Filter By:

Sort By:

Reset Filters

Wireless Essays (Examples)

Having trouble coming up with an Essay Title?

Use our essay title generator to get ideas and recommendations instantly

Latest Network Media Technology
Words: 779 Length: 2 Pages Document Type: Case Study Paper #: 82849574
Read Full Paper  ❯

Wireless Solution

The author of this report has been asked to assess and offer recommendations regarding the network setup for ichton Toys. There is currently a fairly dated but operational Cat5 setup in the office area, which is located on half a floor of a thirty floor office building. However, some users have taken to using an 802.11b wireless network. The Chief Executive Officer of ichton is very concerned about the wireless security of that setup given that corporate espionage in the toy industry is rampant. The author will give some recommendations about what should be done and why. While the existing Cat5 setup is not a completely dinosaur, the use of an extremely outmoded wireless technology and security standard is a disaster waiting to happen.


The one thing that absolutely must change with the ichton internet access setup is the wireless technology in use. The 802.11b router that…


Beal, V. (2015). What is Cat-7? Webopedia. Retrieved 10 August 2015, from 

Cable Organizer. (2015). What Is The Difference Between Cat 5, Cat 5e, and Cat 6 Cable?. Retrieved 10 August 2015, from 

HTCC. (2015). WPA2 Encryption Basics. Retrieved 10 August 2015, from

Kelly, G. (2014). 802.11ac vs. 802.11n WiFi: What's The Difference?. Forbes. Retrieved 10 August 2015, from

Protocol and Network Management
Words: 580 Length: 2 Pages Document Type: Essay Paper #: 8863986
Read Full Paper  ❯

Wireless connections today are ubiquitous and taken for granted; however, there is a complex world at work behind the scenes that relies on highly specific conditions. Whether on a laptop, cell phone, or other wireless handheld device, everyone has experienced the frustration of a faulty wireless signal. For this reason, it is helpful to understand some causes of signal weakness or failure. A brief study of the differences between wired and wireless networks, the basics of multiple access protocols, and increased challenges posed by mobility will offer a basic understanding of the complexities involved in successful wireless data transmission, or what can be described as the "21st century grease of the daily grind."

When a user chooses to "unplug" from the wired internet and connect through a virtual wire instead, they introduce a myriad of problems. Some basic challenges result from the differences between a wired and wireless network: decreasing…

Municipal Wi-Fi Be Pursued Municipal
Words: 799 Length: 3 Pages Document Type: Case Study Paper #: 35351308
Read Full Paper  ❯

City and municipal governments can also benefit greatly from the development of a Municipal Wi-Fi network in that fire, police, safety and medical equipment can be more effectively optimized in its used across broad geographic areas (Zhang, Schiffman, Gibbs, Kunjithapatham, Jeong, 2009). Using these forms of communication would also allow for greater responsiveness to emergency situations and a more effective series of strategies for managing ongoing communications across all government agencies in a given metro area. As both private industry and government benefit from a metropolitan Wi-Fi, both need to share in its costs as well (Tang, Baker, 2002).

A Technology Capable of Shared Ownership Across Government and Private Industry

The underlying technological foundations of WiMax concentrate on a consortium-based approach to defining specific aggregation, transmission, measurement of performance and optimal usage scenarios for metropolitan-wide Wi-Fi networks (Zhang, Schiffman, Gibbs, Kunjithapatham, Jeong, 2009). In short, the technology platform lends itself…


Huang, C., & Chang, J.M. (2008). Responding to security issues in WiMAX networks. It Professional Magazine, 10(5), 15-21.

Dan O'Shea (2006, April). WiMAX Puts Service Quality on Display. Telephony, 247(6), S12-S14.

Peng, Y. (2006). WiMax: The emergence of wireless broadband. It Professional Magazine, 8(4), 44-48.

Tang, D., & Baker, M. (2002). Analysis of a metropolitan-area wireless network. Wireless Networks, 8(2-3), 107-120.

Wirless Industry the Fact That
Words: 574 Length: 2 Pages Document Type: Term Paper Paper #: 92315811
Read Full Paper  ❯

This is why the subtitle is interesting on asking whether bidding for the new bandwidth is worth it. On one hand, it is obvious that this is a way of increasing the services that are being offered and, additionally, in amplifying the business. On the other hand, it is interesting to note that any amplification of the business will bring about initial high investment costs, as is notable in Google's case, for example.

