my passionContents 1 International Mobile Station Equipment Identity 1 1.1 IMEI and the law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Blacklists of stolen devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.3 Lawful interception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Structure of the IMEI and IMEISV (IMEI Software Version) . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 Check digit computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Usage on satellite phone networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.6 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 2 3 3GPP 5 2.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Organizational Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Market Representation Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.5 Specification groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.6 Standardization process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.7 Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.8 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.10 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 International Telecommunication Union 9 3.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2 ITU sectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.3 Legal framework of ITU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.4 Leadership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.5 Directors and Secretaries-General of ITU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.6 Membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.6.1 Regional groupings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 World Summit on the Information Society . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.7 i ii CONTENTS 3.8 World Conference on International Telecommunications 2012 (WCIT-12) . . . . . . . . . . . . . . 11 3.8.1 Changes to International Telecommunication Regulations . . . . . . . . . . . . . . . . . . 11 3.8.2 Proposed Changes to the Treaty And Concerns . . . . . . . . . . . . . . . . . . . . . . . . 11 3.8.3 WCIT-12 Conference Participation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.10 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3.11 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 H.331 15 4.1 15 3.9 4 5 ICANN 16 5.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 5.2 Notable events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 5.3 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5.3.1 Governmental Advisory Committee . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 5.3.2 Democratic input . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 5.4.1 Proposed elimination of public DNS whois . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 5.5.1 IBSA proposal (2011) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5.5.2 Montevideo Statement on the Future of Internet Cooperation (2013) . . . . . . . . . . . . 21 5.5.3 Global Multistakeholder Meeting on the Future of Internet Governance (2013) . . . . . . . 21 5.5.4 NetMundial Initiative (2014) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5.5.5 .sucks domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5.7 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5.8 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 5.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 5.4 5.5 6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . American Registry for Internet Numbers 26 6.1 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 6.1.1 Registration services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 6.1.2 Organization services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 6.1.3 Policy development services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Organizational structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 6.2.1 Board of trustees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 6.2.2 Advisory council . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 6.3 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 6.4 Service Region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 6.4.1 Former service regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 6.2 6.5 CONTENTS iii 6.6 28 7 8 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Latin America and Caribbean Network Information Centre 29 7.1 Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 7.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 7.3 LACNIC meetings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.4 Countries - LACNIC region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.5 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.5.1 Organisational . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.5.2 Executive Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.6 Membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 7.7 LACNIC cooperation agreements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 7.8 The Number Resource Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 7.9 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 7.10 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3G 33 8.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 8.1.1 Break-up of 3G systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Market penetration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 8.2 History 8.3 Adoption 8.3.1 9 8.4 Patents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 8.5 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 8.5.1 Data rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 8.5.2 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 8.5.3 Applications of 3G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 8.6 Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 8.7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 8.8 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 TD-SCDMA 38 9.1 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 9.2 Deployment and usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 9.3 Technical highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 9.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 9.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 9.6 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 9.7 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 10 TD-CDMA 41 10.1 Standardized implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 10.2 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 iv CONTENTS 11 Time division multiple access 42 11.1 TDMA characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 11.2 TDMA in mobile phone systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 11.2.1 2G systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 11.2.2 3G systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 11.3 TDMA in wired networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 11.4 Comparison with other multiple-access schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 11.5 Dynamic TDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 11.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 11.7 References 44 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Bluetooth 45 12.1 Name and logo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 12.2 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 12.2.1 Communication and connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 12.3 Uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 12.3.1 Bluetooth profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 12.3.2 List of applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 12.3.3 Bluetooth vs. Wi-Fi (IEEE 802.11) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 12.3.4 Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 12.4 Computer requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 12.4.1 Operating system implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 12.5 Specifications and features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 12.5.1 Bluetooth v1.0 and v1.0B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 12.5.2 Bluetooth v1.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 12.5.3 Bluetooth v1.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 12.5.4 Bluetooth v2.0 + EDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 12.5.5 Bluetooth v2.1 + EDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 12.5.6 Bluetooth v3.0 + HS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 12.5.7 Bluetooth v4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 12.5.8 Bluetooth v4.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 12.5.9 Bluetooth v4.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 12.6 Technical information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 12.6.1 Bluetooth protocol stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 12.6.2 Baseband error correction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 12.6.3 Setting up connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 12.6.4 Pairing and bonding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 12.6.5 Air interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 12.7 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 12.7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 12.7.2 Bluejacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 12.7.3 History of security concerns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 CONTENTS 12.7.4 Mitigation v . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 12.8 Health concerns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 12.9 Interference caused by USB 3.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 12.10Bluetooth award programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 12.11See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 12.12References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 12.13External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 13 IEEE 802.16 61 13.1 Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 13.1.1 Projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 13.2 802.16e-2005 Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 13.2.1 PHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 13.2.2 MAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 13.3 Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 13.4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 13.5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 13.6 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 14 Wireless broadband 63 14.1 The term broadband . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 14.2 Technology and speeds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 14.3 Development of Wireless Broadband in the United States . . . . . . . . . . . . . . . . . . . . . . . 64 14.3.1 Residential Wireless Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 14.3.2 Business Wireless Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 14.3.3 Demand for spectrum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 14.4 Mobile wireless broadband . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 14.5 Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 14.6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 14.7 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 14.8 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 15 IEEE 802 66 15.1 Working groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 15.2 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 15.3 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 15.4 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 16 Media access control 67 16.1 Functions performed in the MAC sublayer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 16.2 Addressing mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 16.3 Channel access control mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 16.4 Common multiple access protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 17. . . . . 17 Logical link control 69 17. . . . . . . . . . . . . . . . . . . . . . .4 PPP and modems . . . . . . . . . . . . . 73 19. . . . 78 21. . . . . . . . . 70 17. . . 73 19. . . . . . . . . . . . .2 All-IP architecture . . . . . . . . . 19 Ubiquiti Networks 73 19. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 and LAPB . . . . . . . . . . . . . . . . . . . . . .1. . .3 See also . . . . . . . . . . . . .5 See also . . . . . . . 70 18 HiperLAN 71 18. . . . . . . . . . . . . . . . . . . . .2. . . . . . . . 74 19. . . . . . . . . . . . . . . . 76 20. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 20 Evolved HSPA 75 20. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 References . . . . . . . . . . . . . 76 20. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 20. . . . . . . . . . . 69 17. . . . . . . . . . . . . . . . . . . . . . .3 Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 21. . . . . . . . . 69 17. . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 20.2. . . . . .4 See also . . . . . . .6 References . . . . .3 Failure in the Market . . . . . . . .1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5. . . 70 17. . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . .2 Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 18. . . . . . . . . . . . 68 16.2 Local area network (LAN) and metropolitan area network (MAN) protocols . . . . . . . . . . . . . . . . . . . . . . . .4 Software . . . . . . . . . . . . . . . . . . 69 17. . . . . . . . . . . . . . . . . . . . . . . 71 18. . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . .4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Speeds . . . . . . . . . . . 74 19. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Security . . . . . . . . . 77 21. . . . .5 Cellular systems . . . . . . . . . . . . . . . . . . . . . . .6 References 68 . . . . . . . . . . . . . .1 Rationale for W-CDMA . . . . . . . .3 HDLC . . . . . . . . . . . . . .2. . . . . . . . . . . . . . .6 External links . . .1 Operation . .2 HiperLAN/2 . . . . . . . . . . . 70 17. . . . . . . . . . . . . . . . . . . . . . .3 See also . . . . . . . 70 17. . . . . . . . . . . 76 20. . . . . . . . . . . . . . . .6 Power lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 HiperLAN/1 . . .3 Stock market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Voice over IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 References 72 . . . . .2 Application examples . . . . 71 18. . . . . . . . . . . . . . . . . . . 78 . . . . . . . . . . . . . . . . 72 18. . . . . . . . . . . . . . . . . .1 Accusations Regarding Crooks Utilizing Hacked AirOS Routers for Cybercrime . . . . . . . . . . . . . . . . . . . .1 X. . . . . . . . . . . 74 19. 76 21 W-CDMA (UMTS) 77 21. . . . . . . . . . 74 19. . . . . . . . . . . . . . . . . . . . . .vi CONTENTS 16. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . 89 25. . . . . .1 Introduction . . . . . . . . . . . . . 80 23. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 23. . . . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 24. . . . . . . . . . . . . .4 References . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . 91 . . . . . . . . . 80 23. 81 23. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11External links . . . . .6 Differential phase-shift keying (DPSK) . . . . . . . . . . . . . 86 25. . . . . . . . . . . . . . . .3 Variants . . . . . . . 87 25. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . .1 Transmission techniques . . . . . .3 Evolved EDGE . . . . . . . . . . . . . . . . . . . . 82 24 Enhanced Data Rates for GSM Evolution 83 24. .4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. . . . . . . . . . . . . 87 25. . . . . . . . . . . . . . . .4 References . . . . . . . . . . . . . . . . . . 87 25. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Bit error rate .4 Evolved High Speed Packet Access (HSPA+) . . . . . . . . . . . . . . . . . . .5. . . . . . . . . . . . .3. . . . . . . . .2 Applications . . 91 25. . . . . . . . . . .2 EDGE modulation and coding scheme (MCS) . . . . . . . . . . . .3 High Speed Uplink Packet Access (HSUPA) . . . . .2 Bit error rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 24. 82 23. . . . . . . .1. . . . . 84 24. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Multi-carrier HSPA (MC-HSPA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Bit error rate . .6 Dual-carrier HSUPA (DC-HSUPA) . . . . . . . . . . . . . . . . .3. . . . . 84 24. . . . . . .2 Networks . . . . .5 External links . . . . . . . . . . . . . . . . . 78 22 3. . .1. . . . . . . . . . . .3 Binary phase-shift keying (BPSK) . . . . . . . . . . 84 24. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Dual-carrier HSDPA (DC-HSDPA) . . . . . . . . . . . . . . . . .5G 79 22. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 25. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 25 Phase-shift keying 85 25. . . . . . . . . . . . . . . . . . . 87 25. . . . . . 82 23. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 21. . . . . . . . . . . . . . . . . . . . . . .10Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . 23 High Speed Packet Access 79 80 23. . . . . .1 Implementation . . . . . . . . . . . . . . . 85 25. . . . . 88 25. . . . . . . . .9 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 24. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Higher-order PSK . . . . . . 84 24. . . . . . . . . . . . . . 86 25. . . . . . . . .1 Technology . . . . . . . . . . . . . . .CONTENTS vii 21. . . . . . . . . . . . . . . . . . . . . . . . . .1 Definitions . . . . . . . 81 23. . . . . . . . . . . . . . . . . . 81 23. . 81 23. . . . . . . . .1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 23. 85 25. . . . . . . .8 See also . . . . . . . . . . . .3 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Implementation . . . . . . . . . . . . . . . . . .4 Quadrature phase-shift keying (QPSK) . . . . . . .2 High Speed Downlink Packet Access (HSDPA) . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . . . . . . . . . 105 30 Digital Enhanced Cordless Telecommunications 106 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 28. 96 26. . . . . . 26. . .1. . .2 Channel encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 References . . . . . . . . . . . . . . 100 28. . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 System spectral efficiency or area spectral efficiency . . . . . . . . . . . . .8 See also . . . . 100 28. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 25. . . . . . . . . . . 102 28. . .1 Mathematical representation . . . . . . . .1 Services offered 99 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 25. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Demodulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Addressing . . . . .6. . . . . 104 29. . 102 28. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 25. . . . . .viii CONTENTS 25. . . . . . . . . . . . . . . . . . . .2 Coding schemes and speeds . . . . . . . . . . .1 Interpretation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Differential encoding . . . . . . . . . 95 26. . . . . . . . . . . . . .2. . .1. . . . . . . . . . . . . . . . . . . . . . 94 25. . . . . . . . . . . . . .3 Example: Differentially encoded BPSK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 29. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 26. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 27 Constellation diagram 97 27. . . . 101 28. . 105 29. . . . . . . . . . . . . . . . . . . . . 97 27. . . . . 99 28. . . . . . . . . . . . . . .9 Notes . . . . . . . . . . 105 29. . . . .4 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 28. . . . . . . . .3 See also . .4 History of GPRS . . . . . . . . 100 28. . . . . . . . . . . . . . . . . . . . . . . . . . . 98 28 General Packet Radio Service 99 28. . . . . . . . . . . . . .1. .2 See also . . . .5 References . . . .1 Technical overview . . .2 Gaussian minimum-shift keying 95 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1. . . . . . 28. . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Protocols supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Multiple access schemes . . . . . . 101 28. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 26 Minimum-shift keying 95 26. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Usability . . . . . . . . . . . . . . 100 28. . . 93 25. . . . . . . . . . . . . . . . . . . . . .10References . . . . . . . . . . . . . .3 Comparison table . . . . . .6. . . . . . . . . . . . . . . . . . . . 102 29 Spectral efficiency 103 29. . . . . . . . . . . . . . . . . . . . . . . . 100 28. . .7 Channel capacity .6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 25. . . . . .4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . .1 Link spectral efficiency . . . . .3 Multislot Class . . . . .6 References . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . .13External links . . . . .1 WiMAX Forum . . . . . . . . . . . . . . . . . . . . .7 Spectral efficiency and Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 30. . . . . . . .1 Gateways . . 117 31. . . . . . . . . . . . 113 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Mobile phones . . . . . 108 30. . . . . .2 Uses . . .4. . . . . . . . . . . . . . . . . .2 Security . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . .2 Physical layer . . . . . 113 31. . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . . .9 Health and safety . . . . . .11References . . . . . . . . . . . . . . . . . .6. 116 31. . . . . . . . . . . . . . . . . . . . .5 Standards history . . . . . . . . . . . . . . . . . . . . . . .3. . . . . . . . .2. . . 118 . . . . . . . . . . . . . . . 107 30. . . . . 108 30. . . .3 Media access control layer . . . . . . . . . . . . . . . . . . . . . 113 31. 110 30.7 DECT for data networks . . . . . . . . . .6 Associations . . . . . . . . .10 Comparison . . . . . . . . . .1 Internet access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 DECT ULE . . . . . . . . . . 109 30. . . .2 WiMAX Spectrum Owners Alliance . . .4 Specifications . . . . . . . . . . . . . . . . .3. . . . . . . . 110 30. . . . . . . . . . . . . . 114 31. . . . . . .6.1 Application . . . .0 . . . . . . . . . . . 114 31. . . 108 30. .10See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Spectrum allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . . . . . . 115 31. . . . . . . . . . . . . . . . 111 30. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 VoIP/IP-DECT . . . . . . . 112 31. . . . . . . . . . . . . . . . . . . . . . 113 31. . . . . . . . . . . . . . . . .5 Conformance testing . . . . . .3. . .5 Integration with an IP-based network . . . . . . 114 31. . . . . . .16 Standard . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Middle-mile backhaul to fiber networks . 110 30. . . . . . . . . . . . . . . . . . . . . . . . . . . 115 31. . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . 117 31. . . . . . . . .3 Connecting . .6. . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 31 WiMAX 112 31. . . . . . . . . . . . 117 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . 116 31. . . . . . . . . . 115 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . .4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 31. . . . . . . . . . 111 30. . . . . . . . . . . . . . . . . . . .1 Radio links . . . . . . . . . . .4 Technical information . . . . . . . . .3 Triple-play . . . .6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Technical properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 31. . . . . . . . . . . . . . . . . . . . . .2 DECT 6.7.12Further reading . . . . . . . . . . . . . 118 31. . . . . . . . . .8 Inherent limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 31. . . . . 110 30. . . . . . . . . . 108 30. . . . . . . . . . .CONTENTS ix 30. . . . . . . . . . . . . . 107 30. . . . . . . .1 Terminology . . . . . . . . . . . . . . . . . . . . . . 106 30. . . . . .2. . . . . . . . . . . . . . . . . . . . . . .9 Silicon implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 31. . . . . . . . . . . . . . .1 The IEEE 802. . . . . . . . . 114 31. . . . . . . . . . . 114 31. . . . .2 External modems . . . . . . . . . . . . . . . . . . .4. . . . . .8 XDECT R . . . . .6 Technical features . . . . . . . . 121 31. . . . . . . . . . . . . . . . . . . . . . .4 Research . . . . . . . . . . . . . . 122 32. . . . . . . . . 133 34. . 130 33. . . . . . . . . . . . 123 32. . . . . . . . .8 Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Utilities . . . . . . . . . . . . . . . . . . . . . . . . 129 33. . . . . .7 Manufacturers and commercial uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 32. . . . . . . . . 119 31. . . . . . . . . . . 119 31. . . . . . . . . . . . .1 Capacity .10External links . . . . . . . . . . . . . .2 LED enhancements . . . . . . . . . . . . . . . . . . . . . .1 Military utilities . .2. . . . . . . . . . . . . . . .14External links . . . . . . . 131 33. . . . . . . . . . . . . . . .3 Eye . . . . . . . . . . . . . . . . . . . .9 References . . . . . . . . . . . . . . .13References . . . . . . . . . . . . . . . .1 2G technologies . . . . . . . . . . . . . . . . . . . . . . . .7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Capacities. . . . . . .1 Mechanics 129 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . advantages. . . . . . . . . . . . . . . . . . . . 118 31. . . . .4 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Harmonization . . . . . 131 33. . . . . . . . . . . . 134 . . . . . . . . . . . . . . . . . . . . . . . . . .2 Debate . . . . . . . . . . . . . . . . . . . . 133 34. . . . . and disadvantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 32. .6 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6. . . . . . .5 History . . . . . . . . . . . . . . . . . . . . . .2 Disadvantages . . . . . . 131 33. . .1 Safety . . . . . . . . . . . . . . . . . . . . . .5. .5. . . . . . . . . . . . . . . .7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Background . . . .8 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . .11See also . . 126 32. . . . . . . . . . . . . . . . . 130 33. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12Notes . . . . . . . . . . . .3 Telecommunications Industry Association . . . . . . . . . . . . . . . . . . . . . . . . .10Deployments . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 34. . . . . . . 126 32. . . . . . . . .x CONTENTS 31. . . . . . . . .2 Comparison to LCDs and other display devices . . . . . . . . . . . . . . . . . . 120 31. . . . . . . . . . . 131 33. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 33. 121 32 5G 122 32. . . . . . . . . . . . .2 Comparison with other mobile Internet standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Research & Development projects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Interference . . . . . . . . . . . . . . . . 118 31. . . . . . .7 References . . . . . . . . . . . . . . . . . . . . . . . . 131 33. . . . . . . . . . . . . . . . . .7 Competing technologies . .6. . . . . . . . . . . . . . . . . . . . . . . . . . . 128 33 Virtual retinal display 33. . . . . . . . . . . . . . . . . . 119 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8 See also . . . . . . . . . . . . . . . . . . . . . . . . . 132 34 2G 133 34. . . . .5 Advantages . . . . . . . 130 33. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 32. . . . . . . . . . . . . 131 33. . . . . . 118 31. . . . . . . . 131 33. . . . . . . . . . . . . . . . . . 119 31. . . . . . . . . . . . . . . . 118 31. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Evolution . . . . .1 Enhanced voice quality . . . . . 135 35 LTE (telecommunication) 136 35. . . . . . . . . . . . . . . . . . . . . . . . . 147 36. . . . . . . . 146 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9 Further reading . . . . . . . . . . . . . . . . . . . . . .2 Features . . . . 147 36.3. . . . . . . . . . . . 134 34.1 White papers and other technical information . . . . . . . . . . . . . . . 147 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 34. . . . . . . . . . . . . . . . . . . . . . . . . 139 35. . . . . . . . . . . . . . . . . . . . . .4 United States . . . . . . . . . . . . . . . . . . . . . . .2 Canada . . . . . . . . . . . . . . . 148 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Voice calls . . . . . 134 34. . . . 138 35. . . . . . . . . . . . . . . .7 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Technical understanding . .6 References . . . .4. . . . . . . . . . . . . . .4 System standards . . . . . . . . . . . . . . . . . . . . . . . . . 139 35. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6. . . . . . . . . . . . . . . . . . . . . .3 Advantage . . . . . . . . . . . . . . .10. . 145 36. . . . . . . . . . . . . . . . . . .7 History of 4G and pre-4G technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Singapore . . . . .5 Open-wireless Architecture and Software-defined radio (SDR) . . . . . . . . . . . . . . . . . . . . . . . 146 36. . . . . . . . .3. .2 Forerunner versions . . . . . 142 36 4G 143 36. .2 2. . . . . . . . . . . . . . . . . 135 34. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 2G Shut Down . . . . . . . . . . . .2 Multiplexing and access schemes . 134 34. . . . . . . . . . . . . . . . . 138 35. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Patents . . . . . . . . . 134 34. . . . . . . . . . . . . . . . . . . . . 143 36. . . . . . . . .1 IMT-2000 compliant 4G standards . . . . . . . . .8 References .5 See also . . . . . . . . . . . . . . . . . . . . . 146 36. . . 144 36. . . . . . . . . . . . . . . . . . .4 Frequency bands . . 134 34. . . . 143 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 35. . . . . . . . . . . . . . . . . . . . . .6. . . . . . . . . . 145 36. . . . .4. . . . . . 144 36. . .6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6. . . . .3. . . . . . . . . . . . . . . 139 35. . . . . . . .CONTENTS xi 34. 139 35. . . . .75G (EDGE) . . . . . . . . . . . . . . . 134 34. . . . . . .4. . . . . . . 147 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Key features . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . . . .6 Principal technologies in all candidate systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Data rate comparison . . . . . . . .4. . . . . . . . . . .3 IMT-Advanced requirements . . . . . . . . . . .1 2. . . . . . . . . . . .1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Discontinued candidate systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 34.10External links . . . . . . . . . . . . . . .2 Background . . .5G (GPRS) . . . 140 35. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Australia . . . . . . . .2. 142 35. . . . . . . . . . . .4.4 Advanced antenna systems . . . . . . . . . . . . . . . 139 35. . . . . . . . . . . . . . . . . . . . . . 148 . . . . . . . . . . . . . . . . . . .3 IPv6 support . . . . . . . . 134 34. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 35.6 Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Security aspects of early IMS and non-3GPP systems . . . . . . . . . . . 175 38. . . . . . . . .5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 37.8 Beyond 4G research . . . . . . . . . . . .2. . . . . . . . . . . . .2.3 1X Advanced . . . . . . . . . . . . . . . . . . . . . . .3 Session handling . . . . . . . . . . . . . . . . . . . . . . . . . . .xii CONTENTS 36. . . . . . . .3. . . 171 37. . . . . . . . . . . . . . .5 External links . . . . . . . . . . . . . . . . . . . . . . . .1 Service layer in IMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 39. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . .5 History . . . . . . . . . . . . . . 166 37. . . . . . . . . . . . . . .2. . . . . . . . . .7 External links . . . . . . 177 39. . . . . . 175 38. .7. . . . . . . . . . . . . . . . . . 175 38. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 37. . . . . . . . . . . . . . . . 166 37. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 38. . . . . . . . . . . . . . . . . . . . . . .2 Protocol details . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Interfaces description . . . . 172 38 IS-95 173 38. . . . . . .8 Books . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 39. . . . . . . . . . . . . . . . . . . . 175 39 CDMA2000 176 39. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 37. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 37. . . . . 165 37. . . 171 37. . . . . . . . . . . . 164 37 IP Multimedia Subsystem 165 37. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 39. . . . . . . . . . . . . . . . . . . . . . .9 See also . . . . . .2 Architecture . . . . . . . . . . . . . . . . 171 37. . . . . .3 See also . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 References . . . . . . . . . . . . . . . . . 174 38. . . . . . . . . . . . . . . 150 36. . . . . . .1 History . . . . . . . . . . . . . . . 170 37. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Charging . . . . . . . . . . . . .4 Networks . . . . . . . .10References . . . . . . . . . 177 39. . . . . . . . . . . . . . . . 170 37. . .1 Deployment plans .2 Core network . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 38. . . . . . . . . . . . . . . . . 170 37. . . . . .1 Protocol revisions . . . 157 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 37. . . . . . . . . 177 40 Service layer 178 40. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . 176 39. . .4 References . . . . . . . . . . . . . . .11External links . . . . . . . . . . . . . . . .2 1xEV-DO . . . . . . . . . . . . .1 Access network . . . . 178 . 158 36. . . . . . . . . . . . . . . . . . . .3 NGN interconnection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Initial filter criteria . . . . . . . . . . . . . . . . . . . . . . . .1 Physical layer . . . . . . . . . . . . . . . . . . . . . 158 36. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 External links . . . . . . . . . . . . . . . . . . . . . . . . . .2 Layer 2 .5 IMS-Based PES Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 External links . . . . . . . . . . . . . . . . . . . . . . .2 SIP Application Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Voice all calls . . . . . .6 References . . . . . . . . . . . . . . . . . . . . . . 178 40. . . . . . . . .1 References . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 43. 186 44 Universal Mobile Telecommunications System 188 44. . . . . . . . . . .2 Service layer in SOA . . . . . . . . . . . . . . . . . . . .4 Standard specifications . . . . . . . . . . . . . . . . . . . . . .1 Accessing a GSM network . . . . . . . . . . . . . . . . . .1. . . . . . . . . . . . . . . 180 41. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Relation to other standards bodies 41. . . . . . . . . . . . . . . . . . . . . . 183 43. . . . . . . . . . . . . 180 . . . . . . . . . . . . . . . . 178 40. . . . .3. 178 40. . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 43. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 How speech is encoded during mobile phone calls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 43. . . . .3 Voice charges . 178 40. . . . . . . . . . . . . . . . . . .2 Technology . . . . 182 43 GSM services 183 43. . . .1 Elements of the IMS service layer . . . . . . . . . 189 44. . . 181 42 Telecoms & Internet converged Services & Protocols for Advanced Networks 182 42. . . . . . . . . . . . . . . . . . . .2 Radio access network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Data transmission . . . . . . . . . . . . . . . .1. . . .1. . . 186 43. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . 181 41. . . . . . . . . . . . . . . . . .3. . . . . . . . . . . . . . . . 185 43. . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Supplementary Services . . . . . . . . . . 186 43. . . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 44. . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . .3 Core network . . . . . . . . . . . . . . . . . . . . . . . . .1 Air interfaces . . . . . . . . . . . . . . . . . . .1 Principles . . 178 40. . . . . . . . . . . 190 . .4 See also . . . . . . .2. . . . . . . . . . 179 41 Open Mobile Alliance 180 41. . . . . . . . . . . . . .3 References . . . . . . . . . . . . . . . . . . . . . . .1 All Outgoing . . . . . . . . . . .1 Circuit-switched data protocols . . . . . . . . . . . . . . . . . . .CONTENTS xiii 40. . . . . . . . 188 44. . . . . . . . . . . . . . . . . . . . . . . .7 External links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 41. . . . . . . . . . . . . . . . . . . . . . . . .2 External links . . . . . . . . . . . . . . . . . . . . . . .3 Spectrum allocation . 182 42. . . . . . . . . . . . . 184 43. . . . . . . 190 44. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 43.2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 41. . . . . . . .3 OSA Service Capability Server . . . . . 178 40. . . . . . . 186 43. . . . . . . . . . . . . . . . . . . . . . . . . 186 43. . . . . . . . . . . . . . . . . . .1 Features . . . . . . . . . . . . . . . .2 Incoming calls .2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 43. . . . . . 189 44. . . . . . . . . . . 180 41. . . . . . . . . . . . . . . .3. . . . . . .3 Short Message Service (SMS) . . . . . . . . . . . . . .5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . .2 General Packet Radio Service (GPRS) . .4 IM-SSF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 References . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Problems and issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Bibliography . . . . . . . . 197 45. 195 44. . . . . . . . . . . . . . . .11References . . . . . . . . .2 Countries with bans or restrictions on use of satellite phones . . . . . . . . . . . . . . . . . . .5 Other competing standards . . . . . . . . . . . . . . . . . . . . . . . . 201 . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 44. . . . . .10Notes . . . . . . . . . . . . . . . . . . . . . . . .7 External links . . . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Release 6 . . . . . . . . . . . . . . . . . . . . . . 199 46. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Release 9 . . . . . . . . . . . 200 46. . . . . . . . . . . . . . . . . . . . .2 Release 4 . . . . . . . . . . . . . 196 45.2 Operating frequencies . . . . . . 196 45. . . . . 192 44. . . . . . . . . . . . . . . . . .6 Migrating from GSM/GPRS to UMTS . . . . . . . 197 45. . . . . . . . . .4 One-way services . . . . . . . . . . . . . . . . .8 Releases . . . . . . . . . . . . . . .1 Handsets and modems . . . . . 194 44. . . . . . . . . . .9 See also . . . . . . . . . . . . . . . . . . .3 Security concerns . .3 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8. . . . . . . . . . . . . 195 44. . . . . . . . . . . . . . . . . . 194 44. . . . . . . . . . . . . . . . . . . . . 194 44. . . . . . . . . . . . . . . . . . 200 46. . . . . .8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 46. . . . 200 46. . . . . . . . . . . . . . 193 44. . . . . . . . . . . . . . . . . .8. . . . . . . . . . . . . . . . . .1 Release '99 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 45. 195 45 iDEN 196 45. . . . . . . . . . . . . . . . . . .5 Release 7 . . . . . . . . . . . . . . . .6 Virtual country codes . . . . . . . . . . . . . . . .8. . . 194 44. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 46. . . . . . . 193 44. . . . . . . . . . 193 44. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 44. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Release 5 . . . . . . . . . . . . . . . . . . . 191 44. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 44. . . . . . . . 198 46. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 44. . . . . . . . . . . . . . . . . . . . . . . .xiv CONTENTS 44. . . . . . . . . . . . . .1 Citations . . . . . . . .5 Cost of a satellite phone . . . . . . . . . . . . . . . . . .4 Operators . . . . . . . . . . . . . . 195 44. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Low Earth orbit . .4. .7. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 iDEN network operators . . . . . . . . . 197 46 Satellite phone 198 46. .5 See also . . . . . . . . . . . . . .1 Geosynchronous satellites . . . . . . . . . . . . . . . . . . . . . . . . 201 46.1 Satellite phone network . . . . . . . . . 197 45. . . . . . .8 Use in disaster response . . . . . . . . . . . . . . . . . . . . 198 46. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . .12External links . . . . . 197 45. . . 193 44. . .6 Release 8 . . . . . . . . . . . . . . . . .1 Security issues . . . . . . . . . . . . . . . . . . . . . . . . 193 44. . . . . . . .8. . . . . . . . . . .1. . . . 191 44. . . . . . . . . . . . . . . . . .11. . . . . . .4 Interoperability and global roaming . . . . . . . . . . . . . . . . . . . . . .8. . . . . . .7 Calling cost . . . . .8. . . . . . . . . . . . . . . 209 47.7. . . . . . . . . . . . . .6. . . . . . . . . . . . . . . . . . . . . . . .2 By manufacturer . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Display . . . .1 Early years . . . 210 47. . . . . . . . . . . . . . . . . . . . .3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 BlackBerry . . . . . . . .1. . . . . . . . . . . . . . . .2 Social . . . . . . . .6 Sailfish OS . . . . . . . . . . . . . .2 Forerunner .7 Tizen . . . . . . . . . . . . . . . . . 208 47. 204 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Mass adoption . . .1. . . . . . . . 204 47. . .3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. 202 47 Smartphone 203 47.1. . . .1 History . . . . . .4 Medical . . . .3 Bada . . .1 Android . . . . . . . . .2. . . . . . . . 209 47. . . . . . . . . . 206 47. . . . . . . . . . . . .7 Issues .10References . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Symbian . . . . .CONTENTS xv 46. . . . . . . . 201 46. . .2. . . . . . . . . 209 47. 208 47. . . . . . . . . . . . . . . . . . . . 211 . . . . . . 208 47. . .4 Palm OS . .3. . . . . . . . . . . . . . . . . . . . . . . . . . . 209 47.1 Smartphone usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6. . . . 205 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 47. . . . . . . . . . . .9 See also . . . . . . . . . . . . .3 By operating system . . . . . . . . . 207 47. . . . .6 Market share . . . . . . . . . 210 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 47. . 201 46. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7. . . . . . . 209 47. . 211 47. . . . . 206 47. . . .2.3. . . . . . . . 203 47. . . .7. . .7 Future possible developments . . . . . . . .1. . . . . . . . .8 Ubuntu Touch . . . .7. 208 47. . . . . 206 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Legal . . . . . . 210 47. . .2. . . . . . . . . . . . . . . .8 Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 47. . . . . . . . . . . . . . . . . . . . . . . . . 210 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 47. . . . . . . . . . .6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11External links . . . . . . . . . . . . . . . . . . . . .7. . . . . . . . . . . . . . . . . 210 47. . . . . . . . . . . .6 Sleep . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 47. . . . .1. . . . . . . . . . . . . .2 Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 47. .5 Security . . . . . 211 47. . . . . . . . . . .1. . . . . . . .2 iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 webOS . . . . . . . . . . . .1. . . . . . . .2 Mobile operating systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 47. . . . . . . . . . . . . . . . . .3 Discontinued mobile operating systems . . . 208 47. . . . . .4 Application stores . . . . . . . . . . .3.3 PDAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Recent technological developments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 47. . . . . . . .7. . 210 47. . . . .5 Firefox OS . . . . . . . . 211 47. . . . . . . . . . . . . . . . . . . 208 47. . . . . . . . . . .1 Battery life . . . . . . . . . . . . . . . . . . .3 Windows Phone .5 Android and iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 48. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. . . . . . . . . . . . 225 49. . . . . 218 48. . . . . . . . 225 49. . . 217 48. . . . . . . . . .12External links . . . . . . . . . . . . . . . . . . . . . . . . . . 217 48. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. . . . . . . . . . . . . . . .4. . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . .5 Embedded-SIM / Embedded Universal Integrated Circuit Card (eUICC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. . . . . . . . . . . . . . . . . . . . . .10See also . . . . . . . . 211 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10See also . . . 219 48. . . . . .2 IMSI analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 49. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 History . . .9 Other terms . 222 48. . . . . . . . . . . . . . . . . . . . . . . . . . . 211 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. .5 References . . . . . . . . . . . . . . . . . . . . 217 48. . . . . . . . . . 225 49. . . . . .8 SIM and carriers . . . . . . . . . . . . . . . . . . . . . . . . . 220 48. . . . . . . . . . . . .12External links . . . . . . . . . .2 Mini-SIM . . . .4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 48. . . 220 48. . . . . . . . . . . . . . . . . . . . . . . .xvi CONTENTS 47. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4. . . . . . . . .3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 ICCID . . . . . . . . . . . . . . . . . . . .1 Full-size SIM . .3.3 Data . . . . . . . . . . . . . . . . . . 225 49. . . . . . . . . . 218 48. . . . . . . . . . . . . . . . . . . . . . . .1 Verification of the check digit . .5 Security . . . . . . . . . . .6 External links . . . . . . . .3. . . . . . . 227 . . . 215 48 Subscriber identity module 216 48. . . . . . . . . . . . . . . . 217 48. . . . .1 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Location area identity . . . . . . . . .2 Calculation of the check digit . . . . . . . . . . . . .4 Formats . . . . .7 Usage in mobile phone standards . . . . . . . . . . . . . . . . . . . . . . . . .4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 48. . . . . . . . .4. . . . . . . . . . . . . . . . . . .9 Multiple-SIM devices . . . . . . . . . . . . 222 48. . . . . . . . .11References . . . . . . . . . . . . . . . . . . . .2 International mobile subscriber identity (IMSI) . . . . . . 225 49.5 SMS messages and contacts . . . . . . . . . . . . 221 48. . . . . . . . 223 49 Luhn algorithm 224 49. 222 48. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 48. . . . . . .2 Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Implementation of standard Mod 10 . . 225 49. . . . . . . . . . . 225 50 International mobile subscriber identity 227 50. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Nano-SIM . . . . . . . . . . . . 211 47. . . . . 221 48. . . . . . . . . . . .2 Strengths and weaknesses . . . . . . . . 219 48. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Examples of IMSI numeric presentation . . . . . . . . . . . . . . . . .3 Authentication key (Kᵢ) . . . . .6 Developments . . . 218 48. 220 48. . . . . . . . . . 227 50. . . . . . . . . . . . .3 Micro-SIM . . . . . 229 51. .2. . . . . . . . . . . . . . . . . .2. . . .3 Home Network Identity . 236 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 51 Mobile equipment identifier 229 51. . . . . . . . .17 Honduras . . . . . . . . . . . . . . . . .1. . . . . . . . . . . . .10 Croatia . . . . . . . . .2. . . . . . . . . . . . . . . . . . .8 Colombia . .1 Economics . . . . . . .5 References . . . . . . . . . . . .3 Australia . . . . . . . . . . . . . . . . . . . . . . . . . 234 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Laws and practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 52. . . . . . . . . . . .2. . . . . . 230 52 SIM lock 231 52. 233 52. . . . . . . . .2. . . . . . . . . . . . . . .16 Germany . . . . . . . . . . . . . . . . . . . . . . .5 References . . . . . . . . . . . 