. What are the basic protocols used in
Mobile communication.
Ans :
A microbrowser, also called a mobile
browser or wireless Internet browser, is a web
l i c a Ans : (Imp.)
Device that does not need to remain at one
browser designed to be used on a mobile device
ub
like a smartphone or tablet. It functions like a
place to carry out its functions is a mobile device.
So laptops, smartphones and personal digital
P
traditional web browser, but is optimized for viewing
l
pages on a small screen, and to operate efficiently
u
with limited memory and processing power.
assistants are some examples of mobile devices. Due
to their portable nature, mobile devices connect to
networks wirelessly. Mobile devices typically use
ah
radio waves to communicate with other devices and
The first microbrowser was called PocketWeb,
networks. Here we will discuss the protocols used
R
and it was created in 1994 for Apple’s Newton PDA.
The first commercial microbrowser, released
in 1996, was called Net Hopper.
A microbrowser makes it possible to view a
to carry out mobile communication.
Mobile communication protocols use
multiplexing to send information. Multiplexing is a
Web page on a mobile phone/gadget. Initially, Web method to combine multiple digital or analog signals
browsers were used to access content and websites into one signal over the data channel. This ensures
from a WAP protocol and supported basic HTML, optimum utilization of expensive resource and time.
XML and WDML Web page formats. Some websites At the destination these signals are de-multiplexed
also have a mobile version of their site that usually to recover individual signals.
provides the same content, theme and functionality These are the types of multiplexing options
but might have a different layout. Generally, a available to communication channels .
microbrowser has limited Web page zooming
capability, lacks the ability to view dynamic websites FDM (Frequency Division Multiplexing)
and restricts users to only one Web page at a time. Here each user is assigned a different
Popular Web browsers have a mobile version of frequency from the complete spectrum. All
their browser such as Opera Mini or Internet the frequencies can then simultaneously travel
Explorer ,Chrome, Firefox, Safari, UC Browser etc. on the data channel.
45
Rahul Publications
BBA III YEAR V SEMESTER
ns
from users through terrestrial microwave links.
Each base station can support multiple
tio
It was developed in Europe in 1980s and is
now international standard in Europe, handsets depending on its capacity.
a
Australia, Asia and Africa. Any GSM handset (iv) GPRS
with a SIM (Subscriber Identity Module) card
can be used in any country that uses this
standard. Every SIM card has a unique
u
identification number. It has memory to store
applications and data like phone numbers,
P
based on the volume of data they send rather
than the time duration for which they are
l
processor to carry out its functions and using the service. This is possible because
software to send and receive messages
ahu
GSM technology uses TDMA (Time Division
Multiple Access) to support up to eight calls
GPRS sends data over the network in packets
and its throughput depends on network
traffic. As traffic increases, service quality may
R
simultaneously. It also uses encryption to go down due to congestion, hence it is logical
make the data more secure. to charge the users as per data volume
transmitted.
The frequencies used by the international
standard is 900 MHz to 1800 MHz However, GPRS is the mobile communication protocol
GSM phones used in the US use 1900 MHz used by second (2G) and third generation
frequency and hence are not compatible with (3G) of mobile telephony. It pledges a speed
the international system. of 56 kbps to 114 kbps, however the actual
speed may vary depending on network load.
(ii) CDMA
Q19. Explain in detail Mobile Internet
CDMA stands for Code Division Multiple Protocol.
Access. It was first used by the British military
during World War II. After the war its use Ans : (Imp.)
spread to civilian areas due to high service Mobile IP is a communication protocol
quality. As each user gets the entire spectrum (created by extending Internet Protocol, IP) that
all the time, voice quality is very high. Also, it allows the users to move from one network to
is automatically encrypted and hence another with the same IP address. It ensures that
provides high security against signal the communication will continue without user’s
interception and eavesdropping. sessions or connections being dropped.
46
Rahul Publications
UNIT - II MOBILE COMMERCE
Terminologies
Mobile Node (MN)
It is the hand-held communication device that the user caries e.g. Cell phone.
Home Network
It is a network to which the mobile node originally belongs to as per its assigned IP address (home
address).
Home Agent (HA)
It is a router in home network to which the mobile node was originally connected
Home Address
It is the permanent IP address assigned to the mobile node (within its home network).
Foreign Network
a it o
It is a router in foreign network to which mobile node is currently connected. The packets from the
home agent are sent to the foreign agent which delivers it to the mobile node.
Correspondent Node (CN)
b l i c
It is a device on the internet communicating to the mobile node.
Care of Address (COA)
P u
It is the temporary address used by a mobile node while it is moving away from its home network.
ul
R ah
47
Rahul Publications
BBA III YEAR V SEMESTER
Correspondent node sends the data to the mobile node. Data packets contains correspondent
node’s address (Source) and home address (Destination). Packets reaches to the home agent. But now
mobile node is not in the home network, it has moved into the foreign network. Foreign agent sends the
care-of-address to the home agent to which all the packets should be sent. Now, a tunnel will be established
between the home agent and the foreign agent by the process of tunneling.
Tunneling establishes a virtual pipe for the packets available between a tunnel entry and an endpoint.
It is the process of sending a packet via a tunnel and it is achieved by a mechanism called encapsulation.
Now, home agent encapsulates the data packets into new packets in which the source address is the
home address and destination is the care-of-address and sends it through the tunnel to the foreign agent.
Foreign agent, on other side of the tunnel receives the data packets, decapsulates them and sends them to
the mobile node. Mobile node in response to the data packets received, sends a reply in response to
foreign agent. Foreign agent directly sends the reply to the correspondent node.
Q20. Explain working procedure of Mobile IP.
Ans:
The working of Mobile IP can be described in 3 phases:
ns
1. Agent Discovery
a tio
Agents advertise their presence by periodically broadcasting their agent advertisement messages.
c
b l i
The mobile node receiving the agent advertisement messages observes whether the message is
from its own home agent and determines whether it is in the home network or foreign network.
2. Agent Registration:
P u
Mobile node after discovering the foreign agent, sends registration request (RREQ) to the foreign
ul
agent. Foreign agent in turn, sends the registration request to the home agent with the care-of-
address. Home agent sends registration reply (RREP) to the foreign agent. Then it forwards the
ah
registration reply to the mobile node and completes the process of registration.
R
3. Tunneling:
It establishes a virtual pipe for the packets available between a tunnel entry and an endpoint. It is
the process of sending a packet via a tunnel and it is achieved by a mechanism called encapsulation.
It takes place to forward an IP datagram from the home agent to the care-of-address. Whenever
home agent receives a packet from correspondent node, it encapsulates the packet with source
address as home address and destination as care-of-address.
Q21. What are the applications of Mobile IP.
Ans :
The mobile IP technology is used in many applications where the sudden changes in network
connectivity and IP address can cause problems. It was designed to support seamless and continuous
Internet connectivity.
It is used in many wired and wireless environments where users have to carry their mobile devices
across multiple LAN subnets.
Although Mobile IP is not required within cellular systems such as 3G, it is often used in 3G systems
to provide seamless IP mobility between different packet data serving node (PDSN) domains.
48
Rahul Publications
UNIT - II MOBILE COMMERCE
Ans :
WAP stands for Wireless Application Protocol. It is a protocol designed for micro-browsers and it
enables the access of internet in the mobile devices. It uses the mark-up language WML (Wireless Markup
Language and not HTML). It enables creating web applications for mobile devices. In 1998, WAP
Forum was founded by Ericson, Motorola, Nokia and Unwired Planet whose aim was to standardize the
various wireless technologies via protocols.
Internet
WAP
Gateway
ns
a it o
b l i c
P u
ul
Mobile Devices
R ah
49
Rahul Publications
BBA III YEAR V SEMESTER
Ans : (Imp.)
The following steps define the working of Wireless Application Protocol or WAP Model:
The WAP model consists of 3 levels known as Client, Gateway and Origin Server.
When a user opens the browser in his/her mobile device and selects a website that he/she wants to
view, the mobile device sends the URL encoded request via a network to a WAP gateway using
WAP protocol.
The request he/she sends via mobile to WAP gateway is called as encoding request.
The sent encoding request is translated through WAP gateway and then forwarded in the form of a
conventional HTTP URL request over the Internet.
When the request reaches a specified Web server, the server processes the request just as it would
handle any other request and sends the response back to the mobile device through WAP gateway.
ns
Now, the WML file’s final response can be seen in the browser of the mobile users.
c a tio
b l i
P u
ul
R
WAP Protocol stack ah
Application Layer (WAE)
50
Rahul Publications
UNIT - II MOBILE COMMERCE
ns
In some areas, the ability to connect to the
it o
Transaction Protocol (WTP) and runs on top Internet is very sparse, and in some other
of UDP (User Datagram Protocol). This layer areas, Internet access is entirely unavailable.
is a part of TCP/IP and offers transaction
support.
l i c a
It is less secured.
WAP provides a small User interface (UI).
(iv) Security Layer
ub
It contains Wireless Transaction Layer Security
Q26. What are the applications of WAP ?
u P
(WTLS) and responsible for data integrity,
l
privacy and authentication during data
Ans:
The following are some most used
applications of Wireless Application Protocol or
ah
transmission.
WAP:
(v) Transport Layer
R
This layer consists of Wireless Datagram
Protocol (WDP). It provides a consistent data
format to higher layers of the WAP protocol
WAP facilitates you to access the Internet from
your mobile devices.
You can play games on mobile devices over
wireless devices.
stack.
It facilitates you to access E-mails over the
Q24. List out the advantages of WAP.
mobile Internet.
Ans : Mobile hand-sets can be used to access
Following is a list of some advantages of timesheets and fill expenses claims.
Wireless Application Protocol or WAP: Online mobile banking is very popular
WAP is a very fast-paced technology. nowadays.
51
Rahul Publications
BBA III YEAR V SEMESTER
tio
A packet network.
An i-mode server.
Information providers.
l i c a
b
The following picture depicts a very broad overview of i-mode concept
P u
ul
R ah
Ans :
i-Mode Networks utilize two types of computers - servers and clients. Servers are the computers
that hold information and they are called DoCoMo i-Mode Centers. Clients are the computers that we
view the information and they are cellular i-Mode phone.
The following image shows the i-Mode Network structure diagram-
52
Rahul Publications
UNIT - II MOBILE COMMERCE
ns
a it o
There are two other important components involved in connecting to a wireless network. In order
to connect a cellular network to a server, a gateway must exist. Also, the web site must be in an i-Mode
format.
(i) i-Mode Gateway
b l i c
P u
An i-Mode gateway translates wireless requests from a mobile phone to the server and sends
information from a gateway back to the mobile phone.
(ii)
ul
NTT DoCoMo provides a gateway to their users and connects them to i-Mode enabled websites.
i-Mode Enabled Sites
ah
An i-Mode enabled website utilizes pages that are written in C-HTML. The transmission between
the handhelds and the i-Mode-enabled cell sites takes place via packet mode using packets of 128
R
octets at high speed data transmission rates.
An i-Mode phone utilizes a micro-browser to browse i-Mode enabled site. These phones usually
have a title bar with icons at the top of an LCD screen. These icons then allow users to access
various services such as weather forecasts, transportation schedules, data searches, news updates,
etc.
Q29. List out the services of i-Mode.
Ans :
The highly convenient functions offered by i-mode are enriching our lifestyles by crossing the
conventional boundaries of mobile phone functions.
Some of the services that are now available with i-mode include game playing, video viewing and convenient
access to the latest news and weather forecasts.
(i) i-appli: i-mode with Java
This service group consists of software (programs) used with i-mode compatible mobile phone
terminals. Downloading the software makes it possible to automatically update the news and weather
forecast displays as well as to play new games.
53
Rahul Publications
BBA III YEAR V SEMESTER
(ii) i-area: Location Based Service a specialized language for both devices to
This is DoCoMo’s location information communicate, efficiency in setting and printing
service. The i-area service enables the user materials is greatly increased. There are a wide
to check the weather forecast, traffic and store variety of description languages, but the most
information, and other convenient common is Adobe, PostScript.
information for local areas as well as the map
information to the user’s current location. Although many page description language
varieties are detailed enough to be considered
(iii) i-motion : Dynamic Video Content
programming languages, a large portion of them
This feature refers to video distribution are not. These are known as markup languages.
programs for i-mode mobile phone terminals
Similar to hypertext markup language (HTML),
and the contents. The high-speed packet
communication of FOMA entertains users page description markup languages are capable of
with the latest movie theatre information and speaking to a limited number of programs. Just as
details of the sports highlights available in HTML is used primarily to speak with web browsers,
video. most page description language varieties can be read
(iv) i-motion mail
ns
by a particular machine, program, or computer.
tio
This service transfers video captured with an Page description languages are often created
i-motion compatible mobile phone via e-mail. using binary or textual commands. In the case of
It features a transmission speed of up to 15
frames/sec, thus permitting smooth motion
video to be enjoyed on a mobile phone.
P
A function that supports transfer of still images
l
captured with an i-mode compatible phone. every computer. When a command is typed into a
The images may also be sent to mobile
u
keyboard, for example, a series of ones and zeros
phones of other carriers and PCs.
ah
representing the key tells the computer what to do.
(vi) i-channel The main purpose for using a description
R
This service distributes the latest news, weather
forecasts, and other information to i-channel
compatible i-mode phones. The information
is displayed on a standby screen without any
special operation and users can access more
language is to better communicate various aspects
of a printed material from a computer to a printing
machine. Text and graphics are laid out on a
computer screen, but using only output bitmaps
detailed information by pressing a button. limits the amount of information that can be
received by a printer. Using a page description
language relays more information, faster.
2.7 MOBILE DEVICE PAGE DESCRIPTION
LANGUAGES The benefits of using page description
languages include higher quality materials and more
Q30. Explain in detail about Page description efficient printing. Since information is better received
languages.
by a printer using page description languages, the
Ans : (Imp.) color, layout, and resolution is often of a better
quality than they would be if the same item were
Page description language is a type
of computer language used primarily for the printed without them. These languages can also
printing industry. Computers are generally instruct printers on the quantity of materials to be
connected to large printing machines, and by using printed.
54
Rahul Publications
UNIT - II MOBILE COMMERCE
ns
These focus on improving business efficiency
it o
an app, web app, online app, iPhone app or by easing various tasks such as sending emails,
smartphone app. tracking work progress, booking hotels, and
l
the integrated software systems generally found on
i c a
much more.
Lifestyle and entertainment apps
l P
hardware resources of the early mobile devices, their
u
specificity is now part of their desirability because
such as dating, communicating on social
media, as well as sharing (and watching)
videos. Some of the most widely known apps
ah
such as Netflix, Facebook or TikTok fall into
they allow consumers to hand-pick what their devices
are able to do. this category.
R
The simplest mobile apps take PC-based
applications and port them to a mobile device. As
mobile apps become more robust, this technique is
somewhat lacking. A more sophisticated approach
Other app types include mobile commerce
(M-commerce) apps used to purchase goods online
such as Amazon or eBay, travel apps that help a
traveler in many ways (booking tours and tickets,
involves developing specifically for the mobile finding their way through maps and geolocation,
environment, taking advantage of both its travel diaries, etc.), and utility apps such as health
limitations and advantages. For example, apps that apps and barcode scanners.
use location-based features are inherently built from
Q32. What is application software?
the ground up with an eye to mobile given that the
user is not tied to a location, as on PC. Ans :
Apps are divided into two broad categories: Application software is a computer program
native apps and web apps. Native apps are built for that performs a specific function, be it educational,
a specific mobile operating system, usually iOS or personal, or business. It is also known as an end-
Android. Native apps enjoy better performance and user program or a productivity program.Application
a more finely-tuned user interface (UI), and usually software is developed to assist you with a particular
need to pass a much stricter development and process that may be related to creativity,
quality assurance process before they are released. productivity, or better communication. It helps you
55
Rahul Publications
BBA III YEAR V SEMESTER
in completing your tasks, be it jotting down notes, 4. Education and reference software
completing your online research, setting an alarm, This application software, also termed as
keeping an account log, or even playing academic software, is specifically designed to
games.Application software programs are specific facilitate learning of a particular subject.
in their functionality and do the job that they are Various kinds of tutorial software are included
designed to do. For instance, a browser is an in this category. Some of these are
application used specifically for browsing the JumpStart, MindPlay, Moodle, and Kid Pix.
Internet. Similarly, MS PowerPoint is an application 5. Graphics software
designed specifically for making presentations. All
Graphics application software allows you to
the apps that we see on our smartphones are edit or make changes in visual data or images.
examples of types of application software. It comprises illustration and picture editor
Q33. Discuss in detail about few of the software. Adobe Photoshop and PaintShop
application software’s . Pro are a few examples of graphics software.
1. Presentation software
ns
Spreadsheet application software is used to
perform calculations. In this software, data is
tio
Presentation is a type of application stored in a table format. The intersecting area,
software that enables you to represent your called cells, are separated to define fields such
thoughts and ideas with ease and clarity by
l i c
using visual information. It lets you display
the information in the form of slides. You cana as text, date, time, and number. It allows the
users to provide formulas and functions to
perform calculations. Microsoft Excel and
make your slide more informative and
ub
engrossing by adding text, images, graphs,
Google Sheets are examples of spreadsheet
software.
l P
and videos. It has three components:
Text editor to input and format text
u
7. Database software
Database application software is used to
create and manage a database. Also known
ah
Insert graphics, text, video, and
as a DBMS (Database Management System),
multimedia files
it helps you organize your data. So, when
2.
56
Rahul Publications
UNIT - II MOBILE COMMERCE
9. Simulation software
Simulation application software is used in the fields of military engineering, practical education in
certain industries, machinery testing, industrial training, video games, etc. It is used where work on
the actual system or physical environment can be hazardous.
Q34. List out various functions of application softwares.
Ans :
Application software programs are designed to facilitate a large number of functions. Some of
these include:
Data and information management
Document management (document exchange systems)
Visuals and video development
Emails, text messengers, audio and video chats, and collaboration
Accounting, finance, and payroll management
ns
it o
Resource management (ERP and CRM systems)
HR management such as hiring, on-boarding, and separation
Project management
Business process management
l i c a
ub
Educational software (LMS and e-learning systems)
Healthcare application software
ul P
R ah
57
Rahul Publications
BBA III YEAR V SEMESTER
ns
logistics vehicles to forklifts used in complex
warehouse environments, factory floors, and
tio
A mobile client is designed to make it easier manufacturing units.
to integrate portable devices into a company’s Vehicle-mounted devices are needed to
a
communication workflows. perform accurate and quick operations, calculations
b
structure where people shift dynamically across i
A mobile client is invaluable if your company
P u
mobile and desktop devices. Using this technology, designed to perform in harsh weather and extreme
environmental conditions including shocks and
corporate face.
ul
communications, and your customers and clients
will be presented with a unified and consistent
vibrations. Vehicle-mounted devices are deployed
for heightened productivity, to ensure that the mobile
ah
workforce or field-force is always supplied with the
2. Hybrid Devices latest data and information, can compute precise
R
results leaving no room for human error and
Ans : manage large-scale inventories with efficiency.
Hybrid devices refer to the computers 4. Location Tracking .
manufactured with functionalities of multiple devices
that have similar features. Hybrid devices are Ans :
commonly available in the form of combination
Location tracking refers to technologies that
devices with the functionalities of laptop and tablet
physically locate and electronically record and track
computers. They are accessible in both detachable
the movement of people or objects. Location
and convertible forms. The convertible hybrid
tracking technology is in use every day with GPS
devices can be transformed onto a tablet by rotating,
navigation, locations located on digital pictures and
sliding or folding the keyboard within or behind the
searching for businesses nearby using common
frame of the system. The detachable variants can
apps. While location tracking is often associated with
disengage their keyboard and operate as lightweight
smartphone use since smartphones have a GPS
tablet personal computers (PC). These devices also
chip, there are other ways location tracking is done.
consist of additional accessories, processors, sensors
and storage space for effective cloud management The Global Positioning System (GPS) is
and orchestration, disaster recovery and hybrid location tracking technology that uses data from 24
hosting. As a result, they find extensive applications satellites orbiting the earth. A GPS satellite calculates
across various industries, including education, location by timing how long it takes a radio signal
58
Rahul Publications
UNIT - II MOBILE COMMERCE
s
Triangulation is the process of determining the
n
exact location of a radio transmitter. This can be
it o
done using various techniques such as through radial
The Global Positioning System is an array distance, direction or receiving a signal from two to
l i c a
of satellites that exist solely to help find things across three different points and then assessing the exact
location by overlapping of the three radial distances.
Triangulation in cellular communication is
ub
with that receiver. This will cause it to communicate
with at least four satellites, and the satellites can
commonly used to pinpoint the exact geographical
location of a user.
compare the signal delay to pinpoint where the
l P
signal originated. This allows your phone to know
u
exactly where you are and provide turn-by-turn
Triangulation is a method for calculating a
position that relies on a known distance between
ah
two measuring apparatuses and the measured angles
navigation. A common business use case is GPS
from those two points to an object. This works using
fleet tracking software, which businesses use to
R
the angle-side-angle triangle congruency theorem
remotely keep tabs on their company vehicles and
to the find the location of an object.
their drivers’ performance.
9. What is Mobile Operating System?
6. Wi-Fi
Ans : Ans :
A mobile operating system allows the user to
Wi-Fi location tracking is a bit different from
run other different application software on the
other methods. Typically, a device only connects to
mobile, tablets, etc. Moreover, we can say that it is
one Wi-Fi network at a time. This eliminates the
a type of operating system which is specially
possibility of triangulation. Instead, this form of
designed for mobiles, tablets, smartwatches, etc.
location tracking uses IP addresses. Every network
Furthermore, they are a mixture of computer OS
has a physical IP address that allows the greater
with some additional features for mobiles. Also, they
internet to know where it is. This is necessary for it
are comparatively light and simple.
to accurately send information across internet
infrastructure. When your phone connects to a Wi- An operating system (OS) is a program that
Fi network, it pairs with the physical IP of that acts as an interface between the system hardware
network. That allows location services to know your and the user. Moreover, it handles all the interactions
current address. between the software and the hardware.
59
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
ns
WAP stands for Wireless Application Protocol. It is a protocol designed for micro-browsers and it
tio
enables the access of internet in the mobile devices. It uses the mark-up language WML (Wireless Markup
Language and not HTML). It enables creating web applications for mobile devices. In 1998, WAP
l i a
Forum was founded by Ericson, Motorola, Nokia and Unwired Planet whose aim was to standardize the
c
12.
Ans:
What are the applications of WAP ?
ub
u P
The following are some most used applications of Wireless Application Protocol or WAP:
l
WAP facilitates you to access the Internet from your mobile devices.
ah
You can play games on mobile devices over wireless devices.
R
It facilitates you to access E-mails over the mobile Internet.
Mobile hand-sets can be used to access timesheets and fill expenses claims.
Online mobile banking is very popular nowadays.
It can also be used in multiple Internet-based services such as geographical location, Weather
forecasting, Flight information, Movie & cinema information, Traffic updates etc. All are possible
due to WAP technology.
60
Rahul Publications
UNIT - II MOBILE COMMERCE
2. In which one of the following year Mobile phones were invented? [a]
3. In which one of the following countries, the first phone call was made? [a]
ns
(c) France (d) Italy
a it o
4.
(a) Palm
b l i c
Which of the following is not an OS for mobile?
(b) Windows
[a]
(c) Mango
P u (d) Android
5.
ul
is the protection of smart-phones, phablets, tablets, and other portable tech-devices, & the
networks to which they connect to, from threats & bugs. [d]
6.
R ah
(a) OS Security
[b]
61
Rahul Publications
BBA III YEAR V SEMESTER
9. Android is . [a]
ns
c a tio
b l i
P u
ul
R ah
62
Rahul Publications
UNIT - II MOBILE COMMERCE
8.
of people or objects.
The
ns
is location tracking technology that uses data from 24 satellites orbiting the earth.
9.
10.
tracking is effectively a combination of these other methods.
a it o
works much like GPS. Instead of connecting to satellites, though, your device is connecting
c
to cellular towers.
11.
l i
is a method for calculating a position that relies on a known distance between two measuring
b
apparatuses and the measured angles from those two points to an object.
12. A
u
allows the user to run other different application software on the mobile, tablets, etc.
P
l
13. GSM stands for .
14.
ahu
CDMA stands for .
ANSWERS
1.
2.
3.
4.
R
Mobile client
Mobile phone
Personal digital assistant
Laptop
5. User interface
6. Hybrid
7. Location tracking
8. Global Positioning System
9. Cellular tracking
10. RFID
11. Triangulation
12. Mobile operating system
13. Global System for Mobile Communications
14. Code Division Multiple Access
63
Rahul Publications
BBA III YEAR V SEMESTER
Ans:
The Global Positioning System is an array of satellites that exist solely to help find things across the
planet.
2. Wi-Fi
Ans:
Wi-Fi location tracking is a bit different from other methods. Typically, a device only connects to
one Wi-Fi network at a time. This eliminates the possibility of triangulation.
3. RFID
ns
tio
Ans:
a
RFID tracking is effectively a combination of these other methods. The RFID scanner typically has a
c
static location. When it pings off of other networks, the location of the scanner can be logged. When the
l i
RFID scanner is activated, it can tag its location when it records the access.
4. Triangulation
ub
Ans:
ul P
Triangulation is the process of determining the exact location of a radio transmitter. This can be
ah
done using various techniques such as through radial distance, direction or receiving a signal from two to
three different points and then assessing the exact location by overlapping of the three radial distances.
5.
Ans: R
Microbrowser
64
Rahul Publications
UNIT - III MOBILE COMMERCE
Ans :
ns
WWAN (Wireless Wide Area Network) is a WAN (Wide Area Network) and the only thing is that
it o
the connectivity is wireless. It provides regional, nationwide and global wireless coverage. Where Wide
Area Network can be wired or wireless the Wireless Wide Area Network connections are completely
i a
wireless. In our day today life we are using the Wireless Wide Area Network of different sizes and depending
c
on it delivery of telephonic calls, Web pages and streaming video, data sharing occurs.
l
b
WLAN (Wireless Local Area Network) differs from WWAN (Wireless Wide Area Network) technology
wise for example when WLAN uses WiFi to connect and transfer data, WWAN uses telecommunication
u
cellular network technologies such as 2G, 3G, 4G LTE, and 5G to transfer data.
P
ul
WWAN not only always refers to a wide area rather a closed area with large geographic coverage is
also considered as WWAN. For example a MANET (Mobile ad hoc networks) with nodes on buildings
and towers or planes. A Low Power and low bit rate Wireless Wide Area Network (LPWAN) is also considered
ah
as WWAN. For example transmission of small packets of information between things in case of IoT (Internet
of Things) implemented applications.
R
A general example of WWAN which we use in our daily life is a laptop installed with WWAN card
establishes a secure and fastest connection and brings us to online so that we do our work from anywhere.
The below figure illustrates the wireless connection to Wide Area Network.
Wireless WAN
Router
A
Router
B
65
Rahul Publications
BBA III YEAR V SEMESTER
ns
Wireless Cellular Systems solves the problem
tio
1. Reduced transmission speed as compared to of spectral congestion and increases user capacity.
physical connection. The features of cellular systems are as follows:
2.
3.
It is based on IEEE 802.16 standards.
On increase of distance, decrease of
l i c a
Offer very high capacity in a limited spectrum.
Reuse of radio channel in different cells.
4.
throughput occurs and vice versa.
Getting faster due to Gigabit-Class LTE.
ub Enable a fixed number of channels to serve
an arbitrarily large number of users by
reusing the channel throughout the coverage
tages of WWAN.
ul
Q2. List out the advantages and disadvan-
P
region.
Communication is always between mobile and
ah
base station (not directly between mobiles).
