GSM is called as Global System for Mobile Communications, or ju
Electronic commerce comprises of the selling and buying of the items, products and services through internet or intranet medium. Internet is most helpful and reliable medium to generate revenue and to attract potential customers. E-Commerce is a greatest invention in the field of trade as it has made the trade easy and customer friendly. E-Commerce is mostly depends upon virtual items to access websites.
If you need assistance with writing your essay, our professional essay writing service is here to help!
A huge proportion of E-commerce is carry out totally automatically for virtual items such as admission to finest satisfied on a website, but the majority electronic commerce involves the carrying of substantial items in some means. Almost all large retailers have E-commerce occurrence on the website. Electronic business that is carried out among selling is referred to as business-to-business or B2B. B2B can be unlocked to all concerned parties (e.g. commodity exchange) or incomplete to exact, pre-determined contributors. Electronic trade that is conducted among trade and customers, on the other hand, is referred to as business-to-consumer or B2C. This kind of E-Commerce is carried out through internet and other electronic medium. Online shopping is a shape of electronic trade where the purchaser is straight online to the seller’s computer usually via the internet. E-Commerce is providing the business and the owners more benefits because it is the easiest and cheaper way to promote and boost up the products.
ADVANTAGES AND DISADVANTAGES OF ELECTRONIC COMMERCE:
ADVANTAGES OF E- COMMERCE:
E-Commerce is the easiest and the quickest way to boost up the business. E-commerce is gratifying the just alternative and electronic mail is a computer application which transmits the messages to the email boxes of other people using data communication which is called as email. There are a lot of internet sites which provide free email services related to the E-Commerce and business to the internet users and the customers. Computer softwares are used to promote the Electronic business. The computer softwares refer to the collective set of instructions called programs that can be interpreted by the business computers and cannot be touched by the humanââ‚¬â„¢s The program causes the computer to perform desired functions such as flight simulation, the generation of business graphics or word processing. Following re the basic types of business software:
- System Software
- Application Software
- Utility Programs
Whereas an operating system is an integrated set of programs that is used to manage the various resources and overall operations of a business. T s designed to support the activities of a computer installation. Its primary objective is to improve the performance and efficiency of a computer system and increase facility and ease with a system can be used. It also makes computer system user friendly. Business operating systems are used by many of business computers at this era. Operating systems include the disk operating system, windows, macintosh system from apple computer and Warp of IBM, and UNIX and Linux are using in the Electronic Business now a days. Business computer can only understand the machine or hardware language. It is necessary to convert the instructions of a program written in high level language to machine instructions before the program can be executed by the computer. A complier carries out this business job. Thus a complier is a translating program that translates the instructions of a high level language into machine language. A complier is called as business complier because the complier a set of business activities for every program instruction of a high level instruction. Complier can translate only those sources program which have been written in the language for which the computer is meant. For example, FORTAN complier is only capable of translating source programs which have been written in FORTAN, and therefore each requires a separate complier for each high level language. While interpreter is another type of business high level languages into machine codes. It takes one statement of a high level language and translates it into a machine instruction which is a useful technique for the business.
E-Business is only dependent to the internet based advertisement and business which is a big drawback for the specific company in those cities where the people are not too much educated and then those people cannot access the internet and computer media. This factor can be a big loss for the company and its business. Some of the internet sites are charging too much from the customers and therefore customers and clients feel hesitation to go and view for those sites and this creates a major hindrance to enhance and boost up the business and the trade of the company. E-Business s not too much useful for the illiterate people and thus those people remain unaware by the policies and strategies of the big and well named companies. No doubt, E-Business has many advantages for the company and the trade for the company but we cannot neglect the disadvantages of the E-Business.
MEANING OF SOME E-BUSINESS TERMS
Authentication is a phenomenon to declare the surety and validity of the things to be occurred. Authentication is occurred due to the logon of the password. While that Knowledge of the code word or password describes the validity and authentication of the user. Every user has its own and unique password. It is essential that the user must know the previous password to create the new password. The flaw in this system for transactions that are important (such as the swap of cash) is so as to passwords can often be stolen, by chance exposed, or elapsed.
- ACCESS CONTROL:
It I the scheme or system through which one can control and access the specific and desired task. Admittance systematize system, inside the pasture of the code word, is more often than not seen as the subsequently coat in the sanctuary of a bodily arrangement. Access control is a real and daily process and phenomenon. A bolt on a car access is really a form of access control. A PIN on an ATM scheme at a bank is another means of access control. Bouncers standing in front of a night club is perhaps a more primitive mode of access control (given the evident lack of information technology involved). The control of access manage is of major significance when persons seek to secure significant, confidential, or responsive in sequence and gear. Item manage or electronic key management is an area inside (and possibly integrated with) an access manage system which concerns the managing of control and position of small assets or bodily (mechanical) keys. (Sometimes known as Conditional Access System) A safety system assuring that only those who have paid for the services will get those services. The scheme is often made up of 3 parts: (1) signal scrambling, (2) encryption of electronic “keys” which the viewer will need, and (3) the Subscriber Management System.
- DATA INTEGRITY:
Integrity, in terms of data and network security, is the assurance that information can only be accessed or modified by those authorized to do so. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can also be threatened by environmental hazards, such as heat, dust, and electrical surges. Practices followed to protect data integrity in the physical environment include: making servers accessible only to network administrators, keeping transmission media (such as cables and connectors) covered and protected to ensure that they cannot be tapped, and protecting hardware and storage media from power surges, electrostatic discharges, and magnetism. Network administration measures to ensure data integrity include: maintaining current authorization levels for all users, documenting system administration procedures, parameters, and maintenance activities, and creating disaster recovery plans for occurrences such as power outages, server failure, and virus attacks.
st Global System for Mobile. The technology was started in 1985 by a French company which is previously recognized as Groupe Special Mobile. The main competitor of GSM is CDMA, which is now in use by Bell Mobility, Telus Mobility and Mobility Canada carriers.
At present, just two are the main carriers of GSM network in Canada. Microcell(Fido,Cityfone) and Rogers Wireless. Fido was the first carrier who starts utilizing the technology, and it was followed by Rogers Wireless mainstream around 2001. There are many companies in the United States of America who have adopted GSM and its spreading rapid among AT&T Wireless, T-Mobile. However, there are only two companies in Canada, and they are GSM-850 and GSM-1900.GSM-850 and GSM-1900 which operate at 1.9Ghz.
The radio spectrum can be shared by different users accessing similar frequency band without causing any kind of obstruction. The techniques used for this are TDMA (Time division multiple access), FDMA (Frequency division multiple access) and CDMA (Code division multiple access).GSM is the combination of both Time and Frequency-Division Multiple Access (TDMA/FDMA). FDMA part involves the partition by frequency of (maximum) 25 MHz bandwidth into 124 carrier frequencies spaced 200 kHz apart. Each of the carrier frequencies is then alienated in time, using a TDMA plan. The fundamental unit of time in this TDMA system is called a burst period and it lasts 15/26 ms (or approx. 0.577 ms). Eight burst periods are grouped into TDMA frame (120/26 ms, or approx. 4.615 ms), which forms essential unit for the definition of logical channels. One physical channel is one burst period per TDMA frame. Thus GSM allows eight concurrent calls on same radio frequency. GSM (Global System for Mobile Communications) is a form of multiplexing, which divides the accessible bandwidth between different channels.GSM operates on four special frequencies worldwide.
GSM calls are based on data or voice. Audio codecs used by voice calls are known as half-rate, full-rate and enhanced full-rate. Data calls can turn cell phone into modem operating at 9600 bps. A comprehensive GSM characteristic is high speed circuit switched data, allowing phone to transmit up to around 40 kbps.
Importance of GSM Technology
GSM service is in more than 200 different countries, so it is quite easy to simply use your GSM phone when you are in one of these countries. The cool thing is that a GSM cell phone will work with any other GSM service anywhere in the world as long as it has the same frequency. If you are on an international business trip to five different countries all you need is one cell phone and a SIM card compatible with the GSM in each country. This is much easier and faster to deal with than trying to lug around five different cell phones or figure out how to use other types of communication.
GSM Modulation Technique
Conventional GSM transmitters utilize quadrature amplitude modulation (QAM) with In-phase (I) and Quadrature (Q) signals that are mixed with a local oscillator operating at the carrier frequency. A typical system, where the baseband I and Q data is converted to analog and then mixed with a local oscillator. This method, although viable, requires mixers, filters and D/A converters to up-convert the baseband I and Q signals to the RF carrier frequency. It is difficult to realize the required analog filters in monolithic form so the system becomes complex and costly. A more elegant solution is direct modulation of a high resolution DS synthesizer as described in. In this architecture, the phase-locked loop (PLL) closed-loop bandwidth is narrow (compared to the reference frequency) to satisfy the PLL noise requirements. This restricts the modulating signal bandwidth since the PLL can only readily track frequencies within its bandwidth so this architecture is only suitable for narrow-band modulation. An alternative for wide-band modulation is to break the loop during transmission. Then the modulation is limited only by the VCO and power amplifier bandwidth. This technique has been used for DECT (Gaussian frequency shift keyed modulation) where the transmission data bursts are relatively short and accurate phase control is not required. The problem with opening the loop is that the VCO is free-running and will drift over time with no phase noise suppression. Another difficulty is avoiding switching transients while breaking the loop. A transient while opening the loop results in a frequency channel offset error during the transmit time. Wide-band modulation of a closed loop is possible if some form of compensation is used to overcome the natural roll off of the PLL loop bandwidth. In principle equalization is possible as long as the true PLL characteristics are known. This tends to be the pitfall since this PLL contains analog filters which cannot be realized to close specifications and therefore the necessary equalization transfer function is not known. The synthesizer proposed is a better architecture to use with equalization since it incorporates mostly digital signal processing which has predictable transfer functions to use in designing the equalizer.
If you need assistance with writing your essay, our professional essay writing service is here to help!
GMSK (Gaussian filtered Minimum Shift Keying):
GMSK is a form of modulation used in a variety of digital radio communications systems. It has advantages of being able to carry digital modulation while still using the spectrum efficiently. One of the problems with other forms of phase shift keying is that the sidebands extend outwards from the main carrier and these can cause interference to other radio communications systems using nearby channels.
In view of the efficient use of the spectrum in this way, GMSK modulation has been used in a number of radio communications applications. Possibly the most widely used is the GSM cellular technology which is used worldwide and has well over 3 billion subscribers.
GSM Output Spectrum:
The spectral requirements of a GSM modulated carrier are quite stringent due to the narrow channel spacing. Without careful spectral control, excessive RF power would spread into adjacent channels. The RF spectrum exceeds the GSM spectral requirements and the spurious response is not difficult to meet since this architecture has no mixers and associated analog filters to introduce spurs. The only potential source of spurs is from limit cycles in the DS modulator with a DC input. These are inherently avoided since the modulation data keeps the DS modulator busy enough to randomize the quantization errors.
Open Loop Gain Control:
The open-loop response and gain k of a conventional indirect synthesizer using analog loop filters and a VCO is generally unknown. The reason is that the filters cannot be realized to close specifications and the VCO sensitivity may vary due to process tolerances. Traditionally, the solution to this problem is to provide some means of adjusting the filter response and open-loop gain k by using an active loop filter. In this architecture, the synthesizer loop gain is the only unknown parameter and is caused by deviation of the VCO sensitivity kv due To process variations. A -20% gain error results in significant closing of the eye and a reduced noise margin. Additionally, the zero crossing are spread over a larger time period and this makes the receiver more sensitive to timing errors. Conversely, a +20% gain error has a larger peak distortion with an adequate eye opening but the zero crossings remain spread leading to similar timing sensitivity. Therefore, some form of external adjustment is necessary to compensate for the gain error caused by the unknown VCO sensitivity. Practically, this needs to be done once since the VCO sensitivity wouldn’t drift far from the initial process value although periodic corrections are possible. A suitable compensation method is to measure the actual VCO sensitivity and compensate for it using the existing DSP. This can be done by tuning the synthesizer to the upper and lower GSM transmit frequencies and measuring the tuning voltage in each case. Conversion of the analog tuning voltage to a digital value can be accomplished using the same D/A converter that forms part of the loop filter so minimal extra hardware is required. Once the two tuning voltages have been obtained, a new kv can be computed and the digital loop parameters adjusted accordingly.
The purpose of security for GSM system is to make the system as secure as possible. Various authentication techniques have been incorporated into GSM make it the most secure mobile communication standard currently available. GSM security is based mainly on authentication and encryption techniques.
Some of the security services provided by GSM are:
Anonymity: So that it may not be easy to identify the user of the system. It is provided by using temporary identifiers. When a user first switches on his set, the real identity is used, and after that a temporary identifier is issued. To know the temporary identity the user has to be tracked.
Authentication: So that the operator knows who is using the system for billing purposes. It is used to identify the user (or holder of a Smart Card) to the network operator. It is performed by a “Challenge and Response” mechanism. A random challenge is issued which is encrypted by the mobile using authentication algorithms. A key is assigned to the mobile which sends back a response to the operator who checks that the key is correct.
Signaling Protection & User Data Protection: So that susceptible information on the signaling channel, e.g. telephone numbers, may be protected over the radio path and also that data passed by the user over the radio path is protected.
The response is then passed through an algorithm A8 by both the mobile and the network to derive the key Kc (in figure below) used for encrypting the signaling and messages to provide privacy (A5 series algorithms).
Encryption for GSM
Other GSM security mechanisms
There is always the risk that the SIM card can be compromised. This is considered doubtful, especially as some operators use their own version of A3. Keys Ki (in figure) and the matching IMSI could be compromised by someone who sells information for money.
In GSM the customer subscription and authentication is contained in a smart card known as SIM, Subscriber Identity Module. When a smart card is inserted on any mobile it will take the identity of the subscriber. The mobiles become attractive items to steal, as they can be used with another SIM card.
To prevent this, GSM has specified an International Mobile Equipment Identifier (IMEI).
An Equipment Identity Register (EIR) is placed in each network, with Black, White and Grey Lists for stolen or unapproved mobiles, valid mobiles and mobiles which require tracking respectively. Grey lists represent local tracking of mobiles within a network.
GSM has defined a procedure so that approved; lost or stolen mobile IMEIs can be communicated to all other operators. A Central Equipment Identity Register has been (CEIR) proposed. Type approval authorities issue white list numbers (random ranges of valid IMEIs) to mobile manufacturers, and manufacturers inform the CEIR when the mobiles are released to market. All operators are able to post their black lists to the CEIR, and in return collect a consolidated list of all operators black and white lists.
By this method stolen or invalid mobiles can be quickly barred throughout the world.
Implementation of GSM
Implementation in industries:
GSM-R or GSM-Railway:
It is an international wireless communications standard developed for railway communication and applications. It is a technology used for communication between train and Railway Regulation Control centers. The system is based on GSM qualifications which ensure performance at speeds up to 500 km/h (310 mph), without any data loss. It is a cost efficient digital replacement for current in-track cable and analogue railway radio networks.
Other uses of GSM – R:
· PtP Call: Point-to-Point Call, the same type of call like in regular GSM calls.
· VGCS: Voice Group Call System, similar to walkie-talkie communication.
Nokia Siemens Networks has proposed India’s first GSM-R communications solution into operation under the Mobile Train Radio Communication (MTRC) project for North Central Railways.
Local use of GSM:
SMS: Short Message Service (SMS) is part of the GSM specification and allows short text messages to be sent or received via mobile phones.
Voicemail: This service functions just like a conventional answer machine. If the line is engaged or the user doesn’t answer an incoming call after some specified number of rings, the operator of the mobile diverts the caller to a voicemail system. The caller is welcomed by a pre-recorded greeting and given the opportunity to leave a message.
MMS stands for Multimedia Messaging Service is a messaging service that allows subscribers to exchange multimedia messages. MMS supports the transmission of additional media types: text, picture, audio, and video. The sender can easily create a Multimedia Message, using the phone, or can use images and sounds stored previously in the phone. To send or receive a MMS, the user must have a compatible phone that is running over a GPRS or 3GSM network.
Problems Faced in implementation of GSM:
Much Authentication techniques have been applied in security of GSM but they do have certain flaws.
The user identity confidentiality is violated by transmitting the user identities (IMSI) in unprotected form through the intermediate transport networks between the GSM registers.
In the GSM authentication phase, two related parameters, RAND and SRES, are transmitted on the air interface in the clear. So any listener on the air interface can perform a known plaintext attack on the RAND – SRES pair to obtain the authentication key. Private Key based security protocols are used which has some flaws like; they cannot guarantee confidentiality of the calls within the network.
Advantages and Disadvantages of GSM
Advantages of GSM:
GSM is used all over the world with more than 450 million users.
International roaming facility permits the use of one phone throughout the world unlike CDMA which will work in Asia, but not European nations.
GSM is established, started in the mid-80s due to which a more stable network with healthy features are available.
The accessibility of Subscriber Identity Modules (SIM cards), which are smart cards; provide secure data encryption to give GSM m-commerce advantages.
GSM service is in more than 200 different countries, so it is quite easy to simply use your GSM phone when you are in one of these countries.
Disadvantages of GSM:
In case of GSM, SIM cards, individual authentication keys of the users are stored in the authentication centers. Any person with the rights and qualifications to access to authentication center can manipulate these to impersonate that mobile user.
Security algorithms used in GSM e.g. A3, A5, and A8 are all undisclosed algorithms. But researchers have proved that these algorithms cannot guarantee 100% security.
Privacy of a call and mystery of a subscriber are only assured on the air interface among the mobile station and the base station subsystem leading to likelihood of eavesdropping of voice data.
Anonymous. (anonymous). Benefits of GSM. Available: http://ezinearticles.com/?Benefits-of-GSM-Phone-Service&id=950625. Last accessed 14-03-2010.
Anonymous. (anonymous). GSM Technology. Available: http://www.canadiancontent.net/mobile/gsm_technology.php. Last accessed 14-03-2010.
Anonymous. (anonymous). General Information. Available: http://www.naavi.org/cl_editorial_04/edit_dec_04_04_01.htm. Last accessed 16-02-2010 .
Charles Brookson. (1994). GSM (and PCN ) Security and Encryption. Available: http://www.brookson.com/gsm/contents.htm. Last accessed 03 march 2010.
http://www.mcs.csueastbay.edu/~lertaul/ICW3016.pdf. Last accessed 22 march 2010.
Ed Sutherland. (2005). GSM vs CDMA . Available: http://www.m-indya.com/gsm/CDMA-vs-GSM.htm. Last accessed 12 February 2010.
EE Times-India. (2008). Nokia Siemens launches GSM-R in India. Available: http://www.eetindia.co.in/ART_8800525363_1800005_NT_1aa8c7bf.HTM. Last accessed 14 February 2010.
GSM world. (2005). Messaging . Available: http://www.gsmworld.com/technology/services/messaging.htm. Last accessed 2 February 2010.