235 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19 India . . . . . . 232 52. . . . . 233 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 52. . . . . . . . . . . . . . . 235 52. .2. . . . .2. . . . . . . . . . .21 Italy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Belgium . 227 50.18 Hong Kong . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . 230 51. . . . . . . . . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 52. . . . . . . . . . . . . . 236 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 pESN conflicts . . . . . . . . . . 235 52. . . . . . . . . .20 Israel . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 50. .6 External links . . . . . . . . . . 230 51. . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . .2. . . . . . . .CONTENTS xvii 50. . . . . . . . .2 Example inside World Area 1 (North America) . . . . .1 Unlocking technology . . .2. . . . . .5 Brazil . . . . . . . . . . . . . . . . . . . .2 Display formats . . . . . . . . . . . 236 52. . . 228 50. . . . . . . . . . . . .1 Example of outside World Area 1 . . . .7 China . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Box breaking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 51. . . . . . . . . . . . . . . 228 50. . . . . . . .4 Code to convert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Andorra . . . . . . . . . . . . . 229 51. . . . . . . . . . . . . . . . . . . . . . 234 52. . . . 234 52. . . . . . . . . . . . . . . . . . . .2.2. . . .15 France . . . . . . . . . . 235 52. . . . . . . . . . . . .1 Administration . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . .2. . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . 235 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 Ecuador . . . . . . . . . . . . . . . . . . . . 234 52. . . . . 232 52. . . .11 Denmark . . . . . . .9 Chile . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . 228 50. .6 Canada . . . .3 Unlocking services .2. . . . . . . . . . . . . . 231 52. . . . . . . . . . . . . . . . .14 Finland . . . . . . . . .2 Austria . . . . . . . . . . . . . .1. . . . . . . . . . . . . . . 234 52. . . . . . . . . . . . . . . . . . . . . . . . .4 See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . 235 52. . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 52. . . . . . . . . . . . . 234 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 European Union . . . . . . .6 External links . . . . . . . . . . 234 52. . . . . .2. . . . . . . . 247 53. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5. . . . . . . . . . .2. . . . . . . . . 237 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . 237 52. . . . . . . . . . . . . . .2. . . . . . .13External links . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . .11References . . . . . . . . . . . . . .5 Use of mobile phones . . . . . . . . . . . . .30 Sweden . . . . . . . . . . . . . . . . . . . .26 Portugal . . . . . . . . . . . . . . . . . . 236 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 52. 242 53.5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 References 53 Mobile phone 53. . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 History . . . . . . . . 242 53. . . . . . . . . . . . . . . . . . . . . 237 52. . . . . . . . . . . . . . . . . . . . . 242 53. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25 Peru . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Sound quality . . . . . . . . . . . . . . . .2. . .8 Environmental impact . . .5. . . . . . . . . . . . . . . . 238 240 . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . .2. . . . . . . . .12Further reading . . . . . . . . . . . . . . . . 237 52. . . .5. . . . . . 244 53. . . .2 Smartphones . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 Mobile phone operators . . . . . . . . . . .7 Thefts . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 Kosher phones . . . . . . . . . . . . . . . . . 244 53. . . . . . . . . . . . . . . . . . . . . . . .5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 Text messaging . . . . . .27 Romania . 244 53. . . . . . . . . . . . . . . 247 53. . . . . . . . . . . . . . . . . . . . 236 52. . . . . . . . . . . 245 53. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 53. . . . . . . . . . . . . .3 For distributing content . . . . . . . . . . . . .5. . . . . . 243 53.9 Conflict minerals . . .6 Health effects . . . . . . . . . . . . .5 Mobile banking and payments . . . . 240 53. . . . . . . . . . . . . . . . . . . . . 245 53. . . . . . . 246 53. .2. . . . . . . . . . . .4 Manufacturers . . 247 53. . . .xviii CONTENTS 52. . . . . . . . . . . . . . . . . . . . . .29 Spain . . . . . . . . . . . 247 53. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . .22 Netherlands . . . .28 Singapore . . . . . .3 SIM card . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 . . . . . . . . . 236 52. . . . . . . . . . . . . . . . 242 53. . . . . . . . . 237 52. . . . . . 246 53. . . . . . . . . . . . . . . . . . . . . 249 53. . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 New Zealand . . . . . . . . . . . 243 53. . . 250 . . . . . .5. . . . . . . . . . . . . . . . . . . . . . . . . .3 See also . . . . . . . . . . . . . . . . . 242 53. . . . .2. . . . . . . . . . . . . . .4 Multi-card hybrid phones . . . . . . . . . . 237 52. . . 238 52. . . .2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 Future evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Tracking and privacy . . . . . . . . .32 United Kingdom . . . . . . . . . . . . . . . . . . . . . . . . .33 United States . . . . .1 In general . . . . . . . .31 Thailand . . . . . . . . . . . . . . . . 243 53. . . . . . . . . . . . . . . . . . . . . . .4 While driving . . .2. . . . 246 53. . . . . 245 53. . . . . . . . . . . . . 236 52. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2. . . . . . . . . . . . . . . . . . . . . . .24 Pakistan 52. . . . . . . . 259 56. . . . . . . . . . . . . . . . . . . . . . . 255 55. . . . . . 251 54. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. .1 Mobile device’s OS support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 New Zealand . . . . . .3. . . . . . . . . . . . . . . . . . . . . . . . . 256 56 Mobile phone accessories 257 56. .3 In carriers’ contracts . . . . 258 56. . . . . . . 255 55. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9. . . . . 252 54. . . . and licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. . . . . . . . . . . . . . .4 Chargers and external batteries . 254 55. . . . . . . . . . . . . . . . . . . . . 258 56. . . . . . . . . . . . . . . . . . . . . . . . . .3. . . . . . . . . . . . . . .1 Frequency bands recommended by ITU (UMTS) . . . 256 55. . . . . . . .9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3. .1 Cases . . . . . . . . . . . . . . . .8 References . . . . . . . . .4 See also . . . . . .2 Anti-lost and selfies wireless companions . . .2 Images . . . . .7 See also . . . . . . . . . . . . . 257 56. . . . . . . . . 260 56. . . . . . . . . 259 56. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .CONTENTS xix 54 Cellular frequencies 251 54. . . . . . . 259 56. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . contributors. . . . . . . 277 56. . . . . . . . . . . . . . . . .6 HDMI and Projector . . . . . . . . . . . . . . . . . . . .4 See also . . . . . . . . . . . . . . . . . . . . . . .3 Mass storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 Text . . . . .3 Content license . . . . . . . . . . 255 55. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2 United Kingdom . . . . . . . . . . . . . . .3 Frequency bands by region . . . .5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 United States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 55. . . . . . . . 258 56.2 Operating system support for tethering by the receiving devices . . . . . . . . . . . . . .3 United States of America . . . . . . .9. . . . . . . . . . . . . . . . . . 260 56. . . . . . . . . .5 Photo accessories . . . . . . 259 56. . . . . . . . . . . . . . . . . . . 252 54. .9 Text and image sources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 54. . . . . . . . . . . . . 251 54. . . . . . . . . . . . 251 54. . . . . . . . . . .2 Other Regions . .2 United States Carrier Frequency Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 External links . . 251 54. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 55. . 253 55 Tethering 254 55. 284 . . . . . . . For example. as well as some satellite phones.Chapter 1 International Mobile Station Equipment Identity The International Mobile Station Equipment Identity or IMEI /aɪˈmiː/[1] is a number. it then may put the device IMEI into it.[6] There is a misunderstanding amongst some regulators that the existence of a formally allocated IMEI number range for a GSM terminal implies that the terminal is approved or complies with regulatory requirements.[8] 1 . the owner can contact their local operator with a request that it should be blocked from the operator’s network.) Spoofed IMEI can thwart all efforts to track handsets. whether or not the phone’s SIM is changed. Australia was first to implement IMEI blocking across all GSM networks.[7] Since that date. which is stored on a SIM card that can (in theory) be transferred to any handset. mobile operators are to change with special tools. Instead. or The IMEI number is not supposed to be easy to change. and can optionally communicate this to shared registries. under the Mobile Telephones less business proposition. The linkage between regulatory approval and IMEI allocation was removed in April 2000. in the United Kingdom. encouraged to take measures such as the immediate suspension of service and the replacement of SIM cards in case of loss or theft. is considered an making the CEIR blacklisting effective.1 IMEI and the law ister (CEIR) which blacklists the device in switches of other operators that use the CEIR.1 Blacklists of stolen devices The IMEI is only used for identifying the device and has no permanent or semi-permanent relation to the subscriber. However. IMEI is an un-authenticated mobile identifier (as opposed to IMSI. mobile operators in Singapore are not required by the regulator to implement phone blocking or tracing systems. and the operator can be expected to do so if required by law in the operator’s jurisdiction.[2][3] to identify 3GPP (i. or target handsets for Lawful Intercept. if a mobile phone is stolen. UMTS and LTE) and iDEN mobile phones. For example.e. the owner can call his or her network provider and instruct them to “blacklist” the phone using its IMEI number. The regulator has expressed its doubts on the real effectiveness of this kind of system in the context of the mobile market in Singapore. IMEI-based or other. The IMEI number is used by a GSM network to identify valid devices and therefore can be used for stopping a stolen phone from accessing that network. In addition. unless for parts.1. With this blacklisting Many countries have acknowledged the use of the IMEI in place the device becomes unusable on any operator that in reducing the effect of mobile phone theft. IMEIs have been allocated by BABT (or one of several other regional administrators acting on behalf of the GSM Association) to legitimate GSM terminal manufacturers without the need to provide evidence of approval. changing the IMEI of a phone.. This renders the phone useless on that network and sometimes other networks too. such as the Central Equipment Identity Reg1. which is routinely being authenticated by home and serving mobile networks. For exam. making theft of mobile equipment a useple. GSM. It is usually found printed inside the battery compartment of the phone. with the introduction of the European R&TTE Directive.uses the CEIR. This is not the case. many network and security features are enabled by knowing the current device being used by a subscriber. However this offence under some circumstance. possessing equipment that can change it.[4][5] is not always the case: a phone’s IMEI may be easy IMEI blocking is not the only approach available for combating phone theft. but can also be displayed on-screen on most phones by entering *#06# on the dialpad. the subscriber is identified by transmission of an IMSI number. If the local operator possesses an Equipment Identity Register (EIR). usually unique. or alongside other system information in the settings menu on smartphone operating systems. Instead. (Re-programming) Act. When mobile equipment is stolen or lost. 1. in 2003. 99 is reserved. The remainder of the IMEI is manufacturerdefined.[14] (Thefts reported prior to November distinguished from an MEID.2 CHAPTER 1. model. IMEISV (IMEI Software Version) 1. the TAC was six digits long and was followed by a two-digit Final Assembly Code (FAC). IMEI numbers being decimal allows them to be November 2012. which is hexadecimal and 2012 were not added to the database. From January 1. such blacklisting is not customary. making the format AA-BBBBBB-CCCCCC-EE In New Zealand the NZ Telecommunications Forum Inc [10] provide a blocked IMEI lookup service for New Zealand consumers. Such registration ensures that a device coming into Police possession may be easily reunited with its registered keeper. major network companies in the United States.[9] which allows optional (and free) registration of devices by the public. a voluntary charter operated by the mobile networks ensures that any operator’s blacklisting of a handset is communicated to the Central Equipment Identity Register (CEIR) and subsequently to all other networks. This would typically include quoting a password which was chosen at the time the blacklisting was applied.1. In length. For the IMEI format prior to 2003. 1.uniquely identifying a unit of this model CD: 1 so it is a GSM Phase 2 or higher SVN: 23 .GSMA-approved group that allocated the TAC. All UK Police forces including the Metropolitan Police Service actively check IMEI numbers of phones found involved in crime. committed to introduce a are the Reporting Body Identifier. SNR: 176148 . The service allows up to 3 lookups per day [11] and checks against a database that is updated daily by the 3 major mobile network operators. new CDMA Mobile Equipment Identifier (MEID) 1.issued by the BABT (code 35) with the allocation number 2099 FAC: 00 . 2012. The IMEISV drops the Luhn check digit in favour of an additional two digits for the Software Version Number (SVN). One of the databases consulted is Immobilise.1 Check digit computation The IMEI (15 decimal digits: 14 digits plus a check digit) See also: Luhn algorithm or IMEISV (16 digits) includes information on the ori- .3 Lawful interception TAC: 35-2099 . which was a manufacturer-specific code indicating the location of the device’s construction. The RBI teroperate with the CEIR. In any of the above cases. known as the Type Allocation Code (TAC). the first two digits of the TAC under government pressure. the new style IMEI code 49-015420-323751 has an 8-digit TAC of 49-015420.2 Structure of the IMEI and The uses the same basic format as the IMEI.[12][13] GSM carriers AT&T numbers are allocated by the Global Decimal Adminisand T-Mobile began blocking newly reported IMEIs in trator.2 Limitations IMEIs can sometimes be unlisted depending on local arrangements.003. although it may not always be displayed this way.For example. After April 1.[16] By contrast. 2004. INTERNATIONAL MOBILE STATION EQUIPMENT IDENTITY In the UK. but it’s not clear whether it will in. A target for lawful interception (wiretapping) can be specified by its IMEI number as well as IMSI and MSISDN. in any case. the GSMA guideline was to have this Check Digit always transmitted to the network as zero. which identifies the blacklisting service. with a Luhn check digit at the end. the old style IMEI code 35-209900itive effect as it may result in international smuggling of 176148-1 or IMEISV code 35-209900-176148-23 tells stolen phones. Prior to 2002. and serial number of the device.indicating the phone was made during the transition period when FACs were being removed. against the National Mobile Property Register (NMPR). gin. A blocked IMEI cannot be connected to any of these 3 operators. the FAC for all phones was 00. 2004.) always has 0xA0 or larger as its first two digits. The structure of the IMEI/SV are specified in 3GPP TS 23. 2003 until that April 1.2. This guideline seems to have disappeared for the format valid from 2003 and onwards. This ensures the handset will be unusable for calls often quite quickly and. It is unclear whether local barring of IMEI has any pos. The model and origin comprise the initial 8-digit portion of the IMEI/SV.[17] As of 2004. within 48 hours.The “software version number” identifying the revision of the software installed on the phone.[15] us the following: 1.1. the Final Assembly Code ceased to exist and the Type Allocation Code increased to eight digits in In some countries. the format of the IMEI is AA-BBBBBBCCCCCC-D.The NMPR draws its information from many property databases. Washington City Paper 1. BBC News. IMEI Allocation and Approval Guidelines. 7 → 14).3 Usage on satellite phone networks [13] Wireless carriers partner with FCC.com/2013/07/13/ smartphone-black-market_n_3510341. Retrieved 2009-12-03. 3.g. The BGAN. nor is it stored in the EIR database at any point.6 . D. For the [10] example IMEI 49015420323751?. [3] GSM Europe.au. Legislation. Logistics (using bar-code reader) and EIR/CEIR administration cannot use the Check Digit unless it is printed outside of the packaging.1. The check digit is not transmitted over the radio interface. The Iridium 9601 modem relies solely on its IMEI number for identification and uses no SIM card. [7] R&TTE Directive 2.org/6DDHr0G1D) well as SIM cards in much the same way as GSM phones do. [9] Immobilise Conversely. January 8.checkmend. double every other digit (e. [11] To make the sum divisible by 10. The Check Digit is a function of all other digits in the IMEI.16 / 3GPP 22. one can calculate the IMEI by choosing the check digit that would give a sum divisible by 10. so the IMEI is 490154203237518.5 References [1] “3GPP TS 22. Check if the sum is divisible by 10.html. Accessed: 2012-12-26.1.0. The purpose of the Check Digit is to help guard against the possibility of incorrect entries to the CEIR and EIR equipment. as defined in the IMEI Allocation and Approval Guidelines: The Check Digit shall be calculated according to Luhn formula (ISO/IEC 7812). 1. (See GSM 02. Apr.vvc.g.4 See also • International Mobile Subscriber Identity [16] TR 33.. and on the ME IMEI/Type Accreditation label. all references to the last three or six digits of an IMEI refer to the actual IMEI number. [2] “Phone firms defend security record”. [5] http://www. Retrieved on 2013-09-18. Starting from the right. [15] http://www. Sum the digits (e. works all use IMEI numbers on their transceiver units as webcitation. Therefore. we set ? = 8.1.5.016: International Mobile Equipment Identities (IMEI)" (ZIP/DOC.huffingtonpost. 2009-10-01.gov.gov. [8] FAQs on mobile security.107. Retrieved August 25. 2012. patible with regular GSM networks.016). Retrieved on 2013-09-18. Iridium and Thuraya satellite phone net. 2002.. REFERENCES The last number of the IMEI is a check digit calculated using the Luhn algorithm. Version 5. 14 → 1 + 4).5 vs. however. “GSME proposals regarding mobile theft and IMEI security”. 2003-06 [4] Mobile Telephones (Re-programming) Act 2002. chapter 2. 2010-09-01.lv/export/sites/default/docs/LRTA/ Likumi/The_Criminal_Law. (Archived by WebCite® at http://www. 36 KB).org. Accessed: Iridium is a proprietary network and the device is incom2013-10-13. The Software Version Number (SVN) of a mobile is not included in the calculation. 2011. The check digit is validated in three steps: 3 • Luhn algorithm • Mobile Equipment Identifier • Mobile phone • SIM lock 1.uk. police on database of stolen cellphones. The presentation of the Check Digit both electronically and in printed form on the label and packaging is very important. Amta.[14] http://www.com/us/latest_news.doc [6] IMEI Specifications 1. [12] Carriers to allow Customers to Brick Stolen Phones by Shani Hilton. Retrieved on 2013-09-18. to which the check digit does not belong. The Washington Post (2011-02-28). Lawful interception architecture and functions [17] GSM Association. 10. 4 CHAPTER 1.6 External links • IMEI Allocation & Approval Guidelines from the GSM Association • Identify phone model and manufacturer by IMEI or TAC .mobile identification • Analysis of IMEI numbers . INTERNATIONAL MOBILE STATION EQUIPMENT IDENTITY 1. Ericsson. and its evolution to UMTS. which specifies standards for another 3G technology based on IS-95 (CDMA).Chapter 2 3GPP The 3rd Generation Partnership Project (3GPP) is a collaboration between groups of telecommunications associations. EDGE. and European markets. In 1998 AT&T Wireless was operating an IS-136 (TDMA) wireless network in the United States. Europe and North America. but were eventually joined by NTT DoCoMo. the wireless division of Bell Northern Research had developed a vision for “an all Internet Protocol (IP)" wireless network that went under the internal name “Cell Web”.e.1 History The 3rd Generation Partnership Project initiative eventually arose from a strategic initiative between Nortel Networks and AT&T Wireless. 5 .[4] 2. BellSouth. Texas. • GSM and related "2G" and "2. With this business arrangement. In 1997 Nortel Networks’ Wireless R&D center in Richardson.5G" standards including GPRS and EDGE • UMTS and related "3G" standards including HSPA • LTE and related "4G" standards • An evolved IP Multimedia Subsystem (IMS) developed in an access independent manner 3GPP standardization encompasses Radio. and approve their scope and terms of reference. • Take the decision to create or cease a Technical Specification Groups. Nokia. Their aim is to determine the general policy and strategy of 3GPP and perform the following tasks: 2.2 Organizational Partners The seven 3GPP Organizational Partners are from Asia. GPRS. a third generation wireless standard that was “natively” Internet Protocol based. and Lucent. the original acronym “3GIP” morphed into “3GPP”. up until AT&T Wireless and British Telecom formed a strategic “partnership project” to facilitate “global roaming” between U. known as the Organizational Partners. commonly known as CDMA2000.[5] Initially. Nortel launched the industry vision as • The approval and maintenance of the 3GPP scope. The forum progressed into the 2000 time frame. AT&T launched a global initiative that they named “3GIP”. Very specifically. this included the deployment of GSM data capabilities.S. Core Network and Service architecture. the prevailing European standard was adopted as the basis of AT&T Wireless’ network evolution for North America. i.[3] The 3GPP support team (also known as the “Mobile Competence Centre”) is located at the European Telecommunications Standards Institute (ETSI) headquarters in Sophia-Antipolis (France). France Telecom. AT&T Wireless. a “3rd Generation Partnership Project” for defining the next generation wireless network that was fundamentally capable of supporting Internet Protocol based wireless communications. As the concept progressed. Telecom Italia. Telenor. principal participants included British Telecom. Within 12 months or so. 3GPP became the industry standards forum that defined UMTS and more recently LTE. poised to evolve its network in the United States. The scope was later enlarged to include the development and maintenance of:[1] “Wireless Internet”. With this. and Nortel Networks.[2] The project was established in December 1998 and should not be confused with 3rd Generation Partnership Project 2 (3GPP2). Motorola.[6] A 3GIP standards forum was instituted and standards began to be developed. The initial scope of 3GPP was to make a globally applicable third-generation (3G) mobile phone system specification based on evolved Global System for Mobile Communications (GSM) specifications within the scope of the International Mobile Telecommunications-2000 project of the International Telecommunication Union (ITU). took a strong interest in Wireless Internet and its promise of Internet Protocol (with Nortel Networks as the potential supplier). GSM. and others. • The maintenance of the Partnership Project Description. A change request accepted at WG many revisions. cover not only the radio part ("Air Interface") and Core Network. • the 3GPP WGs hold several meetings a year. They quirements. Cryptographic aspects vided by the Organizational Partners to the Project (authentication. • Take the decision against a possible dissolution of 3GPP.[16] • The maintenance of the Partnership Project Agree.terminal layer 3 protocols. It is composed of five working groups. • The approval of applications for 3GPP partnership. they are remarkably complete and detailed. and work progress. publish and set standards within the 3GPP scope.ing down to source code level. latest revision of the GSM standards. Some specifications are . Current 3GPP standards incorporate the level is called “agreed”. It includes the core network .[17] 3GPP standards are structured as Releases. • CT (Core Network and Terminals): CT specifies the core network and terminal parts of 3GPP. tail. • Has signed the Partnership Project Agreement. The TSGs can “approve” the change requests that were agreed at WG level.There are four Technical Specifications Groups: ment. which is the highest decision-making body. It is composed of three working groups.6 CHAPTER 2..4 Standards 2. 3GPP2 offers similar information about its system. each of which may have been through specifications. features and functionality) falling within the 3GPP scope.provide insight into how the cellular industry works. The documents are available freely on 3GPP’s Web site.5 Specification groups Together with the Market Representation Partners (MRPs) perform the following tasks: The 3GPP specification work is done in Technical Specification Groups (TSGs) and Working Groups (WGs). • Act as a body of appeal on procedural matters referred to them. and • the 3GPP TSGs hold plenary meetings quarterly. services. They Each release incorporates hundreds of individual stanprepare and discuss change requests against 3GPP dards documents. While 3GPP standards can be bewildering to the newcomer. confidentiality) are also specified in deCo-ordination Group. The 3GPP structure also includes a Project Coordination nationally or regionally.3 Market Representation Partners The 3GPP Organizational Partners can invite a Market Representation Partner to take part in 3GPP. including GPRS and EDGE. Group. Companies (“individual members”) participate through their membership to a 3GPP Organizational Partner. SA is composed of five working groups. It is also responsible for the coordination of the project. 2. It is composed of four working groups. which: • Has the ability to offer market advice to 3GPP and to bring into 3GPP a consensus view of market requirements (e. • GERAN (GSM/EDGE Radio Access Network): GERAN specifies the GSM radio technology. • SA (Service and System Aspects): SA specifies the service requirements and the overall architecture of the 3GPP system. Discussion [18] of 3GPP thus frequently refers to the functionality in one Specification work is done at WG and at TSG level: release or another. • Does not have the capability and authority to define. • RAN (Radio Access Network): RAN specifies the UTRAN and the E-UTRAN. 3GPP is composed of more than 370 individual members. 2. Its • Has committed itself to all or part of the 3GPP missions include the management of overall timeframe scope. but also billing information and speech cod• The allocation of human and financial resources pro.g. As of November 2013 the Market Representation Partners are: 2. 3GPP • The approval of Organizational Partner funding re.6 Standardization process 3GPP standardization work is contribution-driven. As of April 2011. ETSI Mobile Competence Centre. SP060232 3GPP TSG SA#31 Sanya. Press Release. A release consists of a set of internally consistent set of features and specifications. ETSI Mobile Competence Centre. [15] “Release 13 priorities”. REFERENCES under the direct responsibility of TSGs and therefore.1.130 [20] GSM/3G Fast Facts.130:[19] • stage 1 specifications define the service requirements from the user point of view. Retrieved 20 November 2014. Cingular Wireless. 7 • GSM services • Telecoms & Internet converged Services & Protocols for Advanced Networks (TISPAN) • Open Mobile Alliance 3GPP follows a three-stage methodology as defined in ITU-T Recommendation I. [17] 3GPP membership [18] 3GPP TR 21.900 Technical Specification Group working methods [19] ITU-T Recommendation I. 3GPP. v. 31 August 2007 [2] About The Third Generation Partnership Project (3GPP) [3] 3rd Generation Partnership Project 2 [4] Mobile Competence Centre [5] “3G. GSM Suppliers’ Association. The approved change requests are subsequently incorporated in 3GPP specifications. With LTE the official successor to 3GPP2’s CDMA systems.9. Archived from the original on 2000-08-31. 10 December 2006 [21] Resources: 3G/UMTS Commercial Deployments.IP Membership List”. growing interest in HSPA+ and LTE is driving adoption of Release 7 and its successors. ETSI Mobile Competence Centre 2006 [13] Review of the Work Plan at Plenaries #31.8 See also • Universal Mobile Telecommunications System (UMTS) • 3GPP Long Term Evolution • Evolution to 3G • IP Multimedia Subsystem • 3GP • 3GPP2 . 2000.[20][21] They are primarily Release 6 systems. Retrieved 20 November 2014. Once a release is frozen. • stage 3 specifications define an implementation of the architecture by specifying protocols in details. only essential corrections are allowed (i. • Service layer • European Telecommunications Standards Institute 2. 3G. Timeframes are defined for each release by specifying freezing dates.2. Specifications are grouped into releases. addition and modifications of functions are forbidden). [7] Releases [8] 3GPP Specifications . Table listing commercially launched 3G/UMTS networks based on WCDMA technology. Summary of all Release 4 by the Organizational Partners.IP.7 Deployment [11] Summary of all Release 5 Features.0 (draft) ETSI Mobile Competence Centre 2004 2.The 3GPP’s counterpart in the CDMA2000 sphere. Summary of all Release 6 Features. Version xx/07/04 The 3GPP specifications are transposed into deliverables [10] Overview of 3GPP Release 4. 3G.1. 2000. • stage 2 specifications define an architecture to support the service requirements.IP Mission Statement”.e. Freezing dates are defined for each stage. Summary of all Release 99 Features. Features.Releases (and phases and stages) [9] Overview of 3GPP Release 99.IP. 13–16 March 2006 [14] “Highlights of 3GPP Release 12”. Version TSG #33. [12] Overview of 3GPP Release 6. North America[22] ). as they follow stage 3. but as of 2010.9 References [1] 3GPP Scope and Objectives. change requests can also be handled at TSG level. Test specifications are sometimes defined as stage 4. 3GPP-based systems will eventually become the single global mobile standard. Archived from the original on 2000-08-31. [16] Specification Groups 2. UMTS Forum [22] Cingular to Deliver 3G Wireless Broadband Services. Retrieved 2014-01-17. Retrieved 2014-01-17. [6] “3G. Since 2005. Version 9 September 2003 3GPP systems are deployed across much of the established GSM market. 3GPP systems were seeing deployment in the same markets as 3GPP2 systems (for example. MediaRoom 30 November 2004 . decoding. encoding network protocol messages defined by 3gpp .10 External links • 3GPP website • 3GPP Standards List of Acronyms & Terminology • 3GPP freely published.8 CHAPTER 2. 3GPP 2. detailed technical specifications • 3GPP releases descriptions • ETSI GSM UMTS 3GPP Numbering Cross Reference • TS/TR • specification numbering • Tool for visualizing multiple inter-related 3gpp standards • Tool for visualizing. In 1992. and graph Consultative Committee or CCITT (from its next-generation networks. 9 . [This monument] erected by a decision of the Telegraph Union made at the international conference at Lisbon in 1908. band Internet. Monument in Bern. TV broadcasting. The text reads: “Union Télégraphique Internationale fondée à Paris en 1865 sur l'initiative du gouvernement français. Standardization (ITU-T) Standardization was the original purpose of ITU since its inception.[2] ITU has been an intergovernmental public-private partnership organization since its inception. which undertake most of the work of each Sector. The ITU is active in areas including broadR. For the hospital department. Its membership includes 193 Member States and around 700 public and private sector companies as well as international and regional telecommunication entities.[1] Radiocommunication (ITU-R) Established in 1927 as The ITU coordinates the shared global use of the radio the International Radio Consultative Committee or spectrum. data.[4] The sectors were created during the restructuring of ITU at its 1992 Plenipotentiary Conference. ITU. Switzerland. the CCIR became the ITUstandards. The International Telecommunication Union (ITU. convergence in fixed-mobile in 1956 as the International Telephone and Telephone. see ITU (disambiguation). this sector manages the infrastructure in the developing world. based in Geneva. Established satellite-based meteorology. such as ITU TELECOM WORLD. is a specialized agency of the United Nations (UN) that is responsible for issues that concern information and communication technologies. voice. and assists in the international radio-frequency spectrum and satellite development and coordination of worldwide technical orbit resources. knowledge and technology.2 ITU sectors The ITU comprises three sectors. is a member of the United Nations Development Group.[3] 3. Switzerland. ITU became a United Nations specialized agency in 1947. see Intensive care unit. radio astronomy.”) 3. aeronautical and maritime navigation.Chapter 3 International Telecommunication Union “ITU” redirects here.1 History ITU was formed in 1865 at the International Telegraph Convention.[5] French: Union Internationale des Télécommunications). ITU also organizes worldwide and regional exhibitions and forums. latest-generation wireless technologies. Internet access. For other uses. Érigé par décision de l'Union Télégraphique prise à la conférence internationale de Lisbonne en 1908. originally the International Telegraph Union (French: Union Télégraphique Internationale). works to improve telecommunication international pour la radio”). bringing together representatives of government and the telecommunications and ICT industry to exchange ideas. known as Sector Members and Associates. promotes international cooperation in assignCCIR (from its French name “Comité consultatif ing satellite orbits.” (In English: “International Telegraph Union founded at Paris in 1865 on the initiative of the French government. as well as ITU Telecom. each managing a different aspect of the matters handled by the Union. funding bodies. which may join the Union as Member States. ITU TELECOM ITU Telecom organizes major events for the world’s ICT community. International Telecommunication Union member states Membership of ITU is open to governments. Resolutions and Recommendaaccess to information and communication technolo. INTERNATIONAL TELECOMMUNICATION UNION French name “Comité consultatif international téléphonique et télégraphique”). the consolidated basic Development (ITU-D) Established in 1992. There are 193 member states of the ITU. which became a member on 14 July 2011. On 23 October 2014 Houlin Zhao was elected 19th Secretary-General of the ITU at the Plenipotentiary Conference in Busan. headed by the Secre. the Decisions.10 CHAPTER 3.6 Membership International Telecommunication Union – anniversary 125 years. Republic of Korea. ences. but neverPlenipotentiary Conference. being listed as “Tai- . and he was formally in3. this sector standardizes global telecommunications (except for radio).[8] The founding document theless received a country code. 3. Post of USSR. and its sectors. equipment manufacturers. of the ITU was the 1865 International Telegraph Convention.[10] International Telecommunication Union – anniversary 150 years. this sector texts include the Optional Protocol on the settlement of helps spread equitable. the CCITT became the ITU-T.to a four-year term by the member states at the ITU tary General. ITU Telecom World 2011[6] is ITU Telecom’s 40th Anniversary with the first event in 1971.4 Leadership The ITU is headed by a Secretary-General.3 Legal framework of ITU augurated on 15 January 2015. Assemblies and Meetings of the Union. as well as to private organizations like carriers. Post of Azerbaijan. as well as the General Rules of Confergies (ICT).5 Directors and General of ITU Secretaries- 3. 1990. research and development organizations and international and regional telecommunication organizations. who is elected A permanent General Secretariat. In addition to the Constitution and Convention.[9] 3. which can join ITU as non-voting Sector Members. 2015. which includes 192 UN member states (all except Palau) and Vatican City. sustainable and affordable disputes.[11] The most recent member state to join the ITU is South Sudan. manages the day-to-day work of the Union Plenipotentiary Conference. which has since been amended several times and is now entitled the “Constitution and Convention of the International Telecommunication Union”.[5] In 1993.[12] The Republic of China (Taiwan) was blocked from memThe basic texts of the ITU[7] are adopted by the ITU bership by the People’s Republic of China.tions in force. His four-year mandate started on 1 January 2015. the international rules for 12 activity that would “negatively impact the internet.representing former Soviet republics) 3.8 World Conference on International Telecommunications 2012 (WCIT-12) Current proposals look to take into account the prevalence of data communications. management of Internet Domain Names and IP addresses. The resolution warned that ". As the Internet has grown.[25][26] The WCIT-12 activity has been attacked by Google.. internet governance and the free flow of infor(ITRs) was held in Melbourne in 1988... content and security. WORLD CONFERENCE ON INTERNATIONAL TELECOMMUNICATIONS 2012 (WCIT-12) 11 wan.. and other aspects of the Internet that are currently governed either by community-based approaches such as Regional Internet Registries. level conference to address International Telecom. UNCTAD and UNDP. 3.[21] 3. along with UNESCO. ICANN. China”.7 3. It is claimed the proposal would allow government restriction or blocking of information disseminated via the internet and create a global regime of monitoring internet communications. telecommunications operated under regulated monopolies in most countries. which has characterized it as a threat to the ". its telecommunications. organizations such as ICANN have come into existence to manage key resources such as Internet addresses and Domain Names.[13] Palestine was admitted as an observer governments to shut down the internet if there is the bein 2010.[28] The resolution asserted that “the ITU body to assert regulatory auIn August 2012.[15] The Summit was held as two conferences in 2003 and 2005 in Geneva and Tunis. business The previous conference to update the Regulations relations.6.[19] 3.free and In December 2012. traffic accounting as well as traffic flow. or largely national regulatory frameworks.[22] The move by the ITU and some countries has alarmed many within the United States and within the Internet community.[14] lief that it may interfere in the internal affairs of other states or that information of a sensitive nature might be shared. operations. when the Internet was still in its infancy. groups: • Asia-Pacific Telecommunity (APT) • Arab Spectrum Management Group (ASMG) • African Telecommunications Union (ATU) • European Conference of Postal and Telecommunications Administrations (CEPT) • Inter-American Telecommunication Commission (CITEL) • Regional Commonwealth in the Field of Communications (RCC .a resolution urging member states to prevent ITU WCITmunications Regulations. [18] draft document ahead of the conference. the ITU facilitated The World [27] Conference on International Telecommunications 2012 open internet. It would also allow On 5 December 2012. proposals have been put forward for consideration at the [WCIT-12] that would .” WCIT-12 was a treaty. respectively. similar to the way funds are transferred between countries using the telephone.8.8.[17] mation online”.. fraud. governance of the Internet by a rare unanimous 397–0 vote.On 22 November 2012. some European telecommunication services have proposed a so-called “sender pays” model that would require sources of Internet traffic to pay destinations.1 Regional groupings Telecommunications ministers from 193 countries at[19] Member states of the ITU are organized into six regional tended the conference in Dubai. Some outside the United States believe that the United States exerts too much influence over the governance of the Internet. including the demand that those who send and receive information identify themselves.[23][24] Indeed.2 Proposed Changes to the Treaty And Concerns World Summit on the Informa- tion Society Main article: World Summit on the Information Society The ITU was one of the UN agencies responsible for convening the World Summit on the Information Society (WSIS).1 Changes to International Telecommunication Regulations The current regulatory structure was based on voice telecommunications.. the lower chamber of the United States Congress passed a resolution opposing U. including international tariffs.] is not the appropriate [29] thority over the internet”.3.[20] In 1988. ITU called for a public consultation on a [. with the aim of bridging the digital divide.N. Proposals under consideration would establish regulatory oversight by the UN over security. the European Parliament passed (WCIT-12) in Dubai.8.[16] architecture. [5] Deutsches Institut für Normung (1998)..[36] Some leaked contributions can be found on the wcitleaks. Retrieved 15 May 2012.S. Associates and Academia”. Retrieved 15 May 2014.331 over some language in the revised ITRs referring to ITU roles in addressing unsolicited bulk communications. Retrieved 2011-03-20.10 References [1] International Telecommunication Union [2] “UNDG Members”.int.. 266. p. Canada. ITU.. Geneva Kingdom.” The same resolution had previously been passed unanimously by the upper chamber of the Congress in September. [31][32][33] The disagreement appeared to be • H. Delegation. Google-affiliated researchers have suggested that the ITU should completely reform its processes to align itself with the openness and participation of other multistakeholder organizations concerned with the Internet. .int. • Latin America and Caribbean Network Information Centre (LACNIC) [8] PP10contributions. ISBN 9783410141495. INTERNATIONAL TELECOMMUNICATION UNION fundamentally alter the governance and operation of the Internet .org web site.[30] On 14 December 2012.8. The Head of the U. “2010 Plenipotentiary Conference”.int. the ITU organisation came out • ITU Telecommunication Standardization Sector with a press release: "New global telecoms treaty agreed (ITU-T) in Dubai". Terry Kramer. Retrieved 15 May 2012. [3] “About ITU”. Germany.[37] 3. [6] “Welcome to ITU TELECOM WORLD 2011 | ITU TELECOM WORLD 2011”. Retrieved 9 July 2012. net• ITU Radiocommunication Sector (ITU-R) work security. India and the United International Telecommunications Union.[34] Despite the significant numD) ber countries not signing. said “We cannot support a treaty that is not sup• Internet Society portive of the multistakeholder model of Internet governance”.. • ITU-R Recommendations 3. An Introduction to Standards and Standardization... Beuth Verlag. active participation was restricted to member states. Japan. While certain parts of civil society and industry were able to advise and observe. an amended version of the Regulations was signed by 89 of the 152 countries. Countries that did not sign included the United States. calling for a more transparent multi-stakeholder process.9 See also • Internet Engineering Task Force • Internet Governance Forum • ICANN • American Registry for Internet Numbers (ARIN) • RIPE • ITU-T Recommendations • X. and stated that the policy of the United States is ". and a resolution on Internet governance that called for government participation in Internet topics • ITU Telecommunication Development Sector (ITUat various ITU forums. Itu. Undg. Retrieved 15 May 2012.3 WCIT-12 Conference Participation The conference itself was managed by the International Telecommunication Union (ITU). New Zealand. • AfriNIC [7] “Basic texts of the International Telecommunication Union”.12 CHAPTER 3. to promote a global Internet free from government control and preserve and advance the successful Multistakeholder Model that governs the Internet today. Itu.”.509 • Working Group on Internet Governance (WGIG) • Child Online Protection (COP) 3. International Telecommunication Union. [and] would attempt to justify increased government control over the Internet . Retrieved 15 May 2014. Itu. [4] “Sector Members.org. 27 October 2011.[35] The Electronic Frontier Foundation expressed concern at this. Retrieved 14 April 2013.in. Keep the Internet Open..-based Web sites. Ssrn. [13] “ITU-T : International Numbering Resources : National Numbering Plans : China. 12 November 2012. (14 December 2012) On the Results at the WCIT. news. [22] Internet Society. itu.N. Shamik (28 June 2012). Retrieved November 2012. Retrieved 12 October 2012.int. CNET. Taiwan”. Threat to Internet Freedom”. Retrieved 12 October 2012. Itu. • Ryan/Glick: The ITU Treaty Negotiations: A Call for Openness and Participation [26] Trivedi. Sherwin.au.3. 17 May 2012.S. Robert M. Retrieved 29 May 2012. Andrea. [34] Siy. The New York Times. (21 February 2012). BBC News.org. International Telecommunication Union. • Protect Global Internet Freedom Coalition [24] L. Japan Times. The Wall Street Journal. EXTERNAL LINKS [9] “ITU Management team inauguration on 15 January 2015”.S. 29 May 2012. Itu. Retrieved 15 May 2012. Retrieved 12 October 2012. [11] “International Telecommunication Union Member States”. The U.int.N.N. [33] “WCIT-12 Final Acts Signatories”. 14 December 2012.N. could tax U. [28] “European Parliament warns against UN internet control”. Retrieved 23 November 2012. 16 December 2012. Retrieved on 28 April 2014. “Crovitz: The U.11. [18] “ITU opens public consultation on internet regulation treaty”. Retrieved 11 October 2012. [10] “Constitution of ITU: Chapter I – Basic Provisions”.com. West snub rules for Net curbs”. 6 May 2012. 25 April 2012. Rejects Telecommunications Treaty”. Public Knowledge. 5 December 2012. Retrieved 25 March 2015.com. “Robert McDowell:The U. Gordon Crovitz (17 June 2012). [17] “International Telecommunication Regulations” (PDF). 26 January 2007. Retrieved 12 October 2012. Eff.int. [14] “Palestine ITU status”. [16] “World Conference on International Telecommunications 2012”. Retrieved 29 May 2012. . [35] “Convention of the ITU”. The Hill. leaked docs show<".11 External links • Official website • History of ITU Portal (official site) • ITU Telecom World 2011 [23] Mcdowell. Retrieved 12 October 2012. [20] Global Internet usage [21] “Russia calls for internet revolution”. Does the Internet Need a Global Regulator?. 13 [29] “European Parliament resolution on the forthcoming World Conference on International Telecommunications (WCIT-12) of the International Telecommunication Union. Indrus. Retrieved 12 October 2012. Vinton. Retrieved 12 October 2012. 24 May 2012. 20 October 2010. Retrieved November 2012. 22 November 2012. Retrieved 18 July 2013. 