scispace - formally typeset
Search or ask a question

Showing papers on "GSM published in 2004"


Journal ArticleDOI
TL;DR: The design and implementation of remote control system by means of GSM cellular communication network integrates the device to be controlled, the microcontroller, and the GSM module so that it can be used for a wide range of applications.
Abstract: M2M wireless communication of various machines and devices in mobile networks is a fast growing business and application area in industry, maintenance business, customer service, security, and banking areas This paper presents design and implementation of remote control system by means of GSM cellular communication network The design integrates the device to be controlled, the microcontroller, and the GSM module so that it can be used for a wide range of applications Detailed description and implementation of each design element are presented To verify the principle operation of the M2M design, two home applications are experimentally tested using PC-based environment

306 citations


Proceedings ArticleDOI
01 Oct 2004
TL;DR: A man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies, is presented, showing that an attacker can mount an impersonation attack since GSM base stations do not support integrity protection.
Abstract: In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber regardless of the fact that UMTS authentication and key agreement are used. As a result, an intruder can eavesdrop on all mobile-station-initiated traffic.Since the UMTS standard requires mutual authentication between the mobile station and the network, so far UMTS networks were considered to be secure against man-in-the-middle attacks. The network authentication defined in the UMTS standard depends on both the validity of the authentication token and the integrity protection of the subsequent security mode command.We show that both of these mechanisms are necessary in order to prevent a man-in-the middle attack. As a consequence we show that an attacker can mount an impersonation attack since GSM base stations do not support integrity protection. Possible victims to our attack are all mobile stations that support the UTRAN and the GSM air interface simultaneously. In particular, this is the case for most of the equipment used during the transition phase from 2G (GSM) to 3G (UMTS) technology.

240 citations


Journal ArticleDOI
13 Sep 2004
TL;DR: An EDGE transmitter, using a non-linear GSM type PA, is presented, and a dual feedback loop ensures robust performance even under VSWR variations.
Abstract: An enhanced data-rates for GSM evolution (EDGE) transmitter using a nonlinear GSM-type PA is presented. It is based on a novel polar loop architecture that employs separate feedback control of the amplitude and the phase of the output signal. With this approach, the problems with AM-to-PM as well as AM-to-AM of the nonlinear PA are essentially eliminated. In addition, this architecture allows for a large dynamic output power control range, as required by the GSM specification. The transmitter uses a standard I/Q interface and does not require the extraction of amplitude and phase modulation in the digital domain. The dual feedback loop ensures robust performance even under voltage-standing wave ratio variations without using an isolator. No external PA filtering is required to meet the transmitter noise in the receive band. The EDGE spectral mask is met with an rms error vector magnitude of <3% at 29 dBm at the antenna, corresponding to 2 dB above nominal maximum output power. There is no mode change between GMSK and EDGE, and the transmitter operates seamlessly in multislot Enhanced General Packet Radio Service. The polar modulation transmitter meets or exceeds the GSM-type approval requirements for both EDGE and GMSK in quad band (850/900/1800/1900 MHz).

183 citations


Patent
16 Sep 2004
TL;DR: In this article, a wireless intranet office (WIO) concept is disclosed, which integrates an IP based Intranet environment and GSM network providing mobile telephones with access to GSM through the GSM networks or via the intranets.
Abstract: A wireless intranet office (WIO) concept is disclosed, which integrates an IP based Intranet environment ( 27 ) and GSM network providing mobile telephones ( 21 ) with access to GSM through the GSM network or via the intranet Access through the intranet to the GSM MSC ( 26 ) is provided by a WIO interworking unit ( 24 ) which may comprise several network entities (eg intranet mobile cluster ( 241 ), intranet location register ( 242 ), WIO gatekeeper ( 243 ), WIO gateway ( 244 ) and H323 gateway) A dual mode terminal for such a system is also disclosed