Ans :
Each cellular base station is allocated a group
R
Advantages of WWAN of radio channels within a small geographic
Global wireless coverage area called a cell.
Flexible with cloud management, deploying Neighboring cells are assigned different
and relocating channel groups.
By limiting the coverage area to within the
Better security than WLAN
boundary of the cell, the channel groups may
Diverse, cost effective backup for data be reused to cover different cells.
applications. Keep interference levels within tolerable limits.
Quick deployment for new applications. Frequency reuse or frequency planning.
Disadvantages of WWAN Organization of Wireless Cellular Network.
Replacement of lost WWAN may be costly. Q4. How data communication is possible In
To maintain the reliable network connectivity. cellular networks?
To build a cost effective solution is a challenge. Ans :
Decreased throughput during large coverage The coverage area of cellular networks are
area. divided into cells, each cell having its own antenna
66
Rahul Publications
UNIT - III MOBILE COMMERCE
for transmitting the signals. Each cell has its own frequencies. Data communication in cellular networks is
served by its base station transmitter, receiver and its control unit.
The shape of cells can be either square or hexagon:
i) Square
A square cell has four neighbors at distance d and four at distance Root 2 d
Better if all adjacent antennas equidistant
Simplifies choosing and switching to new antenna
ii) Hexagon
A hexagon cell shape is highly recommended for its easy coverage and calculations. It offers the
following advantages:-
Provides equidistant antennas
Distance from center to vertex equals length of side
ns
a it o
b l i c
P u
iii)
l
Frequency Reuse
u
Frequency reusing is the concept of using the same radio frequencies within a given area, that are
ah
separated by considerable distance, with minimal interference, to establish communication.
Frequency reuse offers the following benefits:
R
Allows communications within cell on a given frequency
Limits escaping power to adjacent cells
Allows re-use of frequencies in nearby cells
Uses same frequency for multiple conversations
10 to 50 frequencies per cell
For example, when N cells are using the same number of frequencies and K be the total number
of frequencies used in systems. Then each cell frequency is calculated by using the formulae K/N.
In Advanced Mobile Phone Services (AMPS) when K = 395 and N = 7, then frequencies per cell
on an average will be 395/7 = 56. Here, cell frequency is 56.
Q5. What is CDMA one? Describe the features and applications of CDMAone.
Ans : (Imp.)
CDMAone or IS-95 is a second generation (2G) digital cellular technology that is based on spread
spectrum technique that improves channel capacity substantially by accommodating a large number of
users in a single transmission channel. It is based on the wireless communication protocol IS-95 and is
known by its brand name CDMAone.
67
Rahul Publications
BBA III YEAR V SEMESTER
It was first developed by Qualcomm in 1995, and is primarily used in North America where it
competes with Digital AMPS (IS 136). The data rate of CDMAone is around 300 to 500 Kbps and
operates in 1900 MHz band as well as 800 MHz band. The 3G version of CDMAone is known as CDMA2000
which is gradually replacing CDMAone in North America. In India, Reliance offers CDMA service to
around 40 million subscribers.
CDMA systems employ a combination of digital transmission and spread spectrum technology. The
analog audio (voice) signal is first digitized into binary elements using Analog to Digital Converters (ADC).
Next, the frequency of the digital signal is varied according to a definite pattern or code. The modulated
digital signal is then transmitted through the wireless medium and at the receiving end the signal is decoded
at the receiver with the same code pattern as used in the transmitter. The code pattern is kept secret to
maintain the privacy of the signal and also to make it hacker proof. CDMA uses wide bandwidth for the
signal, so that they include a large range of frequencies and appear as noise signals and are hard to be
intercepted or demodulated by unwanted users. Further, spread spectrum (wide band) signals are difficult
to interfere (jam) with than narrowband signals. These two qualities, namely low probability of intercept
and anti-jam feature, made spread spectrum most appropriate for military applications. The coding used
in spread spectrum systems are pseudo-random in nature which means they are not real (random)
ns
Gaussian code, but statistically generated code sequence which can be repeated over and over again.
Actually, the spread spectrum signals are intentionally made of much wider band than required to carry
tio
the information, in order to make them more noise like so that they become much difficult to intercept
and decode.
l i a
Another important feature of spread spectrum is that as they are of wide bandwidth, they transmit
c
at a much lower spectral power density (of the order of watts per Hertz) than narrow band signals. This
low transmitter power density leads to significant cost cutting. Also, both spread and narrow band signals
ub
can be transmitted over the same channel without any significant interference.
Powered by the above advantages of spread spectrum, CDMA systems have emerged as a major
P
2G cellular system in North America and in a number of other countries and is rapidly evolving into 3G
l
systems, known as CDMA2000 following IX EV-DO standard. Major advantages of using CDMAone
u
systems are as follows:
ah
Increased communication security
Low probability of interference with other signals
R
Simultaneous multi-user access
Increased efficiency, as same channel can accommodate more subscribers
Low power requirement
Extended coverage to remote areas.
Q6. What is CDMA? Explain the features of CDMA.
Ans : (Imp.)
CDMA technology, predominantly used in North America, is based on IS 95 protocol, first developed
by Qualcomm. CDMA differs from FDMA or TDMA in its use of spread spectrum techniques for transmitting
voice and data over wireless medium. Instead of dividing RF spectrum into separate user channels by
frequency slices (FDMA) or time slots (TDMA), CDMA separates users by assigning them different digital
code sequence within the same (wide) frequency spectrum. It ensures increased channel capacity and
immunity from interference among different signals. The CDMA standard is developed and maintained
by GDMA Development Group (CDG), a consortium of major CDMA manufacturers and operators.
CDG’s responsibilities include standardization and improvement of CDMA technology towards third
generation systems, incorporating IS-95 CDMA air interface and implementing ANSI-41 network standard
for switch interconnection.
68
Rahul Publications
UNIT - III MOBILE COMMERCE
Requirements
The three major requirements of CDMA spread spectrum system are as follows:
The bandwidth of the spread signal must be greater than that necessary to send the information.
This reduces chance of interference between different signals and also can accommodate a large
number of signals to achieve multi-user access and improved capacity.
Each information signal in the spread bandwidth is accompanied by a coding sequence which is
independent of the information signal. Both the information signal and the coding sequence are
sent together from the sender (transmitter) through the wireless medium and are received by the
receiver at the receiving end.
The receiver receives the signal in synchronous mode and recovers original information data from
the code sequence and reproduces the information signal. Different code sequences are used for
different user signals and it allows the receiver to receive and reproduce multiple signals synchronously
using the same frequency band at the same time. In order to protect the signal from tampering
during transmission, the code is made pseudo random, i.e. it appears as random, but it is actually
deterministic so that the receiver can reconstruct the code for synchronous detection. The pseudo
ns
random code is also known as pseudo noise as due to a large number of signals present in the
widespread band, the combined signal appears like a noise rather than a focused signal. It makes it
it o
hard to intercept a spread spectrum signal compared to a focused narrowband signal.
The CDMA standard only defines the specifications for the air interface, i.e. the radio link part of the
a
technology. In contrast to GSM standard that defines the total network infrastructure, CDMA allows
c
each network operator to adopt the network structure as they, find suitable. The CDMA technology
l i
provides reliable digital systems offering higher capacity, larger coverage area and improved voice
b
quality. It also offers simplified system planning through the use of same frequency in every sector
u
of every cell.
Features
1. l P
The main features of CDMA systems are discussed below:
u
Improved capacity: CDMA system maximizes spectral efficiency (high data rate transmitted over
ah
a given bandwidth) by allowing a large number of signals transmitted through a single 1.25 MHz
channel. But, in order to maintain such a high data rate, the signal to noise ratio must be maintained
R
at a satisfactory (high) level to ensure good voice quality. However, in order to improve channel
capacity, i.e. maximum number of simultaneous calls handled by the channel, the spectral efficiency
must be kept at a low to avoid interference between different calls. Although dynamic power control
is performed to maintain a good voice quality to combat the dampening effects due to random
variation of external RF environment, signal fading and external interference, a proper balance
between spectral efficiency and channel capacity is required to achieve higher number of simultaneous
calls and higher data rates in CDMA systems. This is achieved through radio resource management
techniques that ensure both high channel capacity as well as high data rate of transmission without
adding more radio spectrum or more base station sites.
CDMA system limits the signal power level to a lower value in order to maintain higher channel
capacity. So, the cell size in CDMA networks are kept small, which ensures better coverage in
densely populated urban areas.
2. Soft handover: Handover is the process by which a call is passed from one cell to another adjacent
cell as the user moves between cells. In traditional hard handover, the connection to the current cell
is broken first and then the connection to the new cell is made. This is known as break-before-make
handover. In CDMA, soft handover is used where the connection to the new cell is made first, and
then the connection to the old cell is broken (make-before-break). This reduces the number of
dropped cells and ensures a smooth transition between cells. Soft handover requires less power,
which reduces interference and helps improving channel capacity.
69
Rahul Publications
BBA III YEAR V SEMESTER
3. Roaming: Major development initiative is taken by CGD for CDMA enhancement to ensure advanced
roaming facility that enables transparent roaming between different cellular networks, such as GSM
etc., across the globe. It allows users to avail roaming facility with selection of networks and other
location based services. Registration, authentication and credit-checking will be performed
automatically while the users switch to different networks during their travel. However, prior roaming
arrangement between network operators is required to ensure smooth operation across the globe.
4. Multipath signal handling: One of the main advantages of CDMA systems is the capability of
handling multipath signal to improve signal strength. Multipath signals are reflected signals that
arrive in the receiver with different time delays. Narrowband systems, such as FDMA or TDMA
cannot discriminate between the original signal and the multipath signals, and hence, resort to
equalization method to minimize signal disturbance. CDMA, being a wideband system, receives
multipath signals and combines them to make a stronger signal at the receiver. For this purpose,
CDMA uses rake receivers which are a set of receivers capable of receiving multipath signals. One of
the rake receivers (finger) continuously searches for different multipath signals and after receiving
one, feeds th£ signal to other three receivers. The three receivers then demodulate their received
s
signals corresponding to the strong multipath. All the three signals from the receivers (fingers) are
n
then combined to get an even stronger signal at the receiver.
tio
Q7. List out various advantages and disadvantages of CDMA.
Ans :
Advantages
l i c a
ub
CDMA has a soft capacity. The greater the number of codes, the more the number of users. It has
the following advantages:-
l P
CDMA requires a tight power control, as it suffers from near-far effect. In other words, a user near
u
the base station transmitting with the same power will drown the signal latter. All signals must have
ah
more or less equal power at the receiver
Rake receivers can be used to improve signal reception. Delayed versions of time (a chip or later) of
R
the signal (multipath signals) can be collected and used to make decisions at the bit level.
Flexible transfer may be used. Mobile base stations can switch without changing operator. Two base
stations receive mobile signal and the mobile receives signals from the two base stations.
Disadvantages
The code length must be carefully selected. A large code length can induce delay or may cause
interference.
Gradual transfer increases the use of radio resources and may reduce capacity.
As the sum of the power received and transmitted from a base station needs constant tight power
control. This can result in several handovers.
70
Rahul Publications
UNIT - III MOBILE COMMERCE
ns
In the following example, the frequency band has been shared by three users. Each user is assigned
definite timeslots to send and receive data. In this example, user ‘B’ sends after user ‘A,’ and
it o
user ‘C’ sends thereafter. In this way, the peak power becomes a problem and larger by the burst
communication.
i c a
cy
l
en
A
qu
b
Fre
B
C B A C
P
B
u A C B A C B A
f0
ul
ah
C
Time
Ans :
Advantages
R
Q9. Discuss advantages and disadvantages of TDMA.
71
Rahul Publications
BBA III YEAR V SEMESTER
Due to the burst mode, a large number micro, pico, and umbrella cells. The coverage area
of additional bits are required for of each cell varies according to the implementation
synchronization and supervision. environment.
Call time is needed in each slot to The time division multiple access (TDMA)
accommodate time to inaccuracies (due technique relies on assigning different time slots to
to clock instability). each user on the same frequency. It can easily adapt
to data transmission and voice communication and
Electronics operating at high bit rates
can carry 64 kbps to 120Mbps of data rate.
increase energy consumption.
Q11. Explain GSM Technology architecture.
Complex signal processing is required
to synchronize within short slots. Ans :
Q10. What is GSM Technology? A GSM network comprises of many functional
Ans : units. These functions and interfaces are explained
in this chapter. The GSM network can be broadly
GSM is a mobile communication modem; it divided into:
stands for global system for mobile communication
(GSM). The idea of GSM was developed at Bell
s
The Mobile Station (MS)
n
tio
Laboratories in 1970. It is a widely used mobile The Base Station Subsystem (BSS)
communication system in the world. GSM is an open
The Network Switching Subsystem
and digital cellular technology used for transmitting
mobile voice and data services operate at the
850MHz, 900MHz, 1800MHz, and 1900MHz
l i c a
(NSS)
The Operation Support Subsystem
b
frequency bands. (OSS)
P u
GSM technology was developed as a digital
system using the time division multiple access
GSM - The Mobile Station
The MS consists of the physical equipment,
ul
(TDMA) technique for communication purposes. A
GSM digitizes and reduces the data, then sends it
such as the radio transceiver, display and digital
signal processors, and the SIM card. It provides the
ah
down through a channel with two different streams air interface to the user in GSM networks. As such,
of client data, each in its own particular time slot. other services are also provided, which include:
The digital system has the ability to carry 64 kbps to
R
120 Mbps of data rates.
Voice teleservices
Data bearer services
The features’ supplementary services
GSM Modem
There are various cell sizes in a GSM system
such as macro, micro, pico, and umbrella cells. Each
cell varies as per the implementation domain. There
are five different cell sizes in a GSM network macro,
72
Rahul Publications
UNIT - III MOBILE COMMERCE
The MS also provides the receptor for SMS messages, enabling the user to toggle between the voice
and data use. Moreover, the mobile facilitates access to voice messaging systems. The MS also provides
access to the various data services available in a GSM network. These data services include:
X.25 packet switching through a synchronous or asynchronous dial-up connection to the PAD at
speeds typically at 9.6 Kbps.
General Packet Radio Services (GPRSs) using either an X.25 or IP based data transfer method at
the speed up to 115 Kbps.
High speed, circuit switched data at speeds up to 64 Kbps.
GSM - The Base Station Subsystem (BSS)
The BSS is composed of two parts:
The Base Transceiver Station (BTS)
The Base Station Controller (BSC)
s
The BTS and the BSC communicate across the specified Abis interface, enabling operations between
components that are made by different suppliers. The radio components of a BSS may consist of four to
it o n
seven or nine cells. A BSS may have one or more base stations. The BSS uses the Abis interface between
the BTS and the BSC. A separate high-speed line (T1 or E1) is then connected from the BSS to the
Mobile MSC.
l i c a
ub
ul P
R ah
73
Rahul Publications
BBA III YEAR V SEMESTER
The BTS corresponds to the transceivers and antennas used in each cell of the network. A BTS is
usually placed in the center of a cell. Its transmitting power defines the size of a cell. Each BTS has between
1 and 16 transceivers, depending on the density of users in the cell. Each BTS serves as a single cell. It also
includes the following functions:
ns
tio
Encoding, encrypting, multiplexing, modulating, and feeding the RF signals to the antenna
Transcoding and rate adaptation
Time and frequency synchronizing
l i c
Voice through full- or half-rate services a
b
Decoding, decrypting, and equalizing received signals
u
P
Random access detection
ul
Timing advances
Uplink channel measurements
ah
The Base Station Controller (BSC)
R
The BSC manages the radio resources for one or more BTSs. It handles radio channel setup,
frequency hopping, and handovers. The BSC is the connection between the mobile and the MSC. The
BSC also translates the 13 Kbps voice channel used over the radio link to the standard 64 Kbps channel
used by the Public Switched Telephone Network (PSDN) or ISDN.
It assigns and releases frequencies and time slots for the MS. The BSC also handles intercell handover.
It controls the power transmission of the BSS and MS in its area. The function of the BSC is to allocate the
necessary time slots between the BTS and the MSC. It is a switching device that handles the radio resources.
The additional functions include:
Control of frequency hopping
Performing traffic concentration to reduce the number of lines from the MSC
Providing an interface to the Operations and Maintenance Center for the BSS
Reallocation of frequencies among BTSs
Time and frequency synchronization
Power management
Time-delay measurements of received signals from the MS
74
Rahul Publications
UNIT - III MOBILE COMMERCE
GSM - The Network Switching Subsystem needed by the MSC in order to service visiting
(NSS) subscribers. The VLR is always integrated with the
MSC. When a mobile station roams into a new MSC
The Network switching system (NSS), the
area, the VLR connected to that MSC will request
main part of which is the Mobile Switching Center
data about the mobile station from the HLR. Later,
(MSC), performs the switching of calls between the
if the mobile station makes a call, the VLR will have
mobile and other fixed or mobile network users, as
the information needed for call setup without having
well as the management of mobile services such as
to interrogate the HLR each time.
authentication.
Authentication Center (AUC)
s
Equipment Identity Register (EIR)
n
it o
HLR EIR The Equipment Identity Register (EIR) is a
database that contains a list of all valid mobile
a
equipment on the network, where its International
The switching system includes the following
functional elements:
Home Location Register (HLR)
ul
considered the most important database, as it stores
permanent data about subscribers, including a
The operations and maintenance center
(OMC) is connected to all equipment in the switching
ah
subscriber’s service profile, location information, and system and to the BSC. The implementation of
activity status. When an individual buys a OMC is called the operation and support system
R
subscription in the form of SIM, then all the (OSS).
information about this subscription is registered in Here are some of the OMC functions:
the HLR of that operator.
Administration and commercial operation
Mobile Services Switching Center (MSC) (subscription, end terminals, charging, and
The central component of the Network statistics).
Subsystem is the MSC. The MSC performs the Security Management.
switching of calls between the mobile and other fixed
or mobile network users, as well as the management Network configuration, Operation, and
of mobile services such as registration, Performance Management.
authentication, location updating, handovers, and Maintenance Tasks.
call routing to a roaming subscriber. It also performs
such functions as toll ticketing, network interfacing, The operation and Maintenance functions are
common channel signaling, and others. Every MSC based on the concepts of the Telecommunication
is identified by a unique ID. Management Network (TMN), which is standardized
in the ITU-T series M.30.
Visitor Location Register (VLR)
Following is the figure, which shows how
The VLR is a database that contains OMC system covers all the GSM elements.
temporary information about subscribers that is
75
Rahul Publications
BBA III YEAR V SEMESTER
ns
c a tio
The OSS is the functional entity from which the network operator monitors and controls the system.
i
The purpose of OSS is to offer the customer cost-effective support for centralized, regional, and local
l
operational and maintenance activities that are required for a GSM network. An important function of
b
OSS is to provide a network overview and support the maintenance activities of different operation and
maintenance organizations.
P u
l
A simple pictorial view of the GSM architecture is given below:
ahu
R
76
Rahul Publications
UNIT - III MOBILE COMMERCE
The additional components of the GSM architecture comprise of databases and messaging systems
functions:
Home Location Register (HLR)
Visitor Location Register (VLR)
Equipment Identity Register (EIR)
Authentication Center (AuC)
SMS Serving Center (SMS SC)
Gateway MSC (GMSC)
Chargeback Center (CBC)
Transcoder and Adaptation Unit (TRAU)
The following diagram shows the GSM network along with the added elements:-
ns
a it o
b l i c
P u
ul
R ah
The MS and the BSS communicate across the Um interface. It is also known as the air interface or
the radio link. The BSS communicates with the Network Service Switching (NSS) center across the A
interface.
Q12. List out various major applications and features of GSM Technology.
Ans : (Imp.)
Applications
The applications of GSM technology include the following.
i) Intelligent GSM Technology for Automation and Security
These days, the GSM mobile terminal has become one of the items that are constantly with us. Just
like our wallet/purse, keys or watch, the GSM mobile terminal provides us a communication channel that
enables us to communicate with the world. The requirement for a person to be reachable or to call
anyone at any time is very appealing.
77
Rahul Publications
BBA III YEAR V SEMESTER
This project, as the name says the project is based on GSM network technology for transmission of
SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access to appliances and
allowing breach control at home. The system proposes two sub-systems. The appliance control subsystem
enables the user to control home appliances remotely and the security alert subsystem gives automatic
security monitoring.
The system is capable enough to instruct users via SMS from a specific cell number to change the
condition of the home appliance according to the user’s needs and requirements. The second aspect is
that of security alert which is achieved in a way that on the detection of intrusion, the system allows
automatic generation of SMS thus alerting the user against security risk.
GSM technology will allow communication anywhere, anytime, and with anyone. The functional
architecture of GSM employing intelligent networking principles, and its ideology, which provides the
development of GSM is the first step towards a true personal communication system that enough
standardization to ensure compatibility.
ns
tio
ii) GSM Applications in Medical Services
Consider Two Situations like the following
c a
A person is critically injured or has fallen ill and needs to be immediately taken care of. All he
l i
or the person accompanying him has is a mobile phone.
b
A patient is discharged from the hospital and thinks of taking rest at his home, but still has to go
u
to the hospital for regular checkups. He may have a mobile phone and also some medical
l P
sensor devices like health monitoring devices.
u
In both situations, the only way which can provide a solution is by using the mobile communication
ah
system. In other words, using communication technologies any situation like the above can be handled
just by transmitting the patient details through the communication network and receiving them and
R
processing them at the receiver section-either a the healthcare center or at the doctor’s home.
The doctor simply monitors the patient details and gives back the instructions to the person (in the
1st case) so that he can at least take some precautions before finally reaching the hospital and in the
2nd case monitors the test results of the patient and in case of any abnormalities, takes the next step for
further treatment.
This whole situation is the telemedicine services. The telemedicine system can be used in either of
the three ways.
Using Video conferencing, where patients sitting at one place can have direct interaction with
the health care providers and accordingly carry on the curing process.
By using health monitoring sensors that keep updating about the health of the patient and
accordingly guide the health care providers to carry on the treatment.
By transmitting the acquired medical data and transmit the acquired data for consultation and
processing.
78
Rahul Publications
UNIT - III MOBILE COMMERCE
Features
GSM introduced two new concepts, such as voice digitization and text messaging. It employed data
encryption to digital voice or text data to ensure secured data transmission across cellular networks. Based
on these concepts, GSM offered a number of features and services. These are as follows:
1. SIM cards: Subscriber Identity Module (SIM) is a processor-based smart card that is inserted into
GSM phones in order to store user account and other personal information. As soon as the SIM
card is plugged in a GSM phone, it becomes activated and starts making/receiving phone calls using
the number stored in the SIM card. SIM cards are also programmed to display custom menus
offering personalized services, such as SMS, time setting, music/video playing, etc. The user can
retain the SIM card while changing the handset, or can change SIM card to switch to a different
number/operator.
2. Phone locking: Phone locking or SIM card locking is a process by which the network operators
restrict the use of the SIM cards (used by their subscribers) only within their network. The network
ns
operators provide the SIM cards to their customers, but they become invalid outside their network.
If the user wants to use the SIM card in other operator’s network, the SIM locking should be
a it o
removed either by the original operator (for a fee) or by the user through some software. In some
countries phones are sold by network operators in locked state. However, in some countries, such
3.
l i c
as India, Bangladesh, Hong Kong, Malaysia, Pakistan, etc., all the cell phones are sold unlocked.
Short Messaging Service (SMS): Short Messaging Service (SMS) is a unique feature oFGSM
b
that achieved immense popularity among users and is sometimes termed as the Killer Application of
P u
GSM. SMS is a bi-directional data service that allows mobile users to send/receive short alphanumeric
(up to 160 characters) text messages from their mobile devices. SMS operates in store-and-forward
l
mode and can be used in point-to- point mode or in cell broadcast mode for bulk message delivery.
u
ah
The messages are sent using Mobile Application Part (MAP) protocol and are stored in a centralized
message centre called SMSC (Short Message Service Centre). SMSC acts as a gateway to external
systems, such as internet or other mobile networks to forward SMS feeds for delivery. Apart from
4.
R
SMS, GSM supports other supplementary call services such as call forwarding, call waiting, caller
identification, three-way conversations and call barring.
GSM handover: Handover refers to the process by which a mobile phone is switched from one
channel frequency to another during the progress of a call. As the mobile user travels from one
geographic location to another, he leaves one cell site and enters a new one. Accordingly, the
mobile device is assigned a new channel frequency corresponding to the base station of the new cell
site.
6. GSM security: One of the most important features of GSM is the provision it makes to keep the
network secure. The security arrangement is made in two levels, in the network level and in the
subscriber level. In network level, all the communications, both speech and data are encrypted to
prevent fraudulent intrusion by unwanted users. In the subscriber level, all GSM subscribers are
provided with a SIM card that stores the subscriber identity number, the encryption key and the
decryption algorithm. Each subscriber is given a secret (encryption) key which is stored in the SIM
card. A copy of the secret key is stored in the Authentication Centre (AuC) in the base station
subsystem of the cell site?
79
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
1. Time Division Multiple Access (TDMA)
TDMA is the channelization protocol in which bandwidth of channel is divided into various stations
on a time basis. There is a time slot given to each station, the station can transmit data during that time slot
only which is as follows:
ns
c a tio
b l i
P u
Each station must aware of its beginning of time slot and the location of the time slot. TDMA
requires synchronization between different stations. It is type of access method in the data link layer. At
2.
ul
each station, data link layer tells the station to use the allocated time slot.
Code division multiple access (CDMA)
ah
In CDMA, all the stations can transmit data simultaneously. It allows each station to transmit data
over the entire frequency all the time. Multiple simultaneous transmissions are separated by unique code
R
sequence. Each user is assigned with a unique code sequence.
80
Rahul Publications
UNIT - III MOBILE COMMERCE
In the above figure, there are 4 stations marked as 1, 2, 3 and 4. Data assigned with respective
stations as d1, d2, d3 and d4 and the code assigned with respective stations as c1, c2, c3 and c4.
Difference between TDMA and CDMA
S. No. TDMA CDMA
1. TDMA stands for Time Division Multiple CDMA stands for Code Division Multiple
Access. Access.
2. In this, only the sharing of time of satellite In this, there is sharing of both i.e. band
transponder takes place. and time among different stations takes
place.
3. There is no need of any codeword. There is no need of any codeword.
4. In this, guard time of the adjacent slots In this, both guard bands and guard time
s
are necessary. are necessary.
5.
6.
Synchronization is required.
There is average capacity of the system.
it o n
No need of synchronization.
There is large capacity of the system.
7.
8.
It is less flexible than CDMA.
l i
In this, there is no Near-far problem.
c a Flexibility is high.
There is existence of Near-far problem.
9. Rate of data is average.
Ans :
ul P
Q14. Write the differences between GSM and CDMA.
ah
The differences between GSM and CDMA are as follows:
S. No. Nature GSM CDMA
1.
2.
R
Full form
Technology used
Global System for Mobile
Communication.
FDMA(Frequency division
Code Division Multiple
Access.
CDMA(Code division
multiple access) and multiple access).
TDMA (Time division
multiple access).
3. Availability GSM is globally widely used CDMA is available in fewer
and available. countries and carriers.
4. Data speed rate 42Mbps in HSPA (3G). 3.6 Mbps in CDMA.
5. Features GSM supports transmitting CDMA does not support
data and voice both at this feature.
once.