16 August 2012. Forbes magazine. • Cerf. Adam. Retrieved 15 May 2012. The Wall Street Journal. [19] “United Nations wants control of web kill switch”. Declan (7 June 2012). [15] “World Summit on the Information Society”. Itu. International Telecommunication Regulations [37] “Ryan/Glick: The ITU Treaty Negotiations: A Call for Openness and Participation”. and the possible expansion of the scope of international telecommunication regulations”.N. [36] “EFF Joins Coalition Denouncing Secretive WCIT Planning Process”. Retrieved 23 November 2012. BBC News. 21 November 2012. Summit to Focus on Internet – Washington Post article about ICANN and the United Nations’ ITU relationship [25] McCullagh. 3. Itu. • Thierer. • U. The New York Times.int. Retrieved 29 May 2012. 14 July 2011 [31] “U. 22 November 2012.int. [12] New Country. 'TAX' COMING?". Retrieved 12 October 2012. Tax Notes Today – 2012 TNT 126-5. "CNET:U. Internet Regulator?. Retrieved 12 October 2012. • ITU defines the future of mobile communications • Renda. Retrieved 16 December 2012. [30] “House approves resolution to keep Internet control out of UN hands”. “FOR APPLE AND GOOGLE. [27] “Google attacks UN net conference”. Retrieved 21 November 2012.N. New Number – Country code 211 officially assigned to South Sudan ITU Pressroom.'s Internet Power Grab”. The Wall Street Journal. IS AN UNAVOIDABLE U. International Telecommunication Union. [32] “Japan. Geneva • Harrington. 30 May 2012. Retrieved 31 May 2012. 29 May 2012. Matt. 31 May 2012. Putting the United Nations in charge of the Internet is the best idea ever. dailycaller. Retrieved 1 June 2012. ZDNet. syracuse. . Retrieved 30 May 2012. • Peterson.com. 30 May 2012. Stephen. U. • C-SPAN. Coverage of Free State Foundation.14 CHAPTER 3. Retrieved 31 May 2012. Deadline approaches for Russia and China-led U.S. 24 May 2012. House lawmakers to consider proposal for United Nations to Regulate the Internet. tech companies warn of threat to Internet from foreign governments. • Kang. Internet takeover. Josh.N. INTERNATIONAL TELECOMMUNICATION UNION ITU headquarters. The Washington Post. Retrieved 30 May 2012.com. • Shaw. Cecilia. ) • Corporate Broadcasts (Shareholder Meetings. Public Relations..[1] A standard H.320 video and many receiving stations. Academic Press.. Campus Events. These broadcasts can be likened to television broadcasts. Multimedia Communications .) • Political Broadcasts Often low-bit-rate digital satellite transmission is used for such services. 2001 ISBN 012-282160-2 15 .tml. 4.Directions & Innovations. ISDN endpoint) can be modified to provide one-way point-to-multipoint data transmissions (“broadcasts”).). with one uplink site sending H.Chapter 4 H.320 terminal (i.e.fi/Opinnot/Tik-111. H.tkk. Gibson (ed.331 is part of the ITU suite of standards for Video Teleconferencing. Standard applications include: • Educational Broadcasts (Classes.331 H..1 References [1] “EBU Technical Review” EBU. making normal two-way negotiation impossible.331 specifies how H. Retrieved 5 January 2012.590/2002/ Jerry D.320 terminals act in situations where there is no data path from receivers back to transmitters. In such a situation no MCU is needed. This standard is used for broadcast of videoconferences.. 1999. as opposed to point-to-point links. http://www. an agency of the U. and incorporated on September 30.1 History ICANN headquarters in Playa Vista.[1] Most visibly. completing ICANN’s transition. 2006. 1998.” The proposed rule making.S. was published in the Federal Register on February 20. Department of Defense.[5] 5. the National Telecommunications and Information Administration (NTIA).S. Department of Commerce gave up its control of ICANN. 1998. 1998. Department of Commerce. ICANN also maintains registries of Internet protocol identifiers. and assignment of address blocks to regional Internet registries. The numbering facilities ICANN manages include the Internet Protocol address spaces for IPv4 and IPv6. introduction of new generic top-level domains (TLDs). much of its work has concerned the Internet’s global Domain Name System.[2] Before the establishment of ICANN. the IANA function of administering registries of Internet protocol identifiers (including the distributing top-level domains and IP addresses) was performed by Jon Postel. NTIA received more than 650 comments as of March 23.[3] It is headquartered in the Playa Vista section of Los Angeles. to promote competition. On January 30. 1998. the U. ICANN signed a new agreement with the United States Department of Commerce (DOC) that moves the organization further towards a solely multistakeholder governance model. ICANN’s primary principles of operation have been described as helping preserve the operational stability of the Internet. first at UCLA and then at the University of Southern California’s Information Sciences Institute (ISI). issued for comment. 2009 the U. 1998. California.[4] On October 1. and the operation of root name servers. when the comment period closed. “A Proposal to Improve the Technical Management of Internet Names and Addresses.S. and ensuring the network’s stable and secure operation. consensus-based processes. Los Angeles. or "Green Paper". and to develop policies appropriate to its mission through bottomup. including policy development for internationalization of the DNS system. a Computer Science researcher who had been involved in the creation of ARPANET. to achieve broad representation of the global Internet community.[6][7] In 1997 Postel testified before Congress that this had come about as a “side task” to this research work [8] The Information Sciences Institute was funded by the U.S. ICANN performs the actual technical maintenance work of the central Internet address pools and DNS Root registries pursuant to the IANA function contract.[9] As the Internet grew and expanded globally. which also performed some assigned name functions. California. The Internet Corporation for Assigned Names and Numbers (ICANN /ˈaɪkæn/ EYE-kan) is a nonprofit organization that is responsible for the coordination of maintenance and methodology of several databases of unique identifiers related to the namespaces of the Internet.Chapter 5 ICANN ICANN was created on September 18. On September 29. providing opportunity for public comment. Department of Commerce initiated a process to establish a new organization to take over the IANA functions.[10] The Green Paper proposed certain actions designed to privatize the management of Internet names and addresses in a manner that allows for the development of robust competition and facilitates global participation in 16 . as was SRI International’s Network Information Center. Department of Commerce gave up its control of ICANN. and a fee for some domain name cific constituencies bodies within ICANN itself. the United States government rethe increase. 2002. Following this action.[21][22] 2005.83 million. worked. with entrepreneur and philanthropist Esther Dyson Auerbach won. In this lawsuit. currently outstanding. the registry agreement for the top-level domains ment was clarified on September 29. In July 2008. ICANN manages the Internet Assigned Numbers Authority (IANA) under contract to the United States Department of Commerce (DOC) and pursuant to an agreement with the IETF. governicism. cess to ICANN’s accounting records without restriction.[5] 5. the Regional Internet Commerce for the Waiting List Service of VeriSign.com domains. At the meeting of ICANN in the management of the identifiers within their respective Rome. ICANN’s headquarters is now located in that ICANN had overstepped its authority. ICANN played a cruin California due to the presence of Jon Postel.[20] The alistic political and operational targets". Despite the critcontext of ICANN’s relationship with the U. The Green Paper proposed for discussion a variety of issues relating to DNS management including private sector creation of a new notfor-profit corporation (the “new corporation”) managed by a globally and functionally representative Board of Directors. The antitrust component of VeriSign’s claim Per its original Bylaws. NOTABLE EVENTS Internet management.for all domains within a country-code top-level domain. 2004. The increase was to be funded the DNSO proposals received.the openness and professionalism of its operations. decided instead on an al. VeriSign’s broader chalformation in ICANN was to be delegated to three suplenge that ICANN overstepped its contractual rights is porting organizations (Address Supporting Organization. which coordination. which took place from March 2 to March 6. unilateral oversight After a second round of negotiations in 2004.[11] ICANN was formed in response to this policy. Registries and the IETF agreed to serve as the Address Supporting Organization and Protocol Supporting Orga. They were also required to be financially indepenICANN agreed to ask approval of the US Department of [14] dent from ICANN. which is home to an office of the Information on October 4. The letter also stresses the separate roles of SiteFinder that involved allowing VeriSign (the registry) to raise its registration fees by up to 7% a year.On February 28. authority. 1998.[18][19] registrations. 2006. 2004.[25] as founding chairwoman.25 for all others).[13] ICANN was established In September and October 2003.[24] On October 1. VeriSign sought to reduce ambiguity about ICANN’s the nearby Playa Vista section of Los Angeles. who was cial role in the conflict over VeriSign's “wild card” DNS a founder of ICANN and was set to be its first CTO prior service Site Finder.a lawsuit against ICANN on February 27. However.20 thus adding primary responsibility for DNS policy de. 2009 the U. scope. ICANN formerly operated from issuing an ultimatum to VeriSign. claiming nia. As expected. After an open letter from ICANN to his unexpected death. rejected On July 26. publicly elected At-Large Representative for North America board member Karl Auerbach sued ICANN in Superior Court in California to gain acICANN was incorporated in California on September 30. jobs. the ICANN Board. renewals and transfers (initially USD 0. 2004.[28] This . 2006 when ICANN jobs and travel includes a US $2 fee on every domain the signed a new Memorandum of understanding with the licensed companies sell or renew. later supported by the [26] the company voluntarily shut down the service the same Marina del Rey building where Postel formerly IAB.[12] 17 the IANA and VeriSign. represents the Internet registries of 39 countries. travel.[3] It is qualified to do business in the District of Columbia. and Protocol proved by ICANN’s board would resolve VeriSign’s chalSupporting Organization).2. 2006.S.5. ICANN published a proposed budget nization respectively.by the introduction of new top-level domains. mobi.On May 17. velopment to ICANN’s existing duties of oversight and and USD 0. This document does give the DoC a final. based in part on million to $15.S. and tion of the Domain Name Supporting Organization. the U. ICANN’s board approved a sition management of the authoritative root zone file to settlement with VeriSign in the lawsuit resulting from ICANN”. the TLDs eu. primary responsibility for policy was dismissed in August 2004. 2003. each of which was to develop lenge to ICANN in exchange for the right to increase and recommend substantive policies and procedures for pricing on .to domain registries.[17] greatly increased its proposed spending from US $8. and cat were introduced in over some of the ICANN operations. asia. Department of Commerce reiter[23] ated an earlier statement that it has “no plans to tran.2 Notable events On March 18. charges ternate construction for the DNSO which delineated spe.S. VeriSign filed Sciences Institute at the University of Southern Califor. accusing ICANN of a lack of financial prunewed the contract with ICANN for performance of the dence and criticizing what it describes as ICANN’s "unreIANA function for an additional one to five years. It included proposals to increase interested parties to propose the structure and composi. A proposed settlement already apDomain Name Supporting Organization.27 On 4 March 1999.[27] [21] United States Department of Commerce (DOC).[15][16] and ICANN issued a call for for the year 2004-05. The Council of European National Top Level Domain Registries (CENTR). ”[45] Some would argue that the innovative freedom Peter Thrush refers to starts at $185. These notices gave the Registrars 15 days to fix their Whois investigation efforts. illicit product traffic. 2008.000. etc. In 2010. 2008.[34] On October 1. 2012. ICANN began the steps to remove accreditation of one of their registrars. an At-Large seat filled by an At-Large Organization. 5. However the KnujOn Report details how various registrars have not complied with their contractual obligations under the Registrar Accreditation Agreement (RAA). Unless there is a good reason to restrain it. and the harm caused to thousands of clients as a result of what has been called ICANN’s “laissez faire attitude toward customer allegations of fraud". as well a new applica- On June 20. six representatives of its Supporting Organizations. and public participation by the Berkman Center for Internet and Society at Harvard University. On February 3. sub-groups that deal with specific sections of the policies under ICANN’s purview.[36] This external review was in support of the work of ICANN’s Accountability and Transparency Review team. ICANN approved a major review of its policies with respect to accountability. We have provided a platform for the next generation of creativity and inspiration. and criticism of ICANN’s handling of the situation. Compliance system working to correct Whois and other issues. Arabic.3 Structure At present ICANN is formally organized as a non-profit corporation “for charitable and public purposes” under the California Nonprofit Public Benefit Corporation Law. ICANN expects the new rules to significantly change the face of the Internet. Website content and usage are not within ICANN’s mandate. appointed by the Board. These same Registrars were also most frequently cited by KnujOn as failing to resolve complaints made through the Whois Data Problem Reporting System (WDPRS). the organizations that manage IP addresses in different regions.[46] The 2013 NSA spying scandal has led to ICANN endorsing the Montevideo Statement. and the President / CEO.[30] Backend cybercrime detection within the ICANN sphere of influence is also lacking. On June 26. the ICANN board voted to end most restrictions on the names of generic top-level domains (gTLD). The use of non-Latin characters (such as Cyrillic.[42] The renewal or the annual fee of the domain will further be $25.18 CHAPTER 5. was criticised by some people in the US House of Repre. chairman of ICANN’s board of directors stated after the vote: “Today’s decision will usher in a new Internet age. RegisterFly amid charges and lawsuits involving fraud. ICANN has been the subject of criticism as a result of its handling of RegisterFly. innovation should be allowed to run free.000.[33] The main point of the KnujOn research was to demonstrate the relationships between compliance failure. Peter Thrush. and spam.[29] In February 2007.” This program envisions the availability of many new or already proposed domains.[39] The initial price to apply for a new gTLD is $185.[31] This was largely in response to a report issued by KnujOn called The 10 Worst Registrars in terms of spam advertised junk product sites and compliance failure.These Registries began assigning the final IPv4 addresses within their regions until they ran out completely. Chinese. the ICANN Board started a new process of TLD naming policy to take a “significant step forward on the introduction of new generic top-level domains.[35] after further researching reports and complaints issued by KnujOn. ICANN issued Enforcement Notices against 10 Accredited Registrars and announced this through a press release entitled: “Worst Spam Offenders” Notified by ICANN.[38] sentatives' Small Business committee. Los Angeles USA. ICANN issued Breach Notices against Joker and Beijing Innovative Linkage Technology Ltd. ICANN announced that it had distributed the last batch of its remaining IPv4 addresses to the world’s five Regional Internet Registries. then Chairman of the Board of Directors. The sign refers to Vint Cerf.[43][44] It is anticipated that many corporations will apply for gTLDs based on their brands. ICANN tion and implementation process. who is working on the Interplanetary Internet. and thus is not accessible to everyone. 2011. 2011.[39][40][41] Companies and organizations became able to choose essentially arbitrary top level Internet domain names.) will also be allowed in gTLDs. The report demonstrated that out of 900 ICANN accredited Registrars fewer than 20 held 90% of the web domains advertised in spam.[32] The mention of the word spam in the title of the ICANN memo is somewhat misleading since ICANN does not address issues of spam or email abuse. 2007.000. On May 23. transparency.[47] . ICANN began accepting applications for new gTLDS on January 12. 2008.[37] ICANN meeting. It is managed by a 16-member Board of Directors composed of eight members selected by a nominating committee on which all the constituencies of ICANN are represented. which provides advice on the operation of the DNS root server system.3. at least in part. and the Technical Liaison Group (TLG). Cook Islands. which is composed of Internet experts who study security issues pertaining to ICANN’s mandate.[51] In addition the following organizations are GAC Observers:[52] • African Telecommunications Union • Asia-Pacific Telecommunity • Caribbean Telecommunications Union (CTU) • Commonwealth Telecommunications Organisation (CTO) • Inter-American Telecommunication Commission (CITEL) • International Criminal Court • United Nations Educational Scientific and Cultural Organization (UNESCO) • Universal Postal Union • World Bank • World Health Organization (WHO) • World Intellectual Property Organization (WIPO) • World Meteorological Organization • World Trade Organization . the Security and Stability Advisory Committee (SSAC). The Address Supporting Organization (ASO) deals with policy making on IP addresses. which is composed of representatives of a large number of national governments from all over the world.[48] • Council of Europe ICANN also relies on some advisory committees and other advisory mechanisms to receive advice on the interests and needs of stakeholders that do not directly participate in the Supporting Organizations. Niue and Taiwan). The Generic Names Supporting Organization (GNSO) deals with policy making on generic top-level domains (gTLDs). which is composed of individual Internet users from around the world selected by each of the Regional At-Large Organizations (RALO) and Nominating Committee.1 Governmental Advisory Committee • Economic Commission for Africa (ECA) • European Broadcasting Union • European Organization for Nuclear Research (CERN) • International Labour Office • International Telecommunication Union (ITU) • International Criminal Police Organization (INTERPOL) • International Red Cross and Red Crescent Movement • Latin American Association of Telecom Regulatory Agencies (REGULATEL) • League of Arab States • New Partnership (NEPAD) for Africa’s Development • Organisation for Economic Co-operation and Development • The Organization for Islamic Cooperation • Organization of American States • Organisation Internationale de la Francophonie (OIF) • Pacific Islands Forum • Secretariat of the Pacific Community (SPC) Governmental Advisory Committee representatives The Governmental Advisory Committee has representatives from 111 states (108 UN members. The Country Code Names Supporting Organization (ccNSO) deals with policy making on countrycode top-level domains (ccTLDs).[50] • European Space Agency 5.[49] These include the Governmental Advisory Committee (GAC). Hong Kong.5. Bermuda. STRUCTURE 19 There are currently three Supporting Organizations. Montserrat. the Root Server System Advisory Committee. the At-Large Advisory Committee (ALAC). which is composed of representatives of other international technical organizations that focus. on the Internet. the Holy See. the European Commission and the African Union Commission.3. professor Michael Froomkin of the University of Miami School of Law argued that ICANN’s relationship with the U. main name on the Internet.[56] it be replaced with a system that keeps most registration information secret (or “gated”) from most Internet users. compared to the federal courts of appeal in particcontinents for the purpose of encouraging global par. Some have attempted to argue that ICANN was never given the authority to decide policy. that aimed to create international oversight.[60] Whois has been a key tool of investigative journalists interested in determining who was disseminating information on the Internet. ICANN’s attempt at such a Coca-Cola Company.000 fee. the attempts that ICANN have made to set up an organizational structure that would allow wide input from the global Internet community did not produce results amenable to the current Board. ticipation in its processes.3.[64] In 2009. ICANN Democratic input In the Memorandum of Understanding that set up the relationship between ICANN and the U.4. As a result. According to ICANN policy. Samsung and policy was drafted in close cooperation with the World In. Department of Commerce is illegal. avoiding the traditional court system for disputes by allowing cases to be brought to one of a set of bodies that arbitrate domain name disputes. ran into criticism. 5. Hewlett-Packard.[65] In December 2011. a domain registrant must agree to be bound by the UDRP—they cannot get a domain name without agreeing to this. firstserved basis and the market should be the arbiter of who succeeds and who does not.[61] The use of whois by the free press is not included in the list of permissible purposes in the initial report.5 Criticism 5.. be scrapped.S.S.[62][63] In 2000. government. Personal data protection. ICANN was given a mandate requiring that it operate “in a bottom up. and Abuse mitigation. e. in violation of either the Constitution or federal statutes.[55] The World Summit on the Information Society in Tunisia in November 2005 agreed not to get involved in the day-to-day and technical operations of ICANN. including The top-level domains (gTLDs). cheap and reasonable resolution of domain name conflicts. seventy-nine companies. Domain name sale and purchase. ICANN has been the subject of criticism and controversy.1 Proposed elimination of public DNS in real time. Department of Commerce. ICANN’s Government Advisory Committee is currently set up to provide advice to ICANN regarding public policy issues and has participation by many of the world’s governments. A look at the UDRP decision patterns has led some[57] to conclude that compulsory domain name arbitration is less likely to give a fair hearing to domain name owners asserting defenses under the First Amendment and other ICANN holds periodic public meetings rotated between laws. and that all TLDs should be added on a first-come. a utilthat too many discussions and decisions take place out of ity that allows anyone to know who has registered a dosight of the public. This policy essentially attempts to provide a mechanism for rapid. there had been speculation that the United Nations might signal a takeover of ICANN. and minutes of the meetings. signed a petition against ICANN’s new TLD tellectual Property Organization (WIPO). are published on the ICANN website.20 5. but was to be a technical caretaker. the At-Large constituency and direct election of board members by the global Internet community were soon abandoned.2 CHAPTER 5. However. Legal actions. Critics suggest that ICANN should not be allowed to impose business rules on market participants.[54] followed by a negative reaction from the US government[23] and worries about a division of the Internet. the Federal Trade Commission stated ICANN had long failed to provide safeguards that protect [66] One task that ICANN was asked to do was to address the consumers from online swindlers. It recommends In the early 2000s. preliminary reports.others.4 Activities Since its creation. choose new TLDs or shut out other interested parties who refuse to pay ICANN’s US$185.g. and only discloses information for “permissible purposes”. Resolutions of the ICANN Board. sometimes 5. However it also agreed to set up an international Internet Governance Forum. the new Affirmation of Commitments agreement between ICANN and the U.[53] has now become known as the Uniform Dispute Resolution Policy (UDRP).ular. there are criticisms from ICANN whois constituencies including the Noncommercial Users Constituency (NCUC) and the At-Large Advisory Committee The initial report of ICANN’s Expert Working Group (ALAC) that there is not enough public disclosure and has recommended that the present form of Whois. with a consultative role on the future governance of the Internet. Regulatory enforcement.S.[58][59] ICANN’s list of permissible purposes includes Domain name research.” However. consensus driven. democratic manner. issue of domain name ownership resolution for generic Also in 2011. and the result program (sometimes referred to as a “commercial . loosely known as the “I*" (or “I-star”) group. The current contract that the United States Department of Commerce has with ICANN will 5.[68] As of September 2014. would seek to move Internet governance into a “UN Committee on Internet-Related Policy” (UNCIRP). this group.5.5.[71] After outrage from India’s civil society and media. towards an environment in which all stakeholders. that opposes the rollout of ICANN’s TLD expansion program. the World Wide Web Consortium. including Russia. CRITICISM landgrab”[67] ). Latin America and Caribbean Internet Addresses Registry. and academia.3 Global Multistakeholder Meeting on the Future of Internet Governance (2013) In October 2013.1 IBSA proposal (2011) 21 5. and the five regional Internet address registries (African Network Information Center.[74][75][76] 5.[78] At the IGF VIII meeting in Bali in October 2013 a commenter noted that Brazil intends the meeting to be a "summit" in the sense that it will be high level with decision-making authority. and Réseaux IP Européens Network Coordination Centre). civil society.[76][80][81] One controversial proposal. industry. and President Rousseff’s speech at the opening session of the 2013 United Nations General Assembly. The statement was signed by the heads of the Internet Corporation for Assigned Names and Numbers (ICANN). It reflected a compromise and did not harshly condemn mass surveillance or include the words “net neutrality”. met with Brazilian President Dilma Rousseff in Brasilia.5. ICANN initiated an effort to protect trademarks in domain name registrations.[79] The organizers of the “NET mundial” meeting have decided that an online forum called "/1net”.[87] The meeting produced a nonbinding statement in favor of consensus-based decision-making. and South Africa (IBSA). 5. The final resolution says ICANN should be under international control by September 2015. Among other things. the two announced that Brazil would host an international summit on Internet governance in April 2014. the Internet Engineering Task Force.4 NetMundial Initiative (2014) The NetMundial Initiative is a plan for international governance of the Internet that was first proposed at the Global Multistakeholder Meeting on the Future of Internet Governance (GMMFIG) conference (23–24 April 2014)[42][84][85] and later developed into the NetMundial Initiative by ICANN CEO Fadi Chehade along with representatives of the World Economic Forum (WEF)[86] and the Brazilian Internet Steering Committee (Comitê Gestor da Internet no Brasil). the Indian government backed away from The Obama administration that had joined critics of the proposal. the Internet Society. China.[83] On 7 October 2013 the Montevideo Statement on the Future of Internet Cooperation was released by the leaders of a number of organizations involved in coordinating the Internet’s global technical infrastructure. Brazil. were unhappy with the final resolution and wanted multi-lateral management for the Internet.5. Fadi Chehadé. the Internet Architecture Board. commonly referred to as “CGI.[69] Partly as a response to this criticism.[71][72] The statement called for the subordination of independent technical organizations such as ICANN and the ITU to a political organization operating under the auspices of the United Nations. This desire to move away from a United States centric approach is seen as a reaction to the ongoing NSA surveillance scandal. The "Global Multistakeholder Meeting on the Future of Internet Governance (NET mundial)" will include representatives of government. will be a major conduit of non-governmental input into the three committees preparing for the meeting in April.[88] A minority of governments. has been joined by 102 associations and 79 major companies.2 Montevideo Statement on the Future expire in 2015. American Registry for Internet Numbers. resulting from a September 2011 summit between India. AsiaPacific Network Information Centre. in a group organized by the Association of National Advertisers. government. Iran and India.[77] The announcement came after the 2013 disclosures of mass surveillance by the U. Upon Chehadé's invitation. where she strongly criticized the American surveillance program as a “breach of international law”.5.[70][71] The move was a reaction to a perception that the principles of the 2005 Tunis Agenda for the Information Society have not been met. in its place the NTIA will transition oversight of the IANA functions to the 'global multistakeof Internet Cooperation (2013) holder community'. rather than broader multi-stakeholder .br”. the statement “expressed strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance” and “called for accelerating the globalization of ICANN and IANA functions. the Coalition for Responsible Internet Domain Oversight. participate on an equal footing”. which eventually culminated in the establishment of the Trademark Clearinghouse. current President and CEO of ICANN. including all governments.S.[73] ICANN in 2011[82] announced in March 2014 that they intended to transition away from oversight of the IANA functions contract. set up by the I* group.5. despite initial support for that from Brazil. ISBN 978-0-262-04257-4.ietf. Laura (2009).09. ZDNet. [8] http://commdocs. Accessed 2009. The New Republic. exploitive and coercive” by the Intellectual Property Constituency that advises the ICANN board.[91] 5.”[98] 5.[90] In June 2014. it is expected that most of the fees will come from “Brand Protection” customers registering their trademarks to prevent domains being registered. Protocol Politics: The Globalization of Internet Governance. https://tools.” Canadian brands had complained that they were being charged “exorbitant” prices to register their trademarks as premium names.gov/committees/science/ hsy268140.22 CHAPTER 5. Retrieved 31 March 2014.org/html/rfc2460.sucks domains and everyone else $10. will have the effect of undermining the credibility ICANN has slowly been building with skeptical stakeholders. a plan for international governance of the Internet first proposed at the Global Multistakeholder Meeting on the Future of Internet Governance (GMMFIG) conference. Department of Commerce and Internet Corporation for assigned names and numbers”. [3] California Secretary of State. “I REMEMBER IANA”.sucks domain registrar has been described as “predatory. Cerf (October 17.[92] and has accepted the highly controversial domain names ".”[93] Steve DelBianco says that businesses are “very concerned about what they consider extortionist pricing. [2] “Memorandum of understanding between the U. Internet Corporation for Assigned Names and Numbers.6 See also • Alternative DNS root • Domain Name System • Domain name • Domain name registrar • Internationalized domain name • Top-level domain • Country code top-level domain • Generic top-level domain • Geographic top-level domain (GeoTLD) • Domain slamming • IEEE Registration Authority • Internet Assigned Numbers Authority (IANA) • InterNIC • List of ICANN meetings • Montevideo Statement on the Future of Internet Cooperation • NetMundial Initiative.sucks’. Dept of Commerce/NTIA. .house. Retrieved 2009-09-30. supported and included the NetMundial statement in its own report.sucks”. Retrieved 14 March 2013. Barack Obama Isn't Handing Control of the Internet Over to China”. 1998).[89] A month later.[93] Because of the low utility of the ". FTC chair Edith Ramirez has written to ICANN to say the agency will take action against the . [4] ICANN-DOC JPA 09-29-2006 [5] “US Government finally lets ICANN go”. Eileen Yu.500 for . “No.sucks domain ICANN has banked more than $60 million from gTLD auctions. ICANN management.18.5 . [6] V.5. 30 September 2009.[96] Jay Rockefeller says that .sucks owner if “we have reason to believe an entity has engaged in deceptive or unfair practices in violation of Section 5 of the FTC Act”.[93] When the .sucks registry announced their pricing model. [7] Zittrain. • Network Solutions • OpenNIC • Trademark Clearinghouse • Uniform Domain-Name Dispute-Resolution Policy • WHOIS 5. a gTLD with little or no public interest value. IETF.”[94] The . the Panel On Global Internet Cooperation and Governance Mechanisms (convened by the Internet Corporation for Assigned Names and Numbers (ICANN) and the World Economic Forum (WEF) with assistance from The Annenberg Foundation).xxx" and ".sucks” domain.[95] Virginia member of Congress Bob Goodlatte says that trademark holders are “being shaken down” by the registry’s fees. 23–24 April 2014).000/hsy268140_0. 25 November 1998.S. 30 July 2014. Retrieved 30 June 2015. Jonathan. “most brand owners were upset and felt like they were being penalized by having to pay more to protect their brands. RFC 2460.HTM [9] DeNardis.7 References [1] “ICANN Bylaws”.[97] The Register reported that intellectual property lawyers are infuriated that “the dot-sucks registry was charging trademark holders $2. saying ICANN is not a fit venue for Internet governance and that alternatives should be sought. [10] “Management of Internet Names and Addresses”. France strongly attacked ICANN.sucks is a “a predatory shakedown scheme” and “Approving '. p. Voice of America. News release. Baker. Internet Corporation for Assigned Names and Numbers (ICANN). [13] D.but what now?". The Guardian. Media Release. Stan Schroeder. Retrieved 22 February 2013. 2011 [40] Internet minders OK vast expansion of domain names. 2006. 2006 [29] CNET: Domain name price hikes come under fire 23 [30] The Register. Internet Corporation for Assigned Names and Numbers (ICANN). 2008-06-22. retrieved November 1. Accessed June 20. 16. 20 June 2001 [44] “ICANN Approves New Top-Level Domains. March 31. MoU Between IETF and ICANN concerning IANA. [16] “Executive Summary of DNS/ICANN Issues”. [14] “Executive Summary of DNS/ICANN Issues”.18. 2011. Retrieved 21 May 2012. The Register. 2008-07-30.com [33] “Registrar Accreditation Agreement”. [27] “ICANN imposes $2 Internet tax”. 2014-04-23. [22] Rebecca MacKinnon (31 January 2012).S. Internet Governance and the Information Society: Global Perspectives and European Dimensions. 20 June 2011 [45] Icann announces huge expansion of web domain names from 2012. A smart bear. F.Whatever”. 2011.C. [47] BYLAWS FOR INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS | A California Nonprofit Public-Benefit Corporation. ICANN. ISBN 978-9077596-56-2. June 20. Retrieved 21 May 2012.htm [36] “Accountability and Transparency Review Team – Selection of Independent Expert and Update on ATRT Review”. BBC News. July 1. Internet Corporation for Assigned Names and Numbers (ICANN). KnujOn. Retrieved 2008-06-23. [17] “DNSO Application Timetable”.S. ICANN.icann. Accessed June 20. 23 May 2008 [32] “2008 ICANN Registrar Report”. Burke Hansen Of ICANN and the Registerfly meltdown. [18] ICANN Board. News release. So Prepare For . [19] “DNSO Formation Concepts”. SunWorld. 2005. 3 February 2011 [39] New Internet Name Rule Opens Door to Huge Changes. “Wildcard entries in DNS entries”. p. [12] B. DoC letter to ICANN’s Chairman”.org/en/announcements/ announcement-01oct08-en. Internet Corporation for Assigned Names and Numbers (ICANN). [23] “Bush administration annexes Internet”. News release. ICANN. Accessed 2009. 2011. Nancy. 28 February 2006. The Register. ZDNet. 2011 [46] “When free markets make it worse: new TLDs”. IAB. ISBN 978-0-465-02442-1. 207. 2011 [42] “Future of the internet debated at NetMundial in Brazil”. Berkman Center. Retrieved 13 April 2012. IETF. Roberts (June 2000). July 27. ICANN. [20] “United States cedes control of the Internet . 18 July 2011. Accessed June 20. DNSO. June 20. Berkman Center.5. “New U. 10 August 2010 [37] “The First AART (Accountability and Transparency Review Team) Review was Completed in December 2010”. 17 January 2012 [38] “Available Pool of Unallocated IPv4 Internet Addresses Now Completely Emptied”. Retrieved 21 May 2012. 2011. 2005. Internet Corporation for Assigned Names and Numbers (ICANN). Retrieved 22 May 2012. Accessed June 20. RFC 2860. June 20. Carpenter. https://tools. News release. 17 May 2001 with updates 2002-2006 [34] “32nd International Public ICANN Meeting”. Internet Corporation for Assigned Names and Numbers (ICANN). Department of Consumer and Regulatory Affairs. Internet Corporation for Assigned Names and Numbers. REFERENCES [11] Weil. [35] http://www. [28] “ICANN Board Approves VeriSign Settlement Agreements”. [15] “Santiago Resolutions”. Eleven International Publishing. Retrieved 13 April 2012. Veronika Bauer. ICANN. policy turns 'Net governance over to private sector”. . ICANN Board Resolutions. [24] “U. Retrieved 2014-06-02. March 3. Mashable Tech. Basic Books. Internet Corporation for Assigned Names and Numbers (ICANN). 2011 [41] Icann to allow any word as a domain. Retrieved on 2014-04-28. Kettemann (2008).org/html/rfc2860. June 20. Associated Press. 29 July 2002 [26] Geoff Huston (2003-10-17). “DNSO Singapore Statement”. Harvard Cyberlaw Briefing Book.09. Consent of the Networked: The Worldwide Struggle For Internet Freedom. Retrieved 2008-08-03. Retrieved 21 May 2012. Retrieved 10 April 2012. [43] “ICANN Approves Historic Change to Internet’s Domain Name System – Board Votes to Launch New Generic TopLevel Domains”.7. 2007 [31] "'Worst Spam Offenders’ Notified by ICANN. [21] Wolfgang Benedek. Retrieved 21 April 2015. Electronic Frontier Foundation (EEF). Matthias C. M. The Register.ietf. [25] “Court Grants Access to Net Regulatory Corp Records”. CNN. [64] Froomkin. CircleID. “Icann criticised over 'commercial landgrab' of internet”. Retrieved 20 September 2014. [49] “Bylaws For Internet Corporation For Assigned Names And Numbers”. Domain Incite. [74] Montevideo Statement on the Future of Internet Cooperation. Kathleen E. Criticisms”.org/display/gacweb/GAC+ Observers GAC Observers [69] “Coalition for Responsible Internet Domain Oversight (CRIDO)". [67] Arthur. “Obama administration joins critics of U. “Booting up Brazil”. [76] Milton Mueller (2013-11-19). “Wrong Turn in Cyberspace” (PDF). 32-34 (2005). Retrieved 20 September 2014. Retrieved 5 November 2013.org. Retrieved 11 October 2013. “ICANN’s Call For New Domain Names Brings Criticism. [61] Sjmc: Common Sense Journalism. Go to Governance.org. . India).D. Retrieved 23 September 2013. Palácio do Planalto. Jour. The Guardian. Indonesia. icann.3. UNCUT. 7 October 2013. [72] “Tunis Agenda for the Information Society”. 18 November 2005 [73] Kaul. (14 February 2001). Go to Governance.24 CHAPTER 5. October 3. Charles (13 June 2012). [62] Fuller. 25 February 2012. [81] Paul Wilson (2013-11-29). [52] https://gacweb. Ian (1 March 2011). 25 February 2012. Brazil [55] “Power grab could split the net”. IGP Blog.edu. [50] “Bylaws For Internet Corporation For Assigned Names And Numbers”. [79] “Chair’s Summary”. The Battle for Mindshare: the Emerging Consensus that the First Amendment Protects Corporate Criticism and Parody on the Internet. “ICANN: The Debate Over Governing the Internet” (PDF). Retrieved 21 June 2014. The Register. [51] https://gacweb. Retrieved 15 March 2013. Retrieved 15 March 2013. Archived from the original on July 12. Retrieved 201402-11. [59] Murphy. Bylaws. Eighth Meeting of the Internet Governance Forum (IGF).N. OCLC 1567016. nonprofit group that oversees Internet”.sc. [60] Intellectual Property Solutions & Legal Support Services. 25 February 2012. 22–25 October 2013. Vjolt. Sandeep (20 October 2012). Mahima. Grant (1 October 2009). PC World. “India changes its internet governance position — backs away from UN proposal”. Mark (21 December 2011). ARTICLE XI and ARTICLE XI-A. Retrieved 20 September 2014. CircleID blog. December 5. World Summit on the Information Society. Michael (Oct 2000). Retrieved 2014-02-11. ICANN Expert Working Group. Duke Law & Technology Review (Duke University). ICANN. Retrieved 2014-02-11. Bylaws. Bill (14 June 2012).icann. Jeremy (2008). [70] Bamzai. The Washington Post. OCLC 436943765. 2012. [71] “Recommendations from the IBSA (India-Brazil-South Africa) Multistakeholder meeting on Global Internet Governance”. Retrieved 5 November 2013. [63] Malcolm. “New ICANN Agreement Runs Into Criticism”. [78] “Brazil to host global internet summit in ongoing fight against NSA surveillance”. And $357 Million”.1. Section 2. Retrieved 20 September 2014. Rik Myslewski. [80] “CENTR: Internet Governance in 2013 and What’s Coming Up in 2014”.). “Muzzlers of the Free Internet”. ARTICLE VIII-Article X. 2005. ICANN [48] “Bylaws For Internet Corporation For Assigned Names And Numbers”. Rio de Janeiro. Washington Post. Retrieved 4 March 2014. RT News. 10 October 2013. ARTICLE XI and ARTICLE XI-A. [75] “Brazil’s anti-NSA prez urged to SNATCH keys to the internet from America”. LCCN sf82007022. London: Mail Today (New Delhi. MultiStakeholder Public Policy Governance and its Application to the Internet Governance Forum (Ph. [56] ICANN Government Advisory Committee [57] Hannibal Travis. 2002.org/display/gacweb/GAC+ Representatives GAC Representatives [68] Chappell. CPA Global. Duke Law Journal (Duke University School of Law) 50 (17). CNET.org. ANA. Retrieved on 2014-04-28. Retrieved 20 September 2014. [53] ICANN decided to reduce direct public (“at large”) participation on March 14. Retrieved on 2014-04-28. Kevin (13 June 2014). Bali. Retrieved 12 October 2013. Murdoch University. Retrieved 20 September 2014. icann. Retrieved 20 September 2014. 9 October 2013. [66] Milian. 10 Virginia Journal of Law and Technology 3. [77] “Entrevista com Fadi Chehadé: Brasil sediará encontro mundial de governança da internet em 2014”.icann. “Whois “killer” is a recipe for a clusterfuck”. NPR. “2. Ghana. ISSN 0012-7086. 2003. [82] Shapira. Bylaws. [54] “U. Summit to Focus on Internet”. 1–2 September 2011. “What Is “1net” to Me”. at a public meeting in Accra. icann. Go to Governance. 2014-01-27.S. “Keepers of the Internet face their greatest challenges ever”.net [58] “Initial Report from the Expert Working Group on gTLD Directory Services: A Next Generation Registration Directory Service” (PDF). Retrieved 20 September 2014. [65] Gross. 11 October 2013. Retrieved 20 September 2014. ” TIME. 2014-05-03. Retrieved 2014-06-02. The Register. • Official website [88] “At NETmundial. Ruling the Root. 2011.5. Businessweek.br”.Debrief with Founding Partners”. [97] “Canada weighs in on . March 5..9.sucks debate”. PC Tech Magazine. Marcus. [86] “NETmundial Initiative . 2011. Business Standard.9 External links [87] “Public Declaration on the NETmundial Initiative issued by members of the board of CGI. 50 Duke Law Journal17 (2000) 5. Agence France-Presse. dot-sucks!". Retrieved 2014-06-02.com (wiki with people and companies related to ICANN) • National Telecommunications & Information Administration: ICANN • ICANNWatch (co-founded by David J. EXTERNAL LINKS [83] “NTIA Announces Intent to Transition Key Internet Domain Name Functions”. Decentralized Internet Governance Ecosystem . [94] “Is . The Register. Daniel J. 2010) (site advocating the return of public representation in ICANN apparently offline since April 2011) • DomainTools: DailyChanges. Addressing the World.S.. 2014-05-20.uk. Farber) • the icannatlarge community at the Wayback Machine (archived December 30. NTIA. Erica. Yahoo! News. 2014-05-21. 2014-0503.SUCKS Pricing Model Gaining Traction With Other Registries?". [91] “France attacks ICANN as unfit for internet governance”. "ICANN vs. ISBN 0-74252809-X • ICANN DNS Operations • ICANNWiki. • Franda.com (free website reporting daily DNS changes and web hosting activity) • The Guardian: Who holds the seven keys to the internet? – video . the U. Mirror. Michael Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution. 17 Aprr 2015. CircleID. CircleID. [96] “A Debate Over the Domain ‘. Internet Governance in Transition. [95] “19 Jun 2015”. Wall Stree Journal. [92] “ICANN banked $60m from dot-word auctions. 5. Retrieved 2014-06-02. 25 Jun 2015.co. Retrieved 2014-0602. 19 June 2015. A. the World. 19 May 2015. ISBN 0-26213412-8 • Froomkin. 10 Apr 2015.8 Further reading • Brito. The Emergence of an International Regime. IP Pro. Check date values in: |date= (help) [93] “ICANN urges US. Retrieved 25 October 2014. you hoser!". 25 June 2014. Retrieved on March 6. 2014-04-30. Just what exactly is it going to spend it all on?". Timeline for Future Management of Internet”. Kept Its Companies on the Global Stage”. [85] “ICANN Releases Roadmap. ISBN 1-55587-999-3 • Wass. Retrieved 20 September 2014. 25 • Paré. • ICANN FY12 board member report of payments [89] “The future of the internet”. NTIA. Retrieved 2014-06-02.sucks’". Jerry. Canada: Help us stop the 'predatory' monster we created . The Register.report by the Panel On Global Internet Cooperation and Governance Mechanisms”. 15 Jun 2015. Retrieved 2014-06-02. ISBN 0-7425-1846-9 • Mueller. Milton L. [98] “Canada to ICANN in dot-sucks dot-rumble: Take off. Retrieved 2014-06-02. [84] “NETmundial Multistakeholder Statement Concludes Act One of 2014 Internet Governance Trifecta”. [90] “Towards a Collaborative. ARIN.2 Organization services 6.net/resources/index.1 Registration services biguation). and many Caribbean and • IPv4 address allocation and assignment North Atlantic islands. 26 . including IPv4 and IPv6 • IPv6 address allocation and assignment address space and AS numbers. develops consensus-based policies. For other uses. ARIN opened its doors • AS number assignment for business on December 22. a nonprofit corporation.3 Policy development services Policy development services facilitate the development of These services are grouped in three areas: Registration. The American Registry for Internet Numbers Services include: (ARIN) is the Regional Internet Registry (RIR) for Canada.1. allocates Internet Protocol resources. and ARIN. ARIN members.[3][4] • Registration transaction information ARIN is one of five Regional Internet Registries (RIRs) (WHOIS) in the world. and Policy Development. specific distribution policies. • Participates in the international Internet community html. Like the other RIRs. The nature of these services is described in ARIN’s mission statement: Applying the principles of stewardship.Chapter 6 American Registry for Internet Numbers “ARIN” redirects here. Organization services pertain to interaction between stakeholders. the United States. and guidelines for requesting • Is a nonprofit. ARIN manages the distribution of Internet number resources.6. • Is governed by an executive board elected by its membership 6. This section includes the request templates. Virginia.[2] ARIN is a nonprofit corporation • Directory services including: with headquarters in Chantilly.arin. Services include: • Elections • Members meetings • Information publication and dissemination • Education and training 6. community-based organization and managing Internet number resources.1 Services ARIN provides services related to the technical coordination and management of Internet number resources. Registration services pertain to the technical coordination and inventory management of Internet number resources. see Arin (disam. 