155 citations


Journal ArticleDOI
30 Nov 2004
TL;DR: This 0.5-/spl mu/m SiGe BiCMOS polar modulator IC adds EDGE transmit capability to a GSM transceiver IC without any RF filters.
Abstract: This 0.5-/spl mu/m SiGe BiCMOS polar modulator IC adds EDGE transmit capability to a GSM transceiver IC without any RF filters. Envelope information is extracted from the transmit IF and applied to the phase-modulated carrier in an RF variable gain amplifier which follows the integrated transmit VCO. The dual-band IC supports all four GSM bands. In EDGE mode, the IC produces more than 1 dBm of output power with more than 6 dB of margin to the transmit spectrum mask and less than 3% rms phase error. In GSM mode, more than 7 dBm of output power is produced with noise in the receive band less than -164 dBc/Hz.

142 citations


Journal ArticleDOI
TL;DR: In this paper, an internal planar inverted-F antenna (PIFA) is presented for the GSM, DCS, PCS, UMTS, HIPERLAN/2 and IEEE 802.11a bands within 2.5:1 voltage standing wave ratio.
Abstract: A novel internal planar inverted-F antenna (PIFA) suitable for handset terminals is presented. The structure combines shorted parasitic patches, capacitive loads and slots to achieve multiband operation. This compact antenna operates in the GSM, DCS, PCS, UMTS, HIPERLAN/2 and IEEE 802.11a bands within 2.5:1 voltage standing wave ratio (VSWR) and with good efficiency.

136 citations


Proceedings ArticleDOI
05 Sep 2004
TL;DR: To protect UMTS connections from GSM attacks by integrating an additional authentication and key agreement on intersystem handovers between GSM and UMTS.
Abstract: GSM suffers from various security weaknesses: Just recently, Barkan, Biham and Keller presented a ciphertext-only attack on the GSM encryption algorithm A5/2 which recovers the encryption key from a few dozen milliseconds of encrypted traffic within less than a second Furthermore, it is well-known that it is possible to mount a man-in-the-middle attack in GSM during authentication which allows an attacker to make a victim mobile station authenticate itself to a fake base station which in turn forwards the authentication traffic to the real network, thus impersonating the victim mobile station to a real network and vice versa We discuss the impact of GSM encryption attacks, that recover the encryption key, and the man-in-the-middle attack on the security of networks, which employ UMTS and GSM base stations simultaneously We suggest to protect UMTS connections from GSM attacks by integrating an additional authentication and key agreement on intersystem handovers between GSM and UMTS

112 citations


Journal ArticleDOI
TL;DR: This paper proposes using a Robust Extended Kalman Filter to derive an estimate of the mobile user's next mobile base station from the user's location, heading, and altitude, to improve connection reliability and bandwidth efficiency of the underlying system.
Abstract: This paper provides mobility estimation and prediction for a variant of the GSM network that resembles an ad hoc wireless mobile network in which base stations and users are both mobile. We propose using a Robust Extended Kalman Filter (REKF) to derive an estimate of the mobile user's next mobile base station from the user's location, heading, and altitude, to improve connection reliability and bandwidth efficiency of the underlying system. Our analysis demonstrates that our algorithm can successfully track the mobile users with less system complexity, as it requires measurements from only one or two closest mobile base stations. Further, the technique is robust against system uncertainties caused by the inherent deterministic nature of the mobility model. Through simulation, we show the accuracy of our prediction algorithm and the simplicity of its implementation.

105 citations


Journal ArticleDOI
TL;DR: The GSM field is found to affect both females and males and the results suggest that this field-radiation decreases the rate of cellular processes during gonad development in insects.
Abstract: Pulsed radio frequency, (RF), electromagnetic radiation from common GSM mobile phones, (Global System for Mobile Telecommunications) with a carrier frequency at 900 MHz, “modulated” by human voice,...