It is interesting to note that, while all these entities are battling it out over the extension of the telecommunications spectrum, the entity gaining most out of this is, unlike other cases, the consumer. An extension of the spectrum means everything from new technologies to lower prices, because the competition between the main actors will most likely drive prices down as they try to attract new consumers and retain the existing ones. As such, in an international…

Standards 802 11 A B G and N
Words: 784 Length: 3 Pages Document Type: Essay Paper #: 42244954
Read Full Paper  ❯

tandards 802.11 "a," "b," "g" and "n" allow different applications to be deployed as mobility services. Based on the readings what might be the steps to setup a wireless network.

teps to establishing a wireless network

The steps to setting up a wireless network are the following:

caling the area

cale the area that you want wireless network set up in so that you can have an initial idea of layout. Meraki's WiFi tumbler is a tool that can help person assess neighboring wireless networks; their channels; names and intensity of strengths in your area. Based on this information, you can design your own access point placement.

Assess how many users will be employing / sharing the network. More than 20 users can make this problematic

Determine the minimum throughput that you would like to have

802.11 a/g offers up to 54 Mbps while 802.11n can attain an approximate 600…


Badman LH How To Deploy An Open Area With Wireless

Stoneburner, G et al. (2002)Risk management guide for computer security. NIST

TRB (2003) A balanced approach to managing information risk in an unfriendly world.

Data Communication
Words: 1038 Length: 3 Pages Document Type: Term Paper Paper #: 35781574
Read Full Paper  ❯

Communication -- transmission through wireless and SLIP forms

I've got no strings to hold me down." The Disney version of Pinocchio's enthusiasm for his own wireless status as a 'real boy' is paralleled in the recent enthusiasm of many individual users of the Internet's enthusiasm for 'going wireless.' The delight of personal cable modem and broadband devotee's own 'got no strings' status at their home office spaces has encouraged many corporations to also eschew SLIP modem technology in exchange for the use of wireless technology on a wider scale. Still, fully implementing wireless instrumentation on network scale, no pun intended, has been "an elusive goal for some time," for many industries because of cost and logistical problems. (Drake, 2003) Also, as electronics and data processing technology using SLIP ring data transmissions systems move forward, and industrial instrumentation developers build finer tuned processes, better management information, and greater productivity and performance,…

Works Cited

CCSI. (2003) "Survival kit: SLIP vs. PPP." Retrieved on September 3, 2004 at 

Drake, Bill. (May 1, 2003) "Blue tooth gets a filling." ISA. Retrieved on September 3, 2004 at 

Large Slip Ring Assemblies." (2004) Poly-Scientific Website. Retrieved on September 3, 2004 at Polysci. SLIP. Retrieved on September 3, 2004 at

Rockwell Animation. (2003) "Wireless fact v. Fiction." Retrieved on September 3, 2004 at

Transmission Media Advantaged Disadvantages
Words: 1289 Length: 4 Pages Document Type: Essay Paper #: 21525168
Read Full Paper  ❯

Transmission media, which is also known as communication media, refers to a means with which information is broadcasted from one location to another. The transmission medium in a data transmission system is regarded as the physical pathway between the sender and the receiver of a message or information. Generally, transmission media in computer communications are divided into two categories i.e. bounded and unbounded media. Bounded media are the physical pathways for broadcast information like fiber optic cable while unbounded media is transmission through air like cell phone signals. The bounded media is also known as wired media because it involves physical links while unbounded media is also known as wireless media. Notably, the quality and characteristics of a transmission media is determined by the attributes of the signal and medium.

Wired and Wireless Media:

Wired and wireless media are important means of transmitting or transporting information since they provide different…


Dukda, S. (2000, September). Introduction to Structured Cabling. Retrieved from Division of Information Technology -- Ministry of Communication website: 

Evans, S. (2013, March). Wired v. Wireless in the Enterprise. Retrieved February 9, 2014, from

"Wired or Wireless." (n.d.). Virgin Media. Retrieved February 9, 2014, from

Project Management Scenario a Global
Words: 2476 Length: 9 Pages Document Type: Case Study Paper #: 9194818
Read Full Paper  ❯


There are several benefits that a global consumer electronic firm could derive from inter-project learning.