1997. policy for the technical coordination and management of Internet number resources.1. USA. and facilitates the advancement of the Internet through information and educational outreach.1. ARIN: • Routing information (Internet Routing Registry) • Provides services related to the technical coordination and management of Internet number resources • DNS (Reverse) • Facilitates policy development by its members and stakeholders For information on requesting Internet number resources from ARIN. see https://www. 1997[1] after incorporating on April 18. Organization. Kim was succeeded by Raymond “Ray” Plzak until the end of 2008. Network • Maintaining discussion e-mail lists Solutions corporation transitioned these tasks as well as initial staff and computer infrastructure to ARIN. ARIN formerly covered Angola. Don Telage. The first president of ARIN was Kim Hubbard. Executive decisions are carried out following approval by the BoT.2 Organizational structure . The BoT is responsible for The countries in the ARIN service region are:[12] determining the disposition of all revenues received to ensure all services are provided in an equitable manner. The Number Resource Policy Manual. Mozambique.2 Advisory council In addition to the BoT.net/policy/nrpm. and South America. a Chairman.html.”. a 15. The ARIN Board of Trustees ratifies policies only after: 1. South Africa. and CEO. Randy Bush.4. Burundi.[11] The community develops policies by following a formal Policy Development Process as outlined at https://www. Democratic Republic of Congo.html.” Until this time. Adhering to the procedures in the Internet Resource Policy Evaluation Process. and others. Rwanda. a 7-member Board of Trustees. and a professional staff of about 50. its members. parts of the Caribbean. from 1997 until 2000. The advisory council consists of 15 elected members consisting of a Chair. 6. arin. Mexico.[6] 3. corporations and other large institutions) a voice in the policies Services include: by which they are managed and allocated within the North American region. ARIN’s complete set of current policies. The BoT consists of 7 members consisting of a President Republic of Congo. community consensus in favor of the policy. HISTORY All ARIN policies are set by the community. John Curran.6. LACNIC now handles are elected by ARIN members for three-year terms. is available at https://www. discussion on mailing lists and at meetings. full legal and fiscal review. Vice Chair. The Board of Trustees and Advisory Council Until late 2002 it served Mexico. Malawi. Central America. Trustee John Curran was ARIN consists of the Internet community within its re. 27 6.arin. Central America. Kim Hubbard. nonprofit corporation.2.4 Service Region ance received from the Advisory Council and the goals set by the registry’s members.6.[8][9] As part of the transition. and manages ARIN’s operations in a manner consistent with the guid. of IP numbers (mostly Internet service providers. Also. Namibia.acting President until July 1 of 2009 when he assumed gion.net/policy/pdp. • Publishing policy documents Raymundo Vega Aguilar.1 Board of trustees recognized by ICANN as the fifth Regional Internet Registry. Everyone is encouraged to participate in the policy development process at public policy meetings and on the Public Policy Mailing List. ARIN Advisory Council recommendation. South America and all of the Caribbean. and 4. and Jon Postel (IANA) as an ex-officio member. when AfriNIC was officially 6. Sub-Saharan Africa was part of its region until April 2005.the CEO role permanently. a Treasurer.[5] 6. member Advisory Council. The ARIN membership elects the Board of Trustees (BoT).1 Former service regions and submitted through the Advisory Council. the advisory council forwards consensus-based policy proposals to the BoT for ratification. The BoT ratifies proposals generated from the membership 6. IP address registration (outside of RIPE and APNIC regions) was done in accordance with policies set by the IETF[7] by Network Solutions corporation as part of the InterNIC project. and others.3 History The organization was formed in December 1997 to “provide IP registration services as an independent. ARIN has an advisory council that advises ARIN and the BoT on IP address allocation policy and related matters. which has ultimate responsibility for the business affairs and financial health of ARIN.[10] • Conducting public policy meetings The initial Board of Trustees consisted of Scott Bradner.3. Botswana. 2. The NaMembership is not required to participate in ARIN’s tional Science Foundation approved the plan for the crepolicy development process or to apply for Internet ation of the not-for-profit organization to “give the users number resources.2. Guyana. Costa Rica. 2009. Guatemala. Honduras. USG/NTIA. [11] Former Board Members [12] ARIN Region. South Georgia and the South Sandwich Islands. [10] “Amendment 7 to Cooperative Agreement Between NSI and U.6 External links • ARIN Home Page • ARIN Advisory Council • ARIN Board of Trustees . Government”. “United States Government’s Internet Protocol Numbering Principles”. Paraguay. Retrieved on September 16. [5] “Board of Trustees”. [7] “Network Information Services Manager(s) for NSFNET and the NREN: INTERNIC Registration Services”. ARIN. Retrieved 4 December 2012. Trinidad and Tobago. Retrieved 19 June 2013.S. Suriname. El Salvador. AMERICAN REGISTRY FOR INTERNET NUMBERS Swaziland. 6. 2009. Retrieved on September 16. and Zimbabwe until AfriNIC was formed. Zambia. Colombia. ICANN. Dutch West Indies. French Guiana. ARIN.5 References [1] About ARIN [2] Articles of Incorporation [3] "Contact Us. and Venezuela until LACNIC was formed. Uruguay. [4] "Chantilly CDP. Chile. Falkland Islands (UK). [8] NSF Press Release regarding ARIN formation [9] Strickling. Retrieved 16 March 2013. Aruba. Census Bureau.” American Registry for Internet Numbers. National Science Foundation. Belize.28 CHAPTER 6. Nicaragua. Mexico. Ecuador. Haiti. Peru. countries list 6. Bolivia. ARIN formerly covered Argentina. Dominican Republic. Tanzania.S. Lawrence. [6] Advisory Council “Advisory Council”. Brazil. Panama.” U. Cuba. Virginia. 0/8.0.0/8.0. 191.Chapter 7 Latin America and Caribbean Network Information Centre • Reverse DNS delegations • Representing the interests of the Latin American and Caribbean Internet community on the global stage 7. Among them Oscar Messano.0.2 History The office building that houses LACNIC in Montevideo.0/8.0. released a discussion paper. Brasil. This paper proposed a new organization to handle internet resources (that later became ICANN). Following this release.0. 181. the last one in Buenos Aires. LACNIC has been allocated the IPv4 address blocks 177. 29 . 190. and 201. among them.[3][4] Since 1993.0/8.0/8.0.0.0. Fabio Marinho. The Latin America and Caribbean Network Information Centre[1] (LACNIC. discussed the need of a register for Latin America. Ira Magaziner. In 1998 during an ENRED meeting in Panamá including NIC-MX.br) and President of ASSESPRO – Associação • Allocating IPv4 and IPv6 address space.0.0. Anthony Harris and Edmundo Valiente from CABASE.0. member of the Brazilian Internet Steering Committee LACNIC’s main functions are: (CGI.0/8 and IPv6 blocks 2001:1200::/23 and 2800:0000::/12. IFWP organized four meetings.0.0. academic organizations in Latin America like ENRED – Foro de Redes de América Latina y el Caribe.0.0. this theme was discussed and they learned that another group formed by commercial organizations like CABASE — Cámara Argentina de Base de Datos y Servicio en Línea and e-COMLAC (Latin America and Caribbean Federation for Internet and Electronic Commerce). A revised version known as the “white paper” was released on June 5.0. 186. known as the “green paper” after the DNS root authority incident. the IFWP or International Forum for the White Paper. a number of groups organized conferences to discuss its proposal and make suggestions.0/8. then the senior adviser to President Clinton for policy development.0. NIC México American and Caribbean region Oscar Robles and German Valdez. where several South Americans distinguished persons and organizations participated and got to know each 7. y Julian Dunayevich. and similar organisations. were also discussing the idea of a Latin American registry. 1998. 179.0/8. 189.0/8. Portuguese: Registro de Endereçamento da Internet para América Latina e Caribe) is the Regional Internet Registry for the Latin American and Caribbean regions.0. Spanish: Registro de Direcciones de Internet para América Latina y Caribe. It is a not-for-profit. membership-based organisation whose members include Internet Service Providers.1 Functions other. 200.0/8.0. and Brasileira de Empresas de Software Serviços de Informática e Internet. Uruguay. On January 30.AHCIET – AssoAutonomous System Numbers ciation Hispanoamericana de Centros de Investigacion y • Maintaining the public Whois Database for the Latin Empresas de Telecomunicaciones. Raimundo Beca . LACNIC[2] provides number resource allocation and registration services that support the global operation of the Internet.0. 187. this LACNIC Interim Board submitted on August 26. among the Eliezer Cadenas (ENRED). later substituted by vided by LACNIC. 1999. Fabio Marinho (1999-2010) Brazil • LACNIC Caribbean .30 CHAPTER 7. Netherlands Antilles . According .6 Membership • LACNIC XII . was formally recognized by ICANN during its Shanghai meeting in 2002.mx – German Valdez.May 25 to 29. Netherlands Antilles 7.July 22 and 23. Raul Echeverria. this agreement to Esther Dyson. • CGI. LATIN AMERICA AND CARIBBEAN NETWORK INFORMATION CENTRE Raul Echeverria. • Members An Interim Board was defined with six members: • Members can directly influence the LACNIC’s activities and services.5 Structure Finally. LACNIC.5. the organization responsible for this region at that moment. Uruguay and technical facilities German Valdez (1999-2003) provided by CGI. in NIC. with technical people and equipment in São Paulo.3 LACNIC meetings Jesus Martinez (2004-2006) Carlos Neira (2007–2009) • LACNIC XI 26-30 May 2008 . being in full conformance with the criteria[5] 7.br). ble for nominating and electing candidates to • CABASE – Jorge Plano. the agreement for creation of LACNIC (Latin 7. Raimundo Beca (1999-2004) 7. ENRED. and feedback on.Salvador. 2009 .1 Organisational American and Caribbean IP Address Regional Registry). Members are responsi• AHCIET – Raimundo Beca.Willemstad.2 Executive Board for a new Regional Internet Registry as set forth by the Internet Registry community and ICANN. • NIC.Curaçao. Others persons participated in these early discussion. Organizations that receive IP addresses directly from Panamá LACNIC automatically become members. 1999 dur.May 16 to 21. • LACNIC XIII .[6] • Former Directors LACNIC was established in 2001.LACNIC region 7.The LACNIC consists of: ing the second ICANN meeting. A Business Plan of this new organization was developed and presented to ARIN. was signed in Santiago de Chile on August 22. Raphael Mandarino (CGI. • ECOMLAC – Fabio Marinho.br[7] of São Paulo. Curaçao. Fidel Vienegas (AHCIET). ing the LACNIC charging scheme and approving the LACNIC Financial Report each year. Members also give input to. with administrative offices in Montevideo.br – José Luis Ribeiro. then Chair of ICANN Interim Board for ICANN approval. • Executive Board • LACNIC members nominate and elect the Executive Board. • LACNIC Staff • Staff members perform the activities of LACNIC. the activities carried out and the services pro• ENRED – Julian Dunayerich. 2008 7. Those organizations joined by eCOMLAC – Federación Latino Americana y Caribeña para Internet y el Comercio Electrônico. argumented that Latin American IPs addresses could be handled by a local entity and reached an agreement for its creation. Next step. later substituted by Oscar the LACNIC Executive Board and for acceptMessano. Bahia. 2010 .Panamá City.5. provide services to its members and provide administrative support to LACNIC. Statutes were created and it was decided that LACNIC headquarters would be in Montevideo.4 Countries .br premises. The Board consists of six members and is responsible for appointing the LACNIC’s Executive Directo and for the overall financial situation of LACNIC. [8] • LACTLD . lacnic.LACNIC Agreement (Project +RAICES) • ORT University . Thus. LACNIC contributes to the growth and evolution of the regional Internet community. Through the first agreement it was possible to have the technical infrastructure and human resources necessary for LACNIC’s operational center in the city of São Paulo during the first two years of its existence. An example of this are the initial agreements signed with Comite Gestor do Internet Brazil and NIC Mexico.net. although it is not its primary role.7. Likewise.10 References [1] “Memorandum of Understanding between LACNIC (the Latin America and Caribbean Network Information Centre. • CLARA . it was possible to implement LACNIC’s training plans at the expense of said organization.8 The Number Resource Organization With the other RIRs. to promote and protect the bottom-up policy development process. nro. In the case of the agreement with NIC Mexico.LACNIC Cooperation Agreement 7.9 External links • Lacnic.LACNIC Agreement It is not necessary to become a member of LACNIC prior to applying for IP address space (or any other resource). • NIC-MX . zation. integrating and co-participating in the organization of forums and other events as well as supporting research on strategic issues. enhancing its international presence • ICA-IDRC . there are different member categories and levels.7 LACNIC cooperation agreements Since its creation. ment and effect on policy definition and global resource Membership is open to any interested person or organi. 7.LACNIC Agreement • University of the Republic (School of Engineering) .official site. These two agreements have had a very important role in LACNIC’s achievement of stability and viability during its initial stages. [2] “LACNIC´s Board of Directors Elections”.management of the network at international level.LACNIC Agreement • Exchange Programs with other RIRs • Support and Participation in Regional Events and other Forums 7.LACNIC Agreement (FRIDA Program) • ISC . in others by facilitating the institutionalization of regional organizations. • About LACNIC’s membership.net 7. and obligations see the LACNIC webpage. resulting in a greater degree of involveisters. which exists to protect the unallocated number resource pool. [3] IANA. and to be the focal point for input into the RIR system.8.org IPv4 . Retrieved 7 October 2010. For this reason. 1 April 2004. this means that those organizations that do not receive IP addresses directly from LACNIC can also apply • NIC-BR . lacnic.LACNIC Cooperation Agreement nor will doing so make it easier to obtain them. and to satisfy its primary purpose of Internet resource management for the region of Latin America and the Caribbean. LACNIC has adopted an active cooperation policy seeking to consolidate itself as an organization. we believe that by generating different cooperation agreements and activities LACNIC can make a significant contribution to the strengthening of the institution as well as to the growth and development of the Internet community within the region. but the intention is always to complement the resources and actions of each organization. lacnic. Inc. referred to here as “LACNIC”) and Internet Systems Consortium. THE NUMBER RESOURCE ORGANIZATION 31 the size of the address space each organization admin. • ECOM-LAC .and relevance. LACNIC is a member of the Number Resource Organization (NRO). to strengthen its involvement in the growth and development of the Internet within the region. rights. through the preparation of material and the organization of meetings in different countries of our region. (referred to here as “ISC”)" (PDF). in some cases it participates by using its own funds or obtaining funds from outside the region.net • Development of the Regional Internet Registry System. LACNIC’s participation in each agreement is varied and depends on the capabilities that are available in each case.net.LACNIC Agreement for membership.LACNIC Cooperation Agreement For detailed information about member categories.net . [7] “Inicio do processo eleitoral do CGI. 31 October 2002. [6] “Regular Meeting of the Board Minutes”. LATIN AMERICA AND CARIBBEAN NETWORK INFORMATION CENTRE [4] IANA.br” (in Portuguese). ICANN. Retrieved 7 October 2010.net . Retrieved 7 October 2010.org.org IPv6 [5] “ICANN ICP-2 criteria”.br.32 CHAPTER 7. [8] LACNIC. CG. base station sites and minimum technical requirements for a 3G service.9G”).[1] This is based on a set of standards used for mobile devices and mobile telecommunications use services and networks that comply with the International Mobile Telecommunications-2000 (IMT-2000) specifications by the International Telecommunication Union. standardized by 3GPP. 3G telecommunication networks support services that provide an information transfer rate of at least 200 kbit/s. • The TD-SCDMA radio interface was commercialized in 2009 and is only offered in China. The above systems and radio interfaces are based on spread spectrum radio transmission technology. A new generation of cellular standards has appeared approximately every tenth year since 1G systems were introduced in 1981/1982.5G and 3. While 8.Chapter 8 3G For other uses. first offered in 2001.75G. sharing infrastructure with the IS-95 2G standard. fixed wireless Internet access. standardized by 3GPP2.2 Mbit/s). fixed wireless Internet access. Several radio interfaces are offered. utilizing the same switching nodes. mobile Internet access. first offered in 2002. Services advertised as 3G are required to meet IMT2000 technical standards. but new base station and cellcent 3G releases. The latest release EVDO Rev B offers peak rates of 14. mobile Internet access.The following common standards comply with the ity and speed (data transfer rates). a revision by the 3GPP organization to the of at least 200 kbit/s (about 0. a system is required to provide peak data rates • EDGE. The first 3G networks were introduced in 1998 and fourth generation "4G" networks in 2008. The following standards are typically branded 3G: 3G. Japan. However. used primarily in Europe. used especially in North America and South Korea. The cell phones are typically UMTS and GSM hybrids. many services advertised as 3G provide higher speed than the older 2G GSM based transmission methods. video calls and mobile TV. are based on completely different technologies. can provide peak data rates up to 56 Mbit/s in the downlink in theory (28 Mbit/s in existing services) and 22 Mbit/s in the uplink. DECT cordless phones and Mobile WiMAX standards formally also fulSeveral telecommunications companies market wireless fill the IMT-2000 requirements and are approved as 3G mobile Internet services as 3G. To meet the IMT-2000 IMT2000/3G standard: standards. Later 3G releases.75G. video calls and mobile TV technologies.1 Overview the GSM EDGE standard (“2. It is based on the three times as 33 . • the UMTS system. smartphones and mobile modems in laptop computers. • the CDMA2000 system. also provide mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop computers. including standards for reliabil. • The latest UMTS release. Each generation is characterized by new frequency bands. This ensures it can be applied to wireless voice telephony. sharing the same infrastructure: • The original and most widespread radio interface is called W-CDMA. China (however with a different radio interface) and other regions predominated by GSM 2G system infrastructure. often denoted 3. these are typically not branded 3G. also provide mobile broadband access of several Mbit/s to phone RF circuits. The cell phones are typically CDMA2000 and IS-95 hybrids. higher data rates and non– backward-compatible transmission technology. and vertised service is provided over a 3G wireless network. short form of third generation. see 3G (disambiguation). indicating that the adstandards by ITU. often denoted 3. is the third generation of mobile telecommunications technology.[2] 3G finds application in wireless voice telephony.7 Mbit/s downstream. Refrequencies as GPRS. HSPA+.5G and 3. [7] • HSPA is an amalgamation of several up[3] also known as FOMA. EDGE shows slightly better system spectral efficiency than the original UMTS and CDMA2000 systems. ignoring the other air interface options.work carried out by the International Telecommunication Union (ITU) in the early 1980s. and offers speeds of 14. 3G efficient 8PSK modulation scheme as supplement to the original GMSK modulation scheme.76 Mbit/s up. cations. commonly operated on the 2. which were included because they fit the IMT2000 definition. ods and hardware. a further revision and upgrade [5] also known as UTRA-TDD 3. 2G networks as well as revolutionary standards that require all-new network hardware and frequency allo• The Universal Mobile Telecommunications System.4 Mbit/s down and 5. • W-CDMA is the most common deployment.[3] . can provide theoretical peak (HCR) data rates up to 168 Mbit/s in the downlink and 22 Mbit/s in the uplink. in practice EDGE is seldom marketed as a 3G system. B offers downstream peak rates of 14. The family is a with 2G GSM standards and bandwidths.1 Break-up of 3G systems The 3G (UMTS and CDMA2000) research and development projects started in 1992. but do not full revision from GSM in terms of encoding meth. as be retrofitted to broadcast in the UMTS/W-CDMA well as the independently developed standards DECT and format. evolving from the original IS-95 CDMA system. although some GSM sites can which consists of standards developed for IMT-2000. Europe and Africa. has peaks There are evolutionary standards (EDGE and CDMA) of 1 Mbit/s downstream and 400 kbit/s up. and thus formally fulfills the IMT2000 requirements on 3G systems. and it is thus a dead end. and allows peak data rates in the order of 200 kbit/s.100 MHz band. but it is difficult to reach much higher peak data rates due to the limited GSM spectral bandwidth of 200 kHz. C enhanced existing and new terminal user experience. 8. today ceased.[8] UMTS is the common name for grades to the original W-CDMA standard a standard that encompasses multiple air interfaces. A few others use the 850. The cell phones utilise UMTS in combination created and revised by the 3GPP. 3G technology is the result of research and development China.support EDGE. • Evolved EDGE. the latest revision. using [6] also known as UTRA-TDD 1. South.1. South Korea. EDGE is still used extensively due to its ease of upgrade from existing 2G GSM infrastructure and cell-phones. including CDMA2000 1x and CDMA2000 High Rate Packet Data (or EVDO).75G”) and UMTS enhancements of HSPA+ (“3G”) functionality.9G system. WiMAX was added in 2007.900 MHz [1] Can also be used as an upgrade to PDC or D-AMPS.[4] system.[5] The latter group is the UMTS family.2 History from the 3GPP). MIMO and While EDGE fulfills the 3G specifications. 900 and 1. standardized by 3GPP2 (differing 8. but is not commercially used. they are not usually considered due to their rarity and unsuitability for usage with mobile phones.that are backward-compatible extensions to pre-existing stream. • CDMA2000 1x Rev. • The CDMA2000 system. India. 3G specifications and east Asia.[4] also known as UTRA-FDD.1457 Recommendation. Technically though. However. HSPA is backward. W-CDMA is sometimes used compatible with and uses the same freas a synonym for UMTS. is used especially in North America. While DECT cordless phones and Mobile WiMAX standards formally also fulfill the IMT-2000 requirements. 0 EVDO Rev.34 CHAPTER 8.7 Mbit/s while Rev. Japan. • EDGE combined with the GPRS 2. E has an increased voice capacity (in excess of three times) compared to Rev. • HSPA+. bands. but a 2. or IS-2000. most DC-HSPA can be used without the "+" GSM/UMTS phones report EDGE (“2. ITU approved five radio interfaces for IMT-2000 as a part of the • EDGE was also a mode in the IS-135 TDMA ITU-R M. Pakistan. [2] development halted in favour of LTE.5G technology is called EGPRS.84 Mcps high chip rate of HSPA.28 Mcps low chip rate (LCR) a combination of air interface improvements as well as multi-carrier HSPA and MIMO. In 1999. WiMAX. just as the original UMTS WCDMA versions.[8] quencies as W-CDMA. according to the Global Mobile Suppliers Association (GSA). Other leading countries for 3G use include Nepal. The first commercial 3G network was launched by Hutchison Telecommunications branded as Three or “3” in June 2003. and the Android family). In December 2007. The first commercial United States 3G network was by Monet Mobile Networks. The communication spectrum between 400 MHz to 3 GHz was allocated for 3G. The technical specifications were made available to the public under the name IMT-2000.[16] Market penetration See also: 3G adoption By June 2007. This was a demonstration network for the 2002 IT World Congress. An especially notable development during this time is the smartphone (for example. In some instances. many carriers were not able to or delayed acquisition of these updated capabilities. although it was initially somewhat limited in scope. However its 3G was relatively slow to be adopted in Nepal.3 Adoption . This 200 millionth is only 6. Roll-out of 3G networks was delayed in some countries by the enormous costs of additional spectrum licensing fees.3. and the first commercial network (also UMTS based W-CDMA) in Europe was opened for business by Telenor in December 2001 with no commercial handsets and thus no paying customers. and USB Modems connecting to 3G networks are becoming increasingly common. well over 50%. on CDMA2000 1x EV-DO technology.[10] branded as FOMA.) In the countries where 3G was launched first – Japan and South Korea – 3G penetration is over 70%. 3G has also introduced the term "mobile broadband" because its speed and capability make it a viable alternative for internet browsing. Other countries’ delays were due to the ex- According to ITU estimates. having completed its upgrade of the 3G network 8. the operator then owned by British Telecom. (See Telecoms crash.[15] AT&T Mobility is also a true 3G UMTS network. leading to widespread demand for mobile internet connectivity.100 MHz.1 to HSUPA. In Asia. The 3G standard is perhaps well known because of a massive expansion of the mobile communications market post-2G and advances of the consumer mophone. Due to these issues and difficulties with deployment. The first pre-commercial demonstration network in the southern hemisphere was built in Adelaide. the iPhone. combining the abilities of a PDA with a mobile phone.[11] The first commercial launch of 3G was also by NTT DoCoMo in Japan on 1 October 2001.[12][13] broader availability of the system was delayed by apparent concerns over its reliability. Nepal Telecom adopted 3G Service for the first time in Asia. but this network provider later shut down operations. 190 3G networks were operating in 40 countries and 154 HSDPA networks were operating in 71 countries. Australia and Singapore at the 32% migration level. the 200 millionth 3G subscriber had been connected of which 10 million were in Nepal and 8. Both the government and communication companies approved the 3G standard. About half the mobile-broadband subscriptions are for subscribers in developed nations. and initial excitement over 3G’s potential.Net Corporation in February 2002 using UMTS on 2. Note however that there is a distinction between a phone with mobile-broadband connectivity and a smart phone with Emtel launched the first 3G network in Africa. 35 penses of upgrading transmission hardware.7% of the 3 billion mobile phone subscriptions worldwide. bolstered by government auctions of a limited number of licenses and sealed bid auctions. The second 3G network operator in the USA was Verizon Wireless in July 2002 also on CDMA2000 1x EV-DO.[14] The first European pre-commercial network was an UMTS network on the Isle of Man by Manx Telecom. Europe. ADOPTION standards were developed in fifteen years. telecommunication companies use W-CDMA technology with the support of around 100 terminal designs to operate 3G mobile networks. (When counting CDMA2000 1x RTT customers—max bitrate 72% of the 200kbit/s which defines 3G—the total size of the nearly-3G subscriber base was 475 million as of June 2007.[17] In Europe the leading country for 3G penetration is Italy with a third of its subscribers migrated to 3G.8% of all subscribers worldwide.) The license fees in some European countries were particularly high. By May 2002 the second South Korean 3G network was by KT on EV-DO and thus the South Koreans were the first to see competition among 3G operators.[9] The first pre-commercial 3G network was launched by NTT DoCoMo in Japan in 1998. 934 million out of 1600 million total.8. especially for UMTS. whose deployment required the replacement of most broadcast towers. The first network to go commercially live was by SK Telecom in South Korea on the CDMA-based 1xEV-DO technology in January 2002. Canada and the USA. which was 15.[18] as of Q4 2012 there were 2096 million active mobile-broadband subscribers worldwide out of a total of 6835 million subscribers—this is just over 30%. Austria. 3G networks do not use the same radio frequencies as 2G so mobile operators must build entirely new networks and license entirely new frequencies.2 million in India. South Australia by m. UK.3. 8. especially so to achieve high data transmission rates. It was first available in May 2001 as a prerelease (test) of W-CDMA technology. NTT DoCoMo. Hitachi. falling short of the bandwidth requirements for 4G (which is 1 Gbit/s for stationary and 100 Mbit/s for mobile operation). Compare with 3.com the USA has 321 million mobile subscriptions. iniSee also: Mobile security § Attacks based on the GSM tially they are offering pre-4G (or beyond 3G) services in networks Stockholm.6 Evolution Both 3GPP and 3GPP2 are working on extensions to 3G standard that are based on an all-IP network infrastructure and using advanced wireless technologies such as MIMO. the existing 3G Patent Platform Partnership pool has little impact on FRAND protection.5.000 patents declared essential (FRAND) related to the 483 technical specifications which form the 3GPP and 3GPP2 The bandwidth and location information available to 3G standards. Norway. so various data rates are sold as '3G' in the market. although this is not strictly a 3G property. Telia Sonera announced in an official press release that “We are very proud to be the first operator in the world to offer our customers 4G 8.385. whereas Qualcomm has halted development of UMB in In India. InterDigital. a number of serious weaknesses in the KASUMI cipher have been identified. Sweden and Oslo. While stating in commentary that “it is expected that IMT-2000 will provide higher transmission rates: a minimum data rate of 2 Mbit/s for stationary or walking users. However.3 Applications of 3G It has been estimated that there are almost 8.[20] in a population of 1.5. to mobile phone users.1 Data rates ITU has not provided a clear definition of the data rate that users can expect from 3G equipment or providers. 3G penetration was similar at about 81%.”[28] With the launch of their LTE network. 8.[21][22] Twelve companies accounted in 2004 devices gives rise to applications not previously available for 90% of the patents (Qualcomm.5G and 4G. the successor of 3G. 3G is defined by telecom service providers as favour of the LTE family. 3GPP plans to meet the 4G goals with LTE Advanced. • Video on demand 8.[7] [26] minimum 2 Mbit/s to maximum 28 Mbit/s. By allowing the UE (User Equipment) to authenticate the network it is attaching to.36 CHAPTER 8.”[25] the ITU does not actually clearly specify minimum required rates.9G or Pre-4G.[23][24] • Telemedicine • Video Conferencing 8. Mitsubishi. because it excludes the four largest patents owners for 3G. However. These specifications already display features characteristic for IMT-Advanced (4G). On 14 December 2009. these standards are classified as 3. Thus users sold 3G service may not be able to point to a standard and say that the rates it specifies are not being met.[18] In China. according[18] to ComScore just a year earlier in Q4 2011 only about 42% of people surveyed in the USA reported they owned a smart phone. but smart phone ownership was lower at about 17%. including 256 million that are 3G or 4G.5. and 384 kbit/s in a moving vehicle. the user can be sure the network is the intended one and not an impersonator.[22] • Mobile TV Furthermore. 3G a large display and so on—although according[19] to the ITU and informatandm. there were 486.5 Features 8.5 million 3G subscribers in June 2014.537 (2013 UN estimate).2 Security services. It is believed that Nortel and Lucent have undisclosed patents essential to these standards. Siemens. . 3G networks offer greater security than their 2G predecessors. Some of the applications are: Motorola. and Matsushita). In Japan. Ericsson. endto-end security is offered when application frameworks such as IMS are accessed.[27] In addition to the 3G network infrastructure security. which is both 80% of the subscriber base and 80% of the USA population. • Global Positioning System (GPS) Even then. 3G networks use the KASUMI block cipher instead of the older A5/1 stream cipher. nor required average rates.566. Fujitsu. Philips. some patents essential to 3G might have not • Location-based services been declared by their patent holders. nor what modes of the interfaces qualify as 3G. Nokia.4 Patents 8. “China now has 486. Nttdocomo. [9] “3G cellular standards and characteristics”. “Draft summary minutes. but only 14 million on new 4G network”.com. 2012-1213. Daniel Collins. Retrieved 1 June 2009. etc)”. Report on Question 18/2” (PDF). decisions and actions from 3GPP Organizational Partners Meeting#6. REFERENCES 8. Wired. . 9 November 1999.g.in. Retrieved 2012-06-24. W-CDMA. UMTS. [18] “Global mobile statistics 2013 Part A: Mobile subscribers. Retrieved 2012-06-24. “Guidelines on the smooth transition of existing mobile networks to IMT-2000 for developing countries (GST). [11] “The history of UMTS and 3G development”. 11 June 2008.com. Retrieved 13 September 2011. It is essential that the large licensees sign up. Retrieved 2010-09-06. [16] “About Hutchison”. mobiThinking.com)". Pools that cover only a fraction of the actual IPR for a standard are not very useful. “CDG Market Trends and Facts” (PDF). 7. “ITU Radiocommunication Assembly approves new developments for its 3G standards”.com.co. Retrieved 30 October 2012. [7] Qualcomm halts UMB project. 13 November 2008 [8] 3GPP notes that “there currently existed many different names for the same system (e. p. [17] “Plus 8 Star presentation. “What really is a Third Generation (3G)(3G) Mobile Technology” (PDF). Retrieved 2014-0716. May 2013. handset market share. 13 June 2005. [10] “A Brand New Mobile Millennium Ericsson/CATT/DoCoMo jointly demonstrate pioneering W-CDMA technology at PT/Wireless | Press Center | NTT DOCOMO Global”. 37 [13] "broadbandmag. Retrieved 2010-09-06. Hutchison Telecommunications (Australia) Limited. [28] “first in the world with 4G services”. Retrieved 2012-06-24.8. mobiThinking. “Is 3G a Dog or a Demon – Hints from 7 years of 3G Hype in Asia"". [24] “Possible 'showstoppers’ shadow 3G patent pool”. Goodman (13 June 2005). [19] “The 100 million club: the top 10 mobile markets by number of mobile subscriptions”. 1 December 2005. Retrieved 1 June 2009. [14] “DoCoMo Delays 3G Launch”. [21] “3G CELLULAR STANDARDS AND PATENTS”. ITU. [23] “Study on the Interplay between Standards and Intellectual Property Rights (IPRs)" (PDF). [25] “Cellular Standards for the Third Generation”. 11 June 2008. Archived (PDF) from the original on 12 June 2009. Archived from the original on 24 May 2008. Qualcomm (San Diego) is still a wild card in the patentpooling effort. TeliaSonera. Rcom. 14 December 2009. “3G Wireless Networks”. Reuters. Retrieved 8 April 2013. mobile operators”. Retrieved 2013-10-15. [6] ITU-D Study Group 2. [3] CDG. [27] “Security for the Third Generation (3G) Mobile System” (PDF). [4] ITU. [20] Steven Millward (2014-07-29).uk/3G grinds to a start”.11 pool by ViaLicensing. IEEE Wireless com. but deactivated its membership last September.com. [15] “Verizon Wireless Launching New High-Speed 3G Wireless Network”. Examples of pools that have little impact are the 3G Licensing pool (which excludes the four largest IPR owners for 3G) and the 802.co. Archived (PDF) from the original on 12 June 2009.7 See also • List of mobile phone generations • Mobile radio telephone (also known as “0G”) • Mobile broadband • 1G • 2G • 4G • 5G • LTE (telecommunication) 8. Even so. Retrieved 2012-0407. European Commission.ITU”. Retrieved 1 June 2009. Polytechnic Institute of New York University.8 References [1] ITU (4 July 2002). [26] “Reliance 3G FAQs”.5 million 3G subscribers. Tokyo. eetimes.8. 9 October 2001” (PDF). [5] ITU. “IMT-2000 Project . engpaper. 18 July 2009. FOMA. 2000. press release. Plus8star. [12] “World’s first 3G launch on 1 October severely restricted (hktdc. 24 April 2001. page 136. Archived from the original on 19 May 2009. Tech In Asia. [2] Clint Smith. Retrieved 2013-10-15. Network Systems & Security Technologies. “3G CELLULAR STANDARDS AND PATENTS” (PDF). Qualcomm was a member of the UMTS group when it was formed in February 1998. [22] David J. Retrieved 2012-06-24. Retrieved 2014-08-04. 21 May 1999. China Mobile. deployment of the network in China was announced. 2009. The launch of a national TD-SCDMA network was In January 2009 the Ministry of Industry and Informainitially projected by 2005[5] but only reached large scale tion Technology (MIIT) in China took the unusual step commercial trials with 60.2 Deployment and usage ple access (CDMA) and time division multiple access (TDMA): the frequency band is divided into time slots On January 20.28 mcps low chip rate (UTRA-TDD LCR)[1][2] is an air interface[1] found in UMTS mobile telecommunications networks in China as an alternative to W-CDMA. 2006. because time slots can be allocated to either telecommunication.TD-SCDMA was ready for commercial launch. code division multi.000 users across eight cities in of assigning licences for 3 different third-generation mo38 .Chapter 9 TD-SCDMA Time Division Synchronous Code Division Multiple Access (TD-SCDMA) or UTRA TDD 1. TD-SCDMA proponents also claim it is better suited for since Rel-4. 2008.000 TD-SCDMA subscribers The term “TD-SCDMA” is misleading. China Mobile officially announced that it had 1. to build commercial trial networks in Technology (CATT). It is likely to be Together with TD-CDMA. These trials ran from March to October.000 test users in cells. as these were delayed until escape the payment of license fees to western patent hold. and the two fixed-line carriers. the TD-SCDMA was developed in the People’s Republic of Chinese government instructed the dominant cellular carChina by the Chinese Academy of Telecommunications rier.1 Objectives results were apparently unsatisfactory. On February 15. Construction of these trial networks was schedother 3G formats require the payment of patent fees to a uled to finish during the fourth quarter of 2007. years. China Mobile Group announced best used in low mobility scenarios within micro or pico TD-SCDMA “commercial trials” for 60.[2] While TD is primarily a China-only system.327. a timeline for uplink or downlink traffic.[4] 2008. China Telein an attempt to avoid dependence on Western technol. While it suggests as of the end of August. which are further divided into channels using of the People’s Republic of China formally announced CDMA spreading codes. it may well be exported to developing countries. Networks using other 3G TD-SCDMA is based on spread spectrum technology standards (WCDMA and CDMA2000 EV/DO) had still which makes it unlikely that it will be able to completely not been launched in China. whereas W-CDMA is optimised for symmetric traffic and macro cells. In early 2007.28Mbps Option”. 2006. but delays meant that construction was not complete until early large number of Western patent holders. 2008. This is likely primarily for practical reasons.replaced with a newer TD-LTE system over the next 5 division duplex (TDD) UMTS air interfaces (UTRAs). densely populated areas. 2008.[8] covering only a channel access method. 2009. it is one of the two time. it is supposed to cover The standard has been adopted by 3GPP [1] known as “UTRA TDD 1.[1] eight cities from April 1. Ministry of Information Industry (TDMA).[1][3] Both air interfaces use a combination of two channel access methods. China granted a TD-SCDMA 3G licence to China Mobile. These air interfaces are classithat TD-SCDMA is the country’s standard of 3G mobile fied as TDD. and Siemens AG eight cities. stating pre-commercial trials would take place starting after completion of a number of test networks in select cities. to build one each in two other ogy. known commonly as UMTS-TDD or more formally as IMT-2000 CDMA-TDD or IMT 2000 Time-Division (IMT-TD).[6] On January 7.[1] Further.com and China Netcom.[7] On September 21. ers. all usage scenarios. 2009. since cities. but the 9.9. it is actually the common name for the whole air interface specification. Datang Telecom. 2006. while TD-CDMA is On March 28. [9][10][11][12] 9. 9.5 References [1] Siemens (2004-06-10).201 Physical Layer – General Description – Describes basic differences between FDD and TDD. Retrieved 2009-02-16.com. EE Times Asia. Retrieved 2009-06-15. [4] 3G Licensing introduces the W-CDMA Patent Licensing Programme at the “Low Cost 3G Devices” conference. By dynamically adjusting the number of timeslots used for downlink and uplink. REFERENCES bile phone standards to three carriers in a long-awaited step that is expected to prompt $41 billion in spending on new equipment. March 13.cn/wireless/2015-06/25/content_ 1589363. achieved by continuous timing adjustments..baidu. Report on Question 18/2” (PDF). China Mobile have access to the following frequency band for TD-SCDMA deployment. pp. The “S” in TD-SCDMA stands for “synchronous”. Currently in China. were assigned to China Unicom and China Telecom. which reduces the implementation complexity of multiuser detection and beamforming schemes.html [11] http://www. pp. 25–28. (2002). spectrum allocation flexibility is also increased. “Performance Comparison Between UTRA-TDD High Chip Rate And Low Chip Rate Operation”. or 3G. TD Forum. 4. [3] Forkel et al. Retrieved 2009-06-15. TD-SCDMA also uses TDMA in addition to the CDMA used in WCDMA. technology supports Web surfing.com/view/ 5f43e16eaf1ffc4ffe47ac84. but the non-continuous transmission also reduces coverage (because of the higher peak power needed). mobility (because of lower power control frequency) and complicates radio resource management algorithms. “TD-SCDMA Whitepaper: the Solution for TDD bands” (PDF).cn/en/p_rru. Global Sources [6] China Mobile to Test Td-scdma on 60.5.xgpforum.3 Technical highlights TD-SCDMA uses TDD.224 Physical layer procedures (TDD) • TD-CDMA • TS 25. Archived from the original (pdf) on 2014-03-30. which is helpful to the application of beamforming techniques. the world’s biggest phone carrier by subscribers.com/new_XGP/en/001/TDD_ band. which means that uplink signals are synchronized at the base station receiver. • TS 25. That appeared to be an effort to make sure the new system has the financial and technical backing to succeed. respectively. The Chinese-developed standard. and the base station can deduce the downlink channel information from uplink channel estimates.223 Spreading and modulation (TDD) • W-CDMA • TS 25.datangmobile.6 Documentation • TS 25.google. Third-generation. Since it does not require paired spectrum for downlink and uplink. 6– 9.cnii. therefore increasing system capacity. Licences for two existing 3G standards. [2] ITU-D Study Group 2.com. This reduces the number of users in each timeslot.aspx [12] http://wenku.html [13] http://www. wireless video and other services and the start of service is expected to spur new revenue growth. “Guidelines on the smooth transition of existing mobile networks to IMT-2000 for developing countries (GST).222 Multiplexing and channel coding (TDD) • TS 25. This reduces the interference between users of the same timeslot using different codes by improving the orthogonality between the codes. TD-SCDMA. London. W-CDMA and CDMA2000 1xEVDO.000 Phones from April 1.htm 9.au/books?id= dzHABAAAQBAJ&pg=PA824 [10] http://www. was assigned to China Mobile. Cellular News [7] China issues 3G licences to main carriers The Reuters UK [8] [9] https://books.221 Physical channels and mapping of transport channels onto physical channels (TDD) • TS 25. at the cost of some hardware complexity in achieving uplink synchronization.4 See also 39 • Dynamic TDMA • Telecommunications industry in China • Communications in China • Standardization in China 9. in contrast to the FDD scheme used by W-CDMA.9. Using the same carrier frequency for uplink and downlink also means that the channel condition is the same on both directions. the system can more easily accommodate asymmetric traffic with different data rate requirements on downlink and uplink than FDD schemes. 2007 [5] 3G in China still held up.225 Physical layer – Measurements (TDD) . 40 9.7 External links • TD-SCDMA Forum • TD-SCDMA Industry Alliance • China will not interfere in 3G standard selection • China will provide 3G Service in cities where Olympic Games 2008 are held CHAPTER 9. TD-SCDMA . and provides the same types of channels where possible. and is one of the three UMTS air interfaces (UTRAs). [2] “IPWireless Ships First Commercial 3GPP Chipset with Full HSDPA Implementation”. is a channel access method based on using spread spectrum multiple access (CDMA) across multiple time slots (TDMA). defined as IMT-TD Time-Division.[2] 10. as standardized by the 3GPP in UTRA-TDD HCR. UMTS’s HSDPA/HSUPA enhancements are also implemented under TD-CDMA. 41 . “Performance Comparison Between UTRA-TDD High Chip Rate And Low Chip Rate Operation”. which is an acronym for UMTS Terrestrial Radio Access-Time Division Duplex High Chip Rate. TD-CDMA is the channel access method for UTRA-TDD HCR.1 Standardized tions implementa- TD-CDMA is used in IMT-2000's 3G air interface. (2002). an acronym for Time-division-Code division multiple access.com.