6. Customer Information Stored in a SIM card. Stored in a headset or phone.
81
Rahul Publications
BBA III YEAR V SEMESTER
s
execute an Internet Protocol (IP) based core
architecture for integrated voice and data the location directory using routing information
applications that will continue to be used and
expanded for 3G services.
tio n
supplied by the SGSNs about the location of an
MS. It routes the external data network protocol
a
GPRS supersedes the wired connections, as packet encapsulated over the GPRS backbone to
this system has simplified access to the packet data
l i c
networks like the internet. The packet radio principle
b
is employed by GPRS to transport user data packets
in a structure way between GSM mobile stations
the SGSN currently serving the MS. It also
decapsulates and forwards external data network
packets to the appropriate data network and collects
P
can be directly routed to the packet switched
u
and external packet data networks. These packets
charging data that is forwarded to a charging gateway
(CG).
ul
networks from the GPRS mobile stations.
In the current versions of GPRS, networks
There are three important routing schemes:
ah
Mobile-originated message: This
based on the Internet Protocol (IP) like the global
internet or private/corporate intranets and X.25 path begins at the GPRS mobile device
R
networks are supported. The basic processes used and ends at the host.
in GPRS networks: Network-initiated message when
Attach process: Process by which the MS the MS is in its home network: This
attaches (i.e., connects) to the SGSN in a path begins at the host and ends at the
GPRS network. GPRS mobile device.
Authentication process: Process by which
Network-initiated message when
the SGSN authenticates the mobile subscriber.
the MS roams to another GPRS
PDP activation process: Process by which network - This path begins at the host
a user session is established between the MS
of visited network and ends at the GPRS
and the destination network.
mobile device.
Detach process: Process by which the MS
detaches (i.e., disconnects) from the SGSN The GPRS network encapsulates all data
in the GPRS network. network protocols into its own encapsulation
Network-initiated PDP request for static protocol called the GPRS tunnelling protocol (GTP).
IP address: Process by which a call from The GTP ensures security in the backbone network
the packet data network reaches the MS using and simplifies the routing mechanism and the
a static IP address. delivery of data over the GPRS network.
82
Rahul Publications
UNIT - III MOBILE COMMERCE
ns
routing update. The routing area information in the
SGSN is updated, and the success of the procedure
it o
Packet transmission to an active MS is initiated
is indicated in the response message.
by packet paging to notify the MS of an incoming
data packet. The data transmission proceeds
immediately after packet paging through the
channel indicated by the paging message. The
ub
purpose of the paging message is to simplify the
process of receiving packets. The MS listens to only
of the MS and its new location through GPRS
channels to its current SGSN. This procedure is used
P
the paging messages instead of to all the data packets
only when the MS is in the active state.
l
in the downlink channels. This reduces battery usage
significantly.
u
The inter-SGSN routing update is the most
complicated routing update. The MS changes from
ah
When an MS has a packet to transmit, it must
access the uplink channel (i.e., the channel to the one SGSN area to another, and it must establish a
packet data network where services reside). The new connection to a new SGSN. This means creating
R
uplink channel is shared by a number of MSs, and
its use is allocated by a BSS. The MS requests use
of the channel in a random access message. The
BSS allocates an unused channel to the MS and
a new logical link context between the MS and the
new SGSN and informing the GGSN about the new
location of the MS.
sends an access grant message in reply to the Following three key features describe wireless
random access message. packet data:
Standby State The always online feature: Removes the
In the standby state, only the routing area of dial-up process, making applications only one
the MS is known. (The routing area can consist of click away.
one or more cells within a GSM location area). An upgrade to existing systems: Opera-
When the SGSN sends a packet to an MS tors do not have to replace their equipment;
that is in the standby state, the MS must be paged. rather, GPRS is added on top of the existing
Because the SGSN knows the routing area of the infrastructure.
MS, a packet paging message is sent to the routing
area. On receiving the packet paging message, the An integral part of future 3G systems:
MS relays its cell location to the SGSN to establish GPRS is the packet data core network for 3G
the active state. systems EDGE and WCDMA.
83
Rahul Publications
BBA III YEAR V SEMESTER
Q16. What are the goals and benefits of Q17. What are the basic characteristics and
GPRS? applications of GPRS?
Ans : Ans :
Goals GPRS has opened a wide range of unique
services to the mobile wireless subscriber. Some of
GPRS is the first step toward an end-to-end the characteristics that have opened a market full
wireless infrastructure and has the following goals: of enhanced value services to the users. Below are
some of the characteristics:
Open architecture
Mobility: The ability to maintain constant
Consistent IP services voice and data communications while on the
Same infrastructure for different air move.
interfaces Immediacy: Allows subscribers to obtain
Integrated telephony and Internet connectivity when needed, regardless of
location and without a lengthy login session.
s
infrastructure
Leverage industry investment in IP
Service innovation independent of
tio n
Localization: Allows subscribers to obtain
information relevant to their current location.
Using the above three characteristics varied
Benefits
infrastructure
u
GPRS benefits the users in many ways, oneb categories:
Corporation
l
times. In the typical GSM mobile, setup a
u P
of which is higher data rates in turn of shorter access
ah
is lower than one second and ISDN-line data rates Communications: E-mail, fax, unified
are up to many 10 kbit/s. messaging and intranet/internet access,
ii)
R
Easy Billing
GPRS packet trans mission offers a more
user-friendly billing than that offered by circuit
etc.
Value-added services: Information
services and games, etc.
switched services. In circuit switched services, billing E-commerce: Retail, ticket purchasing,
is based on the duration of the connection. This is banking and financial trading, etc.
unsuitable for applications with bursty traffic. The Location-based applications:
user must pay for the entire airtime, even for idle Navigation, traffic conditions, airline/rail
periods when no packets are sent (e.g., when the schedules and location finder, etc.
user reads a Web page). Vertical applications: Freight
In contrast to this, with packet switched delivery, fleet management and sales-
services, billing can be based on the amount of force automation.
transmitted data. The advantage for the user is that Advertising: Advertising may be
he or she can be “online” over a long period of location sensitive. For example, a user
time but will be billed based on the transmitted data entering a mall can receive advertise-
volume. ments specific to the stores in that mall.
84
Rahul Publications
UNIT - III MOBILE COMMERCE
Along with the above applications, non-voice services like SMS, MMS and voice calls are also
possible with GPRS. Closed User Group (CUG) is a common term used after GPRS is in the market, in
addition, it is planned to implement supplementary services, such as Call Forwarding Unconditional (CFU),
and Call Forwarding on Mobile subscriber Not Reachable (CFNRc), and closed user group (CUG).
Q18. Draw and explain the architecture of GPRS.
Ans :
GPRS architecture works on the same procedure like GSM network, but, has additional entities that
allow packet data transmission. This data network overlaps a second-generation GSM network providing
packet data transport at the rates from 9.6 to 171 kbps. Along with the packet data transport the GSM
network accommodates multiple users to share the same air interface resources concurrently.
Following is the GPRS Architecture diagram:
ns
a it o
b l i c
P u
GPRS attempts to reuse the existing GSM network elements as much as possible, but to effectively build
ul
a packet-based mobile cellular network, some new network elements, interfaces, and protocols for handling
packet traffic are required.
ah
Therefore, GPRS requires modifications to numerous GSM network elements as summarized below:
R
GSM Network Element Modification or Upgrade Required for GPRS
Mobile Station (MS) New Mobile Station is required to access GPRS services. These
new terminals will be backward compatible with GSM for
voice calls.
BTS A software upgrade is required in the existing Base Transceiver
Station(BTS).
BSC The Base Station Controller (BSC) requires a software
upgrade and the installation of new hardware called the
packet control unit (PCU). The PCU directs the data traffic to
the GPRS network and can be a separate hardware element
associated with the BSC.
GPRS Support Nodes (GSNs) The deployment of GPRS requires the installation of new
core network elements called the serving GPRS support node
(SGSN) and gateway GPRS support node (GGSN).
Databases (HLR, VLR, etc.) All the databases involved in the network will require software
upgrades to handle the new call models and functions
introduced by GPRS.
85
Rahul Publications
BBA III YEAR V SEMESTER
s
GSM, except that it generally contains fewer cells.
for packet data traffic. The BTS can also require a
n
Because routing areas are smaller than location
software upgrade but typically does not require
tio
areas, less radio resources are used While
hardware enhancements.
broadcasting a page message.
a
fWhen either voice or data traffic is originated
Q19. Draw and explain GPRS Protocol stack.
c
at the subscriber mobile, it is transported over the
air interface to the BTS, and from the BTS to the
BSC in the same way as a standard GSM call.
b
However, at the output of the BSC, the traffic isl i Ans :
The flow of GPRS protocol stack and end-
P u
separated; voice is sent to the Mobile Switching
Center (MSC) per standard GSM, and data is sent
to-end message from MS to the GGSN is displayed
in the below diagram. GTP is the protocol used
ul
to a new device called the SGSN via the PCU over
a Frame Relay interface.
between the SGSN and GGSN using the Gn
interface. This is a Layer 3 tunneling protocol.
ah
iii) GPRS Support Nodes
R
Following two new components, called
Gateway GPRS Support Nodes (GSNs) and,
Serving GPRS Support Node (SGSN) are added:
iv) Gateway GPRS Support Node (GGSN)
The Gateway GPRS Support Node acts as
an interface and a router to external networks. It
contains routing information for GPRS mobiles,
which is used to tunnel packets through the IP based The process that takes place in the application
internal backbone to the correct Serving GPRS looks like a normal IP sub-network for the users
Support Node. The GGSN also collects charging both inside and outside the network. The vital thing
information connected to the use of the external that needs attention is, the application communicates
data networks and can act as a packet filter for via standard IP, that is carried through the GPRS
incoming traffic. network and out through the gateway GPRS. The
packets that are mobile between the GGSN and
v) Serving GPRS Support Node (SGSN) the SGSN use the GPRS tunneling protocol, this
The Serving GPRS Support Node is way the IP addresses located on the external side of
responsible for authentication of GPRS mobiles, the GPRS network do not have deal with the internal
registration of mobiles in the network, mobility backbone. UDP and IP are run by GTP.
86
Rahul Publications
UNIT - III MOBILE COMMERCE
Ans :
profiles in GPRS.
s
of radio resources and the transit delay in the GPRS
n
it o
backbone network. Transfer delays outside the
Quality of Service (QoS) requirements of GPRS network, e.g., in external transit networks,
a
conventional mobile packet data applications are are not taken into account.
b l
requirements for assorted GPRS applications like i c
in assorted forms. The QoS is a vital feature of GPRS Throughput
The throughput specifies the maximum/peak
transfer.
P u
realtime multimedia, web browsing, and e-mail bit rate and the mean bit rate.
Using these QoS classes, QoS profiles can be
following parameters :
ul
GPRS allows defining QoS profiles using the negotiated between the mobile user and the
network for each session, depending on the QoS
ah
Service Precedence demand and the available resources.
87
Rahul Publications
BBA III YEAR V SEMESTER
EDGE is a 2.5G technology that is based on GPRS and can be used to offer personalised multimedia
services similar to 3G technologies.It can be used to transmit both voice and data. It however is just an
add-on to GPRS and can not work alone. EDGE allows subscribers to access the Internet and to send and
receive data, e.g. digital images and videos, with a broadband like transmission speed of 384 kbps that is
about three times faster than an ordinary GPRS network. This speed is sufficient even for video-transmissions
and in that sense it rivals the 3G Universal Mobile Telecommunications System (UMTS) technology.EDGE
is reputed to possess high potential and a growing importance in many regions of the world, e.g. the
Americas, Australia and India, where it is reported to be gaining market rapidly.The main advantage of
EDGE is that it could allow network carriers to offer 3G-like services without having to actually acquire a
3G license. Implementing EDGE is relatively simple, as it works with the existing GSM/GPRS structure. It
may also be used with laptops with the help of a card.EDGE however does not seem to have very bright
prospects in Europe for a practical reason: Most of the network carriers in Europe have invested heavily
in the expensive UMTS licensesand building a UMTS network.
ns
c a tio
b l i
P u
ul
R ah
Data Speed
EDGE has successfully replaced GSM without disrupting the existing frequency reuse scheme.
Technically, EDGE provides a speed of 384kbps (which is much higher than data rate of GPRS) but
labeled as 2.75G by industry.
Key Elements added in EDGE
Use of 8PSK: Modulation format has been changed to 8PSK which provides the advantage to
convey 3 bits per symbol.
Base station: Some small changes have been made in the base station.
Upgrade to network architecture: It offers IP based transfer rate which makes it necessary to
add some more network elements.
Mobile stations: To use EDGE facilities, it is mandatory to gave a GSM EDGE handset because
each and every set can’t be upgraded.
88
Rahul Publications
UNIT - III MOBILE COMMERCE
Ans :
Following are the features of EDGE.
Provide increase data rate, e.g. high speed on GSM radio carriers as provided by broadband.
It can retransmit a packet with more robust coding which means re-segmentation is possible.
In EDGE packets are addressed up to 2048 while in GSM it is from 1 to 128.
Similarly EDGE has a window size of 1024 and GSM window size was 64.
EDGE reduces the number of bursts to retransmit when error occurs.
It allows multimedia file transfer, web browsing and video conferencing through wireless
terminals.
It enables operators to triple the data rate of subscribers and provide extra capacity to their
voice communications.
ns
it o
It requires less radio resources to support the same traffic as supported by GSM networks.
Q23. Draw and explain GSM EDGE network architecture.
Ans :
l i c a
The GSM EDGE network architecture needed to be updated from the basic GSM network, although
b
it was basically the same as that needed for GPRS.
u
P
The large advantage of using GSM EDGE was that it required little upgrade from GPRS and it was
l
also on the evolutionary path from 2G GSM to 3G UMTS. In this way, any upgrades for the GSM EDGE
u
network, would be applicable to the 3G network.
ah
As both GPRS and now EDGE carried packet data, it was necessary for the packet data to be
handled by entities that were not present on the basic 2G GSM network. Accordingly the introduction of
R
GPRS and EDGE technology saw the addition of some new entities within the over network architecture.
The two main elements that are required by the GSM EDGE network architecture are the GGSN
and SGSN. These enable the network to be able to cater for the packet data that is passed over the
network. A network entity called a PCU was also required in the base station controller to route packet
and circuit switched data to the required main network entities.
GSM EDGE network architecture upgrades
Although in practice a variety of elements are required within the network architecture, the main
new network architecture entities that are needed for the EDGE upgrade are:
SGSN: GPRS Support Node - this forms a gateway to the services within the network.
GGSN: Gateway GPRS Support Node which forms the gateway to the outside world.
PCU: Packet Control Unit which differentiates whether data is to be routed to the packet switched
or circuit switched networks.
A simplified view of the GSM EDGE network architecture can be seen in the diagram below. From
this it can be seen that it is very similar to the more basic GSM network architecture, but with additional
elements.
89
Rahul Publications
BBA III YEAR V SEMESTER
To Public Networks..
PSTN Internet
GSM/
GPRS Core AUC
Network
GMSC GGSN
HLR
ns
MSC EIR
c a tio
SGSN
ub li
ul P
R ah BSS PCU
BCS
BTS BTS
BTS
SIM MS
90
Rahul Publications
UNIT - III MOBILE COMMERCE
The network architecture for GSM EDGE was basically the same as that used with GPRS
SGSN network entity
The SGSN or Serving GPRS Support Node element of the GPRS network provides a number of
takes focussed on the IP elements of the overall system. It provides a variety of services to the mobiles:
Packet routing and transfer
Mobility management
Authentication
Attach/detach
Logical link management
Charging data
There is a location register within the SGSN and this stores location information (e.g., current cell,
current VLR). It also stores the user profiles (e.g., IMSI, packet addresses used) for all the GPRS users
s
registered with the particular SGSN.
GGSN network entity
it o n
The GGSN, Gateway GPRS Support Node is one of the most important entities within the GSM
EDGE network architecture.
l i c a
The GGSN organises the inter-working between the GPRS / EDGE network and external packet
switched networks to which the mobiles may be connected. These may include both Internet and X.25
b
networks.
P u
The GGSN can be considered to be a combination of a gateway, router and firewall as it hides the
internal network to the outside. In operation, when the GGSN receives data addressed to a specific user,
ul
it checks if the user is active, then forwarding the data. In the opposite direction, packet data from the
mobile is routed to the right destination network by the GGSN.
ah
PCU
The PCU or Packet Control Unit is a hardware router that is added to the BSC. It differentiates data
R
destined for the standard GSM network (circuit switched data) and data destined for the EDGE network
(Packet Switched Data). The PCU itself may be a separate physical entity, or more often these days it is
incorporated into the base station controller, BSC, thereby saving additional hardware costs.
GSM EDGE network upgrade
One of the advantages of the migration to GSM EDGE was that the network required little upgrade
from what was used for GPRS and what would be used for the future 3G UMTS networks.
This presented a particularly attractive option for network operators who would need little capital
expenditure investment to provide the additional capability. Additionally it would be required for the
future 3G networks and therefore any investment would be required later anyway.
The EDGE network adds to the existing GSM network. The main new entities required within the
network are the SGSN and GGSN, and these are required as the starting point.
The base station subsystems require some updates. The main one is the addition of the PCU described
above. Some modifications may be required to the BTS, but often only a software upgrade is required,
and this may often be achieved remotely. In this way costs are kept to a minimum.
The GSM EDGE network was steadily upgraded to enable it to handle the required packet data
and to ready the network for the future 3G UMTS system that was about to be launched.
91
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
Third Generation systems or 3G systems refer to mobile communication systems that follow IMT-
2000 (International Mobile Telecommunication-2000) standards defined by International
Telecommunication Union (ITU). These systems are characterized by high data transmission rates, of the
order of 200 Kbps up to 6 Mbps. They employ packet switched mode of data transmission along with
spread spectrum technique to achieve high speed internet data transfer suitable for multimedia applications
under mobile environment. 3G systems support high speed broadband internet access, video calling,
mobile TV or multimedia gaming through mobile devices.
Q25. Explain in detail about UMTS.
Ans : (Imp.)
ns
Universal Mobile Telecommunication System (UMTS) is a 3G standard for mobile communication
that provides enhanced data rate (of the order of 2 Mbps) and supports a full range of high speed
tio
multimedia services including broadband internet access. It follows 3GPP (Third Generation Partnership
Project) specifications, defined under IMT-2000 standard. It is based on a technology known as FOMA
l i a
(Freedom of Mobile Multimedia Access) and employs Wideband Code Division Multiple Access (W-CDMA)
c
to achieve higher spectral efficiency and bandwidth than 2G GSM systems. For these reasons, UMTS is
often referred to as 3GSM system to indicate the 3G evolution from basic GSM foundation (Figure).
ub
The features of UMTS are: UMTS combines two packet access technologies namely HSDPA (High
Speed Downlink Packet Access) and HSUPA (High Speed Uplink Packet Access) to achieve very high
P
bandwidth data transfer capabilities. These packet access technologies allow high speed multimedia
l
broadcast/multicast facilities, interactive gaming and large file download through broadband internet access.
u
The speed offered by HSPA technology is comparable to traditional fixed line broadband internet access
ah
or satellite digital broadcast services. With the help of HSPA+ (High Speed Packet Access Evolved)
technology, UMTS can achieve maximum theoretical data transfer rate of 45 Mbps. However, in practical
R
cases, UMTS provides up to 2 Mbps (2048 Kbps) data transfer rates under indoor/stationary environment.
In densely populated urban areas, the actual data rate becomes 384 Kbps and for satellite applications,
the speed becomes 144 Kbps.
92
Rahul Publications
UNIT - III MOBILE COMMERCE
The speed is much higher than 2G GSM speed of 9.6 Kbps or 114 Kbps (GPRS) and is suitable for
several high speed multimedia applications. Apart from normal speech (telephony) services, UMTS supports
a number of packet switched network-based data services. These include:
Conversational Applications: Voice Telep-hony, video telephony, video gaming
Streaming Applications: Multimedia services, video on demand, webcast, mobile TV.
s
UMTS core network contains two types of components, namely circuit switched components and
n
packet switched components. Circuit switched components are similar To GSM network components,
it o
such as Mobile Switching Centre (MSC), Visitor Location Register (VLR), Equipment Identity Register
(EIR), Home Location Register (HLR) and Authentication Centre (AuC). The packet switched
l i a
elements are Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN).
c
Apart from these network elements, core network also contains some databases and additional
network management functions. In order to upgrade a GSM system to UMTS system, the core
ub
network elements need to be modified according to UMTS specifications. However, the subscribers
can maintain their old (GSM) number, with the help of Number Portability Database (NPDB).
2.
u
Radio interface P
MSC, VLR and SGSN are often merged together to become UMTS MSC.
l
ah
UMTS radio interface is based on UTRAN (Universal Terrestrial Radio Access Network) air interface
that employs wide band CDMA (WCDMA) technology. WCDMA is a Direct Sequence CDMA (DS
R
CDMA) where user speech data is multiplied (coded) with quasi random bit sequences (derived
from WCDMA spreading codes) and scrambled and mixed together and sent to destination location.
WCDMA has two basic modes of operation namely, Frequency Division Duplex (FDD) and Time
Division Duplex (TDD). At the receiving end, the scrambled data is decoded using decoder circuits,
and the original message is reconstructed after integrity and validity checking.
3. User equipment
UMTS user equipment consists of a UMTS Subscriber Identity Module (USIM) card whose
functionalities are similar to that of GSM SIM card. Their purpose is to store user identification
information, such as International Mobile Subscriber Identity’ (IMSI), Temporary Mobile Subscriber
Identity (TMSI), International Mobile Equipment Identity (IMEI), etc. The UMTS mobile equipment
can operate in three modes:
PS/CS mode: To support both packet switched and circuit switched functions.
PS mode: To support only packet switched functions
CS mode: To support only circuit switched functions.
93
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
Wideband Code Division Multiple Access (WCDMA) is a radio access technology that is used in
third generation (3G) cellular systems, such as UMTS. It employs direct sequence spread spectrum (DS
CDMA or wideband CDMA and hence the name) technique for channel access and offers higher bandwidth
and much higher speed compared to 2G systems. The bandwidth of the carrier frequency in WCDMA
systems is approximately 5 MHz and using this wide bandwidth, it can support over 100 simultaneous
voice calls. WCDMA systems are capable of providing data rates up to 2 Mbps and using HSPA+
enhancements it can support data rates up to 14 Mbps or higher. WCDMA technology supports a wide
variety of high speed communication services involving data, voice, images or video under mobile as well
as stationary environments. The communication speed ranges from 384 Kbps (for moving vehicles under
wide area access) to 2 Mbps (for stationary users under local area access).
ns
WCDMA is available in two different modes of operation namely, Frequency Division Duplex (FDD)
tio
mode and Time Division Duplex (TDD) mode.
1. FDD
l i c a
In Frequency Division Duplex mode, two different frequency bands are used for uplink and downlink
the user.
ub
transmissions. For any connection, a pair of frequency bands with specified separation is allotted to
2. TDD
ul P
In TDD, both uplink and downlink transmissions are carried over same frequency band, but in
ah
separate synchronized time intervals. The time slot in a physical “channel is divided into two
R
transmission and reception parts.
The capability of operating either in FDD or TDD mode leads to efficient utilization of available
frequency spectrum.
Supports high speed data transmission: 384 Kbps for moving vehicles and 2 Mbps for stationary
users
Highly flexible: supports multiple parallel variable rate services for each connection
Supports advanced techniques such as adaptive antennas, transmitter diversities, etc. to improve
capacity and coverage area
Supports inter frequency handover as well as handover to other systems such as GSM
94
Rahul Publications
UNIT - III MOBILE COMMERCE
Ans :
Sl. No. UMTS WCDMA
1. UMTS is faster than WCDMA in that it offers a WCDMA runs at the speed of GSM, which
speed of HSPDA in the communication network. is slower than UMTS. Hence when consi-
Hence bandwidth does not affect the performance dering both WCDMA and UMTS, WCDMA
of the system. comes as a second preference to the users.
2. UMTS is a cellular technology that transfers data Radio technology is used in the system, and
with the help of packets. Radio technology is not hence communication is done between two
used, and hence efficiency cannot be offered in devices as an interface is used in the system.
the system as much as that of WCDMA. UMTS This makes the system more efficient and
is used instead of GSM networks in the system. does not make any issues while transferring
data.
3. UMTS has a maximum of 45 Mbps if HSPA is WCDMA is based on CDMA and has downlink
activated, which helps to transfer data with more
efficiency. This is one of the popular air interfaces
used in mobile devices. s
and uplink channels to transfer data with a speed
n
of 5MHz used in the channels. This is an
upgrading of CDMA where very less speed is
a it o
used as per the standard. This can be utilized
for the data in the system.
c
4. UMTS phones specifically are not available as it If a WCDMA phone has a sim slot and a UMTS
5.
P u
The basic channel is not CDMA but GSM.
UMTS is developed as an upgrading format of
CDMA is used as a basic channel in WCDMA
to support communication and be efficient.
protocol.
ul
GSM available to the universe as a single
ah
6. The signals are not handled easily and, in some The signal can be handled easily in any paths,
cases, can be in different paths. This makes and this explains the efficiency of the system.
7.
R
communication difficult though it is done. This
is the reason that UMTS depends on other
networks.
The area of coverage is less, but if it is combined
with WCDMA, it is more.
WCDMA uses radio technology to transfer data.
Also, there are code division channels for
separation.
The area of coverage is more for WCDMA.
8. UMTS alone cannot be used in communication WCDMA is mostly used in all phones, and in
devices. some cases, it is combined with GSM or UMTS.
Q28. ‘CDMA 2000 incorporated a number of advanced features that are crucial for enhancing
the channel capacity as well as data speed’. Explain.
Ans : (Imp.)
CPMA 2000, also known as IMT-CDMA MC (Multi Carrier) is a 3G mobile technology based on
IMT 2000 standard developed by International Telecommunication Union (ITU). CDMA 2000 is based
on CDMA technology and the specification is developed by Third Generation Partnership Project 2 or
3GPP2. The basic purpose of CDMA 2000 was to transform 2G CDMAOne systems to 3G CDMA 2000
systems. It has already been implemented to several IS-95 (CDMAOne) networks as an evolutionary step
from CDMAOne to CDMA 2000, as CDMA 2000 provides full backward compatibility with IS-95 systems.
95
Rahul Publications
BBA III YEAR V SEMESTER
World’s first 3G commercial system was launched by SK telecom in South Korea, in October 2000 using
CDMA 2000 IX.
CDMA 2000 has different versions, each having some enhancements than the previous version.
These are as follows:
1. CDMA 2000 IX or IX RTT: This is the core or basic version of CDMA 2000 standard. The term
IX RTT (Radio Transmission Technology) means 1 times to indicate that it provides the same
bandwidth as IS 95 (CDMAOne), i.e. a duplex pair of 1.25 MHz radio channels. It supports data
speed of up to 140 Kbps while occupying a very small amount of spectrum (1.25 MHz per channel)
thus saving the precious spectrum resource for operators.
2. CDMA 2000 IX EV DO: IX EV DO (Evolution Data Optimized), is an enhancement over IX and
it puts voice and data on separate channels (DO: Data Only) to achieve data rate up to 2.4 Mbps.
It employs multiplexing technique involving both CDMA and TDMA in order to improve individual
user’s throughput as well as overall system throughput.
3.
s
CDMA 2000 IX EV DV: IX EV DV is the next enhancement that promises data rate ranging from
n
3 Mbps to 5 Mbps. EV DV stands for Evolution Data Voice, as it is backward compatible with IS-95
tio
and supports both voice and data transmission over the same frequency band.
l i a
3.5 4G, 5G
c
Q29. What is 4G ? List out the features of 4G wireless technology.
Ans :
ub (Imp.)