First, inter-project learning allows firm to enhance project completeness. Prencipe, & Tell (2001) argue that inter-project learning allows firms to execute a project in a best method. In the present competitive market environment, project is the key to the dynamic competitive capabilities. Typically, accumulation of knowledge builds project competencies, which could enhances market performances of a global consumer electronic firm. Experience has revealed that project-based firm has been able to record high profit in the market environment. ( Brady, and Davies, 2004).Through inter-project learning, a global consumer electronic firm will be able to better estimate the project costs and this will enhance ability to deliver the project with success. Moreover, the inter-project learning will enable the company to estimate the project risks efficiently. By better evaluating the project risks, the project manager will be…


Anbari, F.T., Carayannis, E.G. And Voetsch, R.J. (2008) Post-project reviews as a key project management competence, Technovation, Vol. 28, pp.633-643.

Brady, T. And Davies, a. (2004) Building of the Project Capabilities: From Exploratory to Exploitative Learning, Organization Studies, Vol.25, No.9, pp.1601-1621.

Prencipe, a. & Tell, F. (2001). Processes and outcomes Inter-project learning: knowledge codification in project-based firms. Research Policy. 30: 1373 -- 1394


Saving Energy in Ad Hoc
Words: 1706 Length: 5 Pages Document Type: Article Review Paper #: 22570417
Read Full Paper  ❯

The strategy is to partition the network and distribute the routing of the entire group of node instead of only one node having full energy burden task.

Similar to the previous paper reviewed, Xu et al. (2000) in their paper titled "Adaptive Energy-Conserving Routing for Multihop Ad Hoc Networks" also develop two algorithms for routing energy saving devices. hile other papers develop energy saving devices such as GAF and Span, Xu et al. (2000) develop AODV and DSR, which are the algorithms to reduce energy consumption in the application- level development. Similar to GAF that consume between 40% and 60% of less energy consumption, and Span, AODV and DSR have ability to consume as little as 50% of the energy in the ad-hoc routing protocol, which assist in increasing the network lifetime four-fold.


Geographical adaptive fidelity: The energy saving algorithms developed by Xu et al. (2001)

Adaptive Energy Conserving…

Works Cited

Chen, B. Jamieson, K. Balakrishnan, H. "Span: An energy-efficient saving coordination algorithm for topology maintenance in ad hoc wireless networks" ACM Wireless Networks Journal. (2001).

Xu, Y. Heidemann, J. & Estrin, D. Geography-informed Energy Conservation for Ad Hoc Routing. . ACM Wireless Networks Journal. .2001

Xu, Y. Heidemann, J. & Estrin, D. "Adaptive Energy for Routing Conserving for Multihop Ad Hoc Networks." USC/ISI Research Report 527. .2000.

Access Control Types of Access
Words: 1816 Length: 7 Pages Document Type: Term Paper Paper #: 33098167
Read Full Paper  ❯

These certificates are issued by the certification authorities (CAs) and they contain the name, expiration dates as well as serial numbers of the certificates.

OS Hardening

Operating system hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest Operating system patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well as system downtime.

Application hardening

Application hardening is the process of addressing the various security issues and vulnerabilities in a given operating system via the implementation of the latest application patches, updates, hotfixes as well procedures and policies that are necessary for reducing the number of attacks as well as system downtime.

Transmission / emote access protection protocols

The transmission protocols that are necessary for the information assurance include the used of https as well as FTP. Https…

Mobile Security
Words: 1535 Length: 6 Pages Document Type: Research Paper Paper #: 35660798
Read Full Paper  ❯

Mobile Device Security

Analysis of Routing Optimization Security for Mobile IPv6 Networks

Defining and Implementing Mobility Security Architectures

Approaches to defining, implementing and auditing security for mobility devices have become diverse in approach, spanning from protocol definition and development including IPv6 through the creation of secure mobile grid systems. The wide variation in approaches to defining security for mobility devices has also shown the critical need for algorithms and constraint-based technologies that can use constraint-based logic to isolate and thwart threats to the device and the network it is part of. The intent of this analysis is to evaluate the recent developments in constraint-based modeling and network logic as represented by mobile IPv6 protocols and the role trust management networks (Lin, Varadharajan, 2010). These networks are predicated on algorithms that are used authenticating the identity of specific account holders, in addition to defining a taxonomy of the factors that most…


Allen, M. (2006). An IT manager's insight into mobile security. The British Journal of Administrative Management,, 22-23.

Barber, R. (2000). Security in a mobile world - is Bluetooth the answer? Computers & Security, 19(4), 321-325.

Goode, A. (2010). Managing mobile security: How are we doing? Network Security, 2010(2), 12-15.