[1] 10. UTRA-TDD HCR is closely related to W-CDMA (UMTS).Chapter 10 TD-CDMA TD-CDMA. Retrieved 2008-02-28. Archived from the original on 2007-09-27. Retrieved 2009-02-16.2 References [1] Forkel et al. ipwireless. are based on TDMA.from the base station which instructs the mobile phone 42 . • Shares single carrier frequency with multiple users • Non-continuous transmission makes handoff simpler • Slots can be assigned on demand in dynamic TDMA • Less stringent power control than CDMA due to reduced intra cell interference • Higher synchronization overhead than CDMA • Advanced equalization may be necessary for high data rates if the channel is “frequency selective” and creates Intersymbol interference • Cell breathing (borrowing resources from adjacent cells) is more complicated than in CDMA • Frequency/slot allocation complexity • Pulsating power envelope: interference with other devices 11. and PHS are examples of TDMA cellular sysframes and those frames divided into time slots.phones is achieved by sending timing advance commands tion this becomes particularly difficult because the mo. The users transmit in rapid succession. and PON networks for upstream traffic from premises to the operator. IS-136.1 2G systems Most 2G cellular systems. The name “TDMA” is also commonly used in the United States to refer to Digital AMPS. TDMA frame structure showing a data stream divided into iDEN. 11. there are multiple transmitters.1 TDMA characteristics Time division multiple access (TDMA) is a channel access method for shared medium networks. the synchronization of the mobile the case of the uplink from a mobile phone to a base sta. It is also used extensively in satellite systems.Chapter 11 Time division multiple access This article is about the channel access method. For usage of Dynamic TDMA packet mode communication. Personal Digital Cellular (PDC) and iDEN. GSM. TDMA is used in the digital 2G cellular systems such as Global System for Mobile Communications (GSM). and in the Digital Enhanced Cordless Telecommunications (DECT) standard for portable phones. radio frequency channel) while using only a part of its channel capacity. bile phone can move around and vary the timing advance required to make its transmission match the gap in transmission from its peers. with the notable exception of IS-95. see below. each using its own time slot. It allows several users to share the same frequency channel by dividing the signal into different time slots. In In the GSM system.2 TDMA in mobile phone systems 11. one after the other. which is an obsolete mobile telephone standard that uses TDMA to control channel access. tems. nected to one receiver.g.of interference. GSM combines TDMA with Frequency Hopping TDMA is a type of time-division multiplexing. This allows multiple stations to share the same transmission medium (e.2. D-AMPS. PDC. with the and wideband transmission to minimize common types special point that instead of having one transmitter con. combat-net radio systems. rather than limitations of power. For this reason. COMPARISON WITH OTHER MULTIPLE-ACCESS SCHEMES 43 to transmit earlier and by how much. not supported at all in IS95 and supported through complex system additions in Universal Mobile Telecommunications System (UMTS). TDMA is usually used alongside Frequency-division multiple access (FDMA) and Frequency division duplex (FDD). Although most major 3G systems are primarily based upon CDMA. and the best one is selected. something which is difficult in CDMA systems. for the propagation delay resulting from the light speed velocity of radio waves. the mobile will be instructed to broadcast its messages starting nearly a whole time slot earlier than would be expected otherwise. however. where a terminal on the boundary of two congested cells will be unable to receive a clear signal. If the mobile is located next to the base station. The incoming packets are compared for quality. then the RACH will arrive in a neighbouring time slot and be ignored.4. In G. however.in terms of range. packet scheduling (dynamic TDMA) and packet oriented multiple access schemes are available in 3G form. but there is a guard interval at the end of each time slot. the mobile can carry out measurements on the network. The mobile attempts to broadcast at the beginning of the time slot. this limitation can be overcome. a type of “same-frequency handover”. This in turn allows for co-existence of microcell layers with macrocell layers. a “master” device al.4 Comparison with other multiple-access schemes In radio systems. This also means that one device can use a CFTXOP at a time. In that case. If. if the mobile is beyond the 35 km cell range in GSM. Only their signal will take longer to arrive. This compensates trol. and China’s TD-SCDMA. the mobile network adjusts the timing advance to synchronize the transmission. Before a mobile transmits there is no way to actually know the offset required.3 TDMA in wired networks time” between time slots limits the potential bandwidth of a TDMA channel. A major advantage of TDMA is that the radio part of the mobile only needs to listen and broadcast for its own time slot.the supported range would be mostly impractical anyway. .sure their transmission is received at precisely the right locates “Contention-Free Transmission Opportunities” time.hn. This is the case in both GSM and IS-136 for example. FlexRay protocol which is also a wired net. the mobile phone is at just less than 35 km from the base station. uses the TDMA method for data transmission con. phone lines and coaxial cables) is based on moving will need to constantly adjust their timings to ena TDMA scheme. This is the buzz which can sometimes be heard if a TDMA phone is left next to a radio or speakers.cause of the difficulty in ensuring that different terminals cal area networking over existing home wiring (power transmit at exactly the times required. Exceptions to this include the DECT and PHS micro-cellular systems. TDMA is combined with CDMA and A disadvantage of TDMA systems is that they create Time Division Duplexing in two standard UMTS UTRA interference at a frequency which is directly connected to the time slot length.11.2 3G systems 11. combined with CDMA to take advantage of the benefits of both technologies.[1] Another disadvantage is that the “dead 11.hn standard. Handsets that are lines. thus avoiding the major TDMA systems have hard limits on cell sizes collisions. By changing the synchronization between the uplink and downlink at the base station. Initial synchronization of a phone requires even more care. time division duplexing (TDD). can While the most popular form of the UMTS 3G system often negate this advantage during peak periods. though in practice the power levels rework used for safety-critical communication in modern quired to receive and transmit over distances greater than cars. because as they move further from the base station. It is this feature. The mobile phone is not allowed to transmit for its entire time slot. by comparison. an entire time slot has to be dedicated to mobiles attempting to contact the network. 11. which use Time Division duplexing. (CFTXOP) to other “slave” devices in the network. As the transmission moves into the guard period. the time delay will mean the mobile’s broadcast arrives at the very end of the time slot. Finally. detecting surrounding transmitters on different frequencies. where different time slots are allocated for the base station and handsets on the same frequency. that limits the range of a GSM cell to 35 km when no special extension techniques are used. as received from the network. which provides high-speed lo. CDMA’s “cell breathing” characteristic.2. UMTS-TDD UMTS variant. this is known as the random-access channel (RACH) in GSM. there will be no time delay and this will succeed. For the rest of the time. uses CDMA and frequency division duplexing (FDD) instead of TDMA. the combination is referred to as FDMA/TDMA/FDD. supports “soft hand-off” which allows a mobile phone to be in communication with up to 6 base stations simultaneously. This allows safe inter frequency handovers. These are implemented in part beThe ITU-T G. CDMA. July 20.7 References [1] “Minimize GSM buzz noise in mobile phones”.44 11. • TD-SCDMA • ITU-T G. based on the traffic demand of each data stream.TDD) • Link 16 11.5 Dynamic TDMA In dynamic time division multiple access. Retrieved November 22. • IEEE 802.6 See also • Channel access methods (CAM) • Time-division multiplex (TDM) • Duplex (telecommunications) (FDD. CHAPTER 11. EETimes.iPoll(tm) is TDMA based protocol • Ubiquiti airMAX Radios • HIPERLAN/2 broadband radio access network. a scheduling algorithm dynamically reserves a variable number of time slots in each frame to variable bit-rate data streams. TIME DIVISION MULTIPLE ACCESS . Dynamic TDMA is used in • Intelbras WISP+ Radios .16a WiMax • Bluetooth • The Packet radio multiple access (PRMA) method for combined circuit switched voice communication and packet data. 2009. 2010.hn 11. Gaussian frequency-shift keying (GFSK) modulation was the only modulation scheme available. Invented by telecom vendor Ericsson in 1994. For the medieval king of Denmark. which are licensed to individual qualifying devices. according to legend. It can connect several devices. Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2. networking. and protects the trademarks. computing. Scientific and Medical (ISM) 2.[8] A network of patents apply to the technology. Each channel has a bandwidth of 1 MHz.1. 12. see Harald Bluetooth. overcoming problems of synchronization. It usually performs 1600 hops per second. 3 or 5 slots long. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots.[9][10] The implication is that Bluetooth does the same with communications protocols. One master may communicate with up to seven slaves in a piconet. which accommodates 40 channels. The first channel starts at 2402 MHz and continues up to 2480 MHz in 1 MHz steps. The term Enhanced Data Rate (EDR) is used to describe π/4-DPSK and 8DPSK schemes. ald’s initials. each giving 2 and 3 Mbit/s respectively.[7] A manufacturer must make a device meet Bluetooth SIG standards to market it as a Bluetooth device. and two slots make up a slot pair of 1250 µs. The Bluetooth SIG oversees development of the specification.5 MHz (including guard bands of 2 MHz at the bottom end and 3. (Old Norse blátǫnn) the epithet of the tenth-century king Harald Bluetooth who united dissonant Danish tribes into a single kingdom and. and transmits each packet on one of 79 designated Bluetooth channels. The combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a “BR/EDR radio”.4 GHz short-range radio frequency band.5 MHz at the top).0 uses 2 MHz spacing.0+EDR.15. introduced Christianity as well.4 to 2. and building personal area networks (PANs).Chapter 12 Bluetooth This article is about a wireless technology standard.000 member companies in the areas of telecommunication. receives in even slots and The Bluetooth logo is a bind rune merging the Younger transmits in odd slots. Bluetooth is a packet-based protocol with a master-slave structure. defined by the master. which has more than 25. Futhark runes (Hagall) ( ) and (Bjarkan) ( ). Bluetooth is managed by the Bluetooth Special Interest Group (SIG).485 GHz[4] ) from fixed and mobile devices. manages the qualification program. Har.1 Name and logo The name “Bluetooth” is an Anglicised version of the Scandinavian Blåtand/Blåtann. Since the introduction of Bluetooth 2. π/4DQPSK (Differential Quadrature Phase Shift Keying) and 8DPSK modulation may also be used between compatible devices. Bluetooth uses a radio technology called frequency-hopping spread spectrum.but in all cases the master’s transmission begins in even 45 .[5] it was originally conceived as a wireless alternative to RS-232 data cables. Bluetooth divides transmitted data into packets. but no longer maintains the standard. Bluetooth 4. with Adaptive Frequency-Hopping (AFH) enabled.2 Implementation Bluetooth operates at frequencies between 2400 and 2483. conversely. At the time of this proposal he was reading Frans G.[14] This is in the globally unlicensed (but not unregulated) Industrial.5 µs intervals. Packets may be 1. uniting them into one universal standard.[14] Originally. and consumer electronics.[6] The IEEE standardized Bluetooth as IEEE 802. Packet exchange is based on the basic clock. The idea of this name was proposed in 1997 by Jim Kardach who developed a system that would allow mobile phones to communicate with computers. Bengtsson's historical novel The Long Ships about Vikings and King Harald Bluetooth. All devices share the master’s clock. Devices functioning with GFSK are said to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. The slave. Two clock ticks make up a slot of 625 µs. which ticks at 312.[11][12][13] 12. whereas a slave is (in theory) supposed to listen in each receive slot. introduced in the 4. In some cases the effective range of the data link can be extended when a Class 2 device is connecting to a Class 1 transceiver with both higher sensitivity and transmission power than a typical Class 2 device. by agreement.[6] Range is power-class-dependent.[22] ranges vary in practice.2 List of applications devices use a radio (broadcast) communications system. a headset initiating a connection to a phone necessarily begins as master—as initiator of the connection—but may subsequently operate as slave). cate with other Bluetooth devices. they do not have to be in visual line of sight of each • Wireless control of and communication between a other. but there is no upper limit At any given time. configurations and battery conditions. though not all devices reach this maximum. antenna • Wireless Bluetooth headset and Intercom. The effective range varies due to propagation conditions. where attenuation of walls and signal fading due to signal reflections make the range far lower than specified line-of-sight ranges of the Bluetooth products. with a short range based on low-cost transceiver microchips in each device. production sample variations. however a quasi optical wireless path must be mobile phone and a handsfree headset. Some such devices allow open field ranges of up to 1 km and beyond between two similar devices without exceeding legal emission limits.[3] Bluetooth Marketing qualifies that Class 1 range is in most cases 20–30 metres (66– 98 ft). but effective of the earliest applications to become popular. • Wireless control of and communication between a Officially Class 3 radios have a range of up to 1 metre (3 mobile phone and a Bluetooth compatible car stereo ft). being Main article: Bluetooth profile a master is a lighter burden than being a slave. Connecting two Class 1 devices with both high sensitivity and high power can allow ranges far in excess of the typical 100m.or use cases for devices.) The master chooses which slave device to address. Bluetooth Low Energy.12. a headset is sometimes called “a Bluetooth”. This was one viable. initions of possible applications and specify general beMany USB Bluetooth adapters or “dongles” are available. see Bluetooth low energy#Radio interface. These profiles include settings to parametrize and to control the communication from start. material coverage.1 Bluetooth profiles ter that chooses which slave to address.2.0 specification. BLUETOOTH slots and the slave’s in odd slots. and Class 1. Since it is the mas.3. data can be transferred between the on actual range. Being a master of seven slaves is possible. it switches rapidly from one device to another in a round-robin fashion. most commonly found in mobile devices.[2] • Wireless control of and communication with tablets and speakers such as iOS and Android devices. with little difference in range whether the other end of the link is a Class 1 or Class 2 device as the lower powered device tends to set the range limit. 12. typically.100 metres (300 ft).3 Uses becomes effective. The above is valid for “classic” BT. in which certain devices simultaneously play the master role The Bluetooth Core Specification mandates a range of not in one piconet and the slave role in another.[20][21] tions protocol primarily designed for low-power consumption. being a slave of more To use Bluetooth wireless technology.[16] Mostly however the Class 1 devices have a similar sensitivity to Class 2 devices. The specification is vague as able to interpret certain Bluetooth profiles. Class 2. 10 system. and the slave can become the master (for example. . see the table on the right. haviours that Bluetooth-enabled devices use to communisome of which also include an IrDA adapter. Most Bluetooth applications are for indoor conditions. The devices can switch roles. Manufacturers’ implementations can be master and one other device (except for the little-used tuned to provide the range needed for each case.[17][18][19] The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet.[3] broadcast mode.1 Communication and connection A master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad-hoc computer network using Bluetooth technology). primarily for industrial use cases.46 CHAPTER 12. depending on the throughput required by the application. Idiomatically. and Class 2 range 5–10 metres (16–33 ft). Most Bluetooth applications are battery powered Class 2 devices. Adherence to profiles saves the time for transmitting the parameters anew before the bi-directional link 12.[15] Because the 12. a device must be than one master is difficult. uses the same spectrum but somewhat differently. metres (33 ft). which are defto required behavior in scatternets. less than 10 metres (33 ft).3. There are a wide range of Bluetooth profiles that describe many different types of applications Bluetooth is a standard wire-replacement communica. as in headsets and remote controls. able. If the connection is broken (the marker is out of range of the phone) then an alarm is raised.3 Bluetooth vs. This • For controls where infrared was often used. or embedded in the objects tracked. A product using this technology has been available since 2009. • Personal security application on mobile phones for prevention of theft or loss of items.[30] • Calgary. Bluetooth serves well in simple ap• Dial-up internet access on personal computers or plications where two devices need to connect with miniPDAs using a data-capable mobile phone as a wire.11) • Replacement of previous wired RS-232 serial communications in test equipment. keyboard and printer. are used to track and identify the location of objects in real-time using “Nodes” or “tags” attached to. Bluetooth devices.. in their applications and usage. However. the most common being the mouse. where some degree of client configuration is possible • Short range transmission of health sensor data from and high speeds are required.[32] (a more reliable alternative to FM transmitters) • Transfer of files. Bluetooth was intended for bandwidth is not required and cable-free connection portable equipment and its applications.12.3. contact details.).[29] A typical Bluetooth mobile phone headset. and reminders between devices with OBEX. ad-hoc functionality to Wi-Fi.[28] Wi-Fi though not as simply as with Bluetooth. . with an asymmetrical client-server conNintendo's Wii.[26] etc.[27] and Sony's PlayStation 3.ting. set-top box or cess through an access node. This can also be used as a man overboard alarm. Wi-Fi is usually access • Three seventh and eighth generation game consoles. Wi-Fi (IEEE 802. Bluetooth devices. • Wireless bridge between two Industrial Ethernet Wi-Fi and Bluetooth are to some extent complementary (e. work (WPAN). between two Bluetooth for their respective wireless controllers.g.in a variety of personally carried applications in any setenabled advertising hoardings to other. and “Readers” that receive and process the wireless signals from these tags to determine their locations.IEEE 802. use nection with all traffic routed through the access point. or transferring files. • Wireless networking between PCs in a confined space and where little bandwidth is required. especially for network acmedical devices to mobile phone. while Bluetooth is usually symmetrical. The protected item has a Bluetooth marker (e. med. Witrol devices. PROFINET) networks. Alberta. calendar appointments. 12.mal configuration like a button press. Fi is intended as a replacement for high speed cabling for general local area network access in work areas. category of applications is sometimes called wireless lo• For low bandwidth applications where higher USB cal area networks (WLAN). GPS receivers. Bluetooth is a replacement for cabling • Sending small advertisements from Bluetooth..11 standards) have some similar applications: setting up networks.g. point-centered. Wi-Fi Di• Allowing a DECT phone to ring and answer calls on rect was recently developed to add a more Bluetooth-like behalf of a nearby mobile phone. a tag) that is in constant communication with the phone. • Wireless streaming of audio to headphones with[23] or without[24] communication capabilities. bar code scanners. discover. USES 47 • Real-time location systems (RTLS). The category of applications is outlined as the wireless personal area netdesired. Bluetooth access points do exist and ad-hoc connections are possible with dedicated telehealth devices. printing. Canada's Roads Traffic division uses data collected from travelers’ Bluetooth devices to predict travel times and road congestion for motorists.[25] • Wireless communication with PC input and output devices.3. and traffic con.[31] • Wireless transmission of audio. while Wi-Fi suits better in applications less modem.Bluetooth and Wi-Fi (the brand name for products using ical equipment. and also works for fixed location applications such as smart energy functionality in the home (thermostats. desktop computers and most recent laptops come with a built-in Bluetooth radio. modems. DUN. and some high definition headsets. media players. and watches.[33] The technology is useful when transferring information between two or more devices that are near each other in low-bandwidth 12. BLUETOOTH Devices An internal notebook Bluetooth card (14×36×4 mm). network address and permission configuration can be automated than with many other network types. Its Bluetooth stack has been ported to communicate with Bluetooth devices. Bluetooth protocols simplify the discovery and setup of services between devices. stack was developed by Nokia. laptops and console gaming equipment. IrDA. Windows XP Service Pack 2 and SP3 releases work natively with Bluetooth v1.[38] Previous versions required users to install their Bluetooth adapter’s own drivers. handheld. Windows Vista RTM/SP1 with the Feature Pack for Wireless or Windows Vista SP2 work with Bluetooth v2. Bluetooth is commonly used to transfer sound data with telephones (i..[34] Bluetooth devices can advertise all of the services they provide.3. others require an external adapter. .” Unlike its predecessor. HCRP.e.2. FreeBSD features BlueA personal computer that does not have embedded Blue. The BlueZ stack is included with most Linux kernels and was originally developed by Qualcomm. BlueZ and Affix. which was released in 2002. v2. HID. which were not directly supported by Microsoft.[39] Microsoft’s own Bluetooth dongles (packaged with their Bluetooth computer devices) have no external drivers and thus require at least Windows XP Service Pack 2. A Bluetooth USB dongle with a 100 m range. typically in the form of a small USB "dongle. because more of the security. communicate with a computer over a single adapter.0 release.4 Computer requirements Apple products have worked with Bluetooth since Mac OS X v10.1.4.[38] Linux has two popular Bluetooth stacks.0 release.[38] Windows 7 works with Bluetooth v2. Bluetooth lets multiple devices Bluetooth exists in many products. which requires a separate adapter for each device. While some to OpenBSD as well.[36] tablets. with a Bluetooth headset) or For more details on this topic.0 and v2. SPP.tooth since its v5. see Bluetooth stack.[37] For Microsoft platforms. such as telephones.[38] The Windows XP and Windows Vista/Windows 7 Bluetooth stacks support the following Bluetooth profiles natively: PAN.1+EDR and Extended Inquiry Response (EIR).[35] This makes using services easier. NetBSD features Bluetooth tooth can use a Bluetooth adapter that enables the PC since its v4.[40] The Affix A typical Bluetooth USB dongle. robotics systems.0+EDR.4 CHAPTER 12.1+EDR.48 12.1 Operating system implementation situations. The Windows XP stack can be replaced by a third party stack that supports more profiles or newer Bluetooth versions. byte data with hand-held computers (transferring files).[34] 12. The Windows Vista/Windows 7 Bluetooth stack supports vendorsupplied additional profiles without requiring that the Microsoft stack be replaced. 5.3 Bluetooth v1. Versions 1.0B specifications were (SSP): this improves the pairing experience for Bluetooth fixed. At least one commercial device states “Bluetooth v2.5.0 and 1. and later joined by many other companies.5 Bluetooth v2. 12. Intel.4 typically a few years in between Bluetooth v2. The SIG was formally antransmissions of corrupted packets. presented • Adaptive frequency-hopping spread spectrum (AFH). and products may claim compliance to “Bluetooth v2.0B had many problems and manufacturers had difficulty making their products interoperable.1 Mbit/s. although the practical data transfer rate is 2. nology.1 Bluetooth v1. The specification is published as Bluetooth v2. The specifica• Higher transmission speeds in practice. All versions of the Bluetooth standards support downward compatibility. Johan Ullman.12. π/4-DQPSK and 8DPSK.5 Specifications and features 12.0 specification contains other minor improvements. Today it has a membership [42] ally increase audio latency to provide better concurof over 20.0 + EDR • Core Specification Addendum (CSA). See the section on Pairing below for more details.0 and 1.2 The development of the short link radio technology.fer.15. • Ratified as IEEE Standard 802.000 companies worldwide. including • Received Signal Strength Indicator (RSSI). and may optionnounced on 20 May 1998. up to 721 tion is based on frequency-hopping spread spectrum techkbit/s. “Extended inquiry response” (EIR).0B Versions 1.0B also included mandatory Bluetooth hardware device address (BD_ADDR) transmission in the Connecting process (rendering anonymity impossible at the protocol level). devices. Haartsen and Sven Mattisson with developing.1 allows various other improvements.1 is secure simple pairing • Many errors found in the v1. the v2.1–2005[45] • Introduced Flow Control and Retransmission Modes for L2CAP. which was a major setback for certain services planned for use in Bluetooth environments. IBM.2 Bluetooth v1.[47] 12. release cycle is 12. Nils ference by avoiding the use of crowded frequencies Rydbeck tasked Tord Wingren with specifying and Jaap in the hopping sequence. in 1989.[44] leased very quickly EDR uses a combination of GFSK and Phase Shift Key• Errata ing modulation (PSK) with two variants.1 • Ratified as IEEE Standard 802.1 + EDR was adopted by the Bluetooth SIG on 26 July 2007. was initiated by Nils Rydbeck CTO at • Faster Connection and Discovery Ericson Mobile in Lund. The Bluetooth Core Specification Working Group (CSWG) produces mainly 4 kinds of specifications • Host Controller Interface (HCI) operation with three-wire UART. Aside from EDR.5. which The specifications were formalized by the Bluetooth Speimprove voice quality of audio links by allowing recial Interest Group (SIG). The main difference is the introduction can be as tight as a few times per year of an Enhanced Data Rate (EDR) for faster data trans• Core Specification Supplements (CSS).[46] EDR can provide a lower power consumption through a reduced duty cycle. which provides more .1–2002 [43] Bluetooth Core Specification Version 2.0 and v1. release cycle This version of the Bluetooth Core Specification was released in 2004. which implies that EDR is an optional feature.[46] The headline feature of v2. The purpose was to create a wireless headset. That lets the latest standard cover all older versions. according to two inventions. Toshiba and Nokia.1. Sweden. issued 1989-06-12 and 1992 SE which improves resistance to radio frequency inter9202239. SE 8902098-6. later Major enhancements include the following: named Bluetooth.5.5.[48] • Added possibility of non-encrypted channels.1 + EDR 12. issued 1992-07-24 by Dr.0 without EDR” on its data sheet.5. SPECIFICATIONS AND FEATURES 49 12. can be re. who were [41] working for Ericsson in Lund. Version 2.0 + EDR. The nominal rate of EDR is about 3 Mbit/s. It was estabrent data transfer.[44] than in v1. • Extended Synchronous Connections (eSCO). lished by Ericsson.0” without supporting the higher data rate. • The Bluetooth Core Specification.15. while increasing the use and strength of security. announced in March 2009 that it was disbanding. Bluetooth high speed and Bluetooth low energy prodata without establishing an explicit L2CAP chan. and the faster radio when it must send large quantities of The Bluetooth SIG completed the Bluetooth Core Specidata.5. AMP links require enhanced L2CAP modes. and sniff subrating. stack for rapid build-up of simple links.and enhanced past versions. and related administrative items. Instead. dual-mode. Bluetooth high speed is based on Wi-Fi. initial connection and profile configuration.0 (called Bluetooth Smart) and has been adopted as of 30 June 2010.0 + HS Ultra-wideband Version 3.0 + HS solution. is a subset of Bluetooth v4. 12. The main new feature is AMP (Alternative MAC/PHY). It is intended for use by applications that re.11 link. including work on future high speed and power optimized implementations. the Bluetooth link is used for negotiation and establishment. and ultimately UWB was omitted from the Core v3. which reduces the power consumption in low-power mode.0 with an entirely new protocol for small amounts of data. doned and the BLE name was used for a while.applications running off a coin cell. Additionally. to the Bluetooth Special Interest Group (SIG). while Streaming Mode (SM) implements suspended development of UWB as part of the alternaunreliable channel with no retransmission or tive MAC/PHY. BLUETOOTH information during the inquiry procedure to allow better filtering of devices before connection. However. and in Bluetooth v1. Chip designs allow duced by the new modulation schemes added for for two types of implementation. the body responsible for the flavor of UWB intended for Bluetooth.7 Bluetooth v4.0 was originally intended for UWB.6 received.0 + HS of the Bluetooth Core Specification[46] was adopted by the Bluetooth SIG on 21 April 2009. WiMedia has transferred all current and future specifications. After successful completion of the technology transfer.50 CHAPTER 12. flow control. A Bluetooth v3.11 as a high speed transport.[62] The provisional names guities by specifying the behaviour that is expected. and Clasnel.5. The Bluetooth SIG is now in Alternative MAC/PHY Enables the use of alternative the process of evaluating other options for its longer term MAC and PHYs for transporting Bluetooth profile roadmap.[50] The high speed (AMP) feature of Bluetooth v3. The Bluetooth radio is still used for device discovery.0 to v3.0 the high speed alternative MAC PHY 802. The High-Speed part of the specification is not mandatory. Bluetooth v3.11 high-speed data transfer. the WiMedia Alliance ceased [52][53][54][55][56][57] L2CAP Enhanced modes Enhanced Retransmission operations. As an alternative Enhanced Power Control Updates the power control to the Bluetooth standard protocols that were introduced feature to remove the open loop power control.0 specification. This is only appropriate Bluetooth low energy. Bluetooth v3.11 (typically associated with Wi-Fi) transports the data. See also: Bluetooth low energy This means that Bluetooth uses proven low power connection models when the system is idle. This is expected to deal with the headset link loss issue typically observed when a user puts their phone into a pocket on the opposite side to the headset. In late meaning RSSI filtering can start as the response is 2011. Introduced in Core Specification but significant. and hence only devices that display the "+HS” logo actually support Bluetooth over 802.[58][59][60] data. Wibree and Bluetooth ULP (Ultra Low Power) were abanThe feature also adds closed loop power control. single-mode EDR.0[49] or earlier Core Specification Addendum 1.In October 2009 the Bluetooth Special Interest Group nel. Mode (ERTM) implements reliable L2CAP chan.sic Bluetooth consists of legacy Bluetooth protocols.0. fication version 4. a “go straight to maximum power” request has been introduced. 12.[51] On 16 March 2009.0 + HS provides theoretical data transfer speeds of up to 24 Mbit/s. new logos “Bluetooth Smart Ready” for hosts and . Enhanced power control removes the ambi.0 device without the "+HS” suffix is only required to support features introduced in Core Specification Version 3. previously known as Wibree. the WiMedia Alliance announced it was entering into technology transfer agreements for the WiMedia Ultra-wideband (UWB) specifications. marketing.tocols. though not over the Bluetooth link itself. A small. number of former WiMedia members Addendum 1. when large quantities of data must be sent. the addition of 802. It includes Classic BlueUnicast Connectionless Data Permits sending service tooth. and the high data rate traffic is carried over a colocated 802. Bluetooth v3. it is aimed at very low power also to clarify ambiguities in power control intro. quire low latency between user action and reconnec[61] tion/transmission of data. Wireless USB Promoter Group and the USB Implementers Forum. had not and would not sign up to the necessary agreements for the IP transfer. but the WiMedia Alliance. Broadcom[69][70] Notice that some features were already available in a and Texas Instruments.1 The Bluetooth SIG announced formal adoption of the Bluetooth v4. the following semiconductor companies have an• Limited Discovery Time[72] nounced the availability of chips meeting the standard: Qualcomm-Atheros. Some features.[75] Mandatory protocols for all Bluetooth stacks are: LMP. . Bluetooth v4.11n PAL • In a dual-mode implementation.12. As of March 2011. and reliable point-to-multipoint data transfer with advanced power-save and secure encrypted connections at the lowest possible cost.1 specification on 4 December 2013. it contains improvements to the audio Host Controller Interface and to the High Speed (802. bulk data exchange rates— and aid developer innovation by allowing devices to support multiple roles simultaneously. such as privacy updates via firmware. In addition. as well the Generic The major areas of improvement are: Attribute Profile (GATT) and Security Manager (SM) • LE Data Packet Length Extension services with AES Encryption.11) Protocol Adaptation Layer.6. L2CAP and SDP. only the low energy protocol stack is implemented. Core Specification Addendum 4 has an adoption date of 12 February 2013. 12.[66] Nordic Semiconductor[67] and Texas Instruments[68] have released single mode Bluetooth low energy solutions.[63] • Train Nudging and Generalized Interlaced Scanning • In a single-mode implementation.6 Technical information 12. 12. 2014.9 Bluetooth v4. such as Data Length Extension. 3 & 4) and adds new features that improve consumer usability.1. devices that communicate with Bluetooth almost universally can use these protocols: HCI and RFCOMM. The update incorporates Bluetooth Core Specification Addenda (CSA 1. The compliant architecture Core Specification Addendum (CSA) before the release shares all of Classic Bluetooth’s existing radio and of v4. to support connected home and other IoT implementations.[73] But some older Bluetooth hardware may receive some Bluetooth v4. feature a lightweight Link Layer providing ultra-low power idle mode operation.[74] General improvements in version 4.2 was released on December 2.5.8 Bluetooth v4. • Link Layer Privacy Core Specification Addendum 3 revision 2 has an adoption date of 24 July 2012. require a hardware update. TECHNICAL INFORMATION 51 “Bluetooth Smart” for sensors were introduced as the general-public face of BLE.[65] CSR. telephony control protocols. cable replacement protocols. functionality resulting in a negligible cost increase compared to Classic Bluetooth.5.6. STMicroelectronics.0.2 Cost-reduced single-mode chips. Bluetooth Smart • Audio Architecture Updates for Wide Band Speech functionality is integrated into an existing Clas• Fast Data Advertising Interval sic Bluetooth controller.2 via the new Internet Protocol Support Profile (IPSP). and adopted protocols.[71] New features of this specification include: • Mobile Wireless Service Coexistence Signaling • Link Layer Extended Scanner Filter Policies • IPSP adds an IPv6 connection option for Bluetooth Smart. simple device discovery. 12. • L2CAP Connection Oriented and Dedicated Channels with Credit Based Flow Control • Low Duty Cycle Directed Advertising • Dual Mode and Topology • LE Link Layer Topology • 802. and not a hardware update. This specification is an incremental software update to Bluetooth Specification v4. These include increased coexistence support for LTE.1 Bluetooth protocol stack Main articles: Bluetooth stack and Bluetooth protocols Bluetooth is defined as a layer protocol architecture consisting of core protocols.[64] AMICCOM.0 include the changes necessary to facilitate BLE modes. which enable highly integrated and compact devices. • IP connectivity for Bluetooth Smart devices to become available soon after the introduction of BT v4. CSR.2 features. It Introduces some key features for IoT. 2. • LE Secure Connections Core Specification Addendum 2 was unveiled in December 2011. L2CAP can its widespread support and publicly available API on most be configured either for isochronous data or reliable data operating systems. with official The Link Management Protocol (LMP) is used for set-up services (Bluetooth profiles) assigned a short form UUID and control of the radio link between two devices. RFCOMM provides for binary data transport and emulates EIA-232 (formerly RS-232) control signals over the Bluetooth baseband layer.(16 bits rather than the full 128). it is a serial port emulation. . This mode provides a reliable LAN. Audio RFCOMM L2CAP Radio Frequency Communications (RFCOMM) is a cable replacement protocol used to generate a virtual serial data stream. Im. when you use a mobile Physical radio phone with a Bluetooth headset. the phone uses SDP to determine which Bluetooth profiles the headset can use (Headset Profile. with 672 bytes as the default related profiles as a carrier for AT commands. It is used directly by many telephony configurable up to 64 kB. Provides segmentation and reassembly of on-air packets. The Logical Link Control and Adaptation Protocol (L2CAP) Used to multiplex multiple logical connections between two devices using different higher level protocols.e. Additionally. as well as MTU. For example. used by the remote control profile to transfer AV/C commands over an L2CAP channel. The Audio/Video Distribution Transport Protocol Only L2CAP channels configured in ERTM or SM may (AVDTP) is used by the advanced audio distribution profile to stream music to stereo headsets over an L2CAP be operated over AMP logical links. AVCTP • Streaming Mode (SM): This is a very simple mode. In-order sequencing is guaranteed by the lower layer. L2CAP channel. BLUETOOTH Applications/Profiles Service Other RFcomm Telephony discovery LLC Control Logical link control adaptation protocol Link manager Application layer Middleware layer Data link layer Physical layer SDP The Service Discovery Protocol (SDP) allows a device to discover services offered by other devices. similar to TCP. This mode The Audio/Video Control Transport Protocol (AVCTP) is provides an unreliable L2CAP channel. BDR/EDR air interface by configuring the number of retransmissions and flush timeout (time after which the raAVDTP dio flushes packets). Advanced Audio Bluetooth Protocol Stack Distribution Profile (A2DP) etc. Many Bluetooth applications use RFCOMM because of In Retransmission and Flow Control modes. with no retransmission or flow control. These BNEP modes effectively deprecate original Retransmission and Flow Control modes: The Bluetooth Network Encapsulation Protocol (BNEP) is used for transferring another protocol stack’s data via an L2CAP channel. Bluetooth Core Specification Addendum 1 adds two additional L2CAP modes to the core specification. and 48 bytes as the minimum mandatory sup. The music control butReliability in any of these modes is optionally and/or tons on a stereo headset use this protocol to control the additionally guaranteed by the lower layer Bluetooth music player. Its main purpose is the transmission • Enhanced Retransmission Mode (ERTM): This of IP packets in the Personal Area Networking Profile. plemented on the controller. ported MTU. RFCOMM provides a simple reliable data stream to the In Basic mode.BNEP performs a similar function to SNAP in Wireless transmission mode. Each service is identified LMP by a Universally Unique Identifier (UUID).52 CHAPTER 12. i. L2CAP provides packets with a payload user.being a transport layer for OBEX over Bluetooth. applications that used a per channel by performing retransmissions and CRC serial port to communicate can be quickly ported to use RFCOMM. checks. Hands Free Profile. and their assoBaseband ciated parameters. mode is an improved version of the original re.) and the protocol multiplexer settings needed for the phone to connect to the headset using each of them. and connecting to them prevents them from connecting to other devices Adopted protocols and appearing in inquiries until they disconnect from the other device. providing a model for object and operation representation • Wireless Application Environment/Wireless Application Protocol (WAE/WAP): WAE specifies an application framework for wireless devices and WAP is an open standard to provide mobile users access to telephony and information services. TCS 53 • List of services • Technical information (for example: device features. friendly Bluetooth names are used. clock offset) The Telephony Control Protocol – Binary (TCS BIN) is the bit-oriented protocol that defines the call control signaling for the establishment of voice and data calls between Bluetooth devices. Adopted protocols are defined by other standards-making organizations and incorporated into Bluetooth’s protocol Every device has a unique 48-bit address. However. to-point link. • Point-to-Point Protocol (PPP): Internet standard protocol for transporting IP datagrams over a point. 12. there could be several cellular phones in • Object Exchange Protocol (OBEX): Session-layer range named T610 (see Bluejacking). This can be confusing as. These two cases are refollowing information on demand: ferred to as dedicated bonding and general bonding respectively. As such it is only of but the connection itself can be initiated by any device and held until it goes out of range. Instead.[75] 12.2 Baseband error correction time. individual packets may be lish a connection without user intervention (for example. it is useful for Bluetooth devices to be able to estabDepending on packet type. Bluetooth uses a process called with CRC will be retransmitted until acknowledged by bonding. • Device name Pairing often involves some level of user interaction. . the user explicitly requests to “Add a Bluetooth device”). which failed to attract implementers. At the same 12.3 Setting up connections or it is triggered automatically when connecting to a service where (for the first time) the identity of a device is Any Bluetooth device in discoverable mode transmits the required for security purposes. and thus enable control over which devices can connect to a given Bluetooth device. for example. manufacturer. pairing.” Any device may perform an inquiry to find other devices to connect to.12. allowing Bluetooth to code protocols only when addresses are generally not shown in inquiries.6.6. Bluetooth specification used.6. • Device class This user interaction confirms the identity of the devices. connected to only one device at a time. which can be set by necessary. it always responds to direct connection requests and transmits the information shown in the list above if requested. either 1/3 rate forward er. Use of a device’s TCS-BIN is only used by the cordless telephony profile.Most cellular phones have the Bluetooth name set to the manufacturer and model of the phone by default. Most cellular phones and laptops show only the Bluetooth • TCP/IP/UDP: Foundation Protocols for TCP/IP names and special programs are required to get additional protocol suite information about remote devices. these stack. However. Additionally. ror correction (FEC) or 2/3 rate. protocol for the exchange of objects. and any device can be configured to respond to such inquiries. The pairing process is triggered either by a specific request from a user to generate a bond (for example. and a bond is generated through a process called automatic repeat request (ARQ). This name appears when another user scans for devices and in lists of paired devices. TECHNICAL INFORMATION channel intended for video distribution profile in the bluetooth transmission.4 Pairing and bonding Motivation Many services offered over Bluetooth can expose private data or let a connecting party control the Bluetooth device.as soon as in range). if the device trying to connect knows the address of the device. services may require pairing or acceptance by its owner. packets To resolve this conflict. Security reasons make it necessary to recognize specific devices. protected by error correction. The adopted protocols include: the user. Some devices can be historical interest. In addition. “TCS BIN defines mobility management procedures for handling groups of Bluetooth TCS devices.6. such as the Object Push Profile. Some services. for example “0000” or “1234”. • Out of band (OOB): This method uses an external means of communication. However. elect not to explicitly require authentication or encryption so that pairing does not interfere with the user experience associated with the service use-cases. and some types can help protect against man in the middle.SSP is considered simple for the following reasons: phones are examples of these devices. the two devices establish a relationship by creating a shared secret known as a link key. This method is typically used by headsets with very limited IO capabilities. Pairing is completed using the Bluetooth radio. The following summarizes the pairing mechanisms: • Legacy pairing: This is the only method available in Bluetooth v2. If both devices store the same link key. A device that wants to communicate only with a bonded device can cryptographically authenticate the identity of the other device. BLUETOOTH When pairing successfully completes. • Alpha-numeric input devices: PCs and smart. enabling those two devices to connect to each other in the future without repeating the pairing process to confirm device identities. the user(s) should confirm pairing on the device(s) that can accept an input. If the comparison succeeds.1. although a Bluetooth v2. and is more secure than the fixed PIN mechanism this limited set of devices uses for legacy pairing. assuming the user confirms on both devices and actually performs the comparison properly. however. or two devices with numeric keypad entry. Any 16-byte UTF-8 string may be used as a PIN code. pairing is only successful if both devices enter the same PIN code. The user should compare the numbers to ensure they are identical. In the first case. They • In most cases. this method just works. This method provides MITM protection.0 or earlier device. Secure Simple Pairing uses a form of public key cryptography. such as Near Field Communication (NFC) to exchange some information used in the pairing process. Once a link key is generated. or MITM attacks. In the second case. These devices usually have a fixed PIN. a bond forms between the two devices. SSP has the following characteristics: • Just works: As the name implies. who then enters the code on the keypad. there is no mechanism available for a capable device to determine how it should limit the available input a user may use. Pairing mechanisms Pairing mechanisms changed significantly with the introduction of Secure Simple Pairing in Bluetooth v2. which generally have few inputs. with no user interaction. • Secure Simple Pairing (SSP): This is required by Bluetooth v2. not all devices may be capable of entering all possible PIN codes. the display is used to show a 6digit numeric code to the user. Each device must enter a PIN code. This method displays a 6-digit numeric code on each device. the user can remove the bonding relationship. a device may prompt the user to confirm the pairing process. Users can delete link keys from either device. This provides only the level of MITM protection that is present in the OOB mechanism. • Numeric input devices: Mobile phones are classic examples of these devices. Bluetooth services generally require either encryption or authentication and as such require pairing before they let a remote device connect. which removes the bond between the devices—so it is possible for one device to have a stored link key for a device it is no longer paired with.0 and before. code. This method provides no man-in-themiddle (MITM) protection. Implementation During pairing. it does not require a user to generate allow a user to enter full UTF-8 text as a PIN a passkey.1 device may only use legacy pairing to interoperate with a v2.54 CHAPTER 12. and at least one can accept a binary yes/no user input. • Limited input devices: The obvious example of this class of device is a Bluetooth Handsfree headset. they may use Numeric Comparison. • Numeric comparison: If both devices have a display. an authenticated Asynchronous Connection-Less (ACL) link between the devices may be encrypted to protect exchanged data against eavesdropping. user must be aware of the input limitations on the other device. that are hard-coded into the device. They allow a user to enter a numeric value up to 16 digits in length. ensuring it is the same device it previously paired with. they are said to be paired or bonded. • Passkey Entry: This method may be used between a device with a display and a device with numeric keypad entry (such as a keyboard).1. the user of each device enters the same 6-digit number. When desired. but requires information from the OOB mechanism. Both of these cases provide MITM protection. If pairing with a less capable device the . 