Browse Definitions :

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Guide to mobile 2015: What is new?
Definition

mobile virtual network operator (MVNO)

Contributor(s): Cameron McKenzie

A mobile virtual network operator (MVNO) is a reseller for wireless communications services.

An MVNO leases wireless capacity (in effect, purchases “minutes”) from a third-party mobile network operator (MNO) at wholesale prices and resells it to consumers at reduced retail prices under its own business brand. MNOs such as Verizon Wireless and T-Mobile choose to sell to MVNOs because the networks have extra capacity that would otherwise be unused. Rather than taking a loss, the MNO makes a small profit by offloading capacity in bulk at wholesale prices.

MVNOs can afford to mark down their retail prices to a certain extent because they do not have to pay radio frequency spectrum licenses and they have no infrastructure to build or maintain. Because MVNOs have low overhead, they can spend aggressively on marketing to increase their chances of selling minutes to consumers. 

MVNOs typically offer prepaid wireless plans on a subscription basis. Sales and customer service may be handled directly by the MVNO or by yet another entity called a mobile virtual network enabler (MVNE). MVNEs specialize in marketing and administering mobile services.

 

This was last updated in April 2014

Continue Reading About mobile virtual network operator (MVNO)

Dig Deeper on Application Development

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Can a MVNO become a threat to it's donor MNO?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close