Komninos, N., Vergados, D., & Douligeris, C. (2006). Layered security design for mobile ad hoc networks. Computers & Security, 25(2), 121-130.

Security Issues of M Commerce
Words: 5074 Length: 20 Pages Document Type: Term Paper Paper #: 25740607
Read Full Paper  ❯

wireless Web is truly' the next major wave of Internet computing

A its potential for bringing people together and expanding commerce is even greater than that of the wired Internet."

Edward Kozel, board member and former CTO of Cisco systems (AlterEgo, 2000, p. 12)

The integration of the Internet into our modern culture as a driving force behind business, convenience, services and merchandise acquisition has created a new set of desires for modern consumers. The trend started with the ease and availability of services and products being offer4ed through radio and television advertising, and then infomercials and shopping channels. The internet brought the availability to purchase products, goods, and information from our desks and kitchens. Now trough wireless hotspots and wireless devices, society is following their desires toward a marketing distribution channel which motivates them to pay for internet access, and mobile commerce (m-commerce) anytime, anywhere, and instantly. These sets…


AlterEgo (2000). Building the intelligent internet: Making the case for adaptive network services. [].

Albright, B. (2000). Mobilize this!. Frontline Solutions, May, 28-32.

Bansal, P. (1.1.2001) Smart cards come of age. The Banker.

Barnett, N., Hodges, S. & Wilshire, M. (2000). M-commerce: An operator's manual. McKinsey Quarterly, 3,162-171.

Quality Tools
Words: 973 Length: 4 Pages Document Type: Research Paper Paper #: 4044641
Read Full Paper  ❯

internet connectivity for the last few days. The internet has been going on and off in my home every couple of hours, sporadically. It would work fine during the day, with some hiccups in connection, but then it would be go completely off around 11pm and turn back on around 7 in the morning. I didn't understand why it was happening and decided to generate a flow chart that could help me not only process steps to fixing the problem with the internet but also understand why it could be happening.

My wireless router has had several issues with connectivity recently and is the source for my internet issues. I had concerns over getting a new router, however in developing my flowchart and analyzing for the three days, the times in which the internet went out, I came to the realization the plug connecting the router was loose. What this…

Security Issues in IEEE Wlan
Words: 6613 Length: 20 Pages Document Type: Term Paper Paper #: 95819917
Read Full Paper  ❯

Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below.

Review of the Literature.

Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby 2003). "The integrity of the transmitted data is a valid 2.4 GHz. At this wavelength medium, the propagation of wavelength maintains strong connectivity" (Gonzales & Higby 2003, p. 30). The technology of WLANs actually dates back to the mid-1980s; during this period, the Federal Communications Commission (FCC) freed up radio frequency (rf) to the industry. "Initially, this was viewed as a broadcast reception procedure and very little thought went to broadcast transmission" (Gonzales & Higby 2003, p. 30).…


Alexander, Steve. 2004. Computers and Information Systems. In Encyclopedia Britannica Book of the Year [premium service].

Anderson, Robert H., Tora K. Bikson, Richard O. Hundley & C. Richard Neu. 2003. The Global Course of the Information Revolution: Recurring Themes and Regional Variations. Santa Monica, CA: Rand.

Bliss, R. Marion. September 5, 2003. Homeowners Connect to Wireless Fidelity. The Washington Times, p. F29.

Brookshear, J.G. 2000. Computer Science: An Overview. Reading, Mass: Addison-Wesley.

Nextel Communications Inc - 2004
Words: 646 Length: 2 Pages Document Type: Term Paper Paper #: 53032938
Read Full Paper  ❯

The high competition rate in the industry necessitates fast and numerous new developments. Nextel Communications Inc. can much more valuable spend its time and money by investing in new ideas. Court cases take time and energy, while also being highly detrimental to the creative process. In this way, losses are incurred not only in terms of legal fees and work hours, but also in terms of creativity and new products within the company.

In addition, law suits could have a detrimental effect on a company's reputation. If Nextel were for example to lose the case, Verizon receives the right to continue with their product. Potentially, Nextel's reputation could be harmed by its involvement in an apparently petty attempt to corner the market on their product. Even if the company wins, the result could be equally damaging in terms of lost hours as well as creativity and reputation damages.

Furthermore, the…

Risk Assessment for Cybertrans Ltd
Words: 2782 Length: 10 Pages Document Type: Research Paper Paper #: 35153313
Read Full Paper  ❯

The diffused infrared configuration however, uses a transmitter that fills a given office space with signals. The signal receiver can then be located anywhere in the office area in order to successfully receive the I signal.