101 citations


Journal ArticleDOI
TL;DR: The purpose of this project was to evaluate the contribution of this testing environment, called B‐TESTING‐TOOLS, in an industrial process on a real life‐size application, by comparing the generated test sequences with the already used and high‐quality manually‐designed tests.
Abstract: This paper presents the results of a case study on generating test cases for a fragment of the smart card GSM 11-11 standard. The generation method is based on an original approach using the B notation and techniques of constraint logic programming with sets. The GSM 11-11 technical specifications were formalized with the B notation. From this B specification, a system of constraints was derived, equivalent to this formal model. Using a set constraint solver, boundary states were computed and test cases were obtained by traversing the constrained reachability graph of the specifications. The purpose of this project was to evaluate the contribution of this testing environment, called B-TESTING-TOOLS, in an industrial process on a real life-size application, by comparing the generated test sequences with the already used and high-quality manually-designed tests. This comparison enabled us to validate our approach and showed its effectiveness in the validation process of critical applications: the case study gives a wide coverage (about 85%) of the generated tests compared to the pre-existing tests and a saving of 30% in test design time.

97 citations


Patent
Petri Vesikivi1, Peter Wakim1, Sami Ranta1
11 Feb 2004
TL;DR: An apparatus, system, method and computer program product for implementing an automatic identification system to improve the functionality of a personal communication device is described in this paper, where a data carrier that contains one or more data items transmits a data signal wirelessly to a personal communications device equipped with an RFID reader.
Abstract: An apparatus, system, method and computer program product for implementing an automatic identification system to improve the functionality of a personal communication device. A data carrier that contains one or more data items transmits a data signal wirelessly to a personal communication device equipped with an RFID reader. The personal communication device decodes the data signal and at least a portion of the data is used by the personal communication device to establish a communication connection with another device or network. The data subsequently transmitted by the personal communication device is accomplished using GSM, GPRS, WAP, EDGE, UMTS or other similar wireless network protocol. The communication connection is used to provide a request for a service such as a phone call, an Internet connection, a third party service, or to request for the storage of data in a network.

Patent
10 Mar 2004
TL;DR: In this paper, an intermediary system (Intermediary Network) operates between a first network (ANSI Carrier) and a second network (ITU GSM Carrier) operating in accordance with a second standard.
Abstract: Systems and methods for exchanging a short message service (SMS) message between networks (ANSI Carrier, ITU GSM Carrier) operating in accordance with different standards. An intermediary system (Intermediary Network) operates between a first network (ANSI Carrier) operating in accordance with a first standard and a second network (ITU GSM Carrier) operating in accordance with a second standard. A routing information request for an SMS message is received, at the intermediary, from the first network and the intermediary sends, in response to the routing information request, an acknowledgement message to the first network. The SMS message is thereafter received at the intermediary and an acknowledgement of receipt of the SMS message is generated in the intermediary and then sent to the first network. The SMS message is then sent from the intermediary to the second network. In a preferred embodiment, the intermediary is an entity distinct from the first and second networks, but operates as a virtual MSC from the perspective of the first and second networks.

Proceedings ArticleDOI
17 May 2004
TL;DR: An approach that is based on the concept of "nearlynets", explicitly considering the intermittent nature of connectivity that may be limited to short periods of time is presented, enabling useful Internet connectivity when driving through isolated hot spots.
Abstract: We present an architecture and discuss performance enhancement strategies for WLAN-based Internet access for moving vehicles. Measurements, on-going research activities, and the development of first prototypes have shown that WLAN-based Internet access for moving vehicles is feasible and can be an interesting and cost-effective alternative to GSM/3G-based approaches. We present an approach that is based on the concept of "nearlynets", explicitly considering the intermittent nature of connectivity that may be limited to short periods of time. Based on measurements and simulations, we have developed an architecture enabling useful Internet connectivity when driving through isolated hot spots. This architecture supports mobility in such networks, relying on application-layer mobility mechanisms. We also discuss transport and application protocol performance enhancements as well as various operational issues such as detection of network access and address assignment.

Book
13 Feb 2004
TL;DR: This book explains the GSM Fundamentals and IP Telephony for UMTS Release 4.9 and Beyond (All-IP) and some of the applications for GPRS/UMTS and discusses the role of net neutrality in this system.
Abstract: About the Authors.1. Introduction.2. Principles of Communications .3. GSM Fundamentals.4. General Packet Radio System.5. IP Applications for GPRS/UMTS.6. Universal Mobile Telecommunications System.7. UMTS Transmission Networks.8. IP Telephony for UMTS Release 4.9. Release 5 and Beyond (All-IP).Glossary of Terms.Index.