1 Overview achieved with a simple equality comparison by the See also: Mobile security § Attacks based on communiuser. To help mitigate risks.1 Mbit/s.. not on the Bluetooth chip itself. Bluetooth v2. headsets. During pairing. Implementations with versions 1. using a single encryption key longer than this time allows simple XOR attacks to retrieve the encryption key. It describes Bluetooth security capabilities and how to secure Bluetooth technologies effectively. 55 12. 12.1 addresses this in the following ways: • Encryption is required for all non-SDP (Service Discovery Protocol) connections • A new Encryption Pause and Resume feature is used for all normal operations that require that encryption be disabled.Bluetooth implements confidentiality.g. it is susceptible to denial-of-service attacks. “You've just been bluejacked!".[80] Bluejacking does not involve the removal or alteration of any data from the device. including pairing.2 reach speeds of 723.5 hours. Many Bluetooth chip manufacturers let link keys be stored on the device—however. this comes with a concomitant higher power consumption.6. if the device is removable. which has been entered into one or both devices. which must be entered into both devices. the encryption key is only good for approximately 23. cation networks • Using OOB with NFC enables pairing when devices simply get close. eavesdropping.0 implementations feature Bluetooth Enhanced Data Rate (EDR) and reach 2. Bluejacking can also involve taking control of a mobile device wirelessly and phoning a . man-in-the-middle attacks. Those keys.1 kbit/s. used for subsequent encryption of data sent via the air interface. Bluetooth key generation is generally based on a Bluetooth PIN. an initialization key or master key is generated. using the E22 algorithm.402–2. the higher data rate is expected to offset this increased drain. This enables easy identification of normal operation from security attacks. • Turning off encryption is required for several normal operations. This procedure might be modified if one of the devices has a fixed PIN (e.7 Security • For numeric comparison. While Bluetooth has its benefits. SAFER+ block cipher. • The encryption key must be refreshed before it expires. Version 2. 12. user interaction can be eliminated. included in the NIST document are security checklists with guidelines and recommendations for creating and maintaining secure Bluetooth piconets. this means that the link key Bluetooth v2. In some cases. generally 1600 times per second.5 Air interface The protocol operates in the license-free ISM band at 2. See the pairing mechanisms section for more about these changes.g.[78] In September 2008. key derivation with custom algorithms based on the Security concerns Prior to Bluetooth v2.. and smart card readers. for headsets or similar devices with a restricted user interface). SECURITY • For use-cases not requiring MITM protection. Users and organizations must evaluate their acceptable level of risk and incorporate security into the lifecycle of Bluetooth devices. message modification.1.7. rather than requiring a lengthy dis.[77] The E0 stream cipher is used for encrypting packets. encryption is not required and can be turned off at any time. An overview of Bluetooth vulnerabilities exploits was published in 2007 by Andreas Becker. the Bluetooth protocol divides the band into 79 channels (each 1 MHz wide) and changes channels.7.[76] To avoid interfering with other protocols that use the 2. granting confidentiality. namely a previously generated link key or master key.2 Bluejacking Main article: Bluejacking Bluejacking is the sending of either a picture or a message from one user to an unsuspecting user through Bluetooth wireless technology. Moreover.1 and 1.45 GHz band.1 – finalized in 2007 with consumer devices first appearing in 2009 – makes significant changes to moves with the device.480 GHz. and is based on a shared cryptographic secret. so it is problematic to detect if encryption is disabled for a valid reason or for a security attack.12. and resource misappropriation.[79] Link keys may be stored on the device file system. Common applications include short messages. rely on the Bluetooth PIN. e. authentication and covery process. MITM protection can be 12.7. the National Institute of Standards and Technology (NIST) published a Guide to Bluetooth Security as a reference for organizations. Bluetooth’s security. A began targeting mobile phones using Symbian OS (Series 60 platform) using Bluetooth enabled devices to replicate itself and spread to other devices. discovered that serious flaws in some poor communications and spoof. this active attack probThe virus was first described by Kaspersky Lab and re. owned by the bluejacker. BLUETOOTH premium rate line.[84] the device prompts them to. The attacker must also be able to receive infor.[86] 2007 2005 In October 2007.2006 nerable Bluetooth devices from a distance beyond expectation.7. To rectify this vul12. Ben and Adam Laurie from A. it should be re.the time of initial pairing.sis) from another device. Also.3 History of security concerns nerability. Compact Flash. The active method makes use closure of personal data.L. They also demonstrated the first Bluetooth PIN and Linkkeys cracker.vising users to ensure that any mobile networking conif laptops and other devices are record-setting experiment (see also Bluetooth sniping) nections are de-activated [92] left in this way.include:[94][95] der the mobile device unstable.78 km (1.56 CHAPTER 12. which is based on the research of Wool and Shaked. etc. the first portance of the problem to the world. The worm is self-installing and begins once the mobile user approves the transfer of the file (velasco.4 Mitigation infects other .group was able to do at a specific point in the protocol. Once installed. since most commercially quires users to confirm the installation of unknown soft. Thus.[91] a proof-of-concept by a group of virus writers known as “29A” and sent to anti-virus groups.In August 2005. Kevin Finistere and Thierry Zoller demonstrated and released a remote root shell via Bluetooth on Mac OS X v10. They confirmed that attacks are practicably fast. researchers from Secure Network and Fmation from the victim to set up a connection. Yaniv Shaked[89] and Avishai Wool[90] pubries discovered flaws in the Bluetooth pairing proto. and issued statistics on and the ease of attacker knows its Bluetooth address and which channels the spread of various Bluetooth services [93] spread of an eventual Bluetooth worm.SIS files on the device. sive attacks against the PIN-based pairing between commercial Bluetooth devices.available Bluetooth devices are not capable of the timing ware before it can propagate. showed that the range of Class 2 Bluetooth radios could be extended to 1. a world. attack allows a suitably equipped attacker to eavesdrop on Digital Ltd. After that. A new attack method can be used to crack the PIN. Additionally.3. Police are adspread outside of this system.[88] In 2001.[81] In 2003. In August 2004. In January 2005. No at. asymmetric key establishment is feasible for 2001–2004 certain classes of devices.Secure published a report that warns of the large number tack can be made against a Bluetooth device unless the of devices left in a visible state.[87] In April 2005.). if the attacker was present at implementations of Bluetooth security may lead to dis. isgarded as a potential (but not real) security threat to Blue. although these can be deduced within a few minutes if the device is in use. England.11 mi) with directional antennas and signal amplifiers. a mobile malware worm known as Lasco.[82] In a subsequent experiment. Jakobsson and Wetzel from Bell Laborato. the worm begins looking for other Bluetooth enabled devices to infect. showing the im. police in Cambridgeshire.ably requires custom hardware. such as mobile phones.and slave repeat the pairing process.9 and v10. to transmit on.In April 2006.lu Security Conference.published results of their actual implementation of pasvances have alleviated this issue. of a specially constructed message that must be inserted Martin Herfurt from the trifinite.[85] This poses a potential security threat because it enables attackers to access vul.lished a paper describing both passive and active methods col and also pointed to vulnerabilities in the encryption for obtaining the PIN for a Bluetooth link. The virus was written as necessary. allowing replication to another device through use of removable media Options to mitigate against Bluetooth security attacks (Secure Digital. The passive scheme. The worm can ren.sued warnings about thieves using Bluetooth enabled tooth technology or Symbian OS since the virus has never phones to track other devices left in cars. and the Bluetooth symmetric key establishment method is vulnerable. to make the master a field-trial at the CeBIT fairgrounds. Security ad.[83] In 2004 jor weakness is that it requires the user of the devices the first purported virus using Bluetooth to spread itself under attack to re-enter the PIN during the attack when among mobile phones appeared on the Symbian OS.In June 2005. they designed an implementation that showed that stronger.7. at the Luxemburgish Hack. the worm 12. Cambridge University security researchers • Enable Bluetooth only when required . This attack’s macalled BlueBug was used for this experiment.4. org”. The aim of the competition was to stimulate new markets. “Bluetooth Range: 100m.com. [6] Newton. or 10km?". (2007). 2. Retrieved 11 June 2013. 139. was an international competition that encouraged the development of innovations for applications leveraging the Bluetooth low energy wireless technology in sports. Retrieved 9 April 2010. The Bluetooth Innovation World Cup morphed into the Bluetooth Breakthrough Awards in 2013. Even the maximum power output of class 1 is a lower level than the lowest powered mobile phones.pl.10 Bluetooth award programs The Bluetooth Innovation World Cup.org. // Icon Books Ltd. [9] Kardach.11 See also • Bluesniping • BlueSoleil – proprietary driver 12. through Awards[100] Bluetooth program highlights the . Retrieved 10 December 2013.[10] Mark Forsyth.[98] 12. hoovers.[97] Various strategies can be applied to resolve the problem. bluair. Bluetooth. p. The etymologicon.11. 12. Retrieved 3 May 2011. and GSM850/900 outputs 2000 mW.0 devices from any Bluetooth devices or purchasing better shielded USB cables.480 GHz range. [5] “Bluetooth traveler”. [4] “Fast Facts”. Newton’s telecom dictionary.[96] UMTS & W-CDMA outputs 250 mW.12 References [1] DualShock#DualShock 4. [3] “Basics | Bluetooth Technology Website”.org.8 Health concerns Main article: Wireless electronic devices and health Bluetooth uses the microwave radio frequency spectrum in the 2. Bluetooth. [7] “Bluetooth. • Do not enter link keys or PINs when unexpectedly prompted to do so • Remove paired devices when not in use • Regularly update firmware on Bluetooth-enabled devices 12.[99] • Bluetooth wireless headsets • Continua Health Alliance • DASH7 • iBeacon • Java APIs for Bluetooth • Li-Fi • MyriaNed • Near field communication • RuBee – secure wireless protocol alternative • Tethering • ZigBee – low-power lightweight wireless protocol in the ISM band 12.com. 2011. New York: Flatiron Publishing.0 devices can result in a drop in throughput or complete connection loss of the Bluetooth device/s connected to a computer.[76] Maximum power output from a Bluetooth radio is 100 mW for class 1. a marketing initiative of the Bluetooth Special Interest Group (SIG). The Break. most innovative products and applications available toand disable discovery when finished day. 1km. 23 May 2010.5 mW for class 2. Bluetooth. and student-led projects in the making. “Tech History: How Bluetooth got its name”. GSM1800/1900 outputs 1000 mW. The close proximity of Bluetooth and USB 3.9 Interference caused by USB 3. SEE ALSO 57 • Enable Bluetooth discovery only when necessary. and 1 mW for class 3 devices. Retrieved 2 November 2013.402 GHz to 2. [8] “Brand Enforcement Program”. ports and cables have been proven to interfere with Bluetooth devices due to the electronic noise they release falling over the same operating band as Bluetooth.com. Bluetooth. London N79DP. Retrieved 4 June 2015. Wikipedia [2] bluAir. Other solutions include applying additional shielding to the internal Bluetooth components of a computer. Harold.0 devices. Jim (3 April 2008).0 USB 3. fitness and health care products. prototypes coming soon.12. ranging from simple solutions such as increasing the distance of USB 3. ieee. Retrieved 4 September 2010. Re- [30] “Tenbu’s nio Is Kind Of Like A Car Alarm For Your Cellphone”. Retrieved 4 September 2010.ctvnews. Heidi (14 December 1999). Retrieved 22 April 2009. .jp”. Retrieved 1 February 2008.com. 17 July 2002. Bluetooth SIG.com. OhGizmo!. BlueZ. [39] “Network Protection Technologie”.1–2002 – IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements Part 15. [36] “Bluetooth for Programmers” (PDF). doi:10. [38] “Bluetooth Wireless Technology FAQ – 2010”.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (W Pans)".com.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)".2002. 3 August 2006. Information Age. zdnet.1 Module with EDR”. “High speed Bluetooth comes a step closer: enhanced data rate approved”. Retrieved 1 February 2008.com. [13] “Milestones in the Bluetooth advance”. Retrieved 3 May 2012. Changes to Functionality in Microsoft Windows XP Service Pack 2. [12] “About the Bluetooth SIG”. [22] “History of the Bluetooth Special Interest Group”. [34] “How Bluetooth Works”. Ieeexplore. [33] “Watch”. Archived from the original on 17 January 2008. Paul. Retrieved 3 June 2013. 30 June 2010. Radio-Electronics. [28] “Telemedicine. [48] “Simple Pairing Whitepaper” (PDF). Calgary.com. Bluetooth SIG. [15] “How Bluetooth Technology Works”. Amperordirect. Retrieved 27 December 2013. Retrieved 4 June 2015. Retrieved 4 September 2010.net. Bluetooth 4.com. Retrieved 4 September 2010. [49] “Bluetooth Core Version 3. [42] “English Introduction to Membership”. [23] “Bluetooth Headphones”.ca. Archived from the original (PDF) on 18 October 2006. 30 June 2010. [44] Guy Kewney (16 November 2004). SysOpt.15.0 released without ultrawideband”. Modulation & Channels”. Archived from the original on 20 June 2004.1109/IEEESTD. mobileinfo.com. September 2010. Bluetooth. headphonesunboxed. Retrieved 4 February 2008. [17] “WT41 Long Range Bluetooth Module”.96290. Retrieved 1 February 2008. “Bluetooth 3. HTC.58 CHAPTER 12. [16] “Class 1 Bluetooth Dongle Test”. [18] “BluBear Industrial Long Range Bluetooth 2. Retrieved 2014-05-13.1109/IEEESTD. How Stuff Works. Retrieved 18 February 2015. Bluetooth SIG. [19] “OEM Bluetooth Serial Port Module OBS433”. Version V10r00.93621. Archived from the original on 20 February 2008. Microsoft Technet.com. [26] John Fuller. 26 November 2012. clarinox. Bluetooth SIG. Newswireless. Bluetooth. [47] “HTC TyTN Specification” (PDF).” the Next Major Release of Mac OS X” (Press release). Retrieved 1 February 2007. PC World.1–2005 – IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements Part 15. 22 March 2004. Retrieved 26 May 2015.org. Archived from the original on 22 December 2007. howstuffworks. [27] “Wii Controller”.com. BLUETOOTH [11] Monson. [31] “Wireless waves used to track travel times | CTV Calgary News”. [45] “IEEE Std 802. Bluetooth. Bluetooth. [20] “Profiles Overview”. [21] Ian. Ieeexplore. Retrieved 17 February 2009. “Wi-Fi Direct vs. Bluetooth. PricenFees. MIT Computer Science And Artificial Intelligence Laboratory. Retrieved 4 [29] “Real Time Location Systems” (PDF). Ericsson Technology Licensing. [51] David Meyer (22 April 2009). [50] “Bluetooth Core Specification Addendum (CSA) 1”. Retrieved 11 July 2013. Bluetooth SIG.15. runnerwave. [37] “Apple Introduces “Jaguar. Retrieved 4 September 2010. Telemedicine. Apple. 24 May 2001.0: A Battle for Supremacy”.com. Retrieved 4 September 2010. Retrieved 1 February 2008. [35] “Specification Documents” (PDF).jp. [43] “IEEE Std 802. [24] “Headphones Unboxed”. Retrieved 1 February 2008. trieved 4 August 2010.org. doi:10. [41] “The Bluetooth Blues”. [25] “Bluetooth Technology”.uk. Retrieved 4 February 2008. [32] “Bluetooth Technology for Running Headphones”. [46] “Specification Documents”.ieee.co. “Bluetooth Technology and Implications”.com. “How Bluetooth Surveillance Works”.0 + HS specification”.org. Retrieved 4 February 2008. Retrieved 9 January 2015. [40] “Official Linux Bluetooth protocol stack”. [14] “Bluetooth Radio Interface.2005. [84] John Oates (15 June 2004).ac.com – BCM20702 – Single-Chip Bluetooth® 4. [60] “Simon Stenhouse . Retrieved 26 May 2015. Wimedia. Retrieved 7 April 2011.STMicroelectronics”.eng. FSecure. [69] “iFixit MacBook Air 13” Mid 2011 Teardown”.com. [94] Marsh. Bluetooth Technology Website”. [75] Stallings. Nordic Semiconductor. tau. Retrieved 29 January 2015. “Guide to Bluetooth Security” (PDF). National Institute of Standards and Technology. Retrieved 4 June 2015.A”. – Cryptographer’s Track. [85] “Long Distance Snarf”. [55] “bluetooth. “Cracking the Bluetooth PIN”. Wireless communications & networks.com”. Retrieved 4 June 2015. Helsinki University of Technology. University of Cambridge Computer Laboratory. and Padgette.org”. Ben Deardorff. [91] Yaniv Shaked. Retrieved 4 June 2015. Archived from the original on 26 January 2007. iFixit. Retrieved 4 June 2015. [89] http://www. “Bluetooth Hacking – Understanding Risks”. 16 March 2009.com. Nokia.7357.com. REFERENCES [52] “Wimedia. Incisor. “Repairing the Bluetooth pairing protocol” (PDF). Retrieved 26 April 2015. [93] “Going Around with Bluetooth in Full Safety” (PDF). st. EETimes. [67] “Nordicsemi. incisor.org”. 59 [76] D. [86] “Dispelling Common Bluetooth Misconceptions”. (2005). 12 June 2007.org. [81] “Security Weaknesses in Bluetooth”. 2013-12-04.org”.com. CiteSeerX: 10.com. School of Electrical Engineering Systems. Retrieved 2014-05-14. Retrieved 1 February 2007.12. [79] Scarfone. “Bluetooth Security” (PDF). [58] “Bluetooth group drops ultrawideband. Archived from the original (PDF) on 16 June 2007. [92] “Phone pirates in seek and steal mission”. Retrieved 9 July 2014.il/~{}shakedy [90] “Avishai Wool . Retrieved 1 February 2007. CSR. [80] John Fuller. Retrieved 2014-05-13. Retrieved 4 September 2010."אבישי וול. [82] “Bluetooth”.com”. [65] http://www. Wimedia.org”. Retrieved 4 September 2010. [61] “Wibree forum merges with Bluetooth SIG” (PDF) (Press release). Retrieved 5 May 2008.amiccom. [95] Elaina Chai. RSA Security Conf. [68] “TI.com. Retrieved 4 February 2008. Broadcom. Retrieved 1 February 2007. Retrieved 1 February 2007.Leech Attempt” (PDF). Bluetooth. explains v4. [53] “Wimedia. [88] Ford-Long Wong.org. Retrieved 7 April 2011. . [74] “DailyTech”. Bluetooth.org. 4 January 2010.org.com”. Retrieved 7 April 2011.tau. Retrieved 1 January 2009.com.tv”. Engadget. Retrieved 4 February 2008.com”. The Register. Retrieved 4 September 2010. Jolyon Clulow (April 2005). “Bluetooth Security & Hacks” (PDF). FSecure. “What is bluejacking?".12. Archived from the original on 17 July 2007. Retrieved 4 September 2010. [59] “Report: Ultrawideband dies by 2013”.1. Retrieved 4 June 2015. Trifinite. SANS.ac. Retrieved 11 December 2009. K.tv. Eftimakis (20 October 2010). J. The Bunker. [70] “Broadcom. [57] “Incisor. Chomienne. Avishai Wool (2 May 2005).23. “Hacking Bluetooth” (PDF). [87] “F-Secure Malware Information Pages: Lasco. [78] Andreas Becker (16 August 2007). Frank Stajano. and Cathy Wu. Retrieved 4 September 2010. Tel Aviv University. [54] “Wimedia. Bluetooth. EETimes.0 HCI Solution with Bluetooth Low Energy (BLE) Support”. [63] “Bluetooth SIG unveils Smart Marks. Cambridge Evening News. (September 2008). Texas Instruments. Retrieved 1 February 2007. eyes 60 GHz”. May 2006.tv.com”. Retrieved 4 September 2010. Retrieved 3 July 2013.. Retrieved 27 July 2011. howstuffworks. Retrieved 1 February 2007. Retrieved 26 April 2015.org. [62] “Bluetooth. “Bluetooth Tutorial” (PDF). [64] “BlueNRG Bluetooth® low energy wireless network processor . Jennifer. Trifinite. [56] “USB.1.il. [83] “BlueBug”. USB. [72] “Adopted Specification. NJ: Pearson Prentice Hall. M. 2013-12-04. Retrieved 10 October 2007. William. [77] Juha T.0 compatibility with unnecessary complexity”.'=' Upper Saddle River. Ruhr-Universität Bochum. Vainio (25 May 2000). Retrieved 4 February 2008. “Virus attacks mobiles via Bluetooth”. 16 March 2009. Retrieved 27 July 2011. [73] “Redmondpie”. [71] “Press Releases Detail | Bluetooth Technology Website”.tw/ [66] “CSR. “Occupational Exposure Related to Radiofrequency Fields from Wireless Communication Systems” (PDF). Retrieved 19 April 2007. Hietanen. Archived from the original (PDF) on 6 October 2006. Retrieved 4 September 2010. Retrieved 4 June 2015. 12. Union Radio-Scientifique Internationale.0 interference issues [99] “Bluetooth Innovation World Cup”. bluetooth. Bluetooth.13 External links • Official website • Specifications at Bluetooth SIG CHAPTER 12. BLUETOOTH .0* Radio Frequency Interference Impact on 2.60 [96] M.org. XXVIIIth General Assembly of URSI – Proceedings. [97] USB 3. [100] “Bluetooth Breakthrough Awards”.com.4 GHz Wireless Devices (PDF) [98] A guide to resolving Bluetooth and USB 3. Alanko (October 2005). T. [1] The ver. The subscriber station (SS) cannot transmit data until it has been allocated a channel by the base staThe 802. and therefore most Projects publish draft and proposed standards with the expensive.16 family of standards is officially called WirelessMAN in IEEE.16 is a series of wireless broadband standards written by the Institute of Electrical and Electronics Engineers (IEEE).16 IEEE 802.1 Projects The 802. The IEEE Standards Board established a working group in 1999 to develop standards for broadband for wireless metropolitan area networks. Other PHY feaThe 802. supporting channel bandwidths of between 1.1.16 is that it is a connection-oriented technology. 16 QAM and QPSK can also be employed. Although the standards allow operation in any band from 2 to 66 GHz. whereas when the signal is poorer.16j.16-2009 was amended by IEEE 802.16 standards. This allows 802. In intermediate conditions. It also describes how secure communications are delivered. 13.16e uses scalable OFDMA to carry data.16e-2005 amendment version was announced tures include support for multiple-input multiple-output as being deployed around the world in 2009. Although the 802.16 standard essentially standardizes two aspects tion (BS). it has been commercialized under the name "WiMAX" (from “Worldwide Interoperability for Microwave Access”) by the WiMAX Forum industry alliance. The Workgroup is a unit of the IEEE 802 local area network and metropolitan area network standards committee.16e specification.1 Standards 13. A key feature of 802.16e-2005 Technology 61 . so that in conditions of good signal. It supports adaptive modulation and coding.1 PHY 802. and how data is classified.2. which gets dropped and replaced by a dash and year when the standards are ratified and pub13. mobile operation is best in the lower bands which are also the most crowded. and encryption using Advanced Encryption Standard (AES) or Data Encryption Standard (DES) during data transfer. etc. This section provides an overview of the technology employed in these two layers in the mobile 802. 13. a highly efficient 64 QAM coding scheme is used.2 MAC lished.[3] letter “P” prefixed.Chapter 13 IEEE 802. Asynchronous Transfer Mode (ATM) and Internet Protocol (IP) are encapsulated on the air interface. media access control (MAC) layer. a more robust BPSK coding mechanism is used.16e to provide strong support of the air interface – the physical layer (PHY) and the for quality of service (QoS).of-sight propagation (NLOS) characteristics (or higher 2009.2.(MIMO) antennas in order to provide good non-linesion IEEE 802. The Forum promotes and certifies compatibility and interoperability of products based on the IEEE 802.25 MHz and 20 MHz. by using secure key exchange during authentication. 13. with up to 2048 subcarriers.16 MAC describes a number of Convergence Sublayers which describe how wireline technologies such as Ethernet.2 802. Further features of the MAC layer include power saving mechanisms (using sleep mode and idle mode) and handover mechanisms. bandwidth) and hybrid automatic repeat request (HARQ) for good error correction performance. News release (WiMAX Forum). Retrieved August 20.6 External links • “The IEEE 802.16e is supported by allocating each connection between the SS and the BS (called a service flow in 802. SSRN 892260. WiMAX certification by this group is intended to guarantee compliance with the standard and interoperability with equipment from other manufacturers. Organisation for Economic Co-operation and Development • IEEE 802. [2] “IEEE Approves IEEE 802.16e.16-2004 • IEEE Std 802.5 References [1] “WiMAX™ operators and vendors from around the world announce new deployments. • “802. “WiMAX: Opportunity or Hype?". 2006). such as bandwidth and delay) to ensure that application data receives QoS treatment appropriate to the application.16. 2011. News release (IEEE Standards Association).16e-2005 • IEEE Std 802. • IEEE Std 802. 13.16-2012 13. 2009. March 31.1-2012 • The WiMAX Forum • The implications of WiMAX for competition and regulation A paper of the OECD.4 See also • WiBro • WiMAX • WiBAS • WiMAX MIMO • Wireless mesh network • 4G LTE 13. the WiMAX Forum runs a certification program wherein members pay for certification. growing commitments at the 2nd Annual WiMAX Forum® Global Congress”. IEEE 802. there are 5 QoS classes: The BS and the SS use a service flow with an appropriate QoS class (plus other parameters. June 4. 2011.16m – Advanced Mobile Broadband Wireless Standard”.16-2009 • IEEE Std 802. Get IEEE 802 official standards download.3 Certification Because the IEEE only sets specifications but does not test equipment for compliance with them.16: Broadband Wireless MANs”. The mission of the Forum is to promote and certify compatibility and interoperability of broadband wireless products.16 terminology) to a specific QoS class. Official web site. CHAPTER 13. • IEEE Std 802.16 13. [3] Michael Richardson.62 QoS Quality of service (QoS) in 802. 2011.16m Technology Introduction . Patrick Ryan (March 19. Advances in Telecom: Proceedings of the Fourth Annual ITERA Conference. Retrieved August 20. In 802.16 Working Group on Broadband Wireless Access Standards”. wireless access (BWA) services are estimated to have a broadband means “having instantaneous bandwidths range of 50 km (31 mi) from a tower.5 Mbit/s. Texas around 2001 speed wireless Internet access or computer networking access over a wide area. For local area network technologies. According to the 802.”[1] the ISM bands and one particular access technology was standardized by IEEE 802.16.Few wireless Internet service providers (WISPs) provide atively high-speed computer network or Internet access download speeds of over 100 Mbit/s. Fort Worth. In 2005 the Federal Communications Commission adopted a Report and Order that revised the FCC’s rules to open the 3650 MHz band for terrestrial wireless broadband operations.[2] Technologies greater than 1 MHz and supporting data rates greater than used include LMDS and MMDS. ing.2 Technology and speeds Wireless networks can feature data rates roughly equivalent to some wired networks.16-2004 standard.Chapter 14 Wireless broadband This article is about wireless networking in general. A fixed wireless network link is a stationary ter14. is most commonly associated with fixed wireless networks. with products known as WiMAX. such as that of asymmetric digital subscriber line (ADSL) or a cable modem. most broadband technology. which WiMAX is highly popular in Europe but has not met full acceptance in the United States because cost of deployment does not meet return on investment figures. but became a marketing term for any kind of rel. Wireless networks can also be symmetrical. 7th Street. see Mobile broadband. Wireless broadband is technology that provides high- A typical WISP Customer Premises Equipment (CPE) installed on a residence Three fixed wireless dishes with (protective covers) on top of 307 W.tems. see Wireless LAN. as well as heavy use of about 1.1 The term broadband restrial wireless connection. meaning the same rate in both directions (downstream and upstream).[3] 63 . For mobile Internet.[3] 14. which can support higher data rates for the same power as mobile or satellite sysOriginally the word "broadband" had a technical mean. In other countries. In 2013. CHAPTER 14. Comcast. the become particularly popular in many rural areas where limit for the $15 plan. access to spectrum for use in point to point communicaincreased spectrum would be needed. announce plans to charge according to usage. petitioned the FCC and won.3 Development of Wireless Broadband in the United States On November 14. To receive this type of Internet connection. a national association of WISPs. Sprint Corporation.64 14. the limit under the $25 monthly pany providing that service. Also. and AT&T Mobility.3.5 Licensing connections from terrestrial providers such as ATT.[7] Many companies in the US and worldwide have started using wireless alternatives to incumbent and local providers for internet and voice service. provide equipment to customers and install a small an. such as at the top of a water tower. Because of this.000 emails or 200 minusually deployed as a service and maintained by the com. most wireless ISP’s use unlicensed 2009. 2007 the Commission released Public Notice DA 07-4605 in which the Wireless Telecommunications Bureau announced the start date for licensing and registration process for the 3650–3700 MHz band.and T-Mobile which allow a more mobile version of Internet access. Initially.[4] In 2010 the FCC adopted the TV White Space Rules (TVWS) and allowed some of the better no line of sight frequency (700 MHz) into the FCC Part-15 Rules. As the only iPhone service in the United States. though existing customers would not be not available. required to change from the $30 a month unlimited service plan. laptop card. customers would be charged $10 a month starting June 7.On June 2.[5] The Wireless Internet Service Providers Association. and for now any action by broadcasters is voluntary. after months of discussion. WISPs were only found in rural areas not covered by cable or DSL.utes of streaming video). licensed connections use a private ments may seek wireless alternatives to local options. 2010. For each gigabyte in excess of Cable. Studies began in tion.4 Mobile wireless broadband Called mobile broadband. wireless broadband technologies include services from mobile phone service providers such as Verizon Wireless.3 Demand for spectrum communications authority (such as the ACMA in Australia or Nigerian Communications Commission in NigeMain article: Spectrum reallocation ria (NCC)). These providers tend to offer competitive services and options in areas where there is a difficulty getting affordable Ethernet 14.1 Residential Wireless Internet providers. 10. Verizon and others. The new plan would become a requirement for 14. and while some unused spectrum was available.3. 2010. and then broadcast the signal from a high elevation. companies looking for A wireless connection can be either licensed or unlifull diversity between carriers for critical uptime require. This equipment is gigabytes (4000 page views. it spectrum which is publicly shared. auctions are planned. WIRELESS BROADBAND appeared broadcasters would have to give up at least some spectrum. such as a T1 or DS3 connection. AT&T experienced the problem of heavy Internet use more than other 14. These connections can cost more for portable convenience as well as having speed limitations in all but urban environments. and 65 percent use less than 200 megabytes. Line of sight is usually necessary for WISPs operating in the 2. 14. . spectrum the user has secured rights to from the Federal Communications Commission (FCC). This type of connection would be stable in almost any area that could also receive a strong cell phone connection. consumers mount a small dish to the roof of their home or office and point it to the transmitter. Fixed wireless services have plan. This led to strong objections from the broadcasting community. Consumers can purchase a PC card.[6] These early WISPs would employ a high-capacity T-carrier. AT&T became the first wireless Internet provider in the USA to fering better NLOS (non-line-of-sight) performance.3.2 Business Wireless Internet those upgrading to the new iPhone technology later in the summer. About 3 percent of AT&T smart phone cusProviders of fixed wireless broadband services typically tomers account for 40 percent of the technology’s use. spectrum is licensed from the country’s national radio 14. or USB equipment to connect their PC or laptop to the Internet via cell phone towers.censed.4 and 5 GHz bands with 900 MHz of. DSL or other typical home Internet services are the limit. In the US.98 percent of the company’s customers use less than 2 tenna or dish somewhere on the roof. Licensing is usually expensive and often reserved for large companies who wish to guarantee private To cope with increased demand for wireless broadband. [4] “PUBLIC NOTICE – Released: November 14. Retrieved [7] Bartash. wi-fiplanet. wi- [3] “REPORT AND ORDER – Released: March 16. Retrieved March 17. “AT&T first carrier to end unlimited data plans”. Federal Communications Commission. 2008. Jeffrey (June 3.8. EXTERNAL LINKS 65 14.14. March 17.com. fiplanet. 2010). 2005” (PDF). Wireless Internet Service Providers Association. Retrieved March 17. Retrieved March 17. 2007” (PDF). [6] “A WISP with Vision”.8 External links • Wireless Internet Service Provider Association . MarketWatch. 2008.7 References [1] Coexistence of Fixed Broadband Wireless Access Systems [2] “WiMAX: Broadband Wireless Access”. Federal Communications Commission. 14. provider in California • WiBro.6 See also • Clearwire • CorDECT • HIPERMAN • Skyriver.20 • Connect card • Policies promoting wireless broadband 14. 2008. Retrieved July 16. 2008. [5] Alex Goldman. Retrieved 2010-0603. “The FCC Decision and the Use of White Spaces”.com. 2011. provider in South Korea • iBurst • 802. Bridging and Virtual Bridged LANs. 15.4 External links • 802 Committee website • Data link layer • IEEE 802 Standards • LLC Sublayer • Entrepreneurial Capitalism and Innovation: A History of Computer Communications 1968-1988 • MAC Sublayer • Physical layer The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC). 802. 15. The services and protocols specified in IEEE 802 map to the lower two layers (Data Link and Physical) of the seven-layer OSI networking reference model. uniformly sized units called cells. September 2004. Isochronous networks. The project number.[1] though “802” is sometimes associated with the date the first meeting was held — February 1980. or groups of octets. IEEE 802 splits the OSI Data Link Layer into two sublayers named Logical Link Control (LLC) and Media Access Control (MAC). By contrast.Chapter 15 IEEE 802 IEEE 802 refers to a family of IEEE standards dealing with local area networks and metropolitan area networks. Retrieved 2012-01-25. The most widely used standards are for the Ethernet family. the IEEE 802 standards are restricted to networks carrying variable-size packets. Retrieved 201311-21. 15.) 4 (7): 1–2. Retrieved January 11. July 1993. was simply the next number in the sequence being issued by the IEEE for standards project [2] “802. [3] “The fate of 100 Mbps Ethernet now definitely two-fold”.3 References • IEEE Std 802-1990: IEEE Standards for Local and Metropolitan Networks: Overview and Architecture New York:1990 More specifically.2 See also • Computer network 66 . so that the layers can be listed like this: [1] “Overview and Guide to the IEEE 802 LMSC” (PDF). at regular time intervals.3”. 2012. Token Ring. Wireless LAN. where data are transmitted as a steady stream of octets. Inc. ISSN 1051-1903. An individual Working Group provides the focus for each area. The number 802 was simply the next free number IEEE could assign. EE Herald. are also out of the scope of this standard. Data Communincation Standards and Protocols. In fact.1 Working groups 15. FDDI News (Boston: Information Gatekeepers. in cell relay networks data are transmitted in short. the primary functions performed by the MAC layer are:[1] • Frame delimiting and recognition • Addressing of destination stations (both as individual stations and as groups of stations) • Conveyance of source-station addressing information • Transparent data transfer of LLC PDUs. the destination IP address (a layer 3 or network layer concept) is resolved with the Address Resolution Protocol for IPv4. and padding The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network’s physical layer. according to 802.g. or of equivalent information in the Ethernet sublayer • Protection against errors.2 Addressing mechanism 16. • half-duplex compatibility: append(tx)/remove(rx) MAC address 16. Thus. the functions required of a MAC are:[2] • receive/transmit normal frames A MAC layer is not required in full-duplex point-to-point communication. This guarantees that each device in a network will have a different MAC address (analogous to a street address). i. but not by network layer routers. multicast or broadcast communication service. 4. SFD (start frame delimiter).2.Chapter 16 Media access control • half-duplex retransmission and backoff functions In the seven-layer OSI model of computer networking.3-2002 section and use IEEE 802 48-bit MAC addresses. The hardware that implements the MAC is referred to as a media access controller. Once a MAC address has been assigned to a particular network interface (typically at time of manufacture). The MAC layer emulates a full-duplex logical communication channel in a multi-point network. bridges and switches. when an IP packet reaches its destination (sub)network. an Ethernet network. but address fields are included in some point-to-point protocols for compatibility reasons. This channel may provide unicast. The MAC sublayer provides addressing and channel access control mechanisms that make it possible for several terminals or network nodes to communicate within a multiple access network that incorporates a shared medium. for example. that device should be uniquely identifiable amongst all other network devices in the world.1. they are based on the addressing scheme used in early Ethernet implementations. or by Neighbor Discovery Protocol (IPv6) into the MAC address (a layer 2 concept) of the destination host. e. generally by means of generating and checking frame check sequences The local network addresses used in IEEE 802 networks and FDDI networks are called MAC addresses. • append/check FCS (frame check sequence) • interframe gap enforcement • discard malformed frames • prepend(tx)/remove(rx) preamble. hosts interconnected by some combination of repeaters. This makes it possible for data packets to be delivered to a destination within a subnetwork. hubs.4.3 “MAC sublayer”. A MAC address is a unique serial number. media access control (MAC) data communication protocol is a sublayer of the data link layer (layer 2).e. 67 . both of which are IEEE 802 networks In the case of Ethernet. • Control of access to the physical transmission Examples of physical networks are Ethernet networks and medium Wi-Fi networks.1 Functions performed in the MAC sublayer According to IEEE Std 802-2001 section 6. 68 CHAPTER 16. MEDIA ACCESS CONTROL 16.3 Channel access control mech- 16.5 See also anism • List of channel access methods The channel access control mechanisms provided by the MAC layer are also known as a multiple access protocol. This makes it possible for several stations connected to the same physical medium to share it. Examples of shared physical media are bus networks, ring networks, hub networks, wireless networks and half-duplex point-to-point links. The multiple access protocol may detect or avoid data packet collisions if a packet mode contention based channel access method is used, or reserve resources to establish a logical channel if a circuitswitched or channelization-based channel access method is used. The channel access control mechanism relies on a physical layer multiplex scheme. • MAC-Forced Forwarding • Isochronous media access controller 16.6 References [1] “IEEE 802-2001 (R2007) IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture” (PDF). IEEE. [2] “IEEE 802.3”. IEEE. This article is based on material taken from the Free OnThe most widespread multiple access protocol is the con- line Dictionary of Computing prior to 1 November 2008 tention based CSMA/CD protocol used in Ethernet net- and incorporated under the “relicensing” terms of the works. This mechanism is only utilized within a network GFDL, version 1.3 or later. collision domain, for example an Ethernet bus network or a hub-based star topology network. An Ethernet network may be divided into several collision domains, interconnected by bridges and switches. A multiple access protocol is not required in a switched full-duplex network, such as today’s switched Ethernet networks, but is often available in the equipment for compatibility reasons. 16.4 Common multiple access protocols Examples of common statistical time division multiplexing multiple access protocols for wired multi-drop networks are: • CSMA/CD (used in Ethernet and IEEE 802.3) • Token bus (IEEE 802.4) • Token ring (IEEE 802.5) • Token passing (used in FDDI) Examples of common multiple access protocols that may be used in packet radio wireless networks are: • CSMA/CA (used in IEEE 802.11/WiFi WLANs) • Slotted ALOHA • Dynamic TDMA • Reservation ALOHA (R-ALOHA) • Mobile Slotted Aloha (MS-ALOHA) • CDMA • OFDMA Chapter 17 Logical link control In the seven-layer OSI model of computer networking, the logical link control (LLC) data communication protocol layer is the upper sublayer of the data link layer, which is itself layer 2. The LLC sublayer provides multiplexing mechanisms that make it possible for several network protocols (IP, IPX, Decnet and Appletalk) to coexist within a multipoint network and to be transported over the same network medium. It can also provide flow control and automatic repeat request (ARQ) error management mechanisms. The LLC sublayer acts as an interface between the media access control (MAC) sublayer and the network layer. 17.1 Operation The LLC sublayer is primarily concerned with: • Multiplexing protocols transmitted over the MAC layer (when transmitting) and decoding them (when receiving). An LLC sublayer was a key component in early packet switching networks such as X.25 networks with the LAPB data link layer protocol, where flow control and error management were carried out in a node-to-node fashion, meaning that if an error was detected in a frame, the frame was retransmitted from one switch to next instead. This extensive handshaking between the nodes made the networks slow. 17.2.2 Local area network (LAN) and metropolitan area network (MAN) protocols The IEEE 802.2 standard specifies the LLC sublayer for all IEEE 802 local area networks, such as IEEE 802.3/Ethernet (if the EtherType field is not used), IEEE 802.5, and IEEE 802.11. IEEE 802.2 is also used in some non-IEEE 802 networks such as FDDI. Ethernet • Providing node-to-node flow and error control In today’s networks, flow control and error management is typically taken care of by a transport layer protocol such as TCP, or by some application layer protocol, in an endto-end fashion, i.e. retransmission is done from source to end destination. This implies that the need for LLC sublayer flow control and error management has reduced. LLC is consequently only a multiplexing feature in today’s link layer protocols. An LLC header tells the data link layer what to do with a packet once a frame is received. It works like this: A host will receive a frame and look in the LLC header to find out to what protocol stack the packet is destined - for example, the IP protocol at the network layer or IPX. However, today most non-IP network protocols are abandoned. 17.2 Application examples 17.2.1 X.25 and LAPB Since bit errors are very rare in wired networks, Ethernet does not provide flow control or automatic repeat request (ARQ), meaning that incorrect packets are detected but only cancelled, not retransmitted (except in case of collisions detected by the CSMA/CD MAC layer protocol). Instead, retransmissions rely on higher layer protocols. As the EtherType in an Ethernet frame using Ethernet II framing is used to multiplex different protocols on top of the Ethernet MAC header it can be seen as an LLC identifier. However, Ethernet frames lacking an EtherType have no LLC identifier in the Ethernet header, and, instead, use an IEEE 802.2 LLC header after the Ethernet header to provide the protocol multiplexing function. Wireless LAN In wireless communications, bit errors are very common. In wireless networks such as IEEE 802.11, flow control and error management is part of the CSMA/CA MAC 69 70 CHAPTER 17. LOGICAL LINK CONTROL protocol, and not part of the LLC layer. The LLC sublayer follows the IEEE 802.2 standard. 17.2.3 HDLC Some non-IEEE 802 protocols can be thought of as being split into MAC and LLC layers. For example, while HDLC specifies both MAC functions (framing of packets) and LLC functions (protocol multiplexing, flow control, detection, and error control through a retransmission of dropped packets when indicated), some protocols such as Cisco HDLC can use HDLC-like packet framing and their own LLC protocol. 17.2.4 PPP and modems Over telephone network modems, PPP link layer protocols can be considered as a LLC protocol, providing multiplexing, but it does not provide flow control and error management. In a telephone network, bit errors might be common, meaning that error management is crucial, but that is today provided by modern protocols. Today’s modem protocols have inherited LLC features from the older LAPM link layer protocol, made for modem communication in old X.25 networks. 17.2.5 Cellular systems The GPRS LLC layer also does ciphering and deciphering of SN-PDU (SNDCP) packets. 