The Spread spectrum LANs

This form of arrangement utilizes the multiple-cell configuration. Each of the cells are appropriately assigned a unique center frequency that lies within a specific band in order to avoid signal interference. This transmission technique makes use of two methods; frequency hopping as well as direct sequence modulation

The Frequency hopping method uses signals that jumps from a given frequency to the other within a specific bandwidth. The transmission unit then "listens" to a give channel and if successfully detects any idle time (a time when no signal is transmitted),then transmits the packet via the full channel bandwidth .In case a channel is deemed "full," the transmitter then "hops" to the…


Bruce, WR (2002).Wireless LANs End to End, Ron Gilster (ed.), John Wiley & Sons.

Burell, J (2002) 'Wireless Local Area Networking: Security Assessment and Countermeasures: IEEE 802.11 Wireless Networks', Dec. 2002, retrieved 22 March

2011, <>

Cisco (n.d)"Cisco HWIC-AP WLAN Module for Cisco 1800 (Modular), 2800 and 3800."

Telecom Industry the Total Business
Words: 2045 Length: 5 Pages Document Type: Term Paper Paper #: 63354661
Read Full Paper  ❯

Wireless although the performance of Cingular has been mediocre also. The new Cingular expects that the added network coverage from at & T. Wireless will assist in opposing that belief nearly from the very beginning. (FCC OKs Cingular, at&T Wireless Merger)

The merger is regarding placing two companies in unison that do not have the metrics to go for the optimum services. Whereas there is scanty reservations regarding the amalgamation gives Cingular instruments to perk up customer satisfaction, the company has to proceed very speedily. Since in excess of 170 million subscribers are at present using a mobile phone in the United States, the phenomenal surge in the recent years is sure of slowing down. Meanwhile, the customers of at & T. Wireless has been deserting at the rate of 3.5% per month during 2004 which is worrying given that rivals Verizon and Nextel Comunications Inc. has been losing their…


Cingular, att Wireless merge after clearing last hurdle. October 26, 2004 Retrieved at . Accessed on 22 November, 2004.

Cingular Completes at&T Wireless Takeover. October 26, 2004. Retrieved at . Accessed on 22 November, 2004.

Consumers Will Pay Big for Cingular/at&T Merger, Study Warns. May 27, 2004 Retrieved from ttp:/ / Accessed on 22 November, 2004.

Customer Benefits. 2004. Retrieved at Accessed on 22 November, 2004.

Qualcomm in China Why Does
Words: 859 Length: 3 Pages Document Type: Term Paper Paper #: 95391608
Read Full Paper  ❯

The U.S. government, for example, could back the CDMA technology by promising China that it would support its candidature for the WTO, where eventually China acceded.

3. To what extent do economic factors?

The economic factors are essential in explaining the global leadership of GSM, mainly because of the economies of scale that can be made when dealing with the GSM technology. The economies of scale are evident in terms of the equipment, going as far as the handsets, for example. This means that despite a cost advantage for the CMDA, the economies of scale obtained from the GSM technology can virtually nullify this and make GSM more profitable.

On the Chinese market, economic considerations also played an important role in the competition between GSM and CMDA. First of all, China Unicom had already invested significant sums of money in the development of a wireless network based on GSM, so…

Bluetooth Technology
Words: 7972 Length: 28 Pages Document Type: Term Paper Paper #: 16680382
Read Full Paper  ❯

BluetoothTM is a low cost, low power, short-range radio technology- originally perceived as cable replacement alternative for the cable / wire connected devices such as mobile phone hand, headsets, and portable computers. The BluetoothTM's goals expanded to include standardized wireless communications between any electrical devices and created a notion of Personal Area Network. The write-up traces history of BluetoothTM starting with its unusual name to formation of Special Interest Group, SIG's formation, its growth culminating into implementation of version 1.0b.

Version 1.0 of the Bluetooth came out in 1999-starting as early as 1994 by engineers from Ericsson. The specification is named after Harald Blatand- a tenth century Viking. Ericsson Corp. founded the Bluetooth SIG in February 1998, Intel Corp., IBM Corp., Toshiba Corp., and Nokia Mobile Phones. In December 1999, core promoters group enlarged to include four major players, namely, Micorsoft, Lucent, 3 Com and Motorola.