P
The First generation wireless mobile communication systems were introduced in early eighties and
l
second generations systems in the late 1980s were intended primarily for transmission of voice. The initial
u
systems used analog frequency modulation where as the second as well as the subsequent mobile systems
ah
use digital communication techniques with time division multiplexing (TDM), frequency division multiplexing
(FDM) or the code division multiple access (CDMA). The third generation wireless systems which are just
R
getting introduced in the world markets offer considerably higher data rates, and allow significant
improvements over the 2G systems. The 3G Wireless systems were proposed to provide voice and paging
services to provide interactive multimedia including teleconferencing and internet access and variety of
other services. However, these systems offer wide area network (WAN) coverage of 384 kbps peak rate
and limited coverage for 2 Mbps. Hence providing broadband services would be one of the major goals
of the 4G Wireless systems.
Features
The following are some possible features of the 4G systems :
1. Support interactive multimedia, voice, video, wireless internet and other broadband services.
2. High speed, high capacity and low cost per bit.
3. Global mobility, service portability, scalable mobile networks.
4. Seamless switching, variety of services based on Quality of Service (QoS) requirements
5. Better scheduling and call admission control techniques.
6. Ad hoc networks and multi-hop networks.
96
Rahul Publications
UNIT - III MOBILE COMMERCE
Application
Advanced mobile web access
IP telephony
High-resolution high-speed gaming services
Streamed multimedia and data
High-definition mobile TV
Video conferencing
3D television
Q30. List out higher layer issues in 4G.
Ans :
4G is going to be a packet-based network. Since it would carry voice as well as internet traffic it
i) Mobility Management
a it o
Mobility Management includes location registration, paging and handover. The MT should be able
b l i c
to access the services at any place possible. The global roaming can be achieved by with the help of multi-
hop networks that can include the WLANs or the satellite coverage in remote areas. A seamless service (Ex
: soft handover of the MT from one network to another or from one kind of service to other) is also
P u
important. The hand-over techniques should be designed so that they make efficient use of the network
(routing) and make sure that hand offs are not done too often.
ul
New techniques in location management might be implemented. Each MT need not do location
registration everytime. They can instead do concatenated location registration, which reports to the network
ah
that they are concatenated to a common object. Ex- MTs in a train need to re-register only when they get
off the train and till the network knows that they are in the train.
ii)
R
Congestion Control
Congestion control will be another critical issues in the high performance 4G networks. Two basic
approaches can be taken towards the congestion control : 1. avoidance or prevention of the congestion
and 2. detection and recovery after congestion. The avoidance scheme will require the network to suitably
implement the admission control (measurement based or pre-computed model) and scheduling techniques.
The detection and recovery would require flow control and feedback traffic management. A conservative
approach might be proposed for the 4G systems because of the wide variety of QoS requirements.
iii) Quality of Service (QoS)
4G systems are expected to provide real-time and internet-like services. The real-time services can
be classified into two kinds:
Guaranteed: pre-computed delay bound is required for the service. Ex voice
Better-than-best effort:
1. Predictive: Service needs upper bound on end-to-end delay.
2. Controlled delay: service might allow dynamically variable delay.
3. Controlled load: Service needs resources (bandwidth and packet processing).
97
Rahul Publications
BBA III YEAR V SEMESTER
6.
requirements of voice.
Security will be an important issue.
ns
7.
do “better than best” effort.
c a tio
A new IP protocol might be needed because of the variable QoS services and the network should
8.
9.
l i
Networking protocols that adapt dynamically to the changing channel conditions.
b
Seamless roaming and seamless transfer of services.
Q32. What are the major categories of 4G?
P u
Ans :
ul
ah
4G comes in two main categories:
R 4G
Worldwide Interoperability
Long-Term Evolution
for Microwave Access
(LTE)
(WIMAX)
(i) Long - Term Evolution (LTE): Long term evolution or LTE is an extension of the 3G technology.
It is a standard for high-speed mobile communication, based upon GSM/EDGE and UMTS/HSPA
technologies. The peak data rate for download is 100 Mbps and upload is 50 Mbps. The LTE
Advanced meets the specifications of IMT-Advanced standard for 4G technology. Its peak data rates
are 1000 Mbps for downlink and 500 Mbps for uplink.
(ii) Worldwide Interoperability for Microwave Access (WIMAX): WiMAX is a mobile wireless
broadband access (MWBA) standard is sometimes branded 4G. It offers peak data rates of 128
Mbps for downlink and 56 Mbps for uplink over 20 MHz wide channels. The latest version of
WIMAX is not compatible to the earlier versions and instead is compatible with LTE.
98
Rahul Publications
UNIT - III MOBILE COMMERCE
s
It provides complete security, privacy, and safety, which is the issue with the Wi-Fi networks. Using
n
4G, users who contain sensitive information on their mobile devices can use the internet securely.
It enables the users to choose many options.
Disadvantages of 4G
a it o
i c
The old devices do not support the 4G network; hence the customer is forced to buy the new
device to make use of the 4G network.
b l
u
4G technology uses various antennas and transmitters, and users would experience poor battery
P
life of the mobile phone while using this network. So, to use the internet for a longer period, we
ul
need to have more battery power.
In 4G, it is easier to obtain information from users illegally.
R
increased.
ah
It may be being attacked with the jamming frequencies; hence the chances of privacy breach are
99
Rahul Publications
BBA III YEAR V SEMESTER
10 years, a new generation of mobile network is launched. The first generation (1G) system, namely
AMPS was first introduced in late seventies (1978) in USA. The second generation (2G) system, i.e. GSM
first appeared in late eighties (1988) followed by CDMA, another 2G system. The third generation system
(3G) was first introduced in the year 2000 in the form of UMTS and CDMA 2000, and is widely deployed
around the world for fast internet download and multimedia application).
5G will also utilize the benefits of Artificial Intelligence (AI), which will gather relevant information
from internet based on certain user defined criteria and employ the information in a variety of business
applications. For example, while passing across a bill board displaying a certain product, the availability
and retail outlet details of the particular product in near vicinity will be extracted and displayed in the
mobile device. In yet another application of AI, during video call, the picture along with the smell of the
place of the caller can be perceived. Support of IPv6 will be provided whereby each mobile device will be
allotted a unique IP address so that they can independently connect to wireless internet, thus giving rise to
a Wireless World Wide Web (WWWW).
Q35. List out various advantages and disadvantages of 5G.
Ans :
ns
tio
Advantages
1.
2.
l i a
Better coverage area, less traffic, and high data speed at the edge of the cell.
c
Provide good efficiency in terms of energy and spectrum.
3.
4.
ub
It has multiple data transfer capacities.
5G technologies consume low battery in comparison to 1G, 2G, 3G, and 4G.
5.
6. l P
As per security terms, 5G is more secure than the rest.
u
5G supports the Virtual Private Network (VPN).
7.
8.
R ah
It has very low latency (time taken by data from origin to destination).
5G regulate the bandwidth requirement according to the application as some application requires
low BW whereas some require High BW.
9. 5G can connect more devices simultaneously than other technologies.
Disadvantages
1. 5G requires high investment in infrastructure development, and up-gradation and degradation are
also costly.
2. As 5G provides a high data speed, so it requires more storage capacity in smartphones and also
requires huge battery power.
3. There is no specific standard known for 5G till now as 4G has its VoLTE.
4. Wi-Fi is cheaper and easily feasible, so Wi-Fi is already a better alternative over 5G, which requires
high costs and maintenance than Wi-Fi.
5. As 5G network technologies are under the working mode, so still have lots of drawbacks and will
take time to be operational globally.
100
Rahul Publications
UNIT - III MOBILE COMMERCE
Ans :
Sl. No. 4G Technology 5G Technology
1. 4G stands for the fourth-generation technology. 5G stands for fifth-generation technology.
2. The maximum theoretical uploading speed of The maximum uploading speed of 5G
4G technology is 500Mbps. technology is 1.25Gbps.
3. The maximum theoretical downloading speed The maximum downloading speed of
of 4G is 1Gbps. 5G is 2.5Gbps.
4. The latency of 4G is approximately 50ms. The latency of 5G is approximately 1ms.
5. The 4G network is slow and less efficient when 5G is the fastest and most efficient
comparing with the 5G network. mobile network.
6. 4G technology is unable to differentiate
ns
5G technology is capable of identifying
it o
between fixed and mobile devices. fixed, and mobile devices with the help
of cognitive radio technique, and hence
ul P (Imp.)
ah
Wireless LANs (WLANs) are wireless computer networks that use high-frequency radio waves instead
of cables for connecting the devices within a limited area forming LAN (Local Area Network). Users
connected by wireless LANs can move around within this limited area such as home, school, campus,
R
office building, railway platform, etc.
Most WLANs are based upon the standard IEEE 802.11 standard or WiFi.
Components of WLANs
Stations (STA): Stations comprises of all devices and equipment that are connected to the wireless
LAN. Each station has a wireless network interface controller. A station can be of two types
Client
Basic Service Set (BSS): A basic service set is a group of stations communicating at the physical
layer level. BSS can be of two categories.
Infrastructure BSS
Independent BSS
101
Rahul Publications
BBA III YEAR V SEMESTER
ns
c a tio
Types of WLANS
b l i
WLANs, as standardized by IEEE 802.11, operates in two basic modes, infrastructure, and ad hoc
mode.
P u
l
Infrastructure Mode: Mobile devices or clients connect to an access point (AP) that in turn connects
u
via a bridge to the LAN or Internet. The client transmits frames to other clients via the AP.
ah
Ad Hoc Mode: Clients transmit frames directly to each other in a peer-to-peer fashion.
Ans :
R
Q38. What are the advantages of WLAN.
Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio
waves can penetrate walls, senders and receivers can be placed anywhere (also non-visible, e.g.,
within devices, in walls etc.).
Planning: Only wireless ad-hoc networks allow for communication without previous planning, any
wired network needs wiring plans.
Design: Wireless networks allow for the design of independent, small devices which can for example
be put into a pocket. Cables not only restrict users but also designers of small notepads, PDAs, etc.
Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood etc. whereas, networks
requiring a wired infrastructure will usually break down completely in disasters.
Cost: The cost of installing and maintaining a wireless LAN is on average lower than the cost of
installing and maintaining a traditional wired LAN, for two reasons. First, after providing wireless
102
Rahul Publications
UNIT - III MOBILE COMMERCE
access to the wireless network via an access point for the first user, adding additional users to a
network will not increase the cost. And second, wireless LAN eliminates the direct costs of cabling
and the labor associated with installing and repairing it.
Ease of Use: Wireless LAN is easy to use and the users need very little new information to take
advantage of WLANs.
Q39. Discuss various disadvantages of WLANs.
Ans :
Quality of Services: Quality of wireless LAN is typically lower than wired networks. The main
reason for this is the lower bandwidth due to limitations is radio transmission, higher error rates due
to interference and higher delay/delay variation due to extensive error correction and detection
mechanisms.
Proprietary Solutions: Due to slow standardization procedures, many companies have come
up with proprietary solutions offering standardization functionality plus many enhanced features.
Most components today adhere to the basic standards IEEE 802.11a or 802.11b.
ns
Restrictions: Several govt. and non-govt. institutions world-wide regulate the operation and
it o
restrict frequencies to minimize interference.
Global operation: Wireless LAN products are sold in all countries so, national and international
frequency regulations have to be considered.
i c a
Low Power: Devices communicating via a wireless LAN are typically power consuming, also wireless
l
devices running on battery power. Whereas the LAN design should take this into account and
b
implement special power saving modes and power management functions.
u
P
License free operation: LAN operators don’t want to apply for a special license to be able to use
the product. The equipment must operate in a license free band, such as the 2.4 GHz ISM band.
ul
Robust transmission technology: If wireless LAN uses radio transmission, many other electrical
ah
devices can interfere with them (such as vacuum cleaner, train engines, hair dryers, etc.).Wireless
LAN transceivers cannot be adjusted for perfect transmission is a standard office or production
environment.
Ans : R
Q40. What is WiFi ? What are its uses ?
WiFi stands for Wireless Fidelity. WiFiIt is based on the IEEE 802.11 family of standards and is
(Imp.)
primarily a local area networking (LAN) technology designed to provide in-building broadband coverage.
Current WiFi systems support a peak physical-layer data rate of 54 Mbps and typically provide
indoor coverage over a distance of 100 feet.
WiFi has become the de facto standard for last mile broadband connectivity in homes, offices,
and public hotspot locations. Systems can typically provide a coverage range of only about 1,000 feet
from the access point.
WiFi offers remarkably higher peak data rates than do 3G systems, primarily since it operates over
a larger 20 MHz bandwidth, but WiFiWiFi systems are not designed to support high-speed mobility.
One significant advantage of WiFi over WiMAX and 3G is its wide availability of terminal devices. A
vast majority of laptops shipped today have a built-in WiFi interface. WiFi interfaces are now also being
built into a variety of devices, including personal data assistants (PDAs), cordless phones, cellular phones,
cameras, and media players.
103
Rahul Publications
BBA III YEAR V SEMESTER
s
Also one can create a Point-to-Point network
using Wi-Fi or WLAN techno-logy. Two sites
tio
corporate office buildings, can be connected
using this method.
Many applications exist for Wi-Fi, including
in all segments where computers or digital media
ub
are used. Wi-Fi can also be used for entertainment.
As an example, the following applications are
(Voice over LTE) (Voice over Long-Term
Evolution ). In recent years, VoWi-Fi has
described:
ul
We use Wi-Fi every day. With Wi-Fi, weP become increasingly popular, allowing us to
make calls and anyone using our home Wi-
Fi network. The only requirement is that our
ah
can connect to the internet from any Wi-Fi- mobile phone must be connected to Wi-Fi.
capable device.Wi-Fi allows us to have Instead of using the mobile SIM network,
voice is transferred over Wi-Fi, resulting in
R
wireless communication, including streaming
very high voice quality. VoWi-Fi is already
or casting audio or video to any device. supported by a large number of mobile
Data transfer rates are also very fast when phones.
using Wi-Fi to share files, data, etc., among Internet via Wi-Fi in offices: In offices, all
two or more computer or mobile phone. computer systems are linked to the Internet
via Wi-Fi. In the case of Wi-Fi, there is no
Another important attribute is the capability need for complicated wiring. Also, the
to print any document using a Wi-Fi printer. network’s speed is excellent. It’s possible to
present an entire Wi-Fi project, such as a
Wi-Fi can also be used as a HOTSPOT, spreadsheet or ppt, to all participants at once.
providing Wireless Internet access for a specific
A cable break in Wi-Fi does not result in a
area. While the main network connection is loss of network connectivity, as it would be in
active, consumers of Wi-Fi-enabled devices the case of a cable.
can access the primary network connection By deploying routers at specific locations, a
via Hotspot, which provides them with city can also provide network connectivity
temporary internet connectivity. To create a using W-Fi. Because of its flexibility, schools,
hotspot, Wi-Fi adapters spread radio signals colleges, and universities have already
by utilising the owner’s network connection. implemented Wi-Fi networks.
104
Rahul Publications
UNIT - III MOBILE COMMERCE
As a positioning system, Wi-Fi can be used to Q42. List out basic advantages and disadva-
recognise a device’s area by detecting the natges of WiFi.
placements of Wi-Fi hotspots.
Ans :
Q41. What is Wi-Fi protocol?
The advantages of Wi-Fi Tt include
Ans : A versatile network connection and the
First and foremost, Wi-Fi is a wireless absence of complicated wiring requirements
communication system that transmits networks using for installation.
electromagnetic waves. The radiofrequency is Everywhere in the Wi-Fi range can access it.
utilised in Wi-Fi because we understand that there
Independent users are not required to obtain
are several types of electromagnetic waves based
regulatory approval.
on their frequency, including X-rays, Gamma-rays,
radio waves, microwaves, etc. In addition, Wi-Fi Extenders make it possible
to expand the network.
Base station network or Ethernet (802.3)
connection: It is the primary host network It’s easy and quick to set up.
from which the router receives its network
connection.
s
Only the SSID and password need to be
configured.
n
Access Point or Router: Network bridge,
also known as an access point or router,
a
it o
As part of its security measures, Wi-Fi
networks encrypt radio signals using WPA
c
connects wired and wireless networks. A wired encryption.
Ethernet connection is accepted, and the
l i
wired connection is converted to a wireless
b
connection, which is then spread via radio
It is also more affordable.
Hotspots are another feature that it offers.
waves.
l
Accessing Device: There are several ways Disadvantages
u
to gain access to information. From our
Mobile phones, laptops, and other devices
mobile, computer, etc., we access Wi-Fi and
ah
with batteries consume a lot of power when
surf the web using Wi-Fi.
using Wi-Fi.
R
Also, routers and our devices read data in
Even when encryption is in place, security
binary form. In this case, routers transmit radio
issues can still arise.
waves to our devices, obtaining and reading the
waves in binary form. All of us are familiar with the Wi-Fi can be attacked and accessed in the
binary representation of a wave, in which the same way that recognised devices become
topmost pick is 1 and the lower pick 0 in binary. unidentified to the router.
In comparison to a direct cable connection,
1
the speed is slower.
People can be harmed by it because it emits
radiation like cell phones.
Thunderstorms, for example, can interfere
with Wi-Fi signals.
Because it lacks a firewall, unauthorised
access to Wi-Fi is possible.
Since a router is required to access the
internet via Wi-Fi, we can’t access the internet
0 if the power goes out.
105
Rahul Publications
BBA III YEAR V SEMESTER
Ans : (Imp.)
Wireless Metropolitan Area Network (WMAN) is a type of Metropolitan Area Network (MAN) and
the only thing is that the connectivity is wireless. It spans multiple locations within a geographic area and
it serves the range greater than 100 meters. It is one type of wireless networking which has a coverage
area approximately the size of a city. Generally it spans or covers an area which is larger than the Wireless
Local Area Network (WLAN) but smaller than Wireless Wide Area Network (WWAN). WMAN connections
can be Point to Point or Point to Multipoint networks. It is a newer type networking technology which
supplements to some wired technologies like Gigabit Ethernet, Resilient Packet Ring (RPR), SONET over
IP etc.
A WMAN is mostly governed by a single entity such as an Internet Service Provider (ISP), government
ns
entity, or any other large corporation. A the user has to take the authorized access from the providers to
tio
The below figure illustrates a WMAN
l i c a
ub
ul P
R ah
Types of WMAN
There are two fundamental types of wireless MAN i.e.
106
Rahul Publications
UNIT - III MOBILE COMMERCE
1. Back haul: It is an enterprise type of (UHF) portion of the radio spectrum between
network, cellular-tower connection. It can also 2.5GHz and 2.7GHz and is used for
use WiFi hotspot. In this type of network fixed telecommunications technology and general-
wireless is used which saves large amount of purpose broadband networking.
money per year. Digital Subscriber Line
Q44. List out any four characteristics and
(DSL) can also be used in Back haul, but
benefits of WMAN.
Wireless connection is faster and less cost than
normal fiber optics connection. Ans :
2. Last mile: It is used for temporary networks Characteristics of WMAN
means where network requirement is for a
1. Connection can be Point to Point or Point to
temporary period. Like some large
Multipoint networks.
construction buildings/sites where conven-
tional network service ( like DSL broadband 2. Service to multiple nodes from one access
and cable modem) is disrupted. point.
WMAN Technology 3. Covers a larger area within a radius up to 50
1. Wireless Interoperable Metropolitan
Area Exchange (WiMAX) 4.
km.
ns
Stable connections to the terminals.
WiMAX is mostly used Wireless Metropolitan
Area Network (WMAN) technology based on
a
Benefits of WMAN
it o
Covers multiple locations within a metro-
the IEEE 802.16 set of standards. It provides
Multiple Physical Layer (PHY) and Media
b l
Access Control (MAC) options. It acts as an
alternate wireless version of Ethernet and i c
politan area.
Does not require high cost for infrastructure
in placing fiber or copper cabling and leasing
ul
Local Multipoint Distributed Service Easy to use, extend, exchange.
ah
(LMDS) Q45. Describe the concept of WiMAX?
It is a broadband microwave wireless
Ans : (Imp.)
R
transmission technology which provides
reliable digital two-way voice, data and WiMAX is one of the hottest broadband
Internet services. It is a wireless point to wireless technologies around today. WiMAX systems
multipoint communication system that’s why are expected to deliver broadband access services
called as Local Multipoint Distribution System to residential and enterprise customers in an
where Local refers to signal range limit, economical way.
Multipoint refers to broadcast access,
Loosely, WiMax is a standardized wireless
Distributed refers to transmission of wide
version of Ethernet intended primarily as an
range of data, Service refers to relationship
alternative to wire technologies (such as Cable
between operators and users. It generally uses
Modems, DSL and T1/E1 links) to provide
low powered, high frequency i.e. 25 to 31
broadband access to customer premises.
GHz over a short distance.
More strictly, WiMAX is an industry trade
3. Multi-Channel Multipoint Distributed
organization formed by leading communications,
Service (MMDS)
component, and equipment companies to promote
MMDS was previously known as Wireless and certify compatibility and interoperability of
Cable or Broadband Radio Service (BRS). It broadband wireless access equipment that conforms
is a wireless telecommunication technology to the IEEE 802.16 and ETSI HIPERMAN
which operates in the ultra-high-frequency standards.
107
Rahul Publications
BBA III YEAR V SEMESTER
WiMAX would operate similar to WiFi, but at higher WiMAX, which is an IP-based wireless
speeds over greater distances and for a greater broadband technology, can be integrated into
number of users. WiMAX has the ability to provide both wide-area third-generation (3G) mobile
service even in areas that are difficult for wired and wireless and wireline networks allowing
infrastructure to reach and the ability to overcome it to become part of a seamless anytime,
the physical limitations of traditional wired anywhere broadband access solution.
infrastructure.
WiMax Speed and Range
WiMAX is a Acronym for Worldwide Intero-
perability for Microwave Access. WiMAX is expected to offer initially up to
about 40 Mbps capacity per wireless channel for
WiMAX is a Based on Wireless MAN both fixed and portable applications, depending on
technology. the particular technical configuration chosen, enough
WiMAX is a wireless technology optimized to support hundreds of businesses with T-1 speed
for the delivery of IP centric services over a connectivity and thousands of residences with DSL
wide area. speed connectivity. WiMAX can support voice and
video as well as Internet data.
WiMAX is a scalable wireless platform for
constructing alternative and complementary
ns
WiMax developed to provide wireless
tio
broadband networks. broadband access to buildings, either in competition
WiMAX can satisfy a variety of access needs. to existing wired networks or alone in currently
a
Potential applications include extending unserved rural or thinly populated areas. It can also
broadband capabilities to bring them closer
l i
to subscribers, filling gaps in cable, DSL and
b
T1 services, WiFi, and cellular backhaul, c be used to connect WLAN hotspots to the Internet.
WiMAX is also intended to provide broadband
connectivity to mobile devices. It would not be as
u
providing last-100 meter access from fibre to fast as in these fixed applications, but expectations
are for about 15 Mbps capacity in a 3 km cell
l
cost-effective option for supporting
u
broadband services. P
the curb and giving service providers another
coverage area.
With WiMAX, users could really cut free from
ah
WiMAX can support very high bandwidth today’s Internet access arrangements and be able
solutions where large spectrum deployments to go online at broadband speeds, almost wherever
they like from within a MetroZone.
R
(i.e.>10 MHz) are desired using existing
infrastructure keeping costs down while
WiMAX could potentially be deployed in a
delivering the bandwidth needed to support
variety of spectrum bands: 2.3GHz, 2.5GHz,
a full range of high-value multimedia services.
3.5GHz, and 5.8GHz.
WiMAX can help service providers meet
many of the challenges they face due to Q46. Explain WiMAX Technology in detail.
increasing customer demands without
discarding their existing infrastructure
Ans :
investments because it has the ability to WiMAX is a technology based on the IEEE
seamlessly interoperate across various 802.16 specifications to enable the delivery of last-
network types. mile wireless broadband access as an alternative to
WiMAX can provide wide area coverage and cable and DSL. The design of WiMAX network is
quality of service capabilities for applications based on the following major principles “
ranging from real-time delay-sensitive voice- Spectrum: Able to be deployed in both
over-IP (VoIP) to real-time streaming video licensed and unlicensed spectra.
and non-real-time downloads, ensuring that
subscribers obtain the performance they Topology: Supports different Radio Access
expect for all types of communications. Network (RAN) topologies.
108
Rahul Publications
UNIT - III MOBILE COMMERCE
s
MHz-wide channel for use in (US deployments) the
10.66 GHz range, and the 28 MHz wide channel
for use in (European deployments) the 10.66 GHz
range.
distance network.
it o n
WPAN is also known as a short wireless
ub
defining MAC and PHY system profiles for IEEE
802.16a and HiperMan standards. The MAC profile
peripheral and hand-held devices such as PDAs,
smart phones and tablet PCs. A WPAN’s range
P
includes an IP-based version for both wireless MAN
l
(licensed) and wireless HUMAN (licence-exempt).
u
IEEE Standard 802.16 was designed to evolve
depends on the wireless router’s capabilities, access
point or the device itself, but it is usually restricted
to a house or small office. WPAN can be created
ah
using Wi-Fi, Bluetooth, infrared, Z-wave or any
as a set of air interfaces standards for WMAN based similar wireless technologies. In some cases, one of
on a common MAC protocol, but with physical layer the Internet enabled/powered devices acts as an
R
specifications dependent on the spectrum of use and
the associated regulations.
The WiMAX framework is based on several
core principles:
access point and provides network and Internet
access to other devices.
For example, a laptop can be connected to
the Internet wirelessly by creating a Bluetooth WPAN
with a cell phone. The General Packet Radio Service
Support for different RAN topologies.
(GPRS) Internet connectivity of the cell phone can
Well-defined interfaces to enable 802.16 RAN be shared with the laptop, and all data packets to
architecture independence while enabling and from the laptop are sent over the Bluetooth-
seamless integration and interworking with powered WPAN.
WiFi, 3GPP3 and 3GPP2 networks. Here are the main characteristics of a WPAN:
Leverage and open, IETF-defined IP Short-range communication
technologies to build scalable all-IP 802.16
Low power consumption
access networks using common off the shelf
(COTS) equipment. Low cost
Support for IPv4 and IPv6 clients and Small personal networks
application servers, recommending use of Communication of devices within a
IPv6 in the infrastructure. personal space
109
Rahul Publications
BBA III YEAR V SEMESTER
connecting wires.
As Bluetooth is an open wireless technology
ns
and spread spectrum. It is a combination of
code division multiple access (CDMA) and
tio
frequency hopping spread spectrum (FHSS)
standard so, it is used to send or receive data
technique.
to connected devices present across a certain
distance using a band of 2.4 to 2.485 GHz.
l i
In Bluetooth technology, the wireless signals
c a Q49. How does a Bluetooth works?
(OR)
ub
transmit data and files over a short distance,
Ans :
Explain the mechanism of bluetooth.
P
Bluetooth technology was developed by a
l
group of 5 companies known as Special
u
Interest Group formed in 1998. The
The master is the device that initiates
communication with other devices. The master
ah
companies are Ericsson, Intel, Nokia, IBM,
device handles the communications link and traffic
and Toshiba.
between itself and the slave devices associated with
R
The range of Bluetooth technology for data it. The slave devices have to respond to the master
exchange was up to 10 meters in older device and synchronize their transmit/receive timing
versions of devices, but the latest version of with the master device’s specified time.
Bluetooth technology i.e., Bluetooth 5.0, can
exchange data in the range of about 40-400
meters.
The average speed of data transmission in
Bluetooth technology was around 1 Mbps in
the very first version. The second version was
2.0+ EDR, which provided the data rate
speed of 3Mbps. The third was 3.0+HS,
which provided the speed of 24 Mbps. The
latest version of this technology is 5.0.
In Bluetooth technology, the network of
Bluetooth consists of a Personal Area Network
Bluetooth’s architecture is also called a
“Piconet” because it is made of multiple
networks.