17.2.6 Power lines Another example of a data link layer which is split between LLC (for flow and error control) and MAC (for multiple access) is the ITU-T G.hn standard, which provides high-speed local area networking over existing home wiring (power lines, phone lines and coaxial cables). 17.3 See also • Virtual Circuit Multiplexing (VC-MUX) • Subnetwork Access Protocol (SNAP) Chapter 18 HiperLAN HiperLAN (High Performance Radio LAN) is a • supports asynchronous and synchronous traffic Wireless LAN standard.[1] It is a European alternative for • Bit rate - 23.2 Mbit/s the IEEE 802.11 standards (the IEEE is an international organization). It is defined by the European Telecommu• Description- Wireless Ethernet nications Standards Institute (ETSI). In ETSI the stan• Frequency range- 5 GHz dards are defined by the BRAN project (Broadband Radio Access Networks). The HiperLAN standard family HiperLAN does not conflict with microwave and other has four different versions. kitchen appliances, which are on 2.4 GHz. An innovative feature of HIPERLAN 1, which may other wireless networks do not offer, is its ability to forward data pack18.1 HiperLAN/1 ets using several relays. Relays can extend the communication on the MAC layer beyond the radio range. For Planning for the first version of the standard, called power conservation, a node may set up a specific wake up HiperLAN/1, started 1991, when planning of 802.11 was pattern. This pattern determines at what time the node is already going on. The goal of the HiperLAN was the high ready to receive, so that at other times, the node can turn data rate, higher than 802.11. The standard was approved off its receiver and save energy. These nodes are called pin 1996. The functional specification is EN300652, the savers and need so called p-supporters that contain information about wake up patterns of all the p-savers they are rest is in ETS300836. responsible for. A p-supporter only forwards data to a pThe standard covers the Physical layer and the Media Acsaver at the moment p-saver is awake. This action also recess Control part of the Data link layer like 802.11. There quires buffering mechanisms for packets on p-supporting is a new sublayer called Channel Access and Control subforwaders. layer (CAC). This sublayer deals with the access requests to the channels. The accomplishing of the request is dependent on the usage of the channel and the priority of 18.2 HiperLAN/2 the request. CAC layer provides hierarchical independence with Elimination-Yield Non-Preemptive Multiple Access mechanism (EY-NPMA). EY-NPMA codes priority choices and other functions into one variable length radio pulse preceding the packet data. EY-NPMA enables the network to function with few collisions even though there would be a large number of users. Multimedia applications work in HiperLAN because of EY-NPMA priority mechanism. MAC layer defines protocols for routing, security and power saving and provides naturally data transfer to the upper layers. HiperLAN/2 functional specification was accomplished February 2000. Version 2 is designed as a fast wireless connection for many kinds of networks. Those are UMTS back bone network, ATM and IP networks. Also it works as a network at home like HiperLAN/1. HiperLAN/2 uses the 5 GHz band and up to 54 Mbit/s data rate.[1] The physical layer of HiperLAN/2 is very similar to IEEE 802.11a wireless local area networks. However, the media access control (the multiple access protocol) is Dynamic TDMA in HiperLAN/2, while CSMA/CA is On the physical layer FSK and GMSK modulations are used in 802.11a/n. used in HiperLAN/1. Basic services in HiperLAN/2 are data, sound, and video transmission. The emphasis is in the quality of these serHiperLAN features: vices (QoS).[1] • range 50 m • slow mobility (1.4 m/s) The standard covers Physical, Data Link Control and Convergence layers. Convergence layer takes care of service dependent functionality between DLC and Network 71 72 CHAPTER 18. HIPERLAN layer (OSI 3). Convergence sublayers can be used also on the physical layer to connect IP, ATM or UMTS networks. This feature makes HiperLAN/2 suitable for the wireless connection of various networks. On the physical layer BPSK, QPSK, 16QAM or 64QAM modulations are used. HiperLAN/2 offers security measures. The data are secured with DES or Triple DES algorithms. The wireless access point and the wireless terminal can authenticate each other. Most important worldwide manufacturers of HiperLAN/2 are Alvarion (Israel), Freescale (USA), Panasonic (Japan).[2] 18.3 Failure in the Market Due to competition from IEEE 802.11, which was simpler to implement and made it faster to the market, HiperLAN never received much commercial implementation.[3] Much of the work on HiperLAN/2 has survived in the PHY specification for IEEE 802.11a, which is nearly identical to the PHY of HiperLAN/2. HIPERACCESS was intended as a last-mile technology. HIPERLINK was intended as a short-range pointto-point technology at 155 Mbit/s. 18.4 See also • HiperMAN 18.5 References [1] “About HiperLAN/2”. 2008-02-20. palowireless.com. Retrieved [2] “HiperLAN/2 prototype”. s2p.de/Sysadmin. Retrieved 2002-11-19. [3] Wolter Lemstra, Vic Hayes, John Groenewegen (December 27, 2010). The innovation journey of Wi-Fi: the road to global success. Cambridge University Press. p. 432. ISBN 0-521-19971-9. Chapter 19 Ubiquiti Networks Ubiquiti Networks is an American technology company started in 2005. Based in San Jose, California they are a manufacturer of wireless products whose primary focus is on under-served and emerging markets. year gave rise to airMAX, Ubiquiti’s proprietary MIMO TDMA polling technology. The new protocol presented an entire lineup of radio/antenna systems, building on the 802.11 b/g series, including the Rocket M. Shortly before the end of 2009, Ubiquiti announced the NanoBridge M and AirGrid M. 19.1 History Over the course of 2010, airMAX World Conferences were held in Europe, Asia, and North and South America, including San Jose, where Ubiquiti headquarters are located. More products, including the AirWire, WifiStation and Power AP N, were released. Ubiquiti also began supporting airMAX products for the 900 MHz and 3 GHz bands. In the fourth quarter, Ubiquiti announced its TOUGHCable, AirSync technology and UniFi indoor wireless system. Using GPS technology, AirSync effectively eliminated AP interference experienced by colocated APs. Nominated by fellow wireless companies at WISPAPALOOZA 2010, Ubiquiti won awards for best manufacturer as well as product of the year.[4] In 2010 and 2011, Ubiquiti Networks was chosen as the WISPA Manufacturer of the Year.[4] [5] Ubiquiti Networks entered the wireless technology market in June 2005, after announcing its “Super Range” mini-PCI radio card series. The SR2 and SR5 cards were adopted by original equipment manufacturers and wireless Internet service providers. Customers included WRAP, Soekris, and Mikrotik. Operating at the 2.4 and 5.8 GHz bands, the “Super Range” modules used the Atheros integrated circuits.[1] In January 2006, Ubiquiti Networks announced Freedom Frequency, which used frequencies as high as 60 GHz on its radio modules. This encouraged the release of the SR9, a separate card operating at 900 MHz non-standard IEEE 802.11 band. In 2011, Ubiquiti released new antennas for its M series devices as well as new models for the NanoBridge series. In August, outdoor and mini UniFi APs were announced, as well as AirCam/AirVision, an IP camera/NVR software. For a second consecutive year, Ubiquiti received the WISPA Manufacturer of the Year award. During October, Ubiquiti announced: Rocket/Bullet Titanium, a Rocket M5 with Gigabit Ethernet ports, TOUGHSwitch, a POE switch, EdgeMAX powered by EdgeOS, a routing Ubiquiti Networks introduced the PowerStation in May platform based on Vyatta, UniFi and AirCam Pro series, 2007, its first product to feature an integrated ra- as well as AirControl, management-software for Ubiquiti dio/antenna design, In the same year, Ubiquiti released equipment. more XR cards for the licensed bands to deal with con- At their 2012 Chicago AWC, Pera unveiled a new 24 gestion seen in the 2.4 GHz and 5.8 GHz bands. The GHz radio platform called AirFiber. AirFiber is able to company received attention in August 2007 when a group achieve speeds of up to 1.4 Gbit/s of aggregate speed. of Italian amateur radio operators set a distance world record for point-to-point links in the 5.8 GHz spectrum. Using two XR5 cards and a pair of 35 dBi dish antennas, the Italian team was able to establish a 304 km (about 188 19.2 Voice over IP mi) link at data rates between 4-5 Mbit/s.[3] After extending the supported frequencies to the 4.9 GHz band with the SR4 card, Ubiquiti announced the “Xtreme Range” series featuring two more mini-PCI cards, the XR2 and XR5. Robert J. Pera, CEO of Ubiquiti, attributed improvements to sensitivity, temperature rating and noise immunity to the “customer interactions and shared field testing experiences” as well as “real world scenarios using the Linux kernel MadWifi driver.”[2] In 2008, Ubiquiti announced additions to its 802.11 b/g In July of 2014 Ubiquiti announced its entry into the lineup, including the Bullet, NanoStation, NanoStation Voice over IP business by unveiling new UniFi systems. Loco, PicoStation and RouterStation. The following This new line of phones will come in three varieties: a 73 All are Power over Ethernet enabled. despite many requests and acknowledging that they are using this GPL-protected ap[12] “Crooks Use Hacked Routers to Aid Cyberheists”. Bullet M2/M5. Retrieved 2012-12-22. rather than the free and open source Atheros-based ath5k or ath9k drivers. All of the phones can be managed in the free-with-purchase UniFi controller that already manages the Uni-Fi Wireless Access Point line. Ubiquiti Networks had its initial allows this to occur. Archived from the original on 7 April 2015.5. Form 10-K.” Bryan Campbell of the Fujitsu Security Operations Center in Warrington. versions of Ubiquiti hardware. 2013. Ubnt.5 Security [1] “Ubiquiti Networks announces hi-power SuperRange2 and SuperRange5 mini-PCI modules | Ubiquiti Networks.com. the drivers accepted into the Linux kernel. researchers at the Fujitsu Security Operations Center in Warrington. The -Pro and -Executive models are Wi-Fi equipped enabling them to operate without having to run Ethernet cables to all phones.org/?p=5138 [5] http://goarticles. US Securities and Exchange Commission.com/article/ Wireless-Solutions-Ubiquiti/7118730/ [6] “Ubiquiti Networks IPO Priced To Work At $15?". 2015. revealing information such as passwords.[10] “GPL archive missing components” ing TFTP and an Ethernet cable.com.” said Bryan Campbell. Retrieved 2012-12-22. Brian Krebs. usually AirOS. Retrieved October 16.[10] . The systems will run a version of Android.” public offering (IPO) at 7. Inc”. [7] “Annual report for fiscal year ended June 30. dailywireless. "“We have seen literally hundreds of wireless access points. September 21. with the customized Commotion software installed.[7] 19.6 References 19. Rocket M2/M5.org.1 Accusations Regarding Crooks Utilizing Hacked AirOS Routers for Cybercrime It was reported by online reporter. 2007-02-08. but are not wireless because power cables are still needed. Gizmag. Archived from the original on 9 March 2010. 2011. lead threat intelligence analyst at Fujitsu.4 Software AirOS is the firmware maintained by Ubiquiti Networks for their products. 2012”.[9] While this issue is fixed in current [11] “Four ways Ubiquiti Networks is creatively violating the GPL”. UK reported. All of the phones include a 5-inch touchscreen that allows for videochatting and access to the Google Play Store.04 million shares. Retrieved 2012-12-22. It is Linux-based but features a modified MadWifi Linux kernel device driver for Atherosbased Wireless LAN devices. it was discovered that there was a security issue in the version of the U-Boot boot loader shipped on [9] “AirOS and Security DUMP of configuration files with TFTP or other thing” Ubiquiti’s devices.74 basic model starting at $149 set to ship in late 2014 and -Pro and a -Executive models to ship shortly after. 2012. Ubiquiti refuses to provide the source code for the GPL-licensed U-Boot. CHAPTER 19. Most of the shares were from existing stockholders.[10][11] This made it impossible (in practical terms) for Ubiquiti’s customers to fix the issue. and routers connected in relation to this botnet. [8] “Supported Devices”.[8] 19. [4] http://web. Seeking Alpha. In 2013. so the company raised only $30.3 Stock market cating with compromised routers in relation to both distribution and communication leads us to believe known vulnerabilities are being exploited in the firmware which On October 13.org/web/20111108031214/http: //www. Commotionwireless. plication. NanoStation M2/M5. “The consistency in which the botnet is communi19. The PicoStation M2. Retrieved 2012-12-22. that [12] “Recently. It was possible to extract the plaintext configuration from the device without leaving a trace us.net. $15 per [6] share. and UniFi AP models are also used as a basis for Commotion Wireless networks. UBIQUITI NETWORKS 19. [2] “Ubiquiti’s 600mW WiFi cards”.wispa. UK began tracking [the] Upatre [trojan software] being served from hundreds of compromised home routers — particularly routers powered by MikroTik and Ubiquiti’s AirOS.archive. Retrieved 9 November 2014. [3] “World Record 304km Wi-Fi connection”. on June 15.5 million. reducing costs and delays.1 Speeds HSPA+ provides an evolution of High Speed Packet Access and provides data rates up to 168 Megabits per second (Mbit/s) to the mobile device (downlink) and 22 Mbit/s from the mobile device (uplink). 20. HSPA+ was first defined in the technical standard 3GPP release 7 and expanded further in later releases. This is nearly identical to the 3GPP Long Term Evolution (LTE) flat architecture as defined in the 3GPP standard Rel-8. broadband telecommunication. HSPA+.HSPA flattened all-IP architecture. This 'flat architecture' connects the 'user plane' directly from the base station to the GGSN external gateway. HSPA+ should not be confused with LTE.2 All-IP architecture A flattened all-IP architecture is an option for the network within HSPA+. or Evolved High-Speed Packet Access.[3] HSPA+ sign shown in notification bar on an Android-based smartphone. In this architecture.Chapter 20 Evolved HSPA tiple carriers with Dual-Cell HSDPA and 4-way MIMO together simultaneously. which effectively use two parallel transmit channels Nokia Siemens Networks Internet HSPA or I-HSPA is with different technical implementations. DPA. which uses a new air interface based on OFDMA technology. 20. using any available link technology supporting TCP/IP. HSPA+ is an evolution of HSPA that upgrades the existing 3G network and provides a method for telecom operators to migrate towards 4G speeds without deploying a new radio interface.[1][2] The technology also delivers significant battery life improvements and dramatically quicker wake-from-idle time – delivering a true always-on connection. The actual speed for a user will be lower. This makes the network faster In the United States. the first commercial solution implementing the Evolved The higher 168 Mbit/s speeds are achieved by using mul.999.[4] 75 . HSPA+ offers higher bitrates only in very good radio conditions (very close to cell tower) or if the terminal and network both support either MIMO or Dual-Cell HS. HSPA+ enhances the widely used WCDMA (UMTS) based 3G networks with higher speeds for the end user that are comparable to the newer LTE networks. The 168 Mbit/s and 22 Mbit/s represent theoretical peak speeds. is a technical standard for wireless. In general. The definition can be found in 3GPP TR25.).There are no changes to the 'control plane'. The legacy archiAT&T Mobility and T-Mobile US. multiple streams etc. it is commonly available under and cheaper to deploy and operate. Technically these are achieved through the use of a multiple-antenna technique known as MIMO (for “multiple-input and multiple-output”) and higher order modulation (64QAM) or combining multiple cells into one with a technique known as Dual-Cell HSDPA. tecture is still permitted with the Evolved HSPA and is likely to exist for several years after adoption of the other aspects of HSPA+ (higher modulation. the base stations connect to the network via IP (often Ethernet providing the transmission) bypassing legacy elements for the user’s data connections. The changes allow cost effective modern link layer technologies such as xDSL or Ethernet and is no longer tied to the more expensive and rigid requirements of the older standard of SONET/SDH and E1/T1 infrastructure. The user’s data flow bypasses the Radio Network Controller (RNC) and the SGSN of the previous 3GPP UMTS architecture versions thus simplifying the architecture. com.5 References [1] Klas Johansson. HSPA & LTE • QUALCOMM to Deliver 28 Mbps Mobile Broadband with HSPA+ • HSPA now “officially” 4G . [4] 20.8 Mbit/s downlink HSPA trial a 'success’ 20. Ericsson. EVOLVED HSPA 20. Johan Bergman. [3] “Ericsson Review #1 2009 . Retrieved 2014-06-01.4 See also • Comparison of wireless data standards • High Speed Packet Access • High-Speed Downlink Packet Access • High-Speed Uplink Packet Access • List of UMTS networks • List of HSDPA networks • List of HSUPA networks • List of HSPA+ networks 20. [2] “White paper Long Term HSPA Evolution Mobile broadband evolution beyond 3GPP Release 10” (PDF). “Multi-Carrier HSPA Evolution” (PDF). Dirk Gerstenberger.Continued HSPA Evolution of mobile broadband” (PDF).76 CHAPTER 20. Ericsson. Nokiaslemensnetworks.com. 27 January 2009. Mats Blomgren and Anders Wallén (28 January 2009). Retrieved 2014-06-01.com.6 External links • 3GPP • Free download of 3GPP standards available at • 3GPP Specifications Home Page • ETSI GSM UMTS 3GPP Numbering Cross Reference • HSPA LTE Link Budget Comparison • Public HSPA Discussion Forum • Nokia HSPA • EDGE. Local 28. Retrieved 2014-06-01.3 Deployment Main article: List of HSPA+ networks • Huawei HSPA+ • HSPA+ Upgrade in Sri Lanka • Sri Lanka. 14 December 2010. dards.[3] However. W-CDMA or WCDMA (Wideband Code Division Multiple Access). The ITU eventually accepted W-CDMA as part of the IMT-2000 family of 3G standards. and the short range DECT system. especially in the Americas. As NTT DoCoMo did not wait for the finalisation of the 3G Release 99 specification. EDGE. allowing mobile operators to deliver higher bandwidth applications including streaming and broadband Internet access. as an alternative to CDMA2000. their network was initially incompatible with UMTS. W-CDMA was selected as an air interface for UMTS. but development of cell-phone networks based on CDMA (prior to W-CDMA) was dominated by Qualcomm. or IMT-2000 CDMA Direct Spread is an air interface standard found in 3G mobile telecommunications networks. this has been resolved by NTT DoCoMo updating their network. text and MMS services. late introduction and the high upgrade cost of de77 . It supports conventional cellular voice.1 Development In the late 1990s. along with UMTS-FDD. Code Division Multiple Access communication networks have been developed by a number of companies over the years.[2] It uses the DS-CDMA channel access method and the FDD duplexing method to achieve higher speeds and support more users compared to most previously used time division multiple access (TDMA) and time division duplex (TDD) schemes.[4] Several cdma2000 operators have even converted their networks to W-CDMA for international roaming compatibility and smooth upgrade path to LTE. Later. a feature it shares with other members Despite incompatibility with existing air-interface stanof the UMTS family. W-CDMA was developed by NTT DoCoMo as the air interface for their 3G network FOMA. it uses the same core network as the 2G GSM networks deployed worldwide. W-CDMA has then become the dominant technology with 457 commercial networks in 178 countries as of April 2012. with coverage in 58 countries as of 2006. Compatibility with CDMA2000 would have beneficially enabled roaming on existing networks beyond Japan. divergent requirements resulted in the W-CDMA standard being retained and deployed globally. 3G sign shown in notification bar on an Android powered smartphone. Qualcomm was the first company to succeed in developing a practical and cost-effective CDMA implementation for consumer cell phones and its early IS-95 air interface standard has evolved into the current CDMA2000 (IS-856/IS-2000) standard. UTRAFDD. Later NTT DoCoMo submitted the specification to the International Telecommunication Union (ITU) as a candidate for the international 3G standard known as IMT2000.[1] W-CDMA is the basis of Japan’s NTT DoCoMo's FOMA service and the most-commonly used member of the Universal Mobile Telecommunications System (UMTS) family and sometimes used as a synonym for UMTS. However. but can also carry data at high speeds. Qualcomm created an experimental wideband CDMA system called CDMA2000 3x which unified the W-CDMA (3GPP) and CDMA2000 (3GPP2) network technologies into a single design for a worldwide standard air interface. While not an evolutionary upgrade on the airside. allowing dual mode mobile operation along with GSM/EDGE. since Qualcomm CDMA2000 networks are widely deployed.Chapter 21 W-CDMA (UMTS) 21. and cross-licensing of patents between Qualcomm and W-CDMA vendors has not eliminated possible patent issues due to the features of WCDMA which remain covered by Qualcomm patents. 21.25 MHz radio channels. Elsewhere. W-CDMA may also be better suited for deployment in the very dense cities of Europe and Asia.2 Deployment The world’s first commercial W-CDMA service.214 Physical layer procedures (FDD) • TS 25.78 CHAPTER 21. The W-CDMA system is a new design by NTT DoCoMo. However. ISBN 978-0-470-02294-8 W-CDMA has been developed into a complete set of [4] GSM Association HSPA Market update April 2012 specifications. a detailed protocol that defines how a mo[5] Qualcomm says it doesn't need Nokia patents bile phone communicates with the tower. [3] Hsiao-Hwa Chen (2007).201 Description—Describes basic differences between FDD and TDD. [2] 3GPP notes that “there currently existed many different names for the same system (eg FOMA. • 3GPP specification series 25—Radio aspects of 3G. From an engineering point of view. Mobile User Objective System using geosynchronous satellites in place of cell towers.4 References [1] “What is 3G/WCDMA?".211 Physical channels and mapping of transport channels onto physical channels (FDD) • TS 25. capacity. while CDMA2000 transmits on one or several pairs of 1. and system interfaces are specified allowing free competition on tech. GSMA.213 Spreading and modulation (FDD) • TS 25. p.3 See also • CDMA • Cellular Frequencies • DECT • Evolution-Data Optimized/CDMA2000 • FOMA • GSM/EDGE • HSPA • TS 25. how datagrams are structured. See the main UMTS article for more information. hurdles remain. FOMA. The Next Generation CDMA Technologies. 7. W-CDMA. Tokyo. 21.Measurements (FDD) . pp. • TS 25. how signals are modulated. John Wiley and Sons.com.1 Documentation nology elements.S. etc)”. decisions and actions from 3GPP Organizational Partners Meeting#6. Retrieved 201406-24. W-CDMA provides a different balance of trade-offs between cost. 105–106.4.212 Multiplexing and channel coding (FDD) • TS 25. was launched by NTT DoCoMo in Japan in 2001.215 Physical layer .[5] • HSDPA • PN sequences • Spectral efficiency comparison table • UMTS • UMTS frequency bands 21. W-CDMA (UMTS) ploying an all-new transmitter technology. W-CDMA deployments are usually marketed under the UMTS brand. Though W-CDMA does use a direct sequence CDMA transmission technique like CDMA2000. 3GPP. W-CDMA has also been adapted for use in satellite communications on the U. and density. “Draft summary minutes. it also promises to achieve a benefit of reduced cost for video phone handsets. including UMTS 21. W-CDMA is not simply a wideband version of CDMA2000.1 Rationale for W-CDMA W-CDMA transmits on a pair of 5 MHz-wide radio channels. performance. and it differs in many aspects from CDMA2000.1. UMTS. 9 October 2001” (PDF).21. W-CDMA has become the dominant standard. 22.5G is a grouping of disparate mobile telephony and data technologies designed to provide better performance than 3G systems.Chapter 22 3.5G 3. precursor of LTE Advanced 79 .1 Technology • High-Speed Downlink Packet Access • Evolved HSPA • 3GPP Long Term Evolution. as an interim step towards deployment of full 4G capability. 8 Mbit/s nationwide. High Speed Downlink Packet Access (HSDPA) and High Speed Uplink Packet Access (HSUPA).3 High Speed Uplink Packet Access (HSUPA) 23. was released late in 2008 with subsequent worldwide adoption beginning in 2010. Upgrading to HSUPA is usually only a software 80 . that extends and improves the performance of existing 3G mobile telecommunication networks utilizing the WCDMA protocols. MTS and Tata DoCoMo provide speed of 21. However. The improved downlink provides up to 14 Mbit/s with significantly reduced latency. which is introduced in 3GPP Release 6. The Australian provider Telstra provides up to 14.2 High Speed Downlink Packet Access (HSDPA) Main article: High-Speed Uplink Packet Access Main article: High-Speed Downlink Packet Access The second major step in the WCDMA upgrade process is to upgrade the uplink.2 Mbit/s.2 Mbit/s and Nepal Telecom Provides 5. Etisalat provides up to 42 Mbit/s and Dialog.2 Mbit/s coverage is now established by SK Telecom and KTF. and as of May 2008 90 percent of WCDMA networks had been upgraded to HSDPA.76 Mbit/s in the uplink. 23. High Speed Packet Access (HSPA)[1] is an amalgamation of two mobile telephony protocols. PCCW. It also reduced latency and provided up to five times more system capacity in the downlink and up to twice as much system capacity in the uplink compared with original WCDMA protocol.2 Mbit/s. The newer standard allows bit-rates to reach as high as 337 Mbit/s in the downlink and 34 Mbit/s in the uplink. In Nepal.2 Mbit/s. short transmission time interval (TTI).1 Overview The first HSPA specifications supported increased peak data rates of up to 14 Mbit/s in the downlink and 5. Airtel and Hutch provides 7.[2] 23. The Croatian VIPnet network supports a downlink speed of 7. The first step required to upgrade WCDMA to HSPA is to improve the downlink by introducing HSDPA. Evolved HSPA (also known as HSPA+). The upgrade to HSDPA is often just a software update for most WCDMA networks. Singapore’s three network providers M1. fast link adaptation and scheduling along with fast hybrid automatic repeat request (HARQ).1 Mbit/s nationwide while Reliance ADAE provides speeds up to 28. a nationwide 7.[3] Voice calls are usually prioritized over data transfer. these speeds are rarely achieved in practice. Ncell Currently Provides 42. HSPA is Currently replaced by HSPA+ in Nepal. higherorder modulation. A further improved 3GPP standard. CSL and Hutchinson 3 provide 21 Mbit/s coverage and in India BPL. The improvement in speed and latency reduces the cost per bit and enhances support for high-performance packet data applications. Sri Lankan companies like Mobitel. In Hong Kong. StarHub and SingTel provide up to 28 Mbit/s throughout the entire island. HSDPA is based on shared channel transmission and its key features are shared channel and multi-code transmission.4 Mbit/s nationwide and up to 42Mbit/s in selected areas. as does Rogers Wireless in Canada which also supports 21 Mbit/s in the Toronto area.Chapter 23 High Speed Packet Access HSPA sign shown in notification bar on an Android-based smartphone.[4] In South Korea. HSPA is in a rush. [8] 23. 23. some diversity and joint scheduling gains can also be achieved. In Finland. Enhanced Uplink adds a new transport channel to WCDMA. DUAL-CARRIER HSUPA (DC-HSUPA) 81 update. called the Enhanced Dedicated Channel (E-DCH). The enhanced uplink features several improvements similar to those of HSDPA.4 Mbit/s HSUPA to most large cities with plans to add [11] [6] capacity improvements within their network.9 Mbit/s HSUPA lations) due to poor radio signal quality. Release 11 specifies 8-carrier HSPA allowed in non-contiguous bands with 4 × 4 MIMO offering peak Since 2011. It provides extensions to the existing HSPA definitions and is therefore backward-compatible all the way to the original Release 99 WCDMA network releases. is the natural evolution of • Global mobile Suppliers Association • Mobile broadband modem • 3GPP Long Term Evolution .[13] 23. these can be doubled.[12] applied to HSUPA UL physical channels and DPCCH. Elisa announced on 30 August 2007.8 See also 23.6 Dual-carrier HSUPA (DCEricsson announced on 16 July 2008.[7] In Haiti. An enhanced uplink creates opportunities for a number of new applications including VoIP. The support of MIMO in combination with DC-HSDPA will allow operators even more 1. The standardisation of Release 9 was completed in December 2009. NATCOM. ployed amongst WCDMA operators with nearly 200 commitments. fast scheduling and fast Hybrid Automatic Repeat reQuest (HARQ). With Dual Cell technology. The enhanced uplink increases the data rate (up to 5.23. HSPA+) is a wireless broadband standard defined in 3GPP release 7 and 8 of the WCDMA specification. the successful tests HSUPA) of HSUPA 5. From Release 9 onwards it will be possible to use DC-HSDPA in comService as part of its new MaxMobile plan on 1 August [5] 2007.8 Mbit/s in the live network of 3 Italia. bination with MIMO.6. including multi-code transmission. which actually took two more years to accomplish). although real speeds are far lower.transfer rates up to 672 Mbit/s. the capacity. HSPA by allowing a user to connect to two cells at once. offers up to 7. (The same announcement contained a promise of covering 25% more of Finland by the end of the year. the former public company now operated by Viettel from Vietnam. The standard is scheduled to be finalised in Q3 2012 and first chipsets supporting MC-HSPA in late 2013. part of 3GPP Release 8. Besides the throughput gain from doubling the number of cells to be used. 3 Italia and 23.[10] Dual-cell can particularly improve the QoS (Quality of Service) for end users in poor radio reception where they cannot benefit from the other WCDMA capacity improvements (MIMO and higher order moduIn Singapore. thereby theoretically doubling the connection speeds for the user. Evolved HSPA provides data rates up to 84 Mbit/s in the downlink and 10.7 Multi-carrier HSPA) HSPA (MC- The aggregation of more than two carriers has been studied and 3GPP Release 11 is scheduled to include 4carrier HSPA.2 Mbit/s Main article: High-Speed Uplink Packet Access § Dual-Cell HSUPA nationwide.8 Mbit/s). Similar enhancements as introduced with DC-HSDPA in the downlink for UMTS Release 8 are being standardized for UMTS Release 9 in the uplink. the service to its whole 3G network within months. Starhub announced a 1. and also reduces latency.8 Mbit/s in the uplink (per 5 MHz carrier) with multiple input.4 Evolved High Speed Packet Access (HSPA+) Main article: Evolved HSPA Evolved HSPA (also known as HSPA Evolution. multiple output (2x2 MIMO) technologies and higher order modulation (64 QAM). short Transmission Time Interval (TTI).[9] An HSPA+ network can theoretically support up to 28 Mbit/s and 42 Mbit/s with a single cell.5 Dual-carrier HSDPA (DCHSDPA) • Broadband Internet access Main article: High-Speed Downlink Packet Access § Dual-Cell • Mobile broadband Dual-Carrier HSDPA (also known as Dual-Cell HSDPA). called DualCell HSUPA. uploading pictures and sending large e-mail messages. HSPA+ has been very widely de. “Initial multi-carrier HSPA performance evaluation”. Retrieved January 18.5G drivin). DC-HSPDA. nomor. Ericsson. UE Radio Access capabilities” (PDF).11 External links • GSMworld. [3] “GSM/3G Market Update”. radioelectronics. ISBN 0-470-02676-6 23. Official HSPA website • Linkedin.82 23. June 2006. Retrieved November 27. April. January 2014.de [10] R1-081546.fi [7] Ericsson. nomor.com [6] Elisa. HIGH SPEED PACKET ACCESS .com [8] “GSA confirms 70% jump in 42 Mbit/s DC-HSPA+ network deployments over past 3 months”.com. Global mobile Suppliers Association.com. 2008 [11] Dual carrier HSPA: DC-HSPA. Public HSPA Discussion Forum • 3. John Wiley.com • Dual carrier HSPA: DC-HSPA. 2012. 3GPP TSG-RAN WG1 #52bis. [4] Rogers. 2014.com.de [2] “Universal Mobile Telecommunications System (UMTS). 2011.com [5] Starhub. Retrieved March 4. Gsacom. September 2006. DC-HSPDA [12] Nomor 3GPP Newsletter 2009-03: Standardisation updates on HSPA Evolution.de [13] 3GPP releases 23. ETSI.com CHAPTER 23. ericsson.9 References [1] Nomor Research: White Paper “Technology of High Speed Packet Access”.10 Further reading • Martin Sauter: Communication Systems for the Mobile Information Society. [9] Nomor Research White Paper: Dual-cell HSPA and its Evolution. nomor. IMT-2000 family of 3G standards.1 Technology “EDGE” redirects here. traffic as standard GPRS. (also known as Enhanced GPRS (EGPRS). making it easier for existing GSM carriers to upgrade to it. This effectively triples the gross data rate offered by GSM. sends more redundancy information to be combined in the receiver.[1] EDGE was deployed on GSM networks beginning in 2003 – initially by Cingular (now AT&T) in the United States. or IMT Single Carrier (IMT-SC). see Edge. which is often the case today.1. which. EDGE sign shown in notification bar on an Android-based smartphone. This increases the probability of correct decoding. was developed for use in a portion of Digital AMPS network spectrum. 83 . and has been accepted by the ITU as part of the performance e. It introduces a new technology not found in GPRS. EDGE. EDGE meets the International Evolved EDGE continues in Release 7 of the 3GPP stan. Enhanced Data rates for GSM Evolution (EDGE) EDGE/EGPRS is implemented as a bolt-on enhancement for 2. increasing the data rate bit-rates of 400 kbit/s can be expected. the network can be upgraded to EDGE by activating an optional software feature.[1] It also enhances the cess (HSPA). This means it can handle four times as much such as an Internet connection.g. Today EDGE is supported by all major chip vendors for both GSM and WCDMA/HSPA.1 Transmission techniques In addition to Gaussian minimum-shift keying (GMSK). uses a rate adaptation algorithm that adapts the modulation and coding scheme (MCS) according to the quality of the radio channel. to complement High-Speed Packet Ac. Incremental Redundancy. of this service. If the operator already has this in place. EDGE is considered a pre-3G radio technology and is part of ITU's 3G definition. Through the introduction of sophisticated methods of coding and transmitting data. mode. resulting in a threefold increase in capacity and performance compared with an ordinary EDGE can carry a bandwidth up to 500 kbit/s (with endto-end latency of less than 150 ms) for 4 timeslots (theoGSM/GPRS connection. For other uses.6 kbit/s for 8 timeslots) in packet EDGE can be used for any packet switched application. like GPRS. EDGE delivers higher bitrates per radio channel.Chapter 24 Enhanced Data Rates for GSM Evolution 24. EDGE produces a 3-bit word for every change in carrier phase. Peak bit-rates of up to 1 Mbit/s and typical circuit data mode called HSCSD.Telecommunications Union's requirement for a 3G netdard providing reduced latency and more than doubled work.[2] EDGE is standardized also by 3GPP as part of the GSM family. EDGE requires no hardware or software changes to be made in GSM core networks. so called Compact-EDGE. EDGE is a superset to GPRS and can function on any network with GPRS deployed on it. and thus the bit rate and robustness of data transmission.5G GSM/GPRS networks. provided the carrier implements the necessary upgrade. EDGEcompatible transceiver units must be installed and the base station subsystem needs to be upgraded to support EDGE. EDGE uses higher-order PSK/8 phase shift keying (8PSK) for the upper five of its nine modulation and coding schemes. instead of retransmitting disturbed packets. retical maximum is 473.[3] 24. A variant. or Enhanced Data rates for Global Evolution) is a digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM. pdf[] bustly than the data.[4] • Spectral efficiency comparison table In EGPRS/EDGE. Physical layer on the radio path.com. the convolutional code is of rate 1/2.e. Gsacom. HSPA and LTE: The Mobile Broadband Advantage” (PDF). General description”.int/ITU-D/imt-2000/ DocumentsIMT2000/IMT-2000. the Radio Link Control (RLC) and Media Access Control (MAC) headers and the payload data are coded [2] http://www.5 External links • The Global mobile Suppliers Association . 24. Bit rates are increased up to 1 Mbit/s peak bandwidth and latencies down to 80 ms using dual carrier. 200709-01. no convolutional coding is applied. each input bit is converted into two coded bits.[6] as of May 2013.1. RLC and MAC headers.[4] In all EGPRS Modulation and Coding Schemes.[5] 24. • List of device bandwidths i. ENHANCED DATA RATES FOR GSM EVOLUTION EDGE modulation and coding The Global mobile Suppliers Association (GSA) states that. the Modulation and Coding Schemes • UMTS MCS-1 to MCS-9 take the place of the Coding Schemes of GPRS. 24.001: Technical Specification Group 24. which are also referred to as the Block Check Sequence.84 24.[4] In Coding Schemes CS-2 and CS-3. end-users will be able to experience mobile internet connections corresponding to a 500 kbit/s ADSL service. Retrieved 2013-03-05.2 CHAPTER 24.int/ITU-D/imt-2000/MiscDocuments/ separately in EGPRS. pp. Note that the bit rates do not [3] ETSI SMG2 99/872 include the overhead incurred by channel coding and the [4] 3rd Generation Partnership Project (September 2012). “3GGP TS45.24.2 Networks See also: List of EDGE networks GSM/EDGE Radio Access Network. the output of the con• Mobile broadband volutional code is punctured to achieve the desired code • Novatel Wireless rate. the Coding Schemes CS-1 to CS-4 specify the number of parity • Evolved EDGE bits generated by the cyclic code and the puncturing rate • HSDPA of the convolutional code.itu.work operator commitments in 213 countries.pdf GRPS. With EDGE Evolution.[4] In GPRS Coding Scheme CS-4.[4] In GPRS Coding Schemes CS-1 through CS-3. taking advantage of the installed base. and puncturing is used to achieve the desired code rate. GMSK or 8PSK. while MCS-5 through MCS-9 use 8PSK. [5] “EDGE.itu. Latencies are reduced by lowering the Transmission Time Interval by half (from 20 ms to 10 ms). from a total of 606 mobile netThe channel encoding process in GPRS as well as EG. EDGE Evolution can be gradually introduced as software upgrades.[4] In GPRS.1. a cyclic code is used to add parity bits.3 Evolved EDGE Evolved EDGE improves on EDGE in a number of ways.4 References a convolutional code of rate 1/3 is used. and additionally specify which modulation • WiFi scheme is used. followed by coding with a possi. Rysavy Research and 3G Americas. PRS/EDGE consists of two steps: first. and turbo codes to improve error correction. And finally signal quality is improved using dual antennas improving average bit-rates and spectrum efficiency.3 See also bly punctured convolutional code. there were 604 GSM/EDGE netscheme (MCS) works in 213 countries. Retrieved 2010-09-27.[4] MCS-1 through MCS-4 use GMSK and have performance similar (but not equal) to GPRS.[4] In contrast to [1] http://www. [6] “GSA – The Global mobile Suppliers Association EDGE Databank”. Retrieved 2013-07-20.[4] The coding schemes are summarized in the tables below. higher symbol rate and higher-order modulation (32QAM and 16QAM instead of 8PSK).[4] The headers are coded more roIMT-Deployments-Rev3. 58–65. in response to nitions will be needed: 85 . There are two fundamental phase of a reference signal (the carrier wave). By convention. Usually. This requires the receiver to be able to compare the phase of the received signal to a A convenient method to represent PSK schemes is on reference signal — such a system is termed coherent (and a constellation diagram.1 Definitions All convey data by changing some aspect of a base sig. although There are three major classes of digital modulation tech. thus recovering the original data.1 Introduction (BPSK) which uses two phases. instead of operating with respect to a con. DPSK In PSK. The amplitude of each point waveform can be considered the significant items. the broadcast can operate with re. each assigned a unique pattern of a reference signal to compare the received signal’s binary digits. Since the data to be niques used for transmission of digitally represented data: conveyed are usually binary. the phase is changed scheme that conveys data by changing. in which case the demodulator must have nite number of phases. the moduli of the comexchange. The demodulator. • By viewing the change in the phase as conveying inwhich is designed specifically for the symbol-set used by formation — differential schemes. in this context. it produces more erroneous demodulation. the demodulator determines the changes in the sine) wave and the amplitude along the quadrature axis phase of the received signal rather than the phase (rel. nal and maps it back to the symbol it represents. pends on the difference between successive phases. In this way. inative to a reference wave) itself.any number of phases may be used. • Frequency-shift keying (FSK) • Phase-shift keying (PSK) 25. the carrier wave (usually a sinusoid). some definal. imaginary axes are termed the in-phase and quadrature Alternatively.For determining error-rates mathematically. determines the phase of the received signot need a reference carrier (to a certain extent). Two common examples are “binary phase-shift keying” 25. or modulating. PSK uses a fimation. Such a repstant reference wave. PSK since there is no need for the demodulator to have a This gives maximum phase-separation between adjacent copy of the reference signal to determine the exact phase points and thus the best immunity to corruption.axes respectively due to their 90° separation. Since this scheme de. or ber of bits. it is termed differential phase-shift keying (DPSK). ways of utilizing the phase of a signal in this way: Any digital modulation scheme uses a finite number of • By viewing the phase itself as conveying the infordistinct signals to represent digital data.to modulate a sine (or cosine) wave. In the case of PSK. the constellation points chosen are usually pocan be significantly simpler to implement than ordinary sitioned with uniform angular spacing around a circle. the to represent the data signal. Each pattern of bits forms the symbol that is represented by the particular phase.1. Changes in phase of a single broadcast forward implementation. In this along the in-phase axis is used to modulate a cosine (or system. the real and referred to as CPSK). plex numbers they represent will be the same and thus so will the amplitudes needed for the cosine and sine waves.Chapter 25 Phase-shift keying Phase-shift keying (PSK) is a digital modulation a data signal. and “quadrature phaseshift keying” (QPSK) which uses four phases. They are of the received signal (it is a non-coherent scheme).phase modulates cosine and quadrature modulates sine. This shows the points in the complex plane where. each phase encodes an equal numphase against. In positioned on a circle so that they can all be transmitted with the same energy.resentation on perpendicular axes lends itself to straightspect to itself. some of which do the modulator. the PSK scheme is usually designed with the number of constellation points being a • Amplitude-shift keying (ASK) power of 2. it uses DBPSK (differential BPSK). BPSK (also sometimes called PRK. and is used in RFID standards such as ISO/IEC 14443 which has been adopted for biometric passports. The higher-speed wireless LAN standard.4 • Tb = Bit duration GHz using OQPSK. as seen above. • Ps = Probability of symbol-error schemes tend to 'jump' from QPSK to 16-QAM (8-QAM is possible but difficult to implement).15. or 2PSK) is the simplest form of phase shift keying (PSK). so either modulation choice in version 2 will yield a higher data-rate.In the presence of an arbitrary phase-shift introduced by tooth 1 modulates with Gaussian minimum-shift keying. The 6 and 9 Mbit/s modes use OFDM modulation where each sub-carrier is BPSK modulated. The fastest four modes use OFDM with forms of quadrature amplitude modulation.4 (the wireless standard used by ZigBee) bol also relies on PSK.3 Binary phase-shift (BPSK) The error-rates quoted here are those in additive white Gaussian noise (AWGN). x≥0 25. 18. To provide the extended rate of 2 Mbit/s. QPSK is employed. It uses two phases which are separated by 180° and so can also be termed 2-PSK.IEEE 802.5 dB better — but its • Pb = Probability of bit-error data rate is only three-quarters that of 16-QAM.2 Applications Owing to PSK’s simplicity. IEEE 802.4 allows the use of two frequency bands: 868–915 MHz using BPSK and at 2.11b-1999. 36. PHASE-SHIFT KEYING • Eb = Energy-per-bit a binary scheme. The 12 and 18 Mbit/s modes use OFDM with QPSK. IEEE 802. 48 and 54 Mbit/s.15.86 CHAPTER 25.[1][3] has eight data rates: 6.5 Mbit/s and the full rate of 11 Mbit/s. phase reversal keying. This modulation is the most robust of all the PSKs since it takes the highest level of noise or distortion to make the demodulator reach an incorrect decision. only able to modulate at 1 bit/symbol (as seen in the figure) and so is unsuitable for high data-rate applications. It is a scaled form of the complementary band satcom) uses 8-PSK modulation. In reaching 5. • Ts = Symbol duration Notably absent from these various schemes is 8-PSK. This is because its error-rate performance is close to that • N0 /2 = Noise power spectral density (W/Hz) of 16-QAM — it is only about 0. Q(x) will give the probability that a single sample taken from a random process with zero-mean and unit-variance Included among the exceptions is HughesNet satellite Gaussian probability density function will be greater or ISP. the demodulator is unable . Because of its simplicity BPSK is appropriate for lowcost passive transmitters. Blue. A similar technology. DQPSK is used. it is widely used in existing technologies. Thus 8PSK is often omitted from standards and. For example.[1][2] uses a variety of different PSKs depending on the data rate required. keying Q 25. At the basic rate of 1 Mbit/s. and in this figure they are shown on the real axis.[4] 0 1 I Constellation diagram example for BPSK. credit cards such as American Express's ExpressPay.11g2003. hence. the communications channel. IEEE 802. It does not particularly matter exactly where the constellation points are positioned. and many other applications. 12. however. Bluetooth 2 will use π/4 -DQPSK at its lower rate (2 Mbit/s) and 8-DPSK at its higher rate (3 Mbit/s) when the link between the two devices is sufficiently robust. at 0° and 180°. It is. particularly when compared with its competitor quadrature amplitude modulation. 9. The wireless LAN standard. These error rates are lower than those computed in fading channels. the model HN7000S modem (on KUequal to x . Gaussian error function: 1 Q(x) = √ 2π ∫ ∞ e x −t2 /2 1 dt = erfc 2 ( x √ 2 ) . 