Journal ArticleDOI
TL;DR: GSM mobile phone telemetry is a useful technique to obtain haul-out and mark-recapture data for single year survivorship studies and should approach 100% with future modifications to the tags, it is shown.
Abstract: We describe and evaluate a new telemetry system based on GSM (Global System for Mobile Communications) mobile phone technology that may provide mark-recapture data for single year survivorship studies. These phone-tags automatically attempt to send an SMS text message once every two days. The successful receipt of a text message ashore constitutes a resighting event within the coastal zone of GSM coverage. Haul-out data and coastal location data are incorporated into the messages. Data are presented for a three-month period (January-March) following tag deployment on 59 gray seal (Halichowus gvpus) pups at the Isle of May (Scotland). An average of 15.5,4.1, and 8.2 seals succeeded in registering within each three-day period in January, February, and March, respectively. Tags registered with a wide geographical range of GSM radio cells on the Scottish and English east coasts, and also from Norway and Germany. Haulout records covering 54% of the animals’ time were received. With future modifications to the tags, this figure should approach 100%. The median delay to network registration was 9.6 sec from a seal in the sea (not hauled out). These data show that GSM mobile phone telemetry is a useful technique to obtain haul-out and mark-recapture data.

Patent
Yoram Rimoni1
18 Jun 2004
TL;DR: A GSM1x (206)-to-GSM (208) handoff feature allows a GSM subscriber with a dual-mode (GSM 1x and GSM modes) handset (204) to seamlessly roam from GSM 1X coverage areas to GSM coverage areas as discussed by the authors.
Abstract: A GSM1x (206)-to-GSM (208) handoff feature allows a GSM1x subscriber with a dual-mode (GSM1x and GSM modes) handset (204) to seamlessly roam from GSM1x coverage areas to GSM coverage areas This functionality is facilitated by the GSM1x system design which integrates a CDMA RAN with a standard GSM core network The GSM1x system is built using standard CDMA as its air interface and an unmodified CDMA RAN with a standard IOS interface to the MSN (304) The only modifications are done at the MSN (304) and the MS

Patent
Juha Ellä1
30 Mar 2004
TL;DR: In this article, a band-reject filter comprising at least a series and a shunt acoustic-wave resonators is used to create a deep notch at the receive frequency band, and a plurality of inductive elements for matching static capacitance of the resonators at the passband frequency.
Abstract: A filter arrangement for use in a multiband dual-mode mobile phone. In particular, the mobile phone is operable in a W-CDMA mode and a band-reject filter comprising at least a series and a shunt acoustic-wave resonators is used to create a deep notch at the receive frequency band. The band-reject filter further includes a plurality of inductive elements for matching static capacitance of the resonators at the passband frequency. The mobile phone is also operable in 1800 and 1900 GSM bands. The band-reject filter is operatively connected to a harmonic trap in order to eliminate the third harmonic of these GSM bands. The mobile phone is also operable in the lower GSM band, for which a harmonic filter can share an antenna path with the band-reject filter.

Proceedings ArticleDOI
26 Sep 2004
TL;DR: Algorithm for optimum assignment of mobiles to a radio technology during call setup as well as during the call is studied based on an approach previously employed to balance the load of distributed computing systems.
Abstract: Currently UMTS networks are rolled out to compliment existing GSM networks. As most UMTS mobiles will also support GSM, the question of which system to select for a given service emerges. In order to exploit the differences between radio access technologies, common radio resource management (CRRM) is employed, i.e. common management of the whole radio resources such that the assignment of mobiles to different radio technologies is flexible and considers the specific advantages of each system. The focus of the paper is on intelligent algorithms to decide the balancing of the load between the different radio technologies. We study algorithms for optimum assignment of mobiles to a radio technology during call setup as well as during the call. The decision is based on an intelligent evaluation of various aspects of the radio link. Our algorithm is based on an approach previously employed to balance the load of distributed computing systems.