110
Rahul Publications
UNIT - III MOBILE COMMERCE
Following is a list of some conditions that must be satisfied for a successful data transmission in
Bluetooth technology:
Maximum number of Master Node - 1
Maximum number of Slave Nodes - 7
Maximum number of Nodes in a Piconet - 8
Maximum number of devices that can be paired - 28 - 1 = 255
Number of devices that can be parked ’! Infinite (“)
SB S
SB
ns
S
S
M
a it o
b l i c P
P
P u S
ul
ah
The parked node is a type of node that is ready to be connected and stand by node is a type of
node that can either become a slave or parked node or remains idle or disconnected.
R
In Bluetooth technology, the data transmission can only occur between master and slave nodes. It
cannot be done between slave and slave nodes. However, two master nodes can be connected.
If the connection from the master node gets disconnected, the whole Piconet gets disconnected.
If there is a connection between two master nodes, then that network is called as Scatter-net.
It means scatter-nets are created when a device becomes an active member of more than one
Piconet and the adjoining device shares its time slots among the different piconets.
If the number of slaves or devices is increased in a Piconet, then the data transmission speed will be
decreased, and if the number of slaves or devices is decreased in number, then the data transmission
speed will be increased.
Q50. List out various advantages and disadvantages of Bluetooth?
Ans :
Advantages
Following is a list of some advantages of the Bluetooth technology:
Bluetooth Technology is based on Wireless technology. That’s why it is cheap because it doesn’t
need any transmission wire that reduces the cost.
111
Rahul Publications
BBA III YEAR V SEMESTER
ns
The data transmission range may also be an issue because it is also less.
tio
Q51. List out various applications of Bluetooth?
Ans :
l i c a
Bluetooth technology is used in many communicational and entertainment devices. The following
are some most used applications of the Bluetooth technology:
ub
Bluetooth technology is used in cordless desktop. It means the peripheral devices such as a mouse,
P
keyboard, printer, speakers, etc. are connected to the desktop without a wire.
ul
R ah
It is used in the multimedia transfer, such as exchanging multimedia data like songs, videos, pictures
etc. that can be transferred among devices using Bluetooth.
This technology is also used in the following devices: i.e.
Bluetooth Speakers.
Bluetooth Headphones.
Bluetooth Headsets for calling purposes.
Bluetooth gaming consoles etc.
112
Rahul Publications
UNIT - III MOBILE COMMERCE
Ans :
WWAN (Wireless Wide Area Network) is a WAN (Wide Area Network) and the only thing is that
the connectivity is wireless. It provides regional, nationwide and global wireless coverage. Where Wide
Area Network can be wired or wireless the Wireless Wide Area Network connections are completely
wireless. In our day today life we are using the Wireless Wide Area Network of different sizes and depending
on it delivery of telephonic calls, Web pages and streaming video, data sharing occurs.
WLAN (Wireless Local Area Network) differs from WWAN (Wireless Wide Area Network) technology
wise for example when WLAN uses WiFi to connect and transfer data, WWAN uses telecommunication
cellular network technologies such as 2G, 3G, 4G LTE, and 5G to transfer data.
ns
WWAN not only always refers to a wide area rather a closed area with large geographic coverage is
also considered as WWAN. For example a MANET (Mobile ad hoc networks) with nodes on buildings
it o
and towers or planes. A Low Power and low bit rate Wireless Wide Area Network (LPWAN) is also considered
as WWAN. For example transmission of small packets of information between things in case of IoT (Internet
of Things) implemented applications.
a
2.
Ans :
Cellular systems
b l i c
P u
Cellular network is an underlying technology for mobile phones, personal communication systems,
l
wireless networking etc. The technology is developed for mobile radio telephone to replace high power
transmitter/receiver systems. Cellular networks use lower power, shorter range and more transmitters for
data transmission.
3.
ahu
What is CDMA one?
Ans :
R
CDMAone or IS-95 is a second generation (2G) digital cellular technology that is based on spread
spectrum technique that improves channel capacity substantially by accommodating a large number of
users in a single transmission channel. It is based on the wireless communication protocol IS-95 and is
known by its brand name CDMAone.
It was first developed by Qualcomm in 1995, and is primarily used in North America where it
competes with Digital AMPS (IS 136). The data rate of CDMAone is around 300 to 500 Kbps and
operates in 1900 MHz band as well as 800 MHz band. The 3G version of CDMAone is known as CDMA2000
which is gradually replacing CDMAone in North America. In India, Reliance offers CDMA service to
around 40 million subscribers.
CDMA systems employ a combination of digital transmission and spread spectrum technology. The
analog audio (voice) signal is first digitized into binary elements using Analog to Digital Converters (ADC).
Next, the frequency of the digital signal is varied according to a definite pattern or code. The modulated
digital signal is then transmitted through the wireless medium and at the receiving end the signal is decoded
at the receiver with the same code pattern as used in the transmitter. The code pattern is kept secret to
maintain the privacy of the signal and also to make it hacker proof. CDMA uses wide bandwidth for the
signal, so that they include a large range of frequencies and appear as noise signals and are hard to be
113
Rahul Publications
BBA III YEAR V SEMESTER
Ans :
advantages of CDMA.
ns
GSM digitizes and reduces the data, then sends it
down through a channel with two different streams
tio
of client data, each in its own particular time slot.
Advantages
The digital system has the ability to carry 64 kbps to
CDMA has a soft capacity. The greater the
number of codes, the more the number of users. It
has the following advantages:-
l i c a 120 Mbps of data rates.
6. GPRS
b
CDMA requires a tight power control, as it
u
suffers from near-far effect. In other words,
Ans :
P
a user near the base station transmitting with
l
the same power will drown the signal latter.
u
All signals must have more or less equal power
General Packet Radio System is also known
as GPRS is a third-generation step toward internet
access. GPRS is also known as GSM-IP that is a
ah
at the receiver Global-System Mobile Communications Internet
Rake receivers can be used to improve signal Protocol as it keeps the users of this system online,
R
reception. Delayed versions of time (a chip allows to make voice calls, and access internet on-
or later) of the signal (multipath signals) can the-go. Even Time-Division Multiple Access (TDMA)
be collected and used to make decisions at users benefit from this system as it provides packet
the bit level. radio access.
Flexible transfer may be used. Mobile base GPRS also permits the network operators to
stations can switch without changing operator.
execute an Internet Protocol (IP) based core
Two base stations receive mobile signal and
the mobile receives signals from the two base architecture for integrated voice and data
stations. applications that will continue to be used and
expanded for 3G services.
Transmission Burst – reduces interference.
Disadvantages GPRS supersedes the wired connections, as
this system has simplified access to the packet data
The disadvantages of using CDMA are as networks like the internet. The packet radio principle
follows:-
is employed by GPRS to transport user data packets
The code length must be carefully selected. in a structure way between GSM mobile stations
A large code length can induce delay or may and external packet data networks. These packets
cause interference.
can be directly routed to the packet switched
Time synchronization is required. networks from the GPRS mobile stations.
114
Rahul Publications
UNIT - III MOBILE COMMERCE
s
switched services. In circuit switched services,
may also be used with laptops with the help of a
billing is based on the duration of the
connection. This is unsuitable for applications
with bursty traffic. The user must pay for the
entire airtime, even for idle periods when no
it o n
card.EDGE however does not seem to have very
bright prospects in Europe for a practical reason:
Most of the network carriers in Europe have invested
packets are sent (e.g., when the user reads a
Web page).
ub
services, billing can be based on the amount Ans :
P
of transmitted data. The advantage for the
Following are the features of EDGE.
user is that he or she can be “online” over a
l
long period of time but will be billed based
u
on the transmitted data volume.
Provide increase data rate, e.g. high speed
on GSM radio carriers as provided by
ah
broadband.
8. What is EDGE ? What are the key
elements of EDGE ? It can retransmit a packet with more robust
Ans :
R
Enhanced Data Rates for GSM (Global
System for Mobile) Evolution.
coding which means re-segmentation is
possible.
In EDGE packets are addressed up to 2048
while in GSM it is from 1 to 128.
EDGE is an enhanced version of GSM and Similarly EDGE has a window size of 1024
offers high speed 3G built on GSM. It is type of and GSM window size was 64.
data system used on GSM network used to allow EDGE reduces the number of bursts to
improved data transmission rates.Itcan transmit three retransmit when error occurs.
times more bits than GPRR in the same length of
time. EDGE is an “add-on” to GPRS, it cannot work It allows multimedia file transfer, web
alone. It was deployed on GSM networks by AT&T browsing and video conferencing through
in 2003 in the United States. wireless terminals.
EDGE is a 2.5G technology that is based on It enables operators to triple the data rate of
GPRS and can be used to offer personalised subscribers and provide extra capacity to their
multimedia services similar to 3G technologies.It can voice communications.
be used to transmit both voice and data. It however It requires less radio resources to support the
is just an add-on to GPRS and can not work alone. same traffic as supported by GSM networks.
115
Rahul Publications
BBA III YEAR V SEMESTER
ns
The Digital to analog conversions at high data
rates, multiuser detection and estimation (at
tio
base stations), smart antennas and complex
Ans :
error control techniques as well dynamic
a
Universal Mobile Telecommunication System routing will need sophisticated signal
c
(UMTS) is a 3G standard for mobile communication processing.
b l
multimedia services including broadband internet i
that provides enhanced data rate (of the order of 2
iv) Issues in the interface with the ad hoc networks
should be sorted out. 4G systems are
access. It follows 3GPP (Third Generation
P u
Partnership Project) specifications, defined under
expected to interact with other networks like
the Bluetooth, hiperlan, IEEE802.11b, etc.
ul
IMT-2000 standard. It is based on a technology
known as FOMA (Freedom of Mobile Multimedia
v) Voice over multi-hop networks is likely to be
an interesting problem because of the strict
ah
Access) and employs Wideband Code Division delay requirements of voice.
Multiple Access (W-CDMA) to achieve higher
spectral efficiency and bandwidth than 2G GSM 14. Define 5G systems.
systems.
12.
Ans :
R
What is 4G ?
Ans :
Fifth Generation (5G) systems are the next
evolutionary mobile network systems that will come
after 4G systems. The standard is, at present, in its
The First generation wireless mobile
developmental stages and is expected to be
communication systems were introduced in early
launched around the year 2020. In the history of
eighties and second generations systems in the late
1980s were intended primarily for transmission of mobile communication systems, it has been found
voice. The initial systems used analog frequency that in every 10 years, a new generation of mobile
modulation where as the second as well as the network is launched. The first generation (1G)
subsequent mobile systems use digital communi- system, namely AMPS was first introduced in late
cation techniques with time division multiplexing seventies (1978) in USA. The second generation
(TDM), frequency division multiplexing (FDM) or (2G) system, i.e. GSM first appeared in late eighties
the code division multiple access (CDMA). The third (1988) followed by CDMA, another 2G system. The
generation wireless systems which are just getting third generation system (3G) was first introduced
introduced in the world markets offer considerably in the year 2000 in the form of UMTS and CDMA
higher data rates, and allow significant improvements 2000, and is widely deployed around the world for
over the 2G systems. The 3G Wireless systems were fast internet download and multimedia application).
116
Rahul Publications
UNIT - III MOBILE COMMERCE
Ans :
WiFi stands for Wireless Fidelity. WiFiIt is based on the IEEE 802.11 family of standards and is
primarily a local area networking (LAN) technology designed to provide in-building broadband coverage.
Current WiFi systems support a peak physical-layer data rate of 54 Mbps and typically provide
indoor coverage over a distance of 100 feet.
WiFi has become the de facto standard for last mile broadband connectivity in homes, offices,
and public hotspot locations. Systems can typically provide a coverage range of only about 1,000 feet
from the access point.
WiFi offers remarkably higher peak data rates than do 3G systems, primarily since it operates over
a larger 20 MHz bandwidth, but WiFiWiFi systems are not designed to support high-speed mobility.
16. List out various advantages and disadvantages of Bluetooth?
Ans :
Advantages
ns
Following is a list of some advantages of the Bluetooth technology:
a it o
Bluetooth Technology is based on Wireless technology. That’s why it is cheap because it doesn’t
l c
need any transmission wire that reduces the cost.
i
It is very simple to form a Piconet in Bluetooth technology.
b
P u
It removes the problem of radio interference by using the Speed Frequency Hopping technique.
The energy or power consumption is very low, about 0.3mW. It makes it possible for the least
ul
utilization of battery life.
It is robust because it guarantees security at a bit level. The authentication is controlled using a
ah
128bit key.
You can use it for transferring the data, and verbal communication as Bluetooth can support data
R
channels of up to 3 similar voice channels.
It doesn’t require line of sight and one to one communication as used in other modes of wireless
communications such as infrared.
Disadvantages
Following is a list of some disadvantages of the Bluetooth technology:
In Bluetooth technology, the bandwidth is low.
The data transmission range may also be an issue because it is also less.
117
Rahul Publications
BBA III YEAR V SEMESTER
ns
tio
4. Bluetooth equipments are . [d]
(a) Stereo head set (b) GPs devices
5.
(c) Pointer
weight less than 10 kgs.
l i c a (d) All
[a]
(a) Nano
ub (b) Micro
6.
(c) Macro
l
UTMS technology based on
u P
.
(d) None
[a]
ah
(a) W-CDMA (b) CDMA
(c) GSM (d) GPP
7.
(a)
(c)
R allows the change of short of short messages between mobile station & wireless systems.
Message
MMS
(b) SMS
(d) Wireless
[b]
118
Rahul Publications
UNIT - III MOBILE COMMERCE
6. Wireless communication is .
s
7. technology permits hands free for incoming calls, tax and automatic synchronization for
n
PDA.
8.
9.
satellite weighting less the 10 kgs.
l i c
allows the exchange of messages mobile to mobile.
b
11.
u
is the advantage and extension of sms.
P
ul ANSWERS
ah
1. Latin
2. Communication
3.
4.
R
Communication system
Source encoder
5. Optimality
6. Data communication
7. Bluetooth
8. Nano satellites
9. TDMA
10. SMS
11. MMS
119
Rahul Publications
BBA III YEAR V SEMESTER
ns
Time Division Multiple Access (TDMA) is a digital cellular telephone communication technology.
tio
4. EDGE.
Ans :
l i c a
Enhanced Data Rates for GSM (Global System for Mobile) Evolution EDGE is an enhanced version
b
of GSM and offers high speed 3G built on GSM.
5.
Ans :
UMTS.
P u
ul
Universal Mobile Telecommunication System (UMTS) is a 3G standard for mobile communication
ah
that provides enhanced data rate (of the order of 2 Mbps) and supports a full range of high speed
multimedia services including broadband internet access.
6.
Ans :
WLAN
R
Wireless LANs (WLANs) are wireless computer networks that use high-frequency radio waves instead
of cables for connecting the devices within a limited area forming LAN (Local Area Network).
7. Wi-Fi
Ans :
Wi-Fi is a wireless communication system that transmits networks using electromagnetic waves.
120
Rahul Publications
UNIT - IV MOBILE COMMERCE
M-COMMERCE APPLICATIONS
UNIT Mobile financial services, Mobile advertising, Mobile Payment, Mobile Ticketing,
Mobile product location and shopping, Mobile business services, Mobile auction,
IV
Mobile entertainment, Mobile office, Mobile distance education.
ns
The use of a mobile phone to access banking
it o
services and execute financial transactions. This services and execute financial transactions.
includes both transactional and non-transactional This covers both transactional and non-
services, such as viewing financial information on a
user’s mobile phone. Mobile financial services
include both mobile banking (m-banking) and
ub
Mobile Financial Services fall into one of three
Mobile banking is a type of electronic banking,
or e-banking, which includes a broad array
categories:
1.
ul P
Mobile payments (P2P, P2M, or M2M)
of electronic banking instruments and
channels like the internet, POS terminals, and
ATMs.
ah
2. Mobile microfinance (loan
disbursement and payments), Q2. What is Mobile Banking? List out various
R
mobile banking services.
3. Mobile banking (bill pay or account
information, e.g. balances or alerts). Ans: (Imp.)
1. Mobile Payments Mobile banking refers to the use of a mobile
A mobile-based transactional service that can device to carry out financial transactions. The service
be transferred electronically using mobile is provided by some financial institutions, especially
networks. A mobile money issuer may, banks. Mobile banking enables clients and users to
depending on local law and the business carry out various transactions, which may vary
model. Finally payments are done using depending on the institution.
mobiles. Mobile banking refers to the use of a mobile
2. Mobile Microfinance device to carry out transactions. The service
is provided by some financial institutions,
Mobile banking has facilitated a new approach especially banks.
to microfinance by using the mobile phone,
customer usage data and agents for loan Mobile banking services can be categorized
applications, customer due diligence, and into the following: account information
credit decision-making. The microfinance access, transactions, investments, support
culture has begun to merge with the m- services, and content and news.
121
Rahul Publications
BBA III YEAR V SEMESTER
To date, many financial institutions and banks Q3. Discuss three major mobile banking
make use of both SMS and apps to keep their business models.
clients informed of their account activities or Ans:
to send out alerts to clients regarding possible
fraud and/or updates and maintenance of Mobile banking offers various financial and
non-financial banking transactions performed
service.
Through mobile devices. Such online banking
Mobile banking services can be categorized transactions are usually processed by banking agents
into the following: that control withdrawals, deposits or fund transfers
on behalf of the banks or other financial institutions.
1. Account information access These banking agents have collaboration with banks
and/or mobile service providers and have become
Account information access allows clients to
an integral part of mobile banking. Several retail or
view their account balances and statements
postal outlets, such as pharmacies, supermarkets,
by requesting a mini account statement, post offices, etc. can act as banking agents and
review transactional and account history, conduct financial transactions performed through
keep track of their term deposits, review and
view loan or card statements, access
ns
mobile devices on behalf of the banks. These
banking agents also offer front-end customer
tio
investment statements (equity or mutual support services, such as account opening, lending,
funds), and for some institutions, deposits, etc. in collaboration with either the banks
2.
management of insurance policies.
Transactions
ub
Transactional services enable clients to transfer
funds to accounts at the same institution or
providers, three mobile banking business models
are available. These are as follows:
P
other institutions, perform self-account
l
transfers, pay third parties (such as bill
u
payments), and make purchases in
1. Bank-focused Model
In this model, the financial institution, such
as bank provides banking services directly to
ah
collaboration with other applications or its customers through mobile devices. The
bank provides a customized mobile banking
prepaid service providers.
3.
R
Investments
Investment management services enable
clients to manage their portfolios or get a real-
user interface that allows customers to access
the bank website over their mobile devices
and perform online banking transactions. This
is an extension of internet banking and the
bank controls the banking transactions for its
time view of their investment portfolios (term- existing customers.
deposits, etc.)
2. Bank-led Model
4. Support services In this model, the bank makes collaboration
Support services enable clients to check on with mobile network operators and mobile
the status of their requests for loan or credit device manufacturers and provides a
facilities, follow up on their card requests, and common mobile banking platform to mobile
users. This is an alternative to conventional
locate ATMs.
branch-based banking, and allows customers
5. Content and news to perform mobile banking transactions
through some banking agents, instead
Content services provide news related to through bank branches or bank employees.
finance and the latest offers by the bank or Such branchless mobile banking offers
institution. banking transactions through mobile devices,
122
Rahul Publications
UNIT - IV MOBILE COMMERCE
and is controlled either by telcos (mobile registration process is defined and endorsed by the
network providers or mobile device bank or the mobile banking service provider and
manufacturers) or other retail banking agents provides an initial identification of the customer to
(such as retail stores or post offices, etc.). The ensure trust and security of the transaction. The
telcos and retail agents offer the front-end consumer identification data such as personal details,
customer support to mobile customers and credit card details etc. are stored in the server under
the back end financial processing is controlled strictly confidential environment. Each of the above
by the bank. In this manner, banks enjoy a technologies is discussed below:
wider customer base as they use a different
1. Interactive Voice Response (IVR)
delivery channel (mobile devices) and
different trade partners (telcos, retail agents) Interactive Voice Response is analogous to
at a much cheaper rate than conventional phone banking where a customer first dials a
branch-based model. However, in bank led pre-defined IVR number from the mobile
model, the customer account information is phone. Next, the customer is greeted by pre-
maintained and controlled by the bank, recorded welcome message, followed by a
instead of the telcos or retail agents. menu of different banking options. The
3. Non-bank-led Model
ns
customer chooses a particular option by
pressing the corresponding number from the
it o
In this model, the bank and telcos make an keypad and the respective transactional
agreement to provide a mobile banking information is announced through a pre-
platform to the mobile user, but the bank will
only provide the funds for a transaction. The
account management and other day-to-day
b
functions are performed solely by nonbank
u
partners (telcos) who have a direct contact
with the customers. Thus, the bank has a very
customer and provides necessary
authentication for making bank transactions.
The customer account is identified and the
P
limited role in customer service or account
l
handling and only provides funds for the
transactions.
u
requested information is provided through
voice messages using a text-to-speech
programme. The major limitation of IVR is
ah
that it can only be used for enquiry-based
Q4. Describe various technologies used in
services, and is also more expensive as
mobile banking.
Ans:
R
Mobile banking technologies are of two types,
namely server side technologies and client side
compared to other methods as it requires to
make a phone call which is generally more
expensive than sending an SMS or making
data transfer through WAP services. IVR
systems are usually implemented using PBX
technologies. Server side technologies are stored in systems that hosts IVR dial plans and other
a secured server at a bank or at the service provider information.
premises. Examples of server side technologies are
SMS banking, WAP applications, IVR (Interactive 2. SMS Banking
Voice Response) and USSD2 (Unstructured In SMS banking, user sends a structured SMS
Supplementary Service Data). Client side code requesting some banking transaction to
technologies are mobile applications stored in the a pre-assigned number. The bank responds
mobile handset or embedded inside the SIM card by sending a reply SMS containing the
of the mobile handset. The client applications are transaction information. SMS banking can be
usually built under J2ME (Java) environment and used for both financial and non-financial
have different characteristics and processes transactions, though SMS-based financial
depending on user requirements. In each of the transactions are seldom used because of
above applications, the user first has to activate the security concerns. For example, a customer
service through a registration process. The of Punjab National Bank (PNB) can send an
123
Rahul Publications
BBA III YEAR V SEMESTER
SMS code PNBBAL, requesting for account developed using WML (Wireless Markup
balance information. Similarly, a customer of Language) and are displayed in WAP
SBI can send an SMS TRN (a/c No.) (PIN browsers. The WAP sites are accessed via WAP
No.) (Amount), for making a fund transfer gateways that forwards bank WAP website to
to the specified account number. The main the user’s mobile devices through the mobile
advantage of SMS banking is that almost all network. The WAP server is hosted in bank
mobile phones support SMS service and the premises and stores WAP sites containing
cost of banking transaction is just the cost of banking applications.
an SMS which is affordable to all. WAP sites offer banking services similar
to Internet banking. The users can access the
The SMS sent by the customer first pass banking websites in their mobile devices and
from user handset to the Short Message perform banking transactions anytime and
Service Centre (SMSC) of the Mobile anywhere on earth. The users are allowed to
Network Operator (MNO) through the perform both enquiry based as well as
mobile network. Next, SMSC stores and transaction based banking operations. The
forwards the SMS to the SMS gateway
allocated to the mobile banking service
ns
actual banking application resides in bank
premises and the security of the transaction
tio
provider or the bank. The bank (or mobile is maintained exactly in the same manner as
in Internet banking. However, in order to
banking service provider) uses the user
mobile number, forwarded by the SMSC
along with the SMS, to identify the user
b
account and respond to the user request. network operator and/or the bank.
Another important use of SMS banking is
P
sending alert messages to the customers
u 4. Unstructured Supplementary Service
Data (USSD)
l
under emergency situations. Whenever there
u
is an ATM fraud happening in a particular Unstructured Supplementary Service Data
(USSD) is a communication protocol used by
ah
region, the bank can send a mass alert to its
customers in that region forbidding them to GSM network providers to communicate with
the cell phone users. It is a two way
R
use the ATM. Also, the alerts can be sent on
communication protocol (unlike SMS which
an individual basis whenever any abnormal
is a one way communication protocol), where
transaction happens in a customer’s account a real-time communication channel is
using an ATM or credit card. established (between the mobile user and the
3. Wireless Application Protocol (WAP) service provider) that allows two-way
exchange of data. SMS works in a store-and-
Wireless Application Protocol (WAP) is an forward mode where data can be sent in one
international standard that enables wireless direction at a time. USSD is session-based and
internet access in mobile devices, such as provides interactive dialogue between the
smartphones or tablets. A WAP browser user and the application provider. In a single
displays websites (known as WAP sites) in the USSD session, both sides can communicate
and exchange messages for a specified period
small screen of a mobile device and offers all
of time. Thus USSD is more responsive in
the basic services of a computer-based web
nature than SMS and is used for a variety of
browser, but simplified to operate within the applications, such as mobile money service,
restrictions of the mobile devices, such as small location based content services, menu based
screen size, small processing power, limited information delivery services and pre-paid
storage and power backup. WAP sites are callback services.
124
Rahul Publications
UNIT - IV MOBILE COMMERCE
5. Standalone Client Applications (J2ME/ from their mobile devices. The customer first
Java) signs on his/her online banking accounts in
Standalone mobile application clients are Citibank website and enters the mobile
application programs that users can download number, the name of the mobile carrier and
and install in their mobile devices from bank model number/name of the mobile handset.
websites and use them for conducting This is required as the Citi Mobile application
complex banking transactions from their must be customized to the make and model
mobile devices. The applications are mostly of the handset. Next, the customer gets two
SMS in the handset, one is the download
developed in Java under J2ME (Java 2 Micro
instructions and the other is an activation key,
Edition) environments and allow banks to
required to set up the application in the
customize the application according to their
phone. The customer then downloads and
specific requirements. In order to run the installs the application in his/her mobile
application, the mobile handset must be able phone, a process that takes two to three
to support J2ME, must have enough memory
s
minutes. Next, the customer launches the
n
to house the application and must have application using the activation key and the
it o
sufficient graphics capacity to display the user mobile banking service becomes available.
interface of the application. Once the Before making transactions, the customer has
application is downloaded in the mobile
handset, it may use SMS, USSD or GPRS to
l i c
transfer user data or instructions to the bank.
a to sign in by entering the mobile number and
make account transfers, balance inquiry and
payments through the mobile devices. In
ul P
transaction data. The user interface of the
mobile applications is similar to that of a
Citibank customer service with a single click.
Q5. Explain the advantages of Mobile
banking.
ah
website and provides same graphic-rich
benefits of the internet to the mobile users. Ans: (Imp.)
R
The user follows the application menu, selects
a particular transaction and press Enter
button to execute the transaction. The
transaction data is first encrypted and then
Advantages
Mobile banking provides the following
advantages :
sent to the bank (or banking service (a) Always on 24×7 Accesses
provider). Once received, the bank will first Banks are able to provide services to the
decrypt the message and then process the customers for 24 hours per day and 7 days
requested transaction. per week. It enables the consumers to be
transaction-ready much as cable access has
6. Citi Mobile facilitated online PC access and reduced
Citi Mobile is a standalone client application consumer dialup delays.
offered by Citibank to its customers to (b) Advanced Penetration of Mobile
provide mobile banking facility. The Networks
customers first download the application in The 2G networks already cover more than
their mobile devices from Citibank website 90% of the population in the western world
and can use it for making banking transactions and this number is growing steadily.
