GSM Technology: Architecture, Security and Future Challenges
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 1
Abstract
GSM means Global System for mobile communication. GSM is generally utilized mobile correspondence framework on the planet. GSM framework was produced as an advanced framework utilizing time division multiple access (TDMA) method for correspondence reason. In this paper we have introduced a concise review of GSM system. GSM arrange otherwise called 2G network. The possibility of GSM was produced at Bell Laboratories in 1970. It is generally utilized portable correspondence framework on the planet. GSM is an open and advanced cell innovation utilized for transmitting versatile voice and information service works at the 850MHz, 900MHz, 1800MHz and 1900MHz frequency bands
Authors and Affiliations
Ihtesham ul Haq| Department of Computer Science, Bacha Khan University, Charsadda, KPK, Pakistan, Zia Ur Rahman| Department of Computer Science, Bacha Khan University, Charsadda, KPK, Pakistan, Shahid Ali| Department of Computer Science, Bacha Khan University, Charsadda, KPK, Pakistan, Engr. Muhammad Faisal| Department of Computer Science, Bacha Khan University, Charsadda, KPK, Pakistan
Thermal Analysis to Estimate Heat Transfer From Heat Sink By Forced Convection Through Open Enclosure
Heat Exchanger is a device used to exchange the heat energy between the two fluids by which increases the operating efficiency. These efficiencies plays a major role for cost effective Operations in the process indus...
Spyware prevention using graphical passwords
our future work will be based on Click-based graphical password schemes require a user to click on a set of points on one or more presented background images. With the Pass Points and to create users to a password by...
Key-Aggregate Model Search for Group Data Sharing Using PatientControlled Encryption In Cloud
Cloud storage has risen as a promising tackling an issue for giving universal, helpful, and onrequest gets to a lot of information shared over the Internet. Specifically, our plans give the main open key patient-contr...
Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services
The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general...
Dispensing Iptv Amenities Through Simulation By Enhancing Cloud Possessions
Prenent we are having virtual technologies these are failure on quality of services.The development of IPTV service delivery through cloud services is of temporary interest in many applications such as failure findi...