Proceedings ArticleDOI
17 May 2004
TL;DR: This paper describes the optimization models with hyperbolic and quadratic objective functions that directly accounts system capacity and proposes heuristics combining greedy and local search phases that provide near-optimal solutions within a reasonable amount of time.
Abstract: The impressive market spread of IEEE 802.11 based wireless local area networks (WLAN) calls for quantitative approaches in the network planning procedure. It is common belief that such networks have the potential to replace traditional indoor wired local networks and allow flexible access outdoors, eventually competing with classical cellular systems (GSM, GPRS, UMTS, etc.). The appropriate positioning of the access points (AP) is crucial to determining the network effectiveness. In a companion paper we argue that previously proposed approaches to coverage planning neglect the features of the IEEE 802.11 access mechanism, which limits system capacity when access point coverage areas overlap. We describe the optimization models with hyperbolic and quadratic objective functions that directly accounts system capacity and we propose heuristics combining greedy and local search phases. Computational results show that our heuristics provide near-optimal solutions within a reasonable amount of time.

Patent
17 Sep 2004
TL;DR: In this article, a dual mode mobile terminal (MT2) comprising a WLAN interface (WLAN-NIC) and a cellular radio interface (GSM_NIC), indicating an incom-ing voice call over the cellular radio interfaces, or upon receiving an indication from the user of the dual mode terminal to perform an outgoing voice call, was described.
Abstract: A Dual mode mobile terminal (MT2) comprising a WLAN interface (WLAN_NIC) and a cellular radio interface (GSM_NIC) has been described wherein when receiving a Page Request (6) message over the cellular radio interface (GSM_NIC), indicating an incom-ing voice call over the cellular radio interface, or upon receiving an indication from the user of the dual mode terminal to perform an outgoing voice call, performing a determi-nation (7) as to whether a WLAN coverage is possible from an AP providing WLAN te-lephony calls, and if so responding, by issuing a WLAN call message (8) to a WLAN AP over the WLAN interface to an interworking node (IWFN). There is moreover provided an Interworking node (IWFN) comprising a cellular control unit (CTRL_SIP), a cellular unit (GSM_U), a voice over IP unit (VO_IP) and a router (R), which upon receiving a WLAN call (9) from a dual mode terminal via a WLAN AP, is establishing a connection against a serving mobile switching centre (S_MSC/VLR) (10,10a, 10b), is performing a call initia-tion procedure (12-15), a assign traffic channel procedure (16 - 20) and a call confirma-tion and call accepted procedure (22- 27) between the dual mode terminal (MT2) and the serving switching mode centre (S_MSC/VLR), is initiating duplex GSM/IP translation (29) and is routing the cellular call between the AP and the serving mobile switching cen-tre (S_MSC).

Journal ArticleDOI
TL;DR: In this article, a low power lowvoltage fully integrated fast-locking quad-band (850/900/1800/1900-MHz) GSM-GPRS transmitter is described.
Abstract: A low-power low-voltage fully integrated fast-locking quad-band (850/900/1800/1900-MHz) GSM-GPRS transmitter is described. It exploits closed-loop phase-locked loop (PLL) upconversion using a modulated fractional-N frequency synthesizer with digital auto-calibration. It uses a type-I PLL in a mostly digital IC with no external components and achieves a lock time of 43 /spl mu/s, a tuning range of 500 MHz, receive-band phase noise of -158dBc/Hz and -165 dBc/Hz for the high and low bands, respectively, and reference feed through of -93.9 dBc. It is implemented in 2.1 mm/sup 2/ using a 0.13-/spl mu/m CMOS process and meets all quad-band GSM transmitter specifications with a current consumption of only 28 mA from a single 1.5-V power supply.