125
Rahul Publications
BBA III YEAR V SEMESTER
ns
tio
the communication channel between (b) Technical Problems
computers and mobile devices. The WAP There are problems of technical issues, security
component essentially provides the facility of
c
reforming data for display in wireless handsets.
b
(e) Faster Data Processing Speed
But, their concerns are not adequately fulfilled
P u
Increase in bandwidth and data transmission
speeds makes mobile data services efficient
by purveyors of m-banking.
l
(c) High Charges
and cost-effective in a real time environment.
(f) Security
ahu
In addition to the above mentioned smart
The most significant problem of m-banking
is that costs exceed perceived benefits. The
charges for data transmitted are still too high
R
card, a private key stored on the SIM card
can protect e-banking transactions. Effectively,
the mobile phone can become a wireless
wallet to protect proprietary purchase and
(d)
to develop mobile banking in several
countries.
Negative Experience in European
Countries
financial information. Experience about m-banking in European
countries has not been positive. e.g. the
(g) Mobile Payment
British leader in on-line banking decided to
Mobile payment means executing a payment abort its mobile offering. It saw little
transaction using a wireless device such as enthusiasm for mobile banking among its
mobile phone or personal digital assistant. customers.
The mobile device becomes the electronic Q7. What is micro finance?
payments device. Its mobility is its big
advantage. It enables payments to be Ans:
transacted regardless of place and time. Microfinance, also called microcredit , is a
Telephone and internet banking afford type of banking service provided to unemployed
customers bill payment and purchasing or low-income individuals or groups who otherwise
conveniences at any time. would have no other access to financial services.
126
Rahul Publications
UNIT - IV MOBILE COMMERCE
s
specific repayment plans. customer e-mails, etc.
The World Bank estimates that more than 500
million people have benefited from micro-
finance-related operations.
5. Investment services
it o n
It includes real time stock quotes delivery,
portfolio management services, selling and
Q8. Describe various services of mobile
banking.
Ans:
ub 4.2 MOBILE ADVERTISING
1. Enquiry-based services
ul P
It includes request for mini statements,
Q9. What is mean by mobile advertising?
Ans:
ah
account history, card and loan statements,
Mobile advertising is the communication of
pension plan statement, insurance policy products or services to mobile device and
R
statements, cheque status enquiry, balance
enquiry, credit card information, enquiry for
due payment dates, information on returned
cheque status, etc. It provides valuable
smartphone consumers. The mobile advertising
spectrum ranges from short message service (SMS)
text to interactive advertisements. Mobile advertising
is a subset of mobile marketing.
market information, such as foreign exchange Mobile advertising targets users according to
rates, bank interest rates, commodity prices, specified demographics. Mobile networks identify
stock market quotes and reports, product related mobile profiles and preferences and displays
corresponding advertisements when consumers
information and offers. It also provides
download and uses data services like games,
information regarding various bank branches applications (apps) or ring tones.
and ATMs and emergency helpline and
contact number. The Mobile Marketing Association (MMA) is
a non-profit global trade association that fosters
2. Transaction-based services mobile marketing and advertising technologies. It
regulates associated terms, specifications and best
It includes fund transfer, micro payments, bill practices. MMA also oversees global mobile
payments, commercial payments, subscribing advertising units in messaging, applications, video,
to insurance policies, mobile recharge, television and also on the Web.
127
Rahul Publications
BBA III YEAR V SEMESTER
Mobile advertising can be done in the existing customers will see an ad through a mobile
following ways: device is greater than they would through traditional
avenues. Because mobile devices typically have
Mobile Web
smaller screens than computers or laptops, this form
Text tagline ads, mobile Web banner ads, of digital advertising is usually optimized for small
WAP 1.0 banner ads, rich media mobile ads displays.
Multimedia Messaging Service The earliest form of mobile advertising took
place via SMS text messages. But mobile ad
Short text ads, long text ads, banner ads, campaigns quickly evolved into mobile web and in-
rectangle ads, audio ads, video ads, full ads app advertisements. One of the popular models in
Mobile Video and TV Advertising Units mobile advertising is known as cost per install (CPI),
where payment is based on the user installing an
Ad breaks, linear ad breaks, nonlinear ad app on their mobile device. CPI mobile advertising
breaks, interactive mobile video and TV ads networks work either as incent or non-incent. In
Mobile Applications the incent model, the user is given virtual points or
ns
rewards to install the game or app.
Many apps offer a free version that can be
tio
ads, branded mobile applications, sponsored
mobile applications. downloaded at no cost, but which is paid for by
placement of advertisements within the app. Mobile
Q10. Explain the working procedure of
Mobile advertisements.
b
Ans: would appear on the full version of the same
website.
P
that appears on mobile devices such as u
Mobile advertising is any form of advertising
Although mobile advertising helps keep
connections.
ul
smartphones and tablets using wireless
company revenues up, there are concerns about
consumer privacy. That’s because companies
ah
use data mining and other ways to collect
Companies advertise through text ads via information about consumers while they use their
SMS or through banner advertisements that devices. Advocates argue that companies may share
R
appear embedded on a mobile web site.
Ads are tailored based on consumer tastes
and/or browsing history using data mining
or even sell the data they collect and use with others.
Q11. List out various types of mobile adverti-
sements.
and other information gathering techniques. Ans:
Modern technology has given consumers a Mobile advertising can take a number of
wider range of options when it comes to how they different forms. These include:
consume media. In fact, people now spend more Push notifications
time on their smartphones, tablets and other mobile
devices than they do sitting in front of the TV. That’s These are pop-ups that appear on a mobile
because of the ease and cost of these devices, not device. These are delivered to consumers at
to mention the availability of wireless connections any time. This means users don’t actually have
allowing people to tap in. to be on an app in order to get a notification.
Image text and banner ads
In order to keep up with changing consumer
habits, companies adapted their advertising Users who click on their ads are redirected to
campaigns by adopting mobile advertising the advertiser’s page by opening it up on
strategies. That’s because the chance that new and a browser.
128
Rahul Publications
UNIT - IV MOBILE COMMERCE
ns
investigate. For many companies, the costs
involved in creating this content are much
it o
less than video marketing, generalized content
Ans: marketing, or social media marketing.
Mobile advertising may seem similar
to mobile marketing, but the two are inherently
l
different. Mobile marketing is a more general term
i c a 3. It creates instantaneous user responses
When mobile advertising reaches the correct
u
personal data collected, mobile marketing also
b
that encompasses mobile advertising. While it uses demographic, 90% of consumers with a
smartphone are able to recall a mobile web
advertisement that they saw even a week after
P
makes use of technology such as location services
they had seen it. Although in-app advertising
l
to personalize ads based on user preference, habits,
or location. This means that some mobile is lower, the recall rate is still at 86%. The
u
advertisements may only appear when a mobile user
ah
is in close proximity to a certain store or service
provider.
engagement rates are much higher for mobile
advertising as well, with 11% clicking on an
ad and 8% going to the website of the brand
R
Mobile ad placement works by way of a
programmatic bidding process for ad placement, in
which advertisers bid in real-time for the right to
place an ad on a mobile device. The infrastructure
4.
after seeing the advertisement.
It places advertising content where
people happen to be
According to information released by
that allows for this process is known as a demand- eMarketer, in-app activities account for 89.2%
side platform (DSP). The use of such platforms will of adult smartphone usage time in the United
enable advertisers to optimize their performance States. For tablets, in-app use accounts for
based on a number of key performance 76.8% of usage time. You must be engaged
indicators (KPI), such as effective cost-per- in some type of mobile advertising to get
click (eCPC) and effective cost-per-action (eCPA). your message to these people. Although
Q13. Discuss the advantages of Mobile mobile web engagement rates are a little
advertising. higher, the average person will spend just 16
minutes each day using the mobile web. The
Ans: (Imp.) remainder of the time is with an app.
1. It reaches people in real-time situations 5. It creates content that can be shareable
Mobile devices are carried by their owners Mobile advertising does more than encourage
almost everywhere they go. Many users will a click or try to get a user to remember a
129
Rahul Publications
BBA III YEAR V SEMESTER
website or phone number. It also creates opportunities to solve problems for people
content that is easy to share across social before they spiral out of control and become
media platforms. This type of advertising negative PR for your company.
helps brand ambassadors extend your
message to other networks that may not Q14. Discuss the disadvantages of Mobile
always engage with the goods or services you advertising
provide. With the right message and a little Ans:
luck, your advertisement may even go viral.
1. It creates advertising that people hate
6. It creates data that can be instantly
tracked Mobile advertising is an interruptive form of
The content offered in mobile advertising is advertising. It allows you to create a message
designed to create interaction opportunities. that will be remembered, which can be an
When a campaign is released, the responses advantage. It turns into a disadvantage when
from users can be tracked instantly. You can you create frustration for the user by
see what is working with your ads, what is interrupting their mobile experience in some
way. HubSpot reports that 70% of people
not working, and make immediate
adjustments if you see users in your targeted
ns
who regularly use a mobile device dislike
seeing mobile advertising. Mobile ad-blocking
tio
demographics not responding as anticipated.
Over time, this advantage allows you to fine- apps have increased in popularity by more
than 90%. That combination means you
a
tune a mobile advertising campaign, so that
must be specific with your targets with
7.
term results.
It gives you access to mobile payments
b l i c
it is able to provide your company with long-
advertising, or you could be wasting your
money.
P
Mobile advertising creates the modernu 2. It needs to be perfect the first time
around.
ul
equivalent of an impulse purchase. When you
stand in line at the grocery store, what do
Real-time reactions can create positive
interactions between users and brands. That
ah
you see? Candy bars, gum, sodas, water, and means if your message is imperfect in some
reading material. These are all items designed way, the negative first impression that is made
R
to engage a purchase because you’re bored, is one that will matter. Your content needs to
waiting for someone to scan your purchases. be error-free. Your ad size should be vertical
Mobile advertising does the same thing. to get the best result. Page position also
Consumers use their smartphones as a form matters. The most viewable position for
of entertainment. Boredom creates interest mobile advertising is right above the fold
in something new. That is why engagement instead of at the top of the page.
rates are so high with this option. Your 3. It may force some users to make
advertisement is able to fulfill a consumer assumptions about your company.
need.
Because there is less content involved with a
8. It can be used in multiple ways
mobile advertisement, you’re relying on a
Mobile advertising doesn’t always need to be click or a visit to your website to get the full
about selling goods or services. You can also message sent to a consumer. You’re forced
use it to ask for feedback about how you are into a position where consumers must see
doing. Consumer surveys, reviews, and other your advertisement, then make assumptions
feedback options can be completed in real- about who you are and the value proposition
time, allowing you to see how someone is that is being offered. This creates
thinking or feeling about your message at any opportunities for your message to be heard
given moment. That gives you more in an unintended way, which may drive some
130
Rahul Publications
UNIT - IV MOBILE COMMERCE
of your targeted demographic away from SMS, and MMS, not every consumer uses
your business and into the hands of the an unlimited plan. There are standard data
competition. and texting charges which may apply to some
accounts. If you’re sending a barrage of
4. It does not have a standard display
advertising messages that are being charged
option to use $0.10 per item to the user, then you’re not
Although advertising providers will do their going to create positive vibes with the
best to display mobile ads in the way your consumer. We must remember that people
company submits them, there is no guarantee are paying to see the messages that are being
that users will see them as intended. Phones offered to them, in one way or another, and
come in various shapes and sizes. Multiple respect that fact.
generations of equipment are being used.
Take the iPhone, for example. The iPhone 4 4.3 MOBILE PAYMENTS
series still produces more than 3% of global
web traffic, according to Apple Insider, despite Q15. What is meant by mobile payments?
several new series being introduced. How
your ad looks in different browsers or apps
may change for users as well.
Ans:
ns
A mobile payment is a money payment made
5. It feels like a telemarketing call
Remember those phone calls you’d get at
a it o
for a product or service through a portable electronic
device such as a tablet or cell phone. Mobile
payment technology can also be used to send
dinner time trying to sell you something?
That’s what mobile ads do for users
throughout their day. Even when consumers
u
have opted in to receive marketing messages
from you, there is no guarantee that they will
P
continue wanting your messages. Even if you
Initially more popular in Asia and Europe,
mobile payments spread to North America
and experienced considerable growth.
l
automate your entire process and allow your
u
ads to generate results on their own, there is
Merchants unwilling to retool existing
ah
terminals have contributed to the slow growth
no guarantee for success with an investment
of mobile pay compared to physical credit
into this advertising option.
R
cards.
6. It may create navigational difficulties
for some users. Mobile payments offer additional privacy and
security benefits compared to physical cards.
About 80% of the phones owned in the
United States are smartphones. That means There are mobile payment apps for both
20% of users are using standard cell phones Apple and Android (Apple Pay and Google
to meet their mobile needs. Even when Pay).
touchscreen capabilities are present, there Many banks have recently adopted
may be navigation issues to consider when technology into their banking apps that allow
designing a mobile add. Some advertisements customers to send money instantly to friends and
may not gain an interaction, even if the user family members directly from their bank accounts.
is interested, because it is too difficult for them Mobile payments are also made on site at stores by
to access it. scanning a barcode on an app on your phone,
7. It costs the user something to receive accepting payments from convenience stores to
your advertisement. large, multi-national retailers.
This is the primary disadvantage to mobile The cost of the purchase may be deducted
advertising that should not be forgotten. Even from a pre-loaded value on the account associated
though we live in an era of unlimited data, with the particular store, or paid by credit or debit
131
Rahul Publications
BBA III YEAR V SEMESTER
card. Payment information is encrypted during confidence so that the privacy of the customer
transmission, so it is thought of as being a safer is not compromised.
payment method than paying with a debit or credit 4. Low cost
card.
The transaction cost of mobile payment
Q16. What are the characteristics of mobile systems must be lower than that of other
payment systems? conventional payment systems. The cost
Ans: (Imp.) should not be a barrier to the mass
deployment of mobile payment options. The
1. Simplicity lower transaction cost of mobile payments
The mobile payment system must be simple will help to keep it competitive with other
and user-friendly with rninimum learning payment options in the market.
curve for the customer to use it. There must 5. High speed
be scope for the customer to personalize the
application according to his/her convenience. The speed of operation of mobile financial
transactions must be high enough to satisfy
s
2. Availability business and other customers. The mobile
n
The mobile payment system must be universal network providers, financial institutions and
tio
in nature and must operate under various mobile payment service providers must work
domestic, national and global environments. together to ensure faster transactions across
a
networks and across different financial
Users must be able to perform financial
transactions in C2C (between customers),
B2B (between businesses) or B2C (between
businesses and customers) modes. The
P u
interoperability among various communi-
Ans:
models with examples.
(Imp.)
l
architectures must be maintained. The
u
software must be developed under open 1. Bank-centric Model
ah
technologies that allow interactions among
different mobile networking systems. In this model, the banks or financial
institutions control all the payment stages and
3.
R
Security
The most important feature of any mobile
payment system is the security arrangements.
At the time of making payment, the customer
maintain and control both the merchant and
consumer accounts. In essence, it is exactly
similar to the traditional credit card based
payments. The merchant acquiring bank and
has to enter the credit card number, bank issuer bank are usually different and the
account number or bank PIN number payment gateway is maintained by yet
depending on the particular type of mobile another financial institution like Visa or
payment used. The important and MasterCard. The role of network operators
confidential account information of the is just to provide the connectivity for
transmitting the payment transactions. Instead
customer must be protected from misuse by
of using the
unwanted hackers which may lead to financial
and other losses to the customer. In order to
resist hacker or virus attacks, proper security
arrangements must be adopted in the form Customer Bank Merchant
of firewalls, Public Key Encryption (PKI
techniques and password authentication. Also,
care must be taken to ensure that the
customer credit history is kept in strict Fig.: Bank-centric Model
132
Rahul Publications
UNIT - IV MOBILE COMMERCE
credit cards, consumers use their NFC enabled mobile devices (which act as a credit card and stores
all credit card info inside it) at the POS terminal and make payments exactly in a manner similar to
credit card based payments. Example of bank-centric model is Paypass by MasterCard or Visa
Mobile by Visa Inc.
2. Operator-centric Model
In this model, the mobile network operator controls the entire value chain of the payment system
and provides the mobile payment service to the customer without the involvement of a bank or
financial institution. The customer holds a pre-paid account with the operator. When the customer
pays through the mobile device, the amount is charged with the pre-paid or post-paid account of
the customer. The entire payment network and transactions are maintained by the operators
themselves and provides POS terminals to the merchants for making payment transactions. The
customers can make payments at the merchant POS terminals either by NFC-based smartphones
ns
or by sending SMS to the operators. Example of operator-centric model is NTT DoCoMo/ Felica e-
wallet service in Japan, GCash and Mobipay in Spain. However, the scope of operator-centric
a it o
model is limited as the network operators are not banks, and hence, it is not possible for them to
provide wide range of financial services provided by banks or financial institutions.
Customer
b l i cMNO Merchant
P u
ul
ah
Bank
3. R
Collaboration Model
Fig.: Operator-centric Model
This model involves collaboration between financial institutions, mobile network operators and
other payment service providers who separately contribute to the mobile payment value chain.
The mobile network operators are responsible for providing and provisioning of NFC cards in the
consumer handsets, and also for providing NFC compatible POS terminals at the merchant locations.
The banks or financial institutions perform the roles of acquiring bank, issuer as well as the payment
gateway provider. One or more banks can work together to perform the roles of acquirer, issuer or
payment gateway provider. Yet another third party can provide the payment application that controls
flow of transactions on behalf of the financial institutions. Collaboration model is the most feasible
model as it allows respective parties to work efficiently in their own domain and contribute significantly
in the value chain. Different stakeholders can focus on their core competencies, and hence, can
generate revenue by incremental services and enjoy customer loyalty. Example of collaboration
model is Moneta by SK Telecom.
133
Rahul Publications
BBA III YEAR V SEMESTER
NFC NFC
POS Card Customer
Merchant MNO
Financial Payment
Acquiring Issuer
Institutions/ Service
Processor Processor
Bank Provider
Fig.: Collaboration Model
4. Peer-to-Peer Model
In this model, mobile payment service providers act independently and offer mobile payment
services to the customers. They do not involve banks or mobile operators for processing the payment
transactions. They take the payment from the customers, deduct their commission from the payment
tio
The transaction is done peer-to-peer between the customer and the merchant, and hence, the
a
name. In this model, money is transferred from one person to another and bypasses the banks and
c
network providers altogether. This model is particularly applicable to individuals who do not own a
l i
bank account and is extensively used in emerging countries for remittance and other micropayment
b
purposes. It also helps merchants as it lowers the transaction fee compared to other three models.
u
Examples of this model are PayPal and Obopay.
Bank
Ans: (Imp.)
Mobile payments refer to any payment made using a mobile device. Due to our ever-increasing
smartphone dependence, various ways have been developed to allow consumers to pay conveniently
through a phone.
There are more types of mobile payments than contactless phone payments, both for remote or
face-to-face payments. Let’s look at the different ways you can pay with a mobile phone.
134
Rahul Publications
UNIT - IV MOBILE COMMERCE
(i) Near-field communication (NFC) frequently NFC, but other modalities like QR codes
payments have been used by some services.
NFC phones communicate with with NFC- Apple Pay is an example that cuts across
enabled card machines using close-proximity radio several categories, allowing contactless payments on
frequency identification. The mobile phones don’t card terminals (using fingerprint authentication via
the phone), in-app purchases and payments on the
have to touch the point of sale to transfer internet.
information, i.e. money, but they have to be within
Google Pay and Samsung Pay are two other
a few inches of the terminal.
big mobile wallet contenders.
NFC involves a direct, almost instantaneous
Digital wallets are very secure to use. They
transfer of encrypted data to point-of-sale devices,
commonly work through complex encryption and
as opposed to chip and PIN technology that takes
tokenisation, a method using time-limited token
longer to process. Many mobile phone operators
numbers generated to process the specific
are looking at ways to further develop this
transaction using your already-encrypted card
technology.
s
“stored” in your mobile wallet.
n
(ii) Sound waves-based payments
(v) Quick response (QR) code payments
it o
Sound wave-based (or sound signal-based)
mobile payments represent a newer, cutting-edge QR (abbreviation of “quick response”) codes
a
solution that works for most mobile phones. have many uses and are often found in advertising,
Transactions are processed – without the need for
internet – through unique sound waves containing
encrypted data about the payment. Sound waves
u
are sent from a terminal to the mobile phone to banking apps where your cards are already
associated, and other apps by stores and providers
P
convey payment details, where after the customer’s
where your card details can be connected.
l
phone converts that data into analog signals that
u
finalise the transaction. Some e-commerce businesses use QR codes
ah
(iii) Magnetic secure transmission (MST) at their website checkout as an alternative to
payments manually entering card details. For card-not-present
transactions, this is more secure because your phone,
R
A third way to pay with a mobile phone at a
card terminal is through magnetic secure
transmission (MST). Samsung Pay uses both MST
and NFC payments for contactless mobile phone
that your card details are securely connected to,
confirms you are the owner of the card – and
because you’re not typing your unencrypted card
details on a device screen.
payments.
(vi) Internet payments
MST is when a phone emits a magnetic signal
imitating the magnetic strip on the payer’s credit Many people simply pay on the internet in
card, which the card terminal picks up and processes their phone browser (e.g. Safari, Chrome) or within
as if a physical card was swiped through the apps, provided there’s WiFi or a 3G/4G network
machine. Some card machines may require a signal. There are several ways to pay this way
software update to accept MST, but most new
(vii) Payment links
terminals accept it already.
Overlapping with internet payments, we have
(iv) Mobile wallets
payment links. Also named ‘pay by link’, it is most
A mobile wallet (also called digital wallet) stores commonly referring to a button/link sent in an email,
payment information on a mobile device, usually text message, messaging app or over social media.
in an app. Mobile wallets can utilise different When the receiver clicks the link, a checkout page
technologies in the payment process, most opens up in an internet browser where the recipient
135
Rahul Publications
BBA III YEAR V SEMESTER
can enter their card details to process a transaction (x) Mobile banking
for a specified merchant.
Mobile banking is simply an app provided by
The transaction total can be set in advance the user’s bank, through which you can conduct
by the merchant sending the link, or in some cases financial transactions directly from your bank
entered manually by the recipient for e.g. charity account. This is usually used for peer-to-peer
donations. The merchant may itemise the bill so transfers and payments to other people, but bills
products are included on the customer’s digital can also be paid this way.
receipt that follows, or you may only see a Each bank has their own sign-up procedures
transaction amount with merchant details on the for their app to verify you are the owner of the
checkout page. bank account. But once signed up, it is usually easy
(viii) SMS payments to log in on your phone and view your account
balance and transaction history, make bank
SMS payments – also called premium SMS – transfers, and anything else that your bank allows.
simply means paying for products or services via a Every bank has their own limits for what you can
text message. Once you’ve submitted a text message do through the app.
with the relevant information to the right payee
phone number, the payment amount is added to
ns
Q19. Describe various types of mobile
payment service providers.
tio
your mobile phone bill. So in effect, you’re paying
through your phone network provider, perhaps Ans: (Imp.)
through direct debit or pay-as-you-go – the way
you usually pay for your phone use.
Just a few years ago, SMS payments were
l i c a Mobile payment has become an integral part
of mobile commerce and billions of mobile users
b
are resorting to mobile payments due to the
one of the most popular methods of using mobile convenience and ubiquitous nature of mobile
phones to pay for goods or services (even for
P u
person-to-person payments) or donate to charity,
devices. Almost all major banks offer mobile
payment options to their customers. All major credit
ul
and for good reason due to its simplicity – all the
user needs is a phone with text capability and
card providers, such as Visa, Master Card and
American Express have introduced mobile payment
ah
prepaid SIM card or phone contract. With the services. Visa offers PayWave service that supports
increase in more advanced smartphones, however, mobile payments from NFC enabled smartphones.
growth.
(ix) R
other modes of mobile payments have seen faster
136
Rahul Publications
UNIT - IV MOBILE COMMERCE
recipient by check or electronic deposit in recipient’s handles the online payments. The users can pay by
bank account, or if the recipient is also a PayPal swiping the card in the Square card reader (fitted in
account holder, deposits in his PayPal account. the mobile device) or by manually entering the credit
PayPal has introduced PayPal Mobile to support card details in the mobile device through the Square
payments through mobile devices. The user, who app. The users can get the Square device and the
already has a PayPal account, first registers the app totally free of cost by registering on to the
mobile device in PayPal website and gets a PIN. At Square website. They pay 2.75% per card swipe
the time of making payment from the mobile device, for Visa, MasterCard, Discover and American
the user first enters the PIN in the mobile device Express cards. It also allows customers to set up tabs
and sends to PayPal through SMS for authorization. in the Square app., and pay with their names.
After the PIN is verified, the user enters amount Customers can sign with finger on the screen for
and recipient details and the transaction is making payments and receive an electronic receipt
completed. The user gets a SMS notification from via text or e-mail. It also supports resending of
receipts and issuing of refunds. It is perfect for mobile
PayPal confirming the payment. Such SMS-based
businesses where merchants are going places and
mobile payments, where the user need not have to
need to accept payments anywhere and anytime
use credit/debit cards have become very popular
worldwide.
ns
using their mobile devices. It also ensures that the
funds are deposited within 24 hours of the
it o
Recently, PayPal has launched PayPal Here, acceptance of payments through the Square device.
a mobile payment solution that allows small Square is compatible with any type of mobile
merchants to accept any form of payment including
credit/debit and checks using their mobile devices.
l i
It includes a free thumb-sized card reader that can
c a devices such as Apple iPhone, Samsung Galaxy,
Motorola Photon, HTC EVO 3D or Google Nexus
S using any platform, such as iOS, Android,
ub
be inserted into the audio socket of the mobile
device, and an app which converts the mobile device
Symbian or BlackBerry OS. Square’s technology is
Verisign certified and uses strong 2048 bit encryption
techniques including SSL and PGP.
ul P
into a card reader. With the help of PayPal Here,
merchants can accept payments by swiping cards
in the card reader, scanning cards and checks by
3. Google Wallet
Google Wallet is a mobile payment application
ah
the phone camera or entering card information into
that allows users to store credit card, loyalty card,
the mobile screen. The app can also send invoices
and gift card information in their mobile devices. At
to respective parties and accept PayPal payments
R
by simply taping on the screen and providing the
photo of the customer. There is no monthly fee or
set up fee for getting PayPal Here service. Merchants
only pay a flat rate of 2.7 per cent for each card
the checkout points, the users have to tap their NFC-
enabled mobile devices in any MasterCard PayPass
terminals in order to make credit-based payments.
Google does not charge users or merchants for the
service and generates revenue through sponsored
swipe and PayPal payments. In addition, every ads to the service. Any user having a Citi MasterCard
PayPal Here merchant gets a business debit card can create a Google Wallet account by entering
for quick access to cash and 1 per cent cash back credit card information in the Google Wallet app.
for eligible purchases. PayPal Here uses end- to- After verification, the credit card information is
end encryption to protect card information, and stored in Google Wallet, and at the checkout point
includes PayPal’s world-class fraud management users can use it by tapping on the mobile phone
capabilities as well as 24×7 live customer support. and make payments. Google Prepaid card is a virtual
2. Square card that can be funded with any existing credit/
debit cards and can be stored in Google wallet for
Square is a mobile payment service that allows future use. Google Wallet can store gift cards issued
mobile users in USA to accept credit card payments. by partner merchants and at the time of payment,
It includes a free plastic square-shaped card reader when the user taps to pay, Google Wallet transmits
that can be inserted in the audio jack of the mobile the gift card information to the merchant terminal
device whenever required, and a free app that for redemption. Google wallet is accepted by
137
Rahul Publications
BBA III YEAR V SEMESTER
thousands of online merchants that support Google credit cards but also debit cards, reward cards,
Checkout and also on Google’s own sites. Users discount coupons, payment coupons, tickets and
can purchase goods from online shops across the transit passes.
web by signing on Google Wallet account. Google In order to protect the mobile wallet from
Wallet is protected against unauthorized purchases fraudulent attempts, Isis employs a number of
made through Google Wallet, and the payment security measures. Isis Mobile wallet is PIN protected
information is stored in encrypted form. The Google and can be opened only by entering a 4-digit PIN.