24. • Es = Energy-per-symbol = nEb with n bits per sym. are a good theoretical benchmark to compare with. but has to be coupled with complementary code keying. or 4-QAM. and differentially encoded QPSK is often used in practice.3.3. with modern electronics technology. Hence. BPSK is functionally equivalent to 2-QAM modulation. of phase changes. equispaced around a circle.1 Implementation Sometimes this is known as quadriphase PSK. With four basis function phases.4. (Although the root concepts of QPSK and 4. T b √ The mathematical analysis shows that QPSK can be used where√1 is represented by Eb ϕ(t) and 0 is represented either to double the data rate compared with a BPSK sysby − Eb ϕ(t) . the resulting modulated radio waves of BPSK and also indicates the implementation of higher- .) QPSK uses four points on the constellation diagram. this is also the the penalty in cost is very moderate. However. binary data is often conveyed with the following signals: √ s0 (t) = √ 2Eb cos(2πfc t + π) = − Tb √ 00 10 2Eb cos(2πfc t) Tb 2Eb cos(2πfc t) Tb where fc is the frequency of the carrier-wave. tem while maintaining the same bandwidth of the signal. In this latter case. This assignment is. of course.25. s1 (t) = Constellation diagram for QPSK with Gray coding. QPSK can encode two bits per symbol. The transmitted carrier can undergo numbers figure are relevant only to QPSK). 0 and π. the data is often differentially encoded prior to modulation.at the same BER. 25.advantage of QPSK over BPSK becomes evident: QPSK transmits twice the data rate in a given bandwidth culated as:[5] compared to BPSK . As a result. Each adjacent symbol only differs by one bit.The implementation of QPSK is more general than that QAM are different. Since there is only one bit per symbol. In the specific form. shown in the diagram with Gray coding to minimize the bit error √ rate (BER) — sometimes misperceived as twice the BER 2 ϕ(t) = cos(2πfc t) of BPSK. The engi(√ ) (√ ) neering penalty that is paid is that QPSK transmitters 2Eb Eb 1 Pb = Q or Pe = 2 erfc N0 N0 and receivers are more complicated than the ones for BPSK. Given that radio communication channels are allocated by agencies such as the Federal Communication Com25. 01 25. 4-PSK. The topmost width needed.1 11 Implementation The general form for BPSK follows the equation: √ sn (t) = I 2Eb cos(2πfc t + π(1 − n)). The bit-stream that causes this ently is a common confusion when considering or describoutput is shown above the signal (the other parts of this ing QPSK.4 Quadrature phase-shift keying (QPSK) 25.and deciding differmodulator would produce.4. the The bit error rate (BER) of BPSK in AWGN can be cal. the BER of QPSK is exsignal is a BPSK-modulated cosine wave that the BPSK actly the same as the BER of BPSK . As with BPSK. This use of this basis function is shown at the end of the or to maintain the data-rate of BPSK but halving the bandnext section in a signal timing diagram. n = 0. QUADRATURE PHASE-SHIFT KEYING (QPSK) 87 Q to tell which constellation point is which. symbol error rate. 1. arbitrary. the signal-space can be represented by the single are exactly the same. there are phase ambiguity problems at the receiving end. Tb This yields two phases.2 Bit error rate mission giving a prescribed (maximum) bandwidth. The binary data waveform alone matches the description given for BPSK stream is split into the in-phase and quadrature-phase compo. contribute to the quadrature-phase component: 1 1 0 0 0 1 1 0 . (√ ) 2Eb Hence. These are then separately modulated onto two orthogonal The binary data that is conveyed by this waveform is: 1 basis functions. The total signal — the sum of the two components — is shown at the bottom.2 needed. and the resulting signal is the QPSK signal. • The odd bits. in order to achieve the same bit-error probability as BPSK. The topmost Conceptual transmitter structure for QPSK. ϕ2 (t) = sin(2πfc t) Ts As a result. the even (or odd) bits are used to modulate the in-phase component √ 2 of the carrier.4. With this interpretation. N0 4 points ( √ ) √ ± Es /2. Afterwards. The factors of 1/2 indicate that the total power is split The symbol error rate is given by: equally between the two carriers. 1.above. contribute to the inphase component: 1 1 0 0 0 1 1 0 • The even bits.with 3.88 CHAPTER 25. it is easier to see it as two independently modulated quadrature carriers. are a cosine wave and a sine wave. 1 0 0 0 1 1 0. highlighted here. nents. correlators. 2. 3π/4. Each detection device uses a reference threshold value to determine whether a 1 or 0 is detected. Jumps in phase can be seen as the PSK changes the phase on each component at the start of each bit-period. Note the use of polar non-return-tozero encoding. ± Es /2 .may be approximated: dent BPSK signals. This yields the four phases π/4. Note that the signal-space points for BPSK do not need to split the symbol (bit) energy over (√ ) the two carriers in the scheme shown in the BPSK conEs Ps ≈ 2Q stellation diagram. while the odd (or even) bits are used to cos(2πfc t) ϕ1 (t) = Ts modulate the quadrature-phase component of the carrier. If the signal-to-noise ratio is high (as is necessary for Comparing these basis functions with that for BPSK practical QPSK systems) the probability of symbol error shows clearly how QPSK can be viewed as two indepen. PHASE-SHIFT KEYING order PSK. Bit error rate This results in a two-dimensional signal space with unit Although QPSK can be viewed as a quaternary modulabasis functions tion. Writing the symbols in the constellation diagram in terms of the sine and cosine waves used to transmit them: √ sn (t) = ( 2Es π) cos 2πfc t + (2n − 1) . two sinusoids are used. Ts 4 Receiver structure for QPSK. The modulated signal is shown below for a short segment An illustration of the major components of the transmitter of a random binary data-stream. N0 QPSK systems can be implemented in a number of ways. highlighted here. QPSK uses twice the power (since two bits are transmitted simultaneously). The matched filters can be replaced n = 0. but have been placed after to illustrate the conceptual difference between digital and analog signals involved with digital modulation. The two carrier waves and receiver structure are shown below. Here. the odd-numbered bits have been assigned to the in-phase component and the even-numbered bits to the quadrature component (taking the first bit as number 1). However. the probability of bit-error for QPSK is the The first basis function is used as the in-phase component same as for BPSK: of the signal and the second as the quadrature component of the signal. as indicated by the signal-space analysis above. 5π/4 and 7π/4 as 25. the two signals are superimposed. These encoders can be placed before for binary data source. BPSK is used on both carriers and they can be indepen√ 2 dently demodulated. the signal constellation consists of the signal-space Pb = Q . In this implementation. The picture on the right shows the difference in the behavior of the phase between ordinary QPSK and OQPSK. This yields much lower amplitude fluctuations than non-offset QPSK and is sometimes preferred signal at the bottom. The two signal components with their bit assignments are shown at the top. 10 Signal doesn't cross zero.25. QUADRATURE PHASE-SHIFT KEYING (QPSK) 89 QPSK 135° 45° t −45° −135° Timing diagram for QPSK. and the total combined signal at the bottom. an undesirable quality in communication systems. When the signal is low-pass filtered (as is typical in a transmitter). hence the name) with respect to one another. Note the half symbol-period offset between the two component waves. Taking four values of the phase (two bits) at a time to construct a QPSK symbol can allow the phase of the signal to jump by as much as 180° at a time. Note the abrupt changes in phase at some of the bit-period boundaries. the in-phase and quadrature components will never change at the same time. while in OQPSK the changes are never greater than 90°. but only to a maximum of 135° . combined quadrature phase-shift keying (SQPSK).4.3 −45° t Difference of the phase between QPSK and OQPSK Offset QPSK (OQPSK) Q in practice. the magnitude of jumps is smaller in OQPSK when compared to QPSK. or half a symbol-period. these phase-shifts result in large amplitude fluctuations. The binary data stream is shown beneath the time axis. This also reduces the phase-shifts from a maximum of 180°. Usually. It is sometimes called Staggered shown beneath the time axis.4. 25. In other words. it can be seen that this will limit the phase-shift to no more than 90° at a time. The two signal components with their bit assignments are shown the top and the total. The binary data stream is of the phase to transmit. Note the half-period offset between the two signal components. It can be seen that in the first plot the phase can change by 180° at once. 11 I 00 45° −135° Variants 01 OQPSK 135° The modulated signal is shown below for a short segment of a random binary data-stream. The sudden phase-shifts occur about twice as often as for QPSK (since the signals no longer change together). but they are less severe. In the constellation diagram shown on the right. either the even or odd symbols are used to select points from one of the constellations and the other symbols select points from the other constellation. By offsetting the timing of the odd and even bits by one bitperiod. π /4–QPSK This variant of QPSK uses two identical constellations which are rotated by 45° ( π/4 radians. because only one bit of the symbol is changed at a time Offset quadrature phase-shift keying (OQPSK) is a variant of phase-shift keying modulation using 4 different values Timing diagram for offset-QPSK. Any number of phases may be used to construct a PSK . (Rather than traveling instantly from one symbol to another. Thus. it travels smoothly around the constant-amplitude circle from one symbol to the next. 25. This shows the two separate constellations with identical Gray coding but rotated by 45° with respect to each other. Timing diagram for π/4-QPSK. In other words. but the total signal’s magnitude remains constant (constant envelope). DPQPSK Dual-polarization quadrature phase shift keying (DPQPSK) or dual-polarization QPSK . This lowers the dynamical range of fluctuations in the signal which is desirable when engineering communications signals. starting with the 'blue' one. The two signal components with their bit assignments are shown the top and the total.90 CHAPTER 25. in the sense that an integrate-and-dump offset QPSK detector produces the same output no matter which kind of transConstellation diagram for 8-PSK with Gray coding.[6] These modulations carefully shape the I and Q wave. or even linearly. The modulated signal is shown below for a short segment of a random binary data-stream.5 Higher-order PSK Q 010 011 110 001 111 I SOQPSK 000 101 The license-free shaped-offset QPSK (SOQPSK) is in100 teroperable with Feher-patented QPSK (FQPSK). The phase-shifts are between those of the two previous timing-diagrams. and the signal stays constant-amplitude even during signal transitions. This is a cost-effective alternative. Note that successive symbols are taken alternately from the two constellations. One property this modulation scheme possesses is that if the modulated signal is represented in the complex domain. combined signal at the bottom. and so the amplitude fluctuations of π/4 –QPSK are between OQPSK and non-offset QPSK. for example. TDMA cellular telephone systems. thus improving the spectral efficiency by a factor of 2. The binary data stream is shown beneath the time axis. to utilizing 16-PSK instead of QPSK to double the spectral efficiency. π/4 –QPSK lends itself to easy demodulation and has been adopted for use in. Successive symbols are taken from the two constellations shown in the diagram. the first symbol (1 1) is taken from the 'blue' constellation and the second symbol (0 0) is taken from the 'green' constellation. mitter is used.) The standard description of SOQPSK-TG involves ternary symbols. it does not have any paths through the origin. Note that magnitudes of the two component waves change as they switch between constellations. PHASE-SHIFT KEYING Q 01 01 00 11 45 00 11 o I 10 10 Dual constellation diagram for π/4-QPSK.involves the polarization multiplexing of two different QPSK signals. On the other hand. forms such that they change very smoothly. the signal does not pass through the origin. The construction is the same as above for ordinary QPSK. The difference encodes the data as described above. In differentially encoded QPSK (DQPSK). '01'. This problem can be overcome by using the data to change rather than set the phase. 91 The bit-error probability for M -PSK can only be determined exactly once the bit-mapping is known. as noted above). the phaseshifts are 0°. 8∫ Ps = 1 − PSK and 16-PSK. Another variant of DPSK is Symmetric Differential Phase Shift keying.6 Differential phase-shift keying (DPSK) r12 + r22 . As mentioned for BPSK and QPSK there is an ambiguity of phase if the constellation is rotated by some effect in the communications channel through which the signal passes. QPSK. QPSK (which are the same. in exchange however they deliver a higher raw data-rate. 25.) the symbol-error probability if M > 4 . However. where encoding would be +90° for a '1' and −90° for a '0'. V = √ ∫∞ 0 Ve √ 2 −(V − 4γs cos θr ) /2 = dV 25. Symmetric Differential Quadrature Phase Shift Keying . −90° corresponding to data '00'.5. which is easier to implement in For the general M -PSK there is no simple expression for hardware. With more than 8 phases. AWGN channel. This may be approximated for high M and high Eb /N0 by: Ps ≈ 2Q (√ π) 2γs sin M For example. Although any number of phases may be used. 8-PSK and 16-PSK. modulations available such as quadrature amplitude modulation (QAM). π M π −M pθr (θr ) dθr Bounds on the error rates of various digital modulation schemes can be computed with application of the union bound to the signal constellation. in differentially encoded BPSK a binary '1' may be transmitted by adding 180° to the current phase and a binary '0' by adding 0° to the current phase.25. the fact that the constellation must usually deal with binary data means that the number of symbols is usually a power of 2 to allow an integer number of bits per symbol. '11'. each received symbol is demodulated to one of the M points in the constellation and a comparator then computes the difference in phase between this received signal and the preceding one. where pθr (θr ) 1 −2γs sin2 θr 2π e . 180°. SDPSK. It is seen that higher-order modulations exhibit higher error-rates. N0 /2) r1 ∼ N are jointly Gaussian random variables. This kind of encoding may be demodulated in the same way as for non-differential PSK but the phase ambiguities can be ignored. The graph on the left compares the bit-error rates of it can only be obtained from: BPSK. θr = tan−1 (r2 /r1 ) . the error-rate becomes too high and there are better. 90°. when Gray coding is used.1 Differential encoding Es N0 and ) (√ Es . the most probable error from one symbol to the next produces only a single bit-error and Pb ≈ 1 Ps k (Using Gray coding allows us to approximate the Lee distance of the errors as the Hamming distance of the errors 25.6. DIFFERENTIAL PHASE-SHIFT KEYING (DPSK) constellation but 8-PSK is usually the highest order PSK constellation deployed. Thus. Unfortunately. γs = BER 10 Main article: differential coding Differential phase shift keying (DPSK) is a common form of phase modulation that conveys data by changing the phase of the carrier wave. though more complex. '10'. 0 10 -2 10 -4 10 -6 BPSK / QPSK 8-PSK 16-PSK 10 -8 0 2 4 6 8 10 Eb/N0 (dB) 12 14 16 18 Bit-error rate curves for BPSK. N0 /2 and r2 ∼ N (0.6.1 Bit error rate in the decoded bitstream. For the case of BPSK for example. upon recepsumed that the signal starts with zero phase. in these cases the differential schemes can yield a better error-rate than the ordinary schemes which rely on precise phase information. which only changes every T = 2T . In the absence of noise. DQPSK and their nondifferential forms using gray-coding and operating in white noise. this manner. Call the received symbol in the k th timeslot rk and let it have phase ϕk . The loss for using DBPSK is small enough compared to the complexity reduction that it is often used in communications systems that would otherwise . 25. the decision is taken on the phase of the resultant complex number: √ √ ∗ rk rk−1 = Es ej(θk −θk−1 ) + Es ejθk n∗k−1 + Es e−jθk−1 nk +nk n∗k−1 where superscript * denotes complex conjugation. Then Timing diagram for DBPSK and DQPSK. 2 which. so the information is changed back into its original state. but encoding is symmetric. For a signal that has been differentially encoded. it is as. is only slightly worse than ordinary BPSK. the phase-shift between the two received signals which can be used to determine the data transmitted. if rk is projected onto rk−1 . The binary data stream is above the DBPSK signal. Furthermore. and a Mach-Zehnder modulator which receives electrical binary data. and so there tion. introduce an unknown phase-shift to the PSK signal. a photodiode is used to transform the optical field into an electric current. there will also be a physical channel between the transmitter and receiver in the communication system. when numerically evaluated. one another. In further processing. but. the data can be modulated onto the phase of a laser in a differential way. the received symbols are not decoded one-by-one to constellation points but are instead compared directly to is a phase shift in both signals at t = 0 . +45° and +135°. particularly at higher Eb /N0 values. the laser transmits the field unchanged for binary '1'. Note that this is subtly different and DQPSK as described above. This channel will. Denote the AWGN term as nk .2 BER 10 Demodulation -2 10 -4 10 -6 10 -8 2 4 6 The decision variable for the k − 1 th symbol and the k symbol is the phase difference between rk and rk−1 . the phase of this is θk − θk−1 . The probability of error for DPSK is difficult to calculate in general. Instead of demodulating as usual and ignoring carrier-phase ambiguity. The modulation is a laser which emits a continuous wave. and with reverse polarity for '0'. However. Assume without loss of generality that the phase of the carrier wave is zero. the phase between two successive received symbols is compared and used to determine what the data In optical communications. That is.from just differentially encoded PSK since. The individual bits of the DBPSK signal are grouped into pairs for the DQPSK signal. PHASE-SHIFT KEYING (SDQPSK) is like DQPSK. The demodulator consists of a delay line interferometer which delays one bit. −45°. BPSK / QPSK DBPSK DQPSK 0 √ Es ejϕk + nk th Pb = 0 10 rk = Using DPSK avoids the need for possibly complex carrier-recovery schemes to provide an accurate phase estimate and can be an attractive alternative to ordinary PSK. must have been.6. this analysis (and the graphical results below) are based on a system in which the only corruption is additive white Gaussian noise(AWGN). the scheme is known as differential phaseThe modulated signal is shown below for both DBPSK shift keying (DPSK). When differential encoding is used in using phase shift values of −135°. The bit-error rates of DBPSK and DQPSK are compared to their non-differential counterparts in the graph to the right. 16 BER comparison between DBPSK. (the phase of '11' should be inverted in this diagram) Analysis shows that differential encoding approximately doubles the error rate compared to ordinary M -PSK but this may be overcome by only a small increase in Eb /N0 . there is an obvious alternative method of demodulation.92 CHAPTER 25. so two bits can be compared at one time. in general. In the figure. in the case of DBPSK it is: 8 Eb/N0 (dB) 10 12 14 1 −Eb /N0 e . CHANNEL CAPACITY 93 use BPSK. Differentially encoded The BER curve for this example is compared to ordi- Differential encoding/decoding system diagram. The performance degradation is a result of noncoherent transmission . Thus. however.in this case it refers to the fact that tracking of the phase is completely ignored.typically about 3 dB. Otherwise it remains in its previous state. enc BPSK -2 3 2.25. The differential encoder produces: nary BPSK on the right. 25. the increase needed in Eb /N0 to overcome this is small. Like all M-ary modulation schemes with M = 2b symbols. So ek only changes state (from binary '0' to binary '1' or from binary '1' to binary '0') if bk is a binary '1'. 10 BPSK QPSK 8 PSK 16 PSK 16 QAM 4 ek = ek−1 ⊕ bk 0 BPSK Diff. if both ek and ek−1 are inverted.8 See also • Differential coding The received signal is demodulated to yield ek = ±1 and then the differential decoder reverses the encoding procedure and produces: • Modulation — for an overview of all modulation schemes bk = ek ⊕ ek−1 • Polar modulation Therefore. the loss in performance compared to ordinary QPSK is larger and the system designer must balance this against the reduction in complexity. bk will still be decoded correctly. 25. channel capacity vs. the channel capacity of any phase shift keying modulation scheme rises to a maximum of b bits per symbol as the signal-to-noise ratio increases. Hence. The waveforms for DPSK are the same as for differentially encoded PSK given above since the only change between the two schemes is at the receiver. the 180° phase ambiguity does not matter.7.5 10 0 -4 -5 0 5 10 15 20 SNR [dB] 10 -6 10 -8 Given a fixed bandwidth. is larger . For DQPSK though. SNR for some common modulation schemes 0 2 4 6 8 Eb/N0 (dB) 10 12 14 BER comparison between BPSK and differentially encoded BPSK with gray-coding operating in white noise. • PSK31 • Phase modulation (PM) — the analogue equivalent of PSK • PSK63 • Binary offset carrier modulation . As mentioned above. At the k th time-slot call the bit to be modulated bk .5 1 BER 0. whilst the error-rate is approximately doubled. Assume that the constellation diagram positions the symbols at ±1 (which is BPSK).5 3. the differentially encoded bit ek and the resulting modulated signal mk (t) . when given exclusive access to a fixed bandwidth.5 10 Channel capacity where ⊕ indicates binary or modulo-2 addition. This is the description of differentially encoded BPSK given above. 25.5 2 1.3 Example: BPSK Differential schemes for other PSK modulations may be devised along similar lines. bk = 1 if ek and ek−1 differ and bk = 0 if they are the same. The increase in Eb /N0 required to overcome differential modulation in coded systems.6.7 Channel capacity 4. 11g-2003 — the IEEE 802. T. p283 [6] Tom Nelson. IEEE Global Telecommunications Conference. ISBN 0-07-113814-5...11-1999: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications — the overarching IEEE 802. “Common detectors for shaped offset QPSK (SOQPSK) and Feher-patented QPSK (FQPSK)" Nelson. T. Singapore: McGraw Hill. Toronto. “Common detectors for shaped offset QPSK (SOQPSK) and Feherpatented QPSK (FQPSK)". Rice. CHAPTER 25. 2004. PHASE-SHIFT KEYING . Digital Communications. (2005). Simon (1988). Nelson. H. 5 pp. Erik Perrins.1109/GLOCOM.11b-1999 (R2003) — the IEEE 802.11 specification. ISBN 0-47162947-2.11b specification. Pearson Prentice Hall. Rev.9 Notes [1] IEEE Std 802. ISBN 0-78039414-3. ATMEL [5] Communications Systems.11g specification. E. (1995). Canada: John Wiley & Sons. Perrins. Upper Saddle River. NJ: PrenticeHall. [2] IEEE Std 802. Perrins. Application Note. 2005. pp. GLOBECOM '05.2005. 2005. • Couch. • Haykin. ISBN 0-7803-9414-3 25. and Michael Rice.1578470. Leon W. II (1997). E. [4] Understanding the Requirements of ISO/IEC 14443 for Type B Proximity Contactless Identification Cards. “Common detectors for Tier 1 modulations”. Rice. 2056B–RFID–11/05. M. Stern & S. John G. [3] IEEE Std 802.10 References The notation and theoretical results in this article are based on material presented in the following sources: • Proakis.94 25. M. ISBN 0-13-081223-4. doi:10. Digital Communications. Mahmoud. Digital and Analog Communications. In MSK the difference between the higher and lower frequency is identical to half the bit rate. Consequently. aI (t) has its pulse edges on t = [−T. the modulation index m is 0. which in turn reduces outof-band interference between signal carriers in adjacent frequency channels.. the carrier phase changes by ±90° In digital modulation. 95 . and the phase changes continuously and linearly. the signal is modulated in frequency and phase.Chapter 26 Minimum-shift keying Q 01 the GSM mobile phone standard. the maximum frequency deviation is δ = 0. the waveforms used to represent a 0 and a 1 bit differ by exactly half a carrier period. Thus. MSK encodes each bit as a half sinusoid. 26.[2] However. Mapping changes in continuous phase. for instance. the Gaussian filter increases the modulation memory in the system and causes intersymbol interference.25 fm where fm is the maximum modulating frequency. As a result. . instead of square pulses as OQPSK uses. and ϕk is 0 if aI (t) is 1. 3T. In addition to being viewed as related to OQPSK. This is the smallest FSK modulation index that can be chosen such that the waveforms for 0 and 1 are orthogonal. GMSK has high spectral efficiency. making it more difficult to differentiate between different transmitted data values and requiring more complex channel equalization algorithms such as an adaptive equalizer at the receiver. and π otherwise.] and aQ (t) on t = [0. in order to reliably transmit the same amount of data. This results in a constant-modulus signal (constant envelope signal).5. [ ] πt s(t) = cos 2πfc t + bk (t) 2T + ϕk 10 where bk(t) is +1 when aI (t) = aQ (t) and −1 if they are of opposite signs.[1] Similar to OQPSK. which reduces problems caused by non-linear distortion. However. MSK is encoded with bits alternating between quadrature components. minimum-shift keying (MSK) is a type of continuous-phase frequency-shift keying that was developed in the late 1950s and 1960s. MSK can also be viewed as a continuous phase frequency shift keyed (CPFSK) signal with a frequency separation of one-half the bit rate. Each bit time. T. this can be rewritten in a form where the phase and frequency modulation are more obvious.. Therefore. but it needs a higher power level than QPSK. This has the advantage of reducing sideband power.] . Gaussian minimum shift keying or GMSK is a continuous-phase frequency-shift keying modulation scheme. however the digital data stream is first shaped with a Gaussian filter before being applied to a frequency modulator. .. A variant of MSK called GMSK is used in 26.. 2T. It is similar to standard minimum-shift keying (MSK). I 00 Using the trigonometric identity. with the Q component delayed by half the symbol period. The carrier frequency is fc . 4T.1 Mathematical representation 11 The resulting is represented by the formula s(t) = ( πt signal ) ( πt ) aI (t) cos 2T cos (2πfc t)−aQ (t) sin 2T sin (2πfc t) where aI (t) and aQ (t) encode the even and odd information respectively with a sequence of square pulses of duration 2T.2 Gaussian minimum-shift keying In digital communication. Fast FSK Signals and their Demodulation. Elec.html [2] Poole. Vol.4 Notes [1] M. Pulse and Spectrum Manipulation in the Minimum (Frequency) Shift Keying (MSK) Format. Heald. CHAPTER 26. IEEE Communications Magazine. de Buda. Minimum Shift Data Communication System. RadioElectronics. MINIMUM-SHIFT KEYING . 26. Amoroso.5 References • Subbarayan Pasupathy.96 GMSK is most notably used in the Global System for Mobile Communications (GSM) and the Automatic Identification System (AIS) for maritime navigation. 1. http://www. 1979 • R. 26.L Doelz and E. Retrieved March 23. 2014. Eng.T. • F. 1976.3 See also • Constellation diagram used to examine the modulation in signal space (not time). Number 1.Gaussian Minimum Shift Keying”. freepatentsonline. US Patent 2977417. 1958. • Gaussian frequency-shift keying 26. J. Can. • Document from the University of Hull giving a thorough description of GMSK. Minimum Shift Keying: A Spectrally Efficient Modulation.com/2977417. “What is GMSK Modulation . Ian. IEEE Trans.com. Upon reception of the signal. can be visualized as points on the complex plane. a Euclidean distance sense) to that of the received sym97 . They are often referred to as quadrature carriers. the symbol can be sent with two carriers on the same frequency. The example shown here is for 8-PSK. In this sense the constellation is not a scatter diagram but a representation of the scheme itself. 27. A coherent detector is able to independently demodulate these carriers. Q 010 011 and the quadrature.Chapter 27 Constellation diagram A constellation diagram is a representation of a signal modulated by a digital modulation scheme such as quadrature amplitude modulation or phase-shift keying. Also a diagram of the ideal positions. which may have been corrupted by the channel or the receiver (e. the phase of the modulating symbol is the phase of the carrier itself. in a modulation scheme can be called a constellation diagram. it represents the possible symbols that may be selected by a given modulation scheme as points in the complex plane. distortion. which has also been given a Gray coded bit assignment. In a more abstract sense. additive white Gaussian noise. 0011 0111 1111 1011 0010 0110 1110 1010 A constellation diagram for rectangular 16-QAM. respectively.g. they selects. Measured constellation diagrams can be used to recognize the type of interference and distortion in a signal. This principle of using two independently modulated carriers is the foundation of quadrature modulation. the demodulator examines the received symbol. The points on a constellation diagram are called constellation points. By representing a transmitted symbol as a complex number and modulating a cosine and sine carrier signal with the real and imaginary parts (respectively). In pure phase modulation. The real that point on the constellation diagram which is closest (in and imaginary axes are often called the in phase. phase noise or interference). or Q-axis. Plotting several symbols in a scatter diagram produces the constellation diagram. They are a set of modulation symbols which comprise the modulation alphabet. It As the symbols are represented as complex numbers. It displays the signal as a two-dimensional scatter diagram in the complex plane at symbol sampling instants. or I-axis. as its estimate of what was actually transmitted.1 Interpretation 110 Q 001 111 0000 0100 1100 1000 0001 0101 1101 1001 I 000 101 I 100 A constellation diagram for Gray encoded 8-PSK. signal space diagram. The constellation diagram allows a straightforward visualization of this process — imagine the received symbol as an arbitrary point in the I-Q plane and then decide that the transmitted symbol is whichever constellation point is closest to it.2 See also • Eye diagram • Modulation error ratio • Error vector magnitude • Quadrature Amplitude Modulation CHAPTER 27. For the purpose of analyzing received signal quality. CONSTELLATION DIAGRAM . The eye pattern can be used to see timing jitter in one dimension of modulation. For example: • Gaussian noise shows as fuzzy constellation points • Non-coherent single frequency interference shows as circular constellation points • Phase noise shows as rotationally spreading constellation points • Attenuation causes the corner points to move towards the center A constellation diagram visualises phenomena similar to those an eye pattern does for one-dimensional signals. This is maximum likelihood detection. 27. some types of corruption are very evident in the constellation diagram. Thus it will demodulate incorrectly if the corruption has caused the received symbol to move closer to another constellation point than the one transmitted.98 bol. by using unused time division multiple access (TDMA) channels in. GPRS provides data rates of 56–114 kbit/second..25 can still be supported over PPP. or disallowed. PPP is used to tunnel IP to the phone. implying variable throughput and latency that depend on the number of other users sharing the service concurrently.2 Protocols supported GPRS supports the following protocols: 28. although it has been removed from the standard. as opposed to circuit switching. Usage above the bundle cap is charged per megabyte. . a technology between the second (2G) and third (3G) generations of mobile telephony.1. but doing this requires either a network-based router to perform encapsulation or intelligence built into the enddevice/terminal. 28. for example. It is now maintained by the 3rd Generation Partnership Project (3GPP). or even over IP. In this mode PPP is often not supported by the mobile phone operator but if the mobile is used as a modem to the connected computer. In practice.25 connections. contrasting with circuit switched data. 28. The GPRS system is an integrated part of the GSM network switching subsystem. This is typically used for applications like wireless payment terminals. an SMS transmission speed of about 30 SMS messages per minute may be achieved. where a certain quality of service (QoS) is guaranteed during the connection. 3G and WCDMA mobile networks to transmit IP packets to external networks such as the Internet.5G. the GSM system. GPRS was originally standardized by European Telecommunications Standards Institute (ETSI) in response to the earlier CDPD and imode packet-switched cellular technologies.[1][2] • “Always on” internet access • Multimedia messaging service (MMS) • Push to talk over cellular (PoC) • Instant messaging and presence—wireless village • Internet applications for smart devices through wireless application protocol (WAP) GPRS usage is typically charged based on volume of data transferred. In 2G systems. which is usually billed per minute of connection time. This is much faster than using the ordinary SMS over GSM. GPRS is a best-effort service. • X.[4] It provides moderate-speed data transfer. • Point-to-point (P2P) service: inter-networking with the Internet (IP) • Point-to-Multipoint (P2M) service: point-tomultipoint multicast and point-to-multipoint group calls If SMS over GPRS is used. This allows an IP address to be assigned dynamically (IPCP not DHCP) to the mobile equipment.1.1 Services offered GPRS extends the GSM Packet circuit switched data capabilities and makes the following services possible: 99 • Internet protocol (IP). GPRS is integrated into GSM Release 97 and newer releases. speed limited.Chapter 28 General Packet Radio Service • SMS messaging and broadcasting General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and 3G cellular communication system’s global system for mobile communications (GSM). e. that is.1 Technical overview See also: GPRS Core Network The GPRS core network allows 2G. X. whose SMS transmission speed is about 6 to 10 SMS messages per minute. built-in mobile browsers use IPv4 since IPv6 was not yet popular.g. • Point-to-point protocol (PPP). user equipment (UE).[3] 2G cellular technology combined with GPRS is sometimes described as 2. 2. due to a radio noise induced 28. and for Internet communication services such as Class A Can be connected to GPRS service and GSM email and World Wide Web access. GPRS service is suspended. The downlink uses first-come first-served packet scheduling. a GPRS mobile may implement the dual transfer mode (DTM) feature.[5] The Coding Schemes CS-1 to CS-4 specify the number of parity bits generated by the cyclic code and the . using both at the same time. optionally a user name 28.1 Multiple access schemes The multiple access methods used in GSM with GPRS are based on frequency division duplex (FDD) and TDMA. To get around this expensive requirement. followed by coding with a possibly punctured convolutional code. and then the actual data is transferred using dynamic TDMA with first-come first-served. The packets have constant length.g.2. short Devices supporting GPRS are divided into three classes: message service (SMS). • the maximum capability of the mobile device expressed as a GPRS multislot class 28. corresponding to a GSM time slot. This means that slotted ALOHA (S-ALOHA) is used for reservation inquiries during a contention phase.2 Channel encoding Huawei E220 3G/GPRS Modem USB 3G/GPRS modems use a terminal-like interface over USB 1. SMS). Most GPRS mobile devices are Class B. SMS). a user must specify an APN. and RFC 1144 and some models have connector for external antenna. During GSM service (voice call or SMS). GPRS will store and forward the to a computer mouse. the operator A true Class A device may be required to transmit on two different frequencies at the same time.0 and later.42bis. which are also referred to as the Block Check Sequence. SMS).1. data formats V. The APN defines the services such as wireless application protocol (WAP) access. and then resumed automatically after the GSM service (voice 28.100 CHAPTER 28. • the channel encoding is used. a cyclic code is used to add parity bits. Modems can be added as cards (for laptops) or The channel encoding process in GPRS consists of two steps: first. IP packets to the phone even during handover. This is combined with time domain statistical multiplexing which makes it possible for several users to share the same frequency channel. service (voice. In order to set up a GPRS connection for a wireless moSuch devices are known to be available today. but using only one or the other by the network operator. and very rarely an IP address. 28. multimedia messaging service (MMS).1. A GPRS connection is established by reference to its access point name (APN).1.2. and thus will need two radios. a user is assigned to one pair of up-link and down-link frequency channels. with the network coordinating to ensure that it is not required to transmit on two different frequencies at the same time. while the up-link uses a scheme very similar to reservation ALOHA (R-ALOHA). Some networks support DTM since 2007. Must be switched manually • the number of BTS TDMA time slots assigned by between one or the other service. Such mobiles are considered pseudo-Class A. at a given time. or nowadays more like a pendrive. The TCP handles any packet loss (e. each phone can have one or more external USB devices which are similar in shape and size IP addresses allocated. dem.3 Hardware Class B Can be connected to GPRS service and GSM and password.4 Addressing pause). GENERAL PACKET RADIO SERVICE When TCP/IP is used.2 Coding schemes and speeds call or SMS) has concluded. A DTM-capable mobile may use simultaneous voice and packet data. During a session. all provided service (voice. The upload and download speeds that can be achieved in GPRS depend on a number of factors such as: Class C Are connected to either GPRS service or GSM service (voice. sometimes referred to as “simple class A”. The following table summarises some possible configurations of GPRS and circuit switched data services. these instead establish a dedicated circuit (usually billed per minute).2. no convolutional coding is applied. about 32–40 kbit/s.[5] In Coding Schemes CS-1 through CS-3. USABILITY 101 puncturing rate of the convolutional code. there are two other GSM technologies which deliver data services: circuit-switched data (CSD) and high-speed circuit-switched data (HSCSD).3 Usability The maximum speed of a GPRS connection offered in 2003 was similar to a modem connection in an analog wire telephone network. Under the best reception conditions. also support GPRS/EDGE multislot class 32.0 kbit/s per time slot. while the kbit/s.[5] In Coding Schemes CS-2 and CS-3. A multislot allocation is represented as. Table B.28.2.2 kbit/s = 177. usually also supporting UMTS. In contrast to the shared nature of GPRS. mobile stations of this class support 5 timeslots in downlink and 3 timeslots in uplink with a maximum number of 6 simultaneously used timeslots. The first number is the number of downlink timeslots and the second is the number of uplink timeslots allocated for use by the mobile station. .[5] The following table summarises the options. fer available in the Uplink and Downlink directions. depending on the phone used. when the best EDGE modulation and coding scheme can be used. A commonly used value is class 10 for many GPRS/EGPRS mobiles which uses a maximum of 4 timeslots in downlink direction and 2 timeslots in uplink direction.[6] most robust coding scheme (CS-1) is used when the mobile station (MS) is further away from a BTS. 5+2.2 kbit/s = 296 kbit/s.3 Multislot Class • the time needed for the MS to perform adjacent cell signal level measurement and get ready to receive The multislot class determines the speed of data trans• the time needed for the MS to get ready to receive. The different multislot class specification is detailed in Multislot class with values greater than 31 are referred to the Annex B of the 3GPP Technical Specification 45.0 kbit/s per time slot. each input bit is converted into two coded bits. using this scheme the cell coverage is 25% of normal. 5 timeslots can carry a bandwidth of 5*59. Latency is very high. i. Note that the bit rates do not include the overhead incurred by channel coding and the RLC and MAC headers. Each multislot class identifies the following: In addition to GPRS. However simultaneously a maximum number of 5 simultaneous timeslots can be used in both uplink and downlink. especially when there is a continuous flow of data between the endpoints. and thus the quality of connection varies greatly. Multislot Classes for GPRS/EGPRS Using the CS-4 it is possible to achieve a user speed of 20. round-trip time (RTT) is typically about 600–700 ms and often reaches 1s. • the maximum number of Timeslots that can be allocated on uplink • the maximum number of Timeslots that can be allocated on downlink • the total number of timeslots which can be allocated by the network to the mobile • the time needed for the MS to perform adjacent cell signal level measurement and get ready to transmit • the time needed for the MS to get ready to transmit 28. for example. 3 The least robust.e.e. but fastest. The network will automatically configure the for either 3+2 or 4+1 operation depending on the nature of data transfer. However. the convolutional code is of rate 1/2. If data traffic is concentrated in downlink direction the network will configure the connection for 5+1 operation. GPRS is typically prioritized lower than speech.002 (Multiplexing and multiple access on the radio path) as high multislot classes. CS-1 can achieve a user speed of only 8. Some applications such as video calling may prefer HSCSD. Some high end mobiles.002 (Release 6).3. the output of the convolutional code is punctured to achieve the desired code rate. According to 3GPP TS 45. 28. but has 98% of normal coverage. It is a value between 1 to 45 which the network uses to allocate radio channels in the uplink and downlink direction. coding scheme (CS-4) is timeslots can carry a bandwidth of 3*59.6 available near a base transceiver station (BTS). When more data is transferred in the uplink the network can at any time change the constellation to 4+2 or 3+3. In uplink direction. i.[5] In Coding Scheme CS-4. Newer network equipment can adapt Attributes of a multislot class the transfer speed automatically depending on the mobile location. Walke their most cited paper that (after double According to a study on history of GPRS development[10] click) unveils US patents referencing that paper Bernhard Walke and his student Peter Decker are the inventors of GPRS – the first system providing worldwide [10] Bernhard Walke: „The Roots of GPRS: The First System mobile Internet access. May 1991. Oct. 13. Also. Bernhard Walke: “A General Packet Radio Service proposed for GSM”. network upgrades of features are available with certain operators. Especially. Proceedings of 41st IEEE Vehicular Technology Conference. Physical layer on the radio path.001: Technical Specification Group GSM/EDGE Radio Access Network. • 3GPP AT command set for user equipment (UE) 28. This workshop contribution is referenced in 22 GPRS related US-Patents. GENERAL PACKET RADIO SERVICE 28. 1993. Finland. “3GGP TS45. B. the CELLPAC Voice & Data functions introduced in a 1993 ETSI Workshop contribution[8] anticipate what was later known to be the roots of GPRS. Wolf Mende.4 History of GPRS GPRS opened in 2000 as a packet-switched data service embedded to the channel-switched cellular radio network GSM. Georgios Hatziliadis: “CELLPAC: A packet radio protocol applied to the cellular GSM mobile radio network”. for example. [8] Peter Decker. naming itself “The Founder of the Mobile Internet”. resulting in significant increase in application-level throughput speeds. Inc. Helsinki. 2008) • Free GPRS resources • Enhanced data rates for GSM evolution (EDGE) • GSM World.7 External links son) patents are referencing CELLPAC. pp. CHAPTER 28.5 See also • Code division multiple access (CDMA) • GPRS security information at the Wayback Machine (archived February 9. Retrieved 2013-07-20.[9] Successor systems to GSM/GPRS like W-CDMA (UMTS) and LTE rely on key GPRS functions for mobile Internet access as introduced by CELLPAC. [9] Program “Publish or Perish”. the trade association for GSM and GPRS network operators. [6] GPRS and EDGE Multislot Classes [7] Bernhard Walke.28. General description”.6 References [1] ETSI [2] 3GPP [3] General packet radio service from Qkport [4] Mobile Phone Generations from 28. The CELLPAC[7] protocol developed 1991-1993 was the trigger point for starting in 1993 specification of standard GPRS by ETSI SMG. GPRS extends the reach of the fixed Internet by connecting mobile terminals worldwide. Oct. With these enhancements the active round-trip time can be reduced. The company is exploiting a large patent portfolio which GPRS relevant (Erics. Decker. IEEE Wireless Communications.102 Devices with latency/RTT improvements (via. 408413. [5] 3rd Generation Partnership Project (September 2012). 2013. for Mobile Packet-Based Global Internet Access“. 12-23. • Universal mobile telephone system (UMTS) • Palowireless GPRS resource center • GPRS core network • GPRS attach and PDP context activation sequence diagram • Sub-network dependent convergence protocol (SNDCP) • IP Multimedia Subsystem • High-speed downlink packet access (HSDPA) • Cellular data communication protocol • List of device bandwidths . see returns to a search for P. Google search for “Inventors of mobile Internet” returns the company Unwired Planet. ETSI SMG Workshop “GSM in a Future Competitive Environment”. the extended UL TBF mode feature) are generally available. 1-20. this results in a maximum symbol rate of W symLink spectral efficiency is typically used to analyse the bols/s. a signal with passband bandwidth of a communication channel or a data link. the symbol rate can not exsystem is measured in bit/s/Hz. Due to filtering in the telephone exchange. Example 2: A V. less frequently but ceed 2B symbols/s in view to avoid intersymbol interferunambiguously. the modulation efficiency is close to 2N = 6 (bit/s)/Hz. Since it can be described as nearly single-side band.400 − 300 103 . It is a measure of how efficiently a limited 15. with which is equivalent to bits per channel use (bpcu).is used. is always excluded. Thus. and in that the modulation efficiency can not exefficiency of a digital modulation method or line code.100 = 18. the passband signal with bandwidth W corretion (FEC) code and other physical layer overhead. and 48.400 hertz. Example 3: A 16QAM modem has an alphabet size of M = 16 alternative symbols. In practice. W can be converted to an equivalent baseband signal (usthe spectral efficiency may be measured in bit/symbol. PSK or OFDM are (modulation rate) or line code pulse rate. Alternatively. ASK. If double-sideband moduplying that the net bit rate is divided by the symbol rate lation schemes such as QAM.1 Link spectral efficiency the case of baseband transmission (line coding or pulseamplitude modulation) with a baseband bandwidth (or The link spectral efficiency of a digital communication upper cut-off frequency) B.92 modem for the telephone network can transfer 56. In the sponds to a baseband message signal with baseband bandlatter case. in (bit/s)/Hz. The spectral efficiency or efficiency refers to the information rate that can be transmodulation efficiency is 56.5 (bit/s)/Hz upstream. In 29.[1] or. ATSC transfers a gross bit rate of 32 Mbit/s over a 6 MHz wide channel. the spectral efficiency can not exceed 2N ful information rate excluding error-correcting codes) or (bit/s)/Hz in the baseband transmission case. and sometimes by