Proceedings ArticleDOI
20 Jun 2004
TL;DR: A new modelling approach is proposed that directly accounts system capacity and it is shown that the resulting optimization problems of WLAN coverage planning can be seen as extensions of the classical set covering or maximum coverage problems.
Abstract: Wireless local area networks (WLANs) are spreading all over the planet with impressive speed and market penetration. They will replace traditional indoor wired local networks and allow flexible access outdoor, eventually competing with classical cellular systems (GSM, GPRS, UMTS, etc.) in the provision of wireless services. Although the small systems currently installed are planned using rules of thumb, their rapid spread and size increase requires quantitative methods to determine proper access points (AP) positioning. Previously proposed approaches to the coverage planning neglect the effect of the IEEE802.11 access mechanism, which limits system capacity when access points coverage areas overlap. Here we propose a new modelling approach that directly accounts system capacity and show that the resulting optimization problems of WLAN coverage planning can be seen as extensions of the classical set covering or maximum coverage problems. We present and discuss different formulations based on quadratic and hyperbolic objective functions and report some preliminary results on synthetic instances we generated.

Patent
Francesco Meago1
23 Mar 2004
TL;DR: In this article, the authors proposed a method for multicast service delivering through the UMTS and GSM networks, in which a certain amount of physical resources are reserved in all the system for the IS-MBMS services; not real-time services can be transmitted on the reserved resources when not used by the ISMBMS ones.
Abstract: The method concerns multicast service delivering through the UMTS and GSM networks. For this aim is given higher priority to an opportune subset of all the real-time services with guaranteed bandwidth transmissible by the network. This subset is named IS-MBMS (Immediate Streaming-Multimedia Broadcast Multicast Service). A certain amount of physical resources is reserved in all the system for the IS-MBMS services; not real-time services can be transmitted on the reserved resources when not used by the IS-MBMS ones. The reserved resources allow for transmitting the IS-MBMS services with minimum bit-rate, at least. The network announces in the service area that an IS-MBMS content becomes available; in reply one or more subscribed users transmit a request for joining a multicast group for that service. The network transmits a notification message on a multicast channel to give to the joined users useful information of how get the announced service, i.e.: Service-Id, RB parameters, etc. The IS-MBMS content is transmitted immediately on a point-to-multipoint channel set-up in each involved cells, even if there are zero recipients in the cell. Content is transmitted in parallel in different cells, leading to service continuity, and the mobile station can perform soft combining. During the IS-MBMS content delivery the network can count in each involved cell the number of subscribed users joined to the transmitted IS-MBMS service. The network switches from point-to-multipoint to point-to-point or to no transmission depending on the result of counting and on a fixed threshold. Alternatively the network, parallel to the content delivery, can execute a checking procedure to see if there are joined users in a cell: in this case the point-to-multipoint channel is switched to no transmission (fig. 3 ).

Proceedings ArticleDOI
01 Jan 2004
TL;DR: This paper describes a real time prototype implementation of a system, which enables secure voice and data communication over the GSM voice channel, and a proprietary speech codec is used on the real time data channel to produce communication quality speech.
Abstract: This paper describes a real time prototype implementation of a system, which enables secure voice and data communication over the GSM voice channel. The security of GSM is not guaranteed especially over the core network. The proposed system modulates digital data, which may be encrypted onto speech-like waveforms. The modulated waveform is then transmitted over the GSM voice channel, which can be demodulated and decrypted at the receiver. The real time prototype system has been tested on GSM-to-GSM voice calls, and a proprietary speech codec is used on the real time data channel to produce communication quality speech. A demonstration will be provided at the presentation. (4 pages)

Patent
02 Feb 2004
TL;DR: In this paper, the authors synthesize transmission waveforms from orthogonal subcarriers using appropriate combinations of complex sub-carrier codes using a multicarrier platform that is similar to OFDM.
Abstract: Transmission waveforms are synthesized from orthogonal subcarriers using appropriate combinations of complex sub-carrier codes. This allows conventional single-carrier signaling (such as GSM and CDMA transmission protocols) to be generated and received using a multicarrier platform that is similar to OFDM. Carrier interferometry provides unprecedented bandwidth efficiency and enables substantial improvements in interference rejection, power efficiency, and system versatility.