Wallet app requires a PIN to activate the NFC The credit card numbers stored in the Isis wallet are
antenna at the time of payment. Once the invisible and constantly changing security codes are
transaction is completed the antenna is turned-off used to prevent any attempt to counterfeit the card.
and needs the PIN to activate it again. Users can call Isis service centre anytime to report
any suspicious activities, and the wallet will be
4. Isis
suspended remotely and instantly to prevent any
Isis is a mobile payment system that stores all further fraudulent attempt. Isis is available in all
payment cards (such as credit card, debit card, gift major NFC-enabled smartphones, such as Apple
iPhone, HTC, LG, Motorola, RIM BlackBerry,
s
card, etc.) and loyalty cards information in
Samsung, Sony Ericsson, etc.
n
smartphones and allows users to perform mobile
tio
payment transactions using their smartphones 5. M-Pesa
whenever required. Isis- enabled smartphones
M-Pesa is a mobile money transfer service
a
utilizes NFC (Near Field Communication)
offered by Safaricom, the leading communication
technology to communicate with the merchant
payment terminals and perform credit/debit card
b l
based payment transactions. Isis has collaboration
i c and mobile network provider in Kenya. The main
purpose of M-Pesa (M for mobile, Pesa for money)
is to enable mobile users to receive and repay
P
and works with Visa, MasterCard, Discover and
u
with AT&T, T-Mobile and Verizon Wireless in USA, microfinance loans using their mobile handheld
devices. It offers a branchless banking service to
ul
American Express cards.
Isis mobile wallet system consists of two
mobile users who can complete basic banking
transactions such as send money to individual or
ah
components, the smartphone component and the businesses, deposit cash, withdraw cash from
designated outlets, buy airtime and loan receipt or
POS component. The smartphone component is
repayment. It is a joint venture between Vodafone
R
downloaded and installed in the NFC-enabled
smartphones of the users. The POS component is
installed in the NFC- enabled POS (Point of Sale)
terminal of the merchant. After installing the Isis app
and Safaricom in partnership with Citibank and
Commercial Bank of Africa.
M-Pesa service platform is developed by
Vodafone in consultation with Sagentia and it
in the smartphone, the user stores all the credit/
debit/gift card information in the application. At the integrates its mobile wallet service with Safaricom’s
time of payment in a retail store, the user simply rating, billing and provisioning systems. Subscribers
taps the smartphone in front of the Isis-enabled POS of Safaricom can register for M-Pesa service by filling
up a registration form with ID proof. After
terminal of the store, and the payment will be
registration, the original SIM is replaced by M-Pesa-
credited to the selected credit/debit account of the
enabled SIM. The user deposits cash in a nearby
user. Instead of carrying all the plastic credit/debit agent office and receives digital currency called e-
cards and scanning or swiping them in the card Float. The e-Float can be transferred to any person
readers and supplying PIN for authorization, user or merchant via encrypted SMS. The user can also
only carries the smartphone and makes credit card- encash e-Float and withdraw money from any M-
based payment at the merchant location. Thus, Isis Pesa designated outlets. In order to secure M-Pesa
mobile wallet system greatly simplifies mobile transactions, all transactions are PIN protected. In
payments, and has become extremely popular order to send or withdraw money from M-pesa
among mobile users in USA. Isis not only stores account, the user has to enter the M-Pesa PIN. At
138
Rahul Publications
UNIT - IV MOBILE COMMERCE
the time of registering and activating M-Pesa account, risk. The system is designed for end-to-end control
the users will receive a ‘Secret Word’ which will be by trusted partners, and USSD messaging supports
used for identification purposes for any subsequent secured delivery of sensitive information to
calls to M-Pesa or for calling M-Pesa customer service. authorized users.
M-Pesa was first launched in Kenya in March 7. NTT DoCoMo (Osaifu-Keitai)
2007, and quickly gained popularity and customer
NTT DoCoMo is the prominent mobile phone
confidence due to its extremely simple user-interface
operator in Japan that provides mobile phone,
and trusted mode of operation. Within two years
video phone, internet phone and internet mail
of its launch, M-Pesa captured 6.5 million customers
service to the customers. It has established a simple
in Kenya alone. At present, M-Pesa has over 15
and effective mobile payment solution in
million subscribers with over 28000 agents across
collaboration with Sony Felica systems. DoCoMo
Kenya and monthly person-to-person transaction
mobile phones are equipped with embedded Sony
is worth over USD 500 million. Later, M-Pesa was
Felica contactless chips (NFC) that allows mobile
launched in other African and Asian countries, such
payments in retail stores fitted with Felica Card
as Tanzania, Afghanistan, South Africa, India and
Reader. Such Felica empowered mobile phones can
Egypt.
6. MobiPay
ns
be used for a variety of payment transactions, such
as debit card transactions, credit card transactions
Mobipay is a mobile payment system
operating in Spain, to provide mobile commerce
a it o
and can also act as a personal identification device.
Such mobile payment services are analogous to
mobile wallet services and are known as Osaifu-Keitai
major Spanish operators, such as Telephonica
Mobviles, Vodafone and Amena and Spanish
b l i c
facilities to mobile users. It is a joint venture of all
services.
Osaifu-Keitai service allows users to purchase
financial institutions, such as BBVA and SCH.
P u
Mobipay’s objective is to launch mobile payment
and make subsequent payment in numerous shops
equipped with Felica card reader. For making
l
facilities by transforming the mobile handset to a payment, user will only cave to wave the mobile
u
user-friendly safer and flexible device for micro- device in front of the Felica card reader device and
payments. With Mobipay, the user will be able to the in-built NFC technology will accept the payment
ah
perform a variety of financial transactions, such as and the amount will be directly billed to the user’s
bill payment, online purchase, tax payments, etc. existing credit card account. The current balance
R
using their mobile devices. Mobipay is based on a
cooperative business model integrating mobile
operators and financial institutions. It is established
on a single technology standard supplied by Atos
and the payment history can be viewed using the
mobile handset. The pre-paid users can track
remaining balance and :an reload the account as
and when required. During any payment
Origin which is a renowned information technology transaction, the user can increase the credit limit at
service provider that deals with consulting, system any service supported store. Users can accumulate
integration and managed operations. Atos Origin points with regular shopping and electronically
performs telcofinance activities that involve bank, redeem whenever required. In order to prevent
payment processors, merchants and mobile network misuse, NTT DoCoMo provides a full lock function
operators. The payment system first validates the and also a service to find the exact location of the
payment request made from user’s mobile handsets mobile device. Such mobile wallet services are vastly
against credit/debit cards, virtual wallets, billing popular in Japan and are also extensively used in
systems, etc., and then routes the authorization Shanghai and Beijing, in China.
request for transactions to respective parties. Apart
8. Reliance m-Pay
from providing payment services, ATOS origin also
provides managed services in business process Reliance m-Pay is a virtual credit card jointly
outsourcing and infrastructure solutions. Mobipay launched by Reliance Communications and HDFC
systems are comparatively of lower cost and reduced bank in India. It allows users to make payments from
139
Rahul Publications
BBA III YEAR V SEMESTER
ns
Keeping all credit cards in your pocket might
tio
HDFC credit card account. The user need not have be risky as you may loss it anywhere and
to enter credit card number, expiry date and other anyone can steal it and make use of your
a
card verification information for using m-Pay service. money or personal information. With mobile
HDFC bank would authenticate all information and
l
will initiate and authorize all payments performed
b
from user mobile device. Main advantage of virtual
i c payments, you don’t have to play with this
risk. You can put all your credit cards in your
mobile wallet.
P u
credit card is, there is less chance of fraud or misuse
as the user never enters any credit card detail at the
5. Create Customer Loyalty Program
Mobile payment options allow you to
ul
time of making the payment. Even if the mobile
device is lost or stolen, nobody can recover the credit integrate loyalty and other incentive
programs into the mobile payment
ah
card details and perform illegal transactions. Thus,
virtual credit cards have become a preferred application in order to add value to their
medium of mobile payment transactions owing to customers. These will make customers happy
R
their convenience and safety.
Q20. Discuss the advantages of Mobile
Payments. 6.
and also motivate them to return back which
increased revenue
Better tracking of inventory
140
Rahul Publications
UNIT - IV MOBILE COMMERCE
it o
Besides sporting events, other industries such as
extremely high in cost. airlines, museums, tourist attractions and movie
3. Device Failure
l i c
For using mobile in performing every activity a theaters are implementing mobile ticketing for their
customers.
Mobile tickets can be purchased via apps and
ub
make it your slave. For making call, checking
social media, emails and transactions all will
SMS messaging, along with more traditional avenues
like over the phone or through a vendor website.
l P
need mobile device. Device failure could be
an issue in case of battery drain. You will not
u
be able to do any transaction until your
Next, the user chooses ‘mobile delivery’ for the
delivery method. After the user provides a cell
number, phone model and mobile carrier, the
ah
phone is charged. vendor sends an e-ticket. Depending on the mobile
device and purchasing avenue, the ticket can be
4.
R
Phone is prone to be theft
Since mobile payments gives you the ability
to make the transaction in your convenience.
Mobile devices are prone to theft which may
delivered through a traditional text message, a
specific mobile application, MMS or WAP push
notifications. The provision of the model number
helps to determine whether to text and send an
image barcode or alphanumeric code that is saved
subject to lose their card and personal by the user as their digital ticket. The user then
account information. presents this message at the events admission where
it is scanned, the record of the purchase is confirmed
5. Difficult to read terms and conditions
and the user is allowed access.
With the small size of mobile device you can
Q23. What are the advantages of Mobile
easily carry it all the way. Before making any ticketing?
payment it is always recommended to go
through the terms and condition thoroughly
Ans:
but because of the small physical appearance (i) Environmentally friendly
it can often too difficult to read terms and Encouraging event attendees to go paperless
conditions. It may also possible to make is a great way to show that the venue is
payments without reading invoices. committed to being environmentally friendly.
141
Rahul Publications
BBA III YEAR V SEMESTER
n
password. The passwords are stored in the system
tio
Venues can help drive uptake for mobile
servers in encrypted form to prevent tampering. The
ticketing by offering incentives to users.
ticketing system servers holding private and
Whether it’s simply priority queuing as
mentioned above, or more elaborate
l
campaigns involving app credit and rewards,
i c a confidential user data are kept in secured locations
and are protected with biometric access controls,
constant surveillance, monitoring and redundant
ub
users can access a range of exclusive benefits
when they have the ticket on their phone.
power backups. In order to ensure the reliability,
and 24×7 availability of the ticketing system, the
Q24. Describe the various privacy and
Ans : l
security issues mobile ticketing.
ah
(Imp.) availability under load and also to ensure quick
Mobile ticketing together with mobile response time.
R
payments are the two most used applications of
mobile commerce. Survey reports show that around
4 billion mobile tickets have been delivered across
the globe during the year 2011, and the number
will more than quadruple to 23 billion by 2016.
2. Privacy issues
Another important issue related to mobile
ticketing system is to maintain the privacy and
confidentiality of user data stored in mobile devices.
Mobile devices are used to purchase and store
Mobile users find mobile tickets for airline, bus or
mobile tickets and at the venue, scanners and card
rail transport or for any sporting or entertainment
readers are used to check the ticket data for
events very convenient and user-friendly, and have
validation purpose. In case of NFC tickets, card
gradually started to adopt it as an integrated part of readers are used to read ticket data stored in the
their mobile lifestyle. However, as the mobile mobile devices. The card readers can read private
ticketing applications are integrated with mobile user data apart from ticket data from the mobile
payment systems, such as mobile wallets, the security devices, if proper security arrangements are not
and reliability of the system are of major concern. adopted. Thus, card readers impose a serious threat
In order to gain consumer confidence, the user to the privacy of mobile users and various
interface of the ticketing system must be simple and confidential user data ranging from user travel
stringent security measure must be undertaken to history, current location information, credit card
prevent any fraudulent attempts to hijack and details, user preferences and purchase history, etc.,
misuse of private and confidential customer data. can be leaked through electronic card readers to
142
Rahul Publications
UNIT - IV MOBILE COMMERCE
unwanted third parties. Proper security arrange- in the number of commuters looking for a
ments must be undertaken in various levels of mobile ticketing platform to reserve their
mobile ticketing infrastructure in order to protect online tickets.
privacy of mobile users. Important actors in privacy
Customer-Centric Functionality
implementation of mobile ticketing systems are
public transport operators, financial institutions, Mobile ticketing solutions are turning into a
mobile network operators and mobile handset reliable and trustworthy ticket booking
manufacturers. Public transport operators must medium as it targets exactly what customers
provide adequate security arrangements in want and need. With its customer-centric
installation of card readers so that any attempt of functionality, mobile ticketing is becoming an
unauthorized access to card readers by unwanted ideal solution for the general public.
users are prevented. Financial institutions must
Save Time And Money
provide proper security measures to protect financial
transactions across mobile networks. Mobile network Customers no longer have to look for a
operators must provide network security over change or reach the counter before time to
mobile internet operations. Similarly, mobile device get the tickets or worry about tickets getting
manufacturers must provide NFC device security
against location, preference and other information
ns
sold out. Mobile ticketing allows users to
purchase tickets for single or multiple fares.
it o
leaks. NFC devices must be protected with encrypted This feature saves time & cost and provides
PIN and password so that at the time of validity great convenience during special events and
checking by card readers, the PIN/Password can be
exchanged to prevent any unauthorized access.
l
NFC device guards are available that protect NFC
i c a long journeys.
Q26. List out the benefits of Mobile ticketing.
ub
devices from privacy leaks. Another way to protect
NFC devices from unwanted card readers is to keep
them in sleep mode, so that only valid card readers
Ans :
Following are the benefits of mobile ticketing.
l P
can awake them up, and can read data from them.
Such security arrangements enhance the privacy of
u
user data and also improve customer confidence in
Passenger Satisfaction
Commuters love using mobile ticketing. As
ah
mobile tickets. they can avoid standing in line at the booking
counter or ticket machine. They can just use
Q25. What are the uses of mobile ticketing
Ans : R
applications?
143
Rahul Publications
BBA III YEAR V SEMESTER
ns
mobile content optimization and delivery of
bar-coded mobile tickets and coupons. It
tio
as a Service (SaaS) basis, users only have to offers wide range of airline, rail, cinema, live
pay for what they use & when they use it. events and retail tickets and coupons that are
a
purchased and delivered in user mobile
No (or low) Upfront Costs
l
Unlike other ticket collection systems, the
b i
capital expense for mobile ticketing is eitherc devices, thus saving time and improving
customer convenience. It offers mobi-ticket
which is a bar-coded mobile ticket that can
be received in user mobile phones through
how you validate a ticket.
P u
nothing or comparatively very low, based on
SMS or MMS and can be validated using
scanners at the venue. It offers mobi-web
ul
Environment Friendly
Mobile ticketing encourages paperless tickets,
which is a mobile website service that is
optimized for access through mobile web
ah
aka e-tickets, which reduce paper utilization browsers. It offers last-minute travel or event
in the manufacturing of paper tickets. information to the mobile users on-the-go,
R
Encouraging passengers to go paperless is a
great way to show that the transport authority
is committed to being environmental
friendly.
and also provides a range of transactions
including food and drink pre-purchase, ticket
pre-purchase as well as ticket retrieval. Mobi-
kiosk offers a dashboard of useful services
related to travel, retail or events, all displayed
Future-proof in user mobile phones.
Technology continues to expand, there’s no 2. mTicket
doubt about that. Just in the past ten years,
we’ve witnessed dramatic advancement in mTicket is an online mobile ticketing service
technology with respect to communication, that allows event organizers to market, sell
payment gateways, receiving information, and distribute mobile tickets of an event using
and even in our daily lives. SMS technology. It offers promotional service
to event organizers, whereby short SMS-
By implementing a mobile ticketing solution based promotional messages are sent to a list
on a large scale, transportation authorities can of guest mobile numbers indicating event
secure their position in today’s smartphone details and other information. For selling of
era and also retain and improve their ability event tickets, mTicket offers online payment
to remain flexible with upcoming gateway service that takes payment from the
technological advancements. customers through online means and
144
Rahul Publications
UNIT - IV MOBILE COMMERCE
ns
help you schedule your weekly or
monthly rides by simply punching in and
it o
Atos, thetrainline, VirginTrains, Crosscountry out after a one-time registration of your
Trains, First TransPennine Express, First Hull fingerprint through the app. The system
Trains and others. Masabi mobile ticketing
applications signal the end of long ticketing
l
queues and allow passengers to purchase and
i c a is well known for its reliability and easy
operability. Current fingerprint
recognition methods operate on optical
ul P
transportation providers to offer hassle-free
travel experience to their passengers and at
the same time drastically improve sales volume
Face Recognition
It identifies the travelers by the digital
ah
snap of their face. Current facial
without significantly increasing costs. recognition systems use face prints and
Q28. What are the new trends in mobile biometric systems that can identify 80
Ans: R
ticketing?
145
Rahul Publications
BBA III YEAR V SEMESTER
to transport operators & authorities of all Q30. How does location technology track your
shapes & sizes. movements?
4. NFC & HCE Based Mobile Ticketing Ans:
Host card emulation (HCE) for mobile There are several mechanisms inside a typical
ticketing is an architecture that follows a mobile device that can provide location information.
traditional smart card on smartphones with The most common are GPS, RFID, Wi-Fi and
NFC. HCE simply lets smartphones work as cellular technology. We’ll explain these in more detail
a pragmatic representation of a contactless, in the next section, but they all operate on similar
transport smart card. This enables the principles.
consumers to securely use their phones as a
A mobile device communicates with other
travel smart card as well as a virtual ticket
devices and hubs – such as satellites, routers and
wallet.
towers – to function. Because the mobile device is
pinging off of multiple communication hubs, its
4.5 MOBILE PRODUCT LOCATION AND precise location can be triangulated.
SHOPPING
Q29. What is M-Shopping? What are the uses services.
ns
Q31. List out the uses of Location based
tio
of location based services in M-
Shopping.
Ans:
Ans:
M-Shopping is Mostly similar to ecommerce,
l i c a Companies have found several ways to use a
device’s location.
b
but accessible via a mobile device. Mobile shopping
u
is now possible through mobile optimized websites,
1. Store locators
Using location-based intelligence, retail
l P
dedicated apps, and even social media platforms.
Location-based services rely on consumers’
u
smartphones to provide interactive 2.
customers can quickly find the nearest store
location.
Proximity-based marketing
ah
opportunities and targeted advertisements.
Local companies can push ads only to
R
Location tracking is conducted with GPS data, individuals within the same geographic
Wi-Fi data, cellular tower pings, QR codes location. Location-based mobile data
and RFID technology. can improve local marketing efforts to
Location-based services (LBS) use real-time potential customers within that city who might
geodata from a smartphone to provide information, actually act on the information.
entertainment or security. Some services allow 3. Travel information
consumers to “check in” at restaurants, coffee shops,
stores, concerts, and other places or events. Often, An LBS can deliver real-time information,
businesses offer a reward – prizes, coupons or such as traffic updates or weather reports, to
discounts – to people who check in at their locations. the smartphone so the user can plan
Google Maps, Foursquare, Yelp and Facebook accordingly.
Places are among the more popular services.
4. Roadside assistance
Location-based services use a smartphone’s
GPS technology to track a person’s location, if that Many roadside assistance companies provide
person has opted in to allow it. After a smartphone an app that allows them to track your exact
user opts in, the service can identify their location location in the event of a blown tire or car
down to the street address without the need for accident without the need for you to give
manual data entry. directions.
146
Rahul Publications
UNIT - IV MOBILE COMMERCE
it o
devices but despite being new, it is one of the
Q32. What is mean by Mobile Business most effective forms of advertising available.
Services? And Explain how mobile
business services helps to increase
more no of customers ?
Ans:
ub(Imp.) 5. Mobile Lead Capture
u P
Mobile Business Services Inc can help you use
l
Customers with websites, advertising and lead
Leads are what keep your business going, and
you can receive them anywhere directly on
your mobile device. Never miss a potential
ah
capture; Increase Sales with digital proposals and customer who is looking for your service on
contracts; and Manage Business with other digital a mobile device, and never miss a lead that
R
tools to maintain oversight and control of your goes to somewhere you are not. Mobile lead
business while on the go. capture means less lost leads and more sales.
Mobile Business Services Inc can make sure 6. Website Recovery
your website is mobile-ready and working to bring For business owners, it can be a struggle to
you customers through the right forms of mobile fix broken websites or get them live if they
advertising and marketing, and that new customers have gone down due to a hack or other issue.
are sent right to your mobile device. Mobile Business Services Inc can help you
1. Mobile Websites get your lost, hacked, or stolen website live
again so your website is working to represent
Mobile Business Services Inc can quickly and your company and bring you customers.
efficiently create a mobile-ready website, Q33. How mobile business services are
convert your current site to be mobile- helpful to increase sales of a business?
friendly, or otherwise make sure your website
will be useful to your mobile customers. Ans:
2. Internet Advertising Winning a new customer means making an
informative sales pitch, having quick follow-up with
Mobile Business Services Inc has been using your prospect, and getting a commitment. Mobile
internet advertising almost since it was Business Services Inc can help increase the speed
147
Rahul Publications
BBA III YEAR V SEMESTER
and efficiency of your sales process with beautiful customer, have them sign right on your
and effective sales tools on your mobile device. mobile device. Finalize your sales process
1. Mobile Presentations rather than have it fall down right before the
finish line.
Why are you still carrying around that binder
of photos and that folder of papers to show Q34. How can we manage Business with the
your potential customers? Let Mobile Business help of Mobile business services.
Services create beautiful mobile presentations
to show your customers. Scrolling through
Ans: (Imp.)
some pictures on your phone isn’t impressive, For business owner, it can be a struggle to
but a comprehensive mobile presentation is manage people, paperwork, and property. But
and will close more sales. Mobile Business Services can help you maintain the
organization and oversight you need to be aware
2. Mobile Estimates
and in control of your business, wherever you are,
Are you still hand-writing estimates on paper with your mobile device.
forms Wouldn’t you rather fill out a form on
your tablet or phone that was custom made 1. Manage Customers With Mobile
for your business and then immediately email
the estimate to your potential customer.
ns
Keeping track of leads, prospective customers,
and existing customers is one of the hardest
tio
Maybe you need a special pricing tool built things about business, and it’s common for
into the estimate form… no problem! Let things to “fall through the cracks”. Leads get
Mobile Business Services Inc help convert all
your estimate forms to be mobile ready for
you and your sales team. To talk about
3. Mobile Proposals
ub
making your estimate process mobile-friendly. back. Wouldn’t it be better if all your leads,
prospects and customers could be managed
A proposal can make or break a new
l P
customer relationship. A proposal can be
u
factual AND beautiful; it can be concise AND
on your mobile device using a CRM like
Salesforce .Mobile Business Services can
make sure you never drop a lead, lose a deal,
ah
or disappoint a customer.
interactive. Let Mobile Business Services Inc
create proposals and proposal generating 2. Manage “Paperwork” With Mobile
4. R
tools that can help you wow your prospects
and win more customers.
Mobile Contracts
The customer said yes and now needs a
Are you still hand-writing estimates on paper
forms. Do you have post-it notes on your
desk and an important message from a
customer you wrote on Paper gets lost,
contract. When a customer says “yes”, misplaced, ruined and buried under other
making it official makes it real… if time passes, paper. Whether it’s a contract, message, time
that “yes” turns into “maybe” or “I’ve been sheet, inventory list or anything else, Mobile
thinking” or “I went with someone else”. Business Services can make sure it’s on your
Don’t let a “yes” turn into something else mobile device and available anywhere you
because your contract process is using paper, are. Your time is valuable so never spend it
fax, email, or anything that doesn’t close the looking for that important piece of paper.
deal NOW. 3. Manage Employees With Mobile
5. Mobile Signatures Do you ever wonder what your employees
The thing that finalizes a contract is a signature. really do during their paid hours. Productive
email a contract that can be signed by the employees are profitable employees. Let
customer easily and Electronically and then Mobile Business Services make your
get a notice sent back. Or if you are with the employees more productive (and profitable)
148
Rahul Publications
UNIT - IV MOBILE COMMERCE
by letting you know on your mobile device Q36. Discuss examples of open auction and
where they are and what they are doing with closed auction.
their paid time. Ans: (Imp.)
4. Manage Locations With Mobile (i) Open Auctions
Maybe you have a “bricks & mortar” physical In an open auction, parties come together at
location. Whether you sell items, rent a physical venue or online exchange to bid on assets.
equipment or need to better keep track of An interested party is aware of the competing bid
what is going on at your location, Mobile amounts and continues to raise their bid until they
Business Services Inc has solutions. Track all are either declared the winner of the auction (i.e.,
sales, rentals, and activity at your place of they submitted the last highest bid within the auction
business on your mobile device. time limit) or until they decide to drop out of the
bidding.
4.7 MOBILE AUCTION Examples of auctions include livestock markets
where farmers buy and sell animals, car auctions.
Q35. What is an Auction?
Ans:
(ii)
n
Closed Format Auctions
s
An auction is a sales event wherein potential
buyers place competitive bids on assets or services
a it o
In many business transactions, including the
sale of company assets or an entire company,
auctions are conducted in a closed format whereby
either in an open or closed format. Auctions are
l i c
popular because buyers and sellers believe they will
get a good deal buying or selling assets.
b
interested parties submit sealed bids to the seller.
These bid amounts are only known by the seller.
The seller may choose to hold just one round of
P u
An auction is a sale in which buyers compete
bidding, or the seller may select two or more bidders
for an additional auction round.
ul
for an asset by placing bids.
Auctions are conducted both live and online.
In a situation wherein a division of a company
or the whole company is up for sale, price is not the
ah
only consideration. The seller, for example, may
In a closed auction, for example, the sale of a
want to preserve as many jobs as possible for its
R
company, bidders are not aware of competing
bids.
In an open auction, such as a livestock
auction, bidders are aware of the other bids.
employees. If a bidder does not submit the highest
price but can offer the best terms for continuity for
employees, the seller may select that bidder.
Q37. Discuss the advantages and dis-
Examples of auctions include livestock markets advantages of Auctions.
where farmers buy and sell animals, car Ans:
auctions, or an auction room at Sotheby’s or There are both advantages and disadvantages
Christie’s where collectors bid on works of of auctions. Sometimes people can find rare items
art. at auctions. And there is always the possibility that a
In an open format, all bidders are aware of buyer can purchase an item at a discount at an
the bids submitted. In a closed format, bidders are auction.
not aware of other bids. Auctions can be live, or In the case of purchasing property through
they can be conducted on an online platform. The an auction, this process can deter some potential
asset or service in question is sold to the party that buyers because of its competitive nature.
places the highest bid in an open auction and usually When it is the sale of company assets or an
to the highest bidder in a closed auction. entire company, there are many advantages for the
149
Rahul Publications
BBA III YEAR V SEMESTER
seller because they control the entire auction entertainment sector is all about engage-
process. They can create a competitive environment ment, content, and a massive audience.
in order to maximize their bargaining power, and,
It is very clear that the entertainment industry
ultimately, achieve a higher price.
majorly depends on mobile applications and thus
On the other hand, the price of running an many mobile app development companies are
auction sale can be significant. The seller must have focusing on entertainment app development.
a strategy for the auction process, and this requires
the service of both financial and legal advisers. Q39. How are mobile apps revolutionizing the
entertainment sector.