Then, the components of…



Bluetooth Revealed, Brent, Miller. September 2000, Prentice Hall PTR

Bluetooth Demystified, Nathan Muller, J.J. September 2000, Prentice Hall PTR

Web Addresses

Lawrence Berkeley National Laboratory Implementation Plan Introduction
Words: 2118 Length: 7 Pages Document Type: Essay Paper #: 70558482
Read Full Paper  ❯

Lawrence Berkeley National Laboratory Implementation Plan

Introduction and Business strategies

Lawrence Berkeley National Laboratory continully receives increasing competition in the information services industry. To reinstate the effectiveness and generate consumer satisfaction, as well as company presence in the market, a proactive strategy must be formed to increase functionality and service, as well as generate a wider consumer base, all while minimizing overhead and operational cost. Along with this aim, an implementation plan must be executed. The plan will consist of a five-step problem-solving model. This model will identify and address concerns, while establishing a process of improvement for Lawrence Berkeley National Laboratory and create increases in the company's wireless service efficacy. "The 5-Step model is a process to; categorize the situation, label and frame the central issue, articulate final goals, possible alternatives, and evaluate those alternatives" (Kundra, United States, & Chief Information Officers Council (U.S.),2010, p. 12)

The model as…


Haugen, D.M., Musser, S., & Lovelace, K. (2009). Outsourcing. Detroit: Greenhaven Press.

Kundra, V., United States, & Chief Information Officers Council (U.S.) (2010). 25 point implementation plan to reform federal information technology management. Washington [D.C.: The White House, [Chief Information Officers Council.

Lacity, M.C., & Hirschheim, R.A. (1995). Beyond the information systems outsourcing bandwagon: The insourcing response. Chichester: Wiley.

Laudon, K.C., & Laudon, J.P. (2002). Management information systems: Managing the digital firm. Upper Saddle River, N.J: Prentice Hall.

Treatment of Traumatic Injuries and
Words: 2501 Length: 9 Pages Document Type: Research Paper Paper #: 80812246
Read Full Paper  ❯

As cellular phone usage has increased the emergency response systems in rural areas has found itself being jammed with over use while the traditional wired trunk lines go unused. Unfortunately, balancing the cost of adding new wireless trunks line in order to meet the new demand has to be balanced against the cost of maintaining the old wired trunk lines. Due to the fact that cell phone coverage is not universally available in rural areas, traditional wired phone access is still needed so rural areas must still adequately meet the needs of both technologies, the old and the new. (Kurtis)

The new E-911 system is an enhanced version of the old 911 system. The advance of wireless technology has allowed the transmission of more information in a much more efficient manner. Under the E-911 system, the 911 operator can easily identify the telephone number of the person calling and any…

Works Cited

Chapman, S. a. (1998). Emergency Use of Cellular (mobile) telephones.

Federal Communications Commission. (2010). Wireless 911 Services. Washington D.C.: FCC.

Habib, I.M. (20007). Wireless technologies advances for emergency and rural communications. Wireless Communications and Mobile Computing .

Kurtis, M. (2004). Deploying E-911 Phase II in Rural America. Business Source Complete .

Words: 4153 Length: 15 Pages Document Type: Term Paper Paper #: 91116179
Read Full Paper  ❯

In addition electronic purses can be reloaded using ATM machines or traditional tellers (if the card is connected to a banking account).

Additionally, electronic purses are usually based on smart card technology and necessitate a card reader to fulfill a transaction. Equipment including point of sale (POS) terminals, ATMs, and smart card kiosks can be outfitted with card readers (Misra et al., 2004). Every time the user utilizes the card reader to complete a transaction; the card reader will debit or credit the transaction value from or to the card.

The author further asserts that Smart cards can be utilized for various purposes.

In most cases they are used as stored value cards (Misra et al., 2004). Stored value cards can be utilized at the time of purchase and are preloaded with a certain amount of money. These cards can be discarded after they have been used; however, most stored…


AL-KAYALI a. (2004) Elliptic Curve Cryptography and Smart Cards GIAC Security Essentials Certification (GSEC). Retrieved October 8 at 

ECC. Retrieved October 8 at 

Frauenfelder M. (2005) Make: Technology on Your Time. Oreily Misra, S.K., Javalgi, R. (., & Scherer, R.F. (2004). Global Electronic Money and Related Issues. Review of Business, 25(2), 15+.

Mitrou N. (2004) Networking 2004: Networking Technologies, Services, and Protocols. Springer Murphy S., Piper F. (2002) Cryptography: A Very Short Introduction. Oxford University Press: Oxford, England.