Patent
30 Apr 2004
TL;DR: In this paper, a communication method, system, devices and software arranged to operate in said system and devices for communicating control and guidance information, or any messages and data information between different devices (1 or 2 or 5 or 6) like mobile or fixed devices such as telephone, mobile phones, wireless modules, computers, servers, a messaging centre, or other device via a telecommunication network.
Abstract: This invention provides a communication method, system, devices and software arranged to operate in said system and devices for communicating control and guidance information, or any messages and data information between different devices (1 or 2 or 5 or 6) like mobile or fixed devices such as telephone, mobile phones, wireless modules, computers, servers, a messaging centre, or any other device via a telecommunication network (e.g. GSM, UMTS, Fixed networks etc.), the method, system, devices and software according to this invention allows the transmitting of unlimited number of control or guidance information, messages, data etc. over a telephone call from a calling device (1) to a receiving device (2 or 5 or 6), said information represented by time values ranging from ringing times (the period of ringing) or length of call or a time value representing a piece of information like letter “A” to the number of ringing signals.

Patent
Hyoung-Soo Kim1
06 Aug 2004
TL;DR: A mobile terminal for use in a Global System for Mobile communication (GSM) system is described in this article, where the MT stores the IMSI and private information of a user.
Abstract: A mobile terminal for use in a Global System for Mobile communication (GSM) system. A mobile equipment (ME) for use in the GSM system includes a Subscriber Identity Module (SIM) card and a Mobile Terminal (MT). The SIM card stores International Mobile Subscriber Identity (IMSI) information used for subscriber authentication and private information. The MT stores the IMSI and private information of a user, and contains a controller, which reads IMSI information from the SIM card when the SIM card is inserted into the MT, and denies access to the stored private information when the read IMSI information of the inserted SIM card is different from the stored IMSI information.

Journal ArticleDOI
TL;DR: A new frame generation model for those audio codecs which handle SID frames and deduces an analytical expression for the mean bit rate at the input of the IP network as a function of the number of frames per packet is proposed.
Abstract: The letter proposes a new frame generation model for those audio codecs which handle SID frames and deduces an analytical expression for the mean bit rate at the input of the IP network as a function of the number of frames per packet. The new model is experimentally validated for the G.729B, G.723.1, and GSM AMR codecs. Results show that the error of the estimation of the mean bit rate can be reduced significantly compared to the traditional on-off model.

Proceedings ArticleDOI
06 Jun 2004
TL;DR: In this article, an integrated triple-band GSM antenna switch module, fabricated in RF CMOS on a sapphire substrate, is presented, which incorporates a FET switch, transmit path filters, and all bias and control circuitry on the same substrate using a 0.5 /spl mu/m CMOS process.
Abstract: An integrated triple-band GSM antenna switch module, fabricated in RF CMOS on a sapphire substrate, is presented in this paper. The low cost and compact size requirements in wireless and mobile communication systems motivate the continuing integration of the analog portions of the design. The antenna switch die incorporates a FET switch, transmit path filters, and all bias and control circuitry on the same substrate using a 0.5 /spl mu/m CMOS process. A revised version of the die is also proposed, which makes use of an additional copper interconnect layer to reduce die area.

Patent
Robert C. Lovell1, Eric T. Wimmer1
30 Sep 2004
TL;DR: In this article, the authors present a system for addressing and routing Short Message Service (SMS) messages from international callers to domestic callers using Global System for Mobile Communication (GSM) Mobile Application Part (MAP) Send Routing Info for Short Message (SRI for SM).
Abstract: Network system and methods for addressing and routing Short Message Service (SMS) messages from international callers to domestic callers using Global System for Mobile Communication (GSM) Mobile Application Part (MAP) Send Routing Info for Short Message (SRI for SM). The systems and methods create a virtual Home Location Register (HLR) and a virtual Mobile Switching Center (MSC) so that an intermediary, which is not itself a carrier, can handle such messages. The systems and methods generate and return an identifier associated with the intermediary as the location for an HLR 112 and a MSC such that the international caller routes the SMS message to the intermediary 100.