While securing a bargain is always a possibility,
if there are multiple bidders, it is also possible that Ans: (Imp.)
the buyer in an auction will actually pay more
because of the potential competition of other Following are the major reasons that make
bidders. mobile entertainment apps a right move for the
media and entertainment industry.
Pros of Auctions
1. Tracking the trends
Seller controls process
Find rare items
ns
The primary way mobile apps transforming
entertainment is through making trends
tio
Buy at a discount tracking easy. When social media wasn’t
Seller can maximize bargaining power around, tracking the trends was quite difficult.
Cons of Auctions
Competitive process can deter some buyers
ul
4.8 MOBILE ENTERTAINMENT P When it comes to the latest movies, games,
music, and series, entertainment apps keep
them on the top or trending section of the
ah
Q38. What is Mobile entertainment? app so that users can learn what’s liked
by the majority.
Ans:
R
Mobile entertainment comprises a range of
activities associated with mobile electronics. The
definition is both somewhat subjective and in
Entertainment is no more limited to time slots
and closed doors. It is now available
anywhere, anytime, and for anyone. Media
software development companies are
continual development, but can include purely working progressively to improve the user
leisure activities (music, playing games), communi- experience by optimizing the applications.
cations (social media, instant messaging, Twitter),
2. Spreading and gathering information
and activities which could also be defined
as commerce (shopping). Applications like Facebook, Instagram,
Twitter, etc. have become a great source of
From news updates to live streaming, authentic and detailed information. From the
entertainment apps have got everything a person latest news to life hacks, everything is
needs to sit back, relax and enjoy. All the things available on these applications.
you need at the touch of your fingertip
Entertainment app development is done
Mobile applications are being used in every keeping in mind that the users can exchange
industry but the entertainment industry is taking every form of media and information on the
advantage of this technology the most. The platform that is authentic and useful.
150
Rahul Publications
UNIT - IV MOBILE COMMERCE
Youtube is another platform for sharing updated on the happenings around the
information through creative videos. There world.
are multiple Youtube-based news channels, 3. People get to bring out their hidden talents.
travel vlogs, and classes for the audience. Through media showcase their talents such
3. A Complete platform as comedy, acting and singing.
Earlier making videos, music, or developing 6. Great in promoting mass consumer products.
games was only done by professionals This can in turn increase sales of the product.
because they had access to platforms that 7. Serves as a good source of entertainment.
launched these products but now application
development is not as complicated as it used television programs.
ns
People get entertained through music and
a
8.
it o
Television allows electronic duplication of
information. This reduces the production cost
4. Promotion Capabilities
l
A mobile app for entertainment industry can
b i
prove to be an efficient method of promotion
c 9.
making mass education possible.
Media leads to diffusion of different cultures.
Media showcases different cultural practices.
u
of an entertainment agency or of influencers
P
looking to make it big in the sector. The fact
10. It helps people around the world to
understand each other and embrace their
ul
that the majority of the people are always on
their smartphones, the chances of high
differences.
Q41. What are the disadvantages of Mobile
ah
engagement with the app and in turn the entertainment?
brand is very high. Entertainment marketing
R
is one of the easiest ones in the app industry
to make popular – especially since the
celebrities who are a part of the content on
your application do half of the work of
Ans:
1. It leads to individualism. People spend too
much time on the internet and watching
television. As a result, socialization with friends,
making your app popular among their family and neighbors is affected.
fanbase. 2. Some media contents are not suitable for
Q40. List out the advantages of Mobile children. Limiting children’s access to such
Entertainment. content can be difficult.
151
Rahul Publications
BBA III YEAR V SEMESTER
7. Health problems. Prolonged watching of 1. Not having an office can save you money
television can lead to eyesight problems and
Office space is expensive, especially for a new
radio listening using earphones exposes one
business. Furniture, electricity and internet
to possible hearing defects.
access must all be paid for too. That money
8. It glamorize drugs and alcohol. Some could be better spent in areas that directly
programs make the use of these things appear affect the bottom line, such as marketing or
cool’. hiring more employees.
9. It can lead to personal injury. Some people 2. Without a commute you’ll save time
decide to follow the stunts that are showcased
If you don’t have to commute to an office
in the media. This can lead to injuries.
you could gain an hour or more every day.
10. It can lead to ruin of reputation. It is possible Whether you use that time for work or
for one to create an anonymous account. relaxation, it’s a big benefit.
Such accounts can be used to for malicious
3. Less distractions increases productivity
reasons such as spreading rumours. This can
lead to ruin of reputation of an individual or If you manage your environment properly,
a company.
ns
remote working can increase your
productivity. There will be fewer distractions
tio
4.9 MOBILE OFFICE and fewer meetings – making it easier to
concentrate and think clearly about your
Q42. What is Mobile Office? What are the
major benefits of Mobile Office ?
l i c a work.
Q43. What are the devices or hardware
b
Ans: components required to setup a Mobile
Office.
u
It often makes sense to run a small business
P
from home, because it keeps costs down and helps
Ans: (Imp.)
ul
you reduce the time lost to commuting. It can put
hundreds of hours back into your year. Technology
A mobile office can be anywhere. You can
share spaces with other businesses, including
ah
has made this a practical option. Mobile devices and suppliers or customers. Plenty of business owners
treat their car or van as an office, and pop into a
online business tools have helped drive the change
R
in working practices.
For some types of business, an office is no
longer essential. It could work for you too, if:
cafe when they want to stretch out over a coffee.
Most commonly, mobile business owners base
operations out of their home.
So long as you have an internet connection,
1. you mostly do business by phone, email, you have an office. Just be aware that public wifi is
messaging and social media. not always secure, so you should be cautious about
what type of work you’re doing. Think about using
2. you run a service business or online business. a virtual private network (VPN) to protect your
privacy and anonymity. And don’t leave your laptop
3. you rarely see your clients in person.
or phone unattended.
4. you don’t need large equipment to do your
You can’t work properly without the right
job. equipment. But for many office-free workers that’s
5. you’re happy working alone (or at least a relatively small investment:
collaborating online). Laptop computer
People run businesses without offices for a Unless you need a lot of processing power, a
variety of reasons. Here are three of the most basic one will be sufficient. As long as it has a
common: reliable internet connection, you can work
152
Rahul Publications
UNIT - IV MOBILE COMMERCE
collaboratively with people all over the world. Q44. What are the issues of mobile office.
It’s a good idea to get one with a webcam, so
you can participate in video calls. Ans: (Imp.)
it o
communicate clearly even when there’s unstructured interactions, where conver-
background noise. sations can drift across topics.
Mobile phone
l
Make sure your clients can reach you easily.
i c a Getting new work
One of the best ways to pick up new work is
ub
You can also use this for internet access if you
to be physically present. Meet when you can.
And when you can’t, try to stay present in
your clients’ lives by communicating on topics
A proper workstation
ul P
If you spend long periods of time seated at a
other than work from time to time.
Maintaining motivation
ah
computer, invest in the right furniture. It can be hard to stay motivated if you’re not
Cramming yourself into a bad kitchen chair in an office full of working people. To avoid
or bean bag can take a toll.
R
procrastination, learn to plan and schedule
Mobile office is also included with following your work sensibly. And build up your
softwares willpower – it will help you succeed.
Software for producing word documents, Meeting clients at the office isn’t an
spreadsheets and slide decks. option
Drives for storing and accessing the When you don’t have an office, you’ll need
documents you produce. to utilize other spaces to catch up with clients.
Some cafes will have relatively quiet areas for
Calendars for managing meetings and you to meet with clients – but bear in mind
schedules. that you won’t always have complete privacy
Call and video conferencing tools. Finding the right balance
Chat-based apps for working in groups Office workers have clearly defined working
days. They start when they arrive in the office
Project management tools for big
and stop when they leave. If you don’t have
organizations.
an office then it can be hard to know when
Online accounting software with dash to switch off. Be disciplined about this. You’ll
boards showing the financial state of the work better and more creatively if you find a
business. good work-life balance.
153
Rahul Publications
BBA III YEAR V SEMESTER
tio
people from different corners of the world
Many schools and colleges are supporting the can access it for different topics or related to
concept of eLearning and mobile learning. They
distribute mobile phones and laptops to students
and encourage them to use them for educational
l i c a 4.
different subjects.
Encourages students
ub
purposes. Although mobile learning may be fun for
the children if it’s used in the right way, it can be
There are many educational apps that use
online quizzes to keep track of your progress
P
very beneficial for the students and adults. (daily, weekly or monthly, depending on firm
l
to firm). The study is presented in such a way
There are many educational apps available that it attracts the students; hence, there are
ahu
online, and they are also gaining huge popularity
among the school and college students. It is even
useful for teachers/professors/instructors, they can
5.
game quizzes that encourage students to
perform better from their previous score.
Tests your knowledge
R
learn a topic or provide notes, examples, and also
refer these apps to the students when or if needed.
The best part of mobile learning is that many
sources are present online. So, if you don’t get it
As discussed in the above point, online
quizzes are made and solving these quizzes,
puzzles or riddles helps you expand your
knowledge. Apart from just study material,
from one place, you can search for it from some there are different types of other quizzes,
other site. Even while using the app; if you do not puzzles, multiple-choice questions, etc. that
understand you can easily send your feedback and are available on the internet; playing these
discuss your query or suggestion with the app games you can test your knowledge and even
developer or app developing company. increase your IQ level.
Q46. What are the advantages of Mobile Q47. What are the disadvantages of M
distance education. Learning?
Ans: Ans:
Mobile learning is very popular and in the As good and alluring as the advantages
past few years, its use has increased extensively. sound, there are also disadvantages of mobile
Mentioned below are 5 advantages of mobile learning. Every coin has two sides, so, here are 5
learning and why it should be used: disadvantages of mobile learning, listed below:
154
Rahul Publications
UNIT - IV MOBILE COMMERCE
1. Software issues
Software is an application that runs on a device according to the instructions embedded in the
software at the time of coding. Even though it seems like the life of software is smooth, there are
other external factors that hinder its smooth life span. These external factors are changing trends in
the field of IT. Software compatibility issues, not upgrading to a new version, regular system crashes,
etc. are some of the issues that hinder the working of the software, thereby interrupting your
smooth mobile learning experience.
2. Hardware issues
Unlike the software, hardware uses physical devices. The physical devices used can wear out after a
period of time. They can wear out due to overuse, dust, using the device roughly, etc. These are
some factors that interrupt the smooth working of the mobile or other devices.
3. Distraction
Using mobile learning, also, creates a lot of distraction. Many students open the mobile to learn
s
something and end up using social media websites, chatting, sharing pictures or playing video
games. These types of distractions waste one’s time, which could have been used to perform a
4.
meaningful task.
Misuse
it o n
i a
Many students also misuse the device for different purposes. Some misuse it just for fun, and some
c
have secret, evil intentions which are definitely not good and need to be prevented.
l
5.
b
Lack of internet connection or electricity
u
This can be a problem in rural areas and in areas where the usage of the internet and electricity is
P
not yet prevalent. When you have a device, but you do not have the electricity or the internet
l
required for you to run the device and avail the facility of mobile learning, then what’s the fun? In
u
order to enjoy your experience of mobile learning, make sure you have met all the requirements
ah
needed to have the best experience for mobile learning.
155
Rahul Publications
BBA III YEAR V SEMESTER
s
categories: banks. Mobile banking enables clients and users to
n
1. Mobile payments (P2P, P2M, or M2M) carry out various transactions, which may vary
tio
depending on the institution.
2. Mobile microfinance(loan disburse-
ment and payments), Mobile banking refers to the use of a mobile
3. Mobile banking (bill pay or account
information, e.g. balances or alerts).
ub
A mobile-based transactional service that can
Mobile banking services can be categorized
u P
be transferred electronically using mobile
l
depending on local law and the business
into the following: account information
access, transactions, investments, support
services, and content and news.
ah
model. Finally payments are done using To date, many financial institutions and banks
mobiles. make use of both SMS and apps to keep their
2.
R
Mobile Microfinance
Mobile banking has facilitated a new approach
to microfinance by using the mobile phone,
customer usage data and agents for loan
clients informed of their account activities or
to send out alerts to clients regarding possible
fraud and/or updates and maintenance of
service.
applications, customer due diligence, and
3. Describe various technologies used in
credit decision-making. The microfinance
mobile banking.
culture has begun to merge with the m-
payments culture to provide much more than Ans:
what microfinance services or m-payment
services can offer alone. Mobile banking technologies are of two types,
namely server side technologies and client side
3. Mobile Banking technologies. Server side technologies are stored in
The use of a mobile phone to access banking a secured server at a bank or at the service provider
services and execute financial transactions. premises. Examples of server side technologies are
This covers both transactional and non- SMS banking, WAP applications, IVR (Interactive
transactional services, such as viewing financial Voice Response) and USSD2 (Unstructured
information on a bank customer’s mobile Supplementary Service Data). Client side
phone. technologies are mobile applications stored in the
156
Rahul Publications
UNIT - IV MOBILE COMMERCE
mobile handset or embedded inside the SIM card by sending a reply SMS containing the
of the mobile handset. The client applications are transaction information. SMS banking can be
usually built under J2ME (Java) environment and used for both financial and non-financial
have different characteristics and processes transactions, though SMS-based financial
depending on user requirements. In each of the transactions are seldom used because of
above applications, the user first has to activate the security concerns. For example, a customer
service through a registration process. The of Punjab National Bank (PNB) can send an
registration process is defined and endorsed by the SMS code PNBBAL, requesting for account
bank or the mobile banking service provider and balance information. Similarly, a customer of
provides an initial identification of the customer to SBI can send an SMS TRN (a/c No.) (PIN
ensure trust and security of the transaction. The No.) (Amount), for making a fund transfer
consumer identification data such as personal details,
to the specified account number. The main
credit card details etc. are stored in the server under
advantage of SMS banking is that almost all
strictly confidential environment. Each of the above
technologies is discussed below: mobile phones support SMS service and the
cost of banking transaction is just the cost of
1. Interactive Voice Response (IVR)
Interactive Voice Response is analogous to
4. s
an SMS which is affordable to all.
n
Explain the advantages of Mobile
it o
phone banking where a customer first dials a
pre-defined IVR number from the mobile banking.
phone. Next, the customer is greeted by pre-
recorded welcome message, followed by a
menu of different banking options. The
l i c a Ans:
Advantages
customer chooses a particular option by
P
information is announced through a pre-
l
recorded speech. The mobile number of the
u
customer (from which the IVR call is made)
(a) Always on 24×7 Accesses
Banks are able to provide services to the
customers for 24 hours per day and 7 days
ah
supplies the identity information for the per week. It enables the consumers to be
customer and provides necessary transaction-ready much as cable access has
R
authentication for making bank transactions.
The customer account is identified and the
requested information is provided through
voice messages using a text-to-speech
programme. The major limitation of IVR is
(b)
facilitated online PC access and reduced
consumer dialup delays.
Advanced Penetration of Mobile
Networks
that it can only be used for enquiry-based The 2G networks already cover more than
services, and is also more expensive as 90% of the population in the western world
compared to other methods as it requires to and this number is growing steadily.
make a phone call which is generally more
(c) Personalisation
expensive than sending an SMS or making
data transfer through WAP services. IVR Through Subscriber Identify Module (SIM)
systems are usually implemented using PBX cards, mobile customers have a specific profile
systems that hosts IVR dial plans and other that enables customised functionality to
information. directly reflect the way they want to transact
business over mobile devices. Through the
2. SMS Banking
convenient addition of a multi-application,
In SMS banking, user sends a structured SMS relationship card, mobile customers will also
code requesting some banking transaction to have a built-in platform for a host of other
a pre-assigned number. The bank responds application services, including security keys,
157
Rahul Publications
BBA III YEAR V SEMESTER
(e) Faster Data Processing Speed Mobile advertising targets users according to
specified demographics. Mobile networks identify
Increase in bandwidth and data transmission
related mobile profiles and preferences and displays
speeds makes mobile data services efficient
and cost-effective in a real time environment. corresponding advertisements when consumers
download and uses data services like games,
(f) Security applications (apps) or ring tones.
In addition to the above mentioned smart
ns
The Mobile Marketing Association (MMA) is
tio
card, a private key stored on the SIM card
a non-profit global trade association that fosters
can protect e-banking transactions. Effectively,
the mobile phone can become a wireless mobile marketing and advertising technologies. It
wallet to protect proprietary purchase and
financial information.
Ans:
What is micro finance?
P
7. Mobile payments.
ul
Microfinance, also called microcredit , is a
type of banking service provided to unemployed
Ans:
A mobile payment is a money payment made
ah
or low-income individuals or groups who otherwise
would have no other access to financial services. for a product or service through a portable electronic
device such as a tablet or cell phone. Mobile
R
Microfinance is a banking service provided
to unemployed or low-income individuals or
groups who otherwise would have no other
access to financial services.
payment technology can also be used to send
money to friends or family members, such as with
the applications PayPal and google pay.
Microfinance allows people to take on Initially more popular in Asia and Europe,
reasonable small business loans safely, and mobile payments spread to North America
in a manner that is consistent with ethical and experienced considerable growth.
lending practices.
Merchants unwilling to retool existing
The majority of microfinancing operations terminals have contributed to the slow growth
occur in developing nations, such as Uganda, of mobile pay compared to physical credit
Indonesia, Serbia, and Honduras. cards.
Like conventional lenders, microfinanciers
Mobile payments offer additional privacy and
charge interest on loans and institute
specific repayment plans. security benefits compared to physical cards.
The World Bank estimates that more than 500 There are mobile payment apps for both
million people have benefited from micro- Apple and Android (Apple Pay and Google
finance-related operations. Pay).
158
Rahul Publications
UNIT - IV MOBILE COMMERCE
1. Security Ans:
One of the amazing and powerful features of 1. Hardware Incompatibility
Mobile Payment is security. While doing Most of the old and low-end smartphones
transaction with mobile you don’t have to have some compatibility issues. There is a
reveal your card information or any personal need of NFC reader (Near Field Communi-
detail like it usually happens in case of credit
cation) which is lack in old devices.
cards. No one will get to know your personal
data unless one is having your mobile device 2. Cost
and PIN or your fingerprint. For accepting payments via mobile devices
2. Privacy require some POS hardware which are
extremely high in cost.
Mobile Payments provide you secure and
confidential transactions. The truncation 3. Device Failure
ns
it o
remains between you, bank and the receiver.
For using mobile in performing every activity
Mobile payments companies doesn’t store any
information like whom you are sending
money, how much transaction has been done
and more.
l i c a make it your slave. For making call, checking
social media, emails and transactions all will
need mobile device. Device failure could be
3. Speed
l P
No doubt mobile payments are very fast.
There are some mobile payments companies
u
which require PIN while some require 4.
phone is charged.
Phone is prone to be theft
ah
fingerprint for your respective transactions. Since mobile payments gives you the ability
to make the transaction in your convenience.
R
4. Nothing much in your pocket
Mobile devices are prone to theft which may
Keeping all credit cards in your pocket might
subject to lose their card and personal
be risky as you may loss it anywhere and
account information.
anyone can steal it and make use of your
money or personal information. With mobile 10. What is meant by mobile ticketing?
payments, you don’t have to play with this
Ans:
risk. You can put all your credit cards in your
mobile wallet. Mobile ticketing is the purchase of admission
to events through a mobile device, including the
5. Create Customer Loyalty Program delivery of digital tickets to a smartphone for use
Mobile payment options allow you to in place of traditional paper tickets.
integrate loyalty and other incentive Many event-organizing groups now choose
programs into the mobile payment to sell tickets via smartphone to improve
application in order to add value to their convenience and accessibility, while also reducing
customers. These will make customers happy infrastructure costs.
and also motivate them to return back which For example, the National Football League
increased revenue (NFL) moved entirely to using mobile tickets in 2018
159
Rahul Publications
BBA III YEAR V SEMESTER
and no longer takes PDF or “Print at Home” tickets. 13. What is Mobile entertainment?
Besides sporting events, other industries such as Ans:
airlines, museums, tourist attractions and movie
theaters are implementing mobile ticketing for their Mobile entertainment comprises a range of
activities associated with mobile electronics. The
customers.
definition is both somewhat subjective and in
11. What is M-Shopping? continual development, but can include purely
Ans: leisure activities (music, playing games), communi-
cations (social media, instant messaging, Twitter),
M-Shopping is Mostly similar to ecommerce, and activities which could also be defined
but accessible via a mobile device. Mobile shopping as commerce (shopping).
is now possible through mobile optimized websites,
From news updates to live streaming,
dedicated apps, and even social media platforms.
entertainment apps have got everything a person
Location-based services rely on consumers’ needs to sit back, relax and enjoy. All the things
smartphones to provide interactive
opportunities and targeted advertisements.
s
you need at the touch of your fingertip
n
tio
14. What is mobile office?
Location tracking is conducted with GPS data,
Ans:
Wi-Fi data, cellular tower pings, QR codes
and RFID technology.
b
12. What is an Auction? you reduce the time lost to commuting. It can put
Ans:
l
An auction is a sales event wherein potential online business tools have helped drive the change
ahu
buyers place competitive bids on assets or services
either in an open or closed format. Auctions are
popular because buyers and sellers believe they will
in working practices.
For some types of business, an office is no
longer essential. It could work for you too, if:
R
get a good deal buying or selling assets.
An auction is a sale in which buyers compete
for an asset by placing bids.
1.
2.
you mostly do business by phone, email,
messaging and social media.
you run a service business or online business.
Auctions are conducted both live and online.
3. you rarely see your clients in person.
In a closed auction, for example, the sale of a
company, bidders are not aware of competing 4. you don’t need large equipment to do your
bids. job.
In an open auction, such as a livestock 5. you’re happy working alone (or at least
auction, bidders are aware of the other bids. collaborating online).
15. What is Mobile Distance education?
Examples of auctions include livestock markets
where farmers buy and sell animals, car Ans:
auctions, or an auction room at Sotheby’s or Mobile distance education, also known as M-
Christie’s where collectors bid on works of learning, is a new way to access learning content
art. using mobile devices. It’s possible to learn whenever
160
Rahul Publications
UNIT - IV MOBILE COMMERCE
and wherever you want, as long as you have a modern mobile device connected to the Internet.
Mobile learning provides a way for educational institutions to deliver knowledge and educational content
to students on any platform, anyplace and at the time of need. Students use mobile apps and tools to
complete and upload assignments to teachers, download course instruction and work in online social
groups to complete tasks.
Many schools and colleges are supporting the concept of eLearning and mobile learning. They
distribute mobile phones and laptops to students and encourage them to use them for educational purposes.
Although mobile learning may be fun for the children if it’s used in the right way, it can be very beneficial
for the students and adults.
ns
a it o
b l i c
P u
ul
R ah
161
Rahul Publications
BBA III YEAR V SEMESTER
4.
(c) WAP
Mobile applications are developed by
(d) None
software.
ns [b]
(a) Java
(c) C, C++
c
(b) J2ME
a
(d) None
tio
5. Mobile Ticket format in mobile commerce is
(a) SMS
b l i (b) PDF
. [b]
(c) word
P u (d) app
6.
ul
The lowest value of amount is known as . [b]
ah
(a) Macro Payments (b) Micro Payments
(c) Immediate Payments (d) None
7.
R
Access to mobile data and information s known as
(a) Mobile computing
(c) Mobile access
.
(b) Mobile communication
(d) Mobile Technology
[a]
162
Rahul Publications
UNIT - IV MOBILE COMMERCE
ns
of tickets through a ticket channel.
9.
10.
MVAS stands for .
a
is the actual program that runs on the mobile hardware. it o
b l i c
ANSWERS
1. Mobile Banking
P u
2.
l
SMS Banking
u
ah
3. Push, Pull
5.
6.
RAutomatic Teller Machines
IVR
7. SMS
8. Buying, Selling
163
Rahul Publications
BBA III YEAR V SEMESTER
2. Expand USSD.
Ans:
Unstructured Supplementary Service Data.
3. Expand WAP.
Ans:
ns
tio
Wireless Application Protocol
4. Mobile advertising.
Ans:
l i c a
b
Mobile advertising is the communication of products or services to mobile device and smartphone
u
consumers.
5.
Ans:
Mobile payments.
ul P
ah
A mobile payment is a money payment made for a product or service through a portable electronic
device such as a tablet or cell phone.
6.
Ans: R
Expand MST.
7. M-Shoping.
Ans:
M-Shopping is Mostly similar to ecommerce, but accessible via a mobile device. Mobile shopping is
now possible through mobile optimized websites, dedicated apps, and even social media platforms.
164
Rahul Publications
SOLVED MODEL PAPERS MOBILE COMMERCE
FACULTY OF MANAGEMENT
BBA III Year V-Semester(CBCS) Examination
MODEL PAPER - I
MOBILE COMMERCE
Time : 3 Hours] [Max. Marks : 60
PART - A (4 × 3 = 12)
Note: Answer any FOUR questions.
ANSWERS
PART - B (4 × 12 = 48)
2. (a) What are the benefits of Mobile Commerce? Describe in detail. (Unit - I, Q.No.5)
OR
3. (a) List out the major device limitations of mobile commerce technology. (Unit - II, Q.No.3)
OR
4. (a) What is CDMA one? Describe the features and applications of CDMAone. (Unit - III, Q.No.5)
OR
165
Rahul Publications
BBA III YEAR V SEMESTER
(b) ‘CDMA 2000 incorporated a number of advanced features that are crucial
for enhancing the channel capacity as well as data speed’. Explain. (Unit - III, Q.No.28)
5. (a) What is Mobile Banking? List out various mobile banking services. (Unit - IV, Q.No.2)
OR
(b) Discuss various major mobile payment models with examples. (Unit - IV, Q.No.17)
166
Rahul Publications
SOLVED MODEL PAPERS MOBILE COMMERCE
FACULTY OF MANAGEMENT
BBA III Year V-Semester(CBCS) Examination
MODEL PAPER - II
MOBILE COMMERCE
Time : 3 Hours] [Max. Marks : 60
PART - A (4 × 3 = 12)
ANSWERS
PART - B (4 × 12 = 48)
OR
3. (a) Explain in detail about Page description languages. (Unit - II, Q.No.30)
OR
(b) List and explain various types of Mobile Clients. (Unit - II, Q.No.2)
4. (a) What is 4G ? List out the features of 4G wireless technology. (Unit - III, Q.No.29)
OR
167
Rahul Publications
BBA III YEAR V SEMESTER
(b) What is WiFi ? What are its uses? (Unit - III, Q.No.40)
5. (a) What are the characteristics of mobile payment systems? (Unit - IV, Q.No.16)
OR
(b) What are the new trends in mobile ticketing? (Unit - IV, Q.No.28)
168
Rahul Publications
SOLVED MODEL PAPERS MOBILE COMMERCE
FACULTY OF MANAGEMENT
BBA III Year V-Semester(CBCS) Examination
MODEL PAPER - III
MOBILE COMMERCE
Time : 3 Hours] [Max. Marks : 60
PART - A (4 × 3 = 12)
ANSWERS
PART - B (4 × 12 = 48)
2. (a) Describe the briefly about various mobile commerce business models. (Unit - I, Q.No.8)
OR
3. (a) How does Location Technology Track the Movements? (Unit - II, Q.No.7)
OR
(b) What are the basic protocols used in Mobile communication. (Unit - II, Q.No.18)
4. (a) Define Wireless Personal Area Network mean? List out the basic
OR
169
Rahul Publications
BBA III YEAR V SEMESTER
(b) List out various major applications and features of GSM Technology. (Unit - III, Q.No.12)
5. (a) What is mean by Mobile Business Services? And Explain how mobile
OR
(b) What is M-Shopping? What are the uses of location based services in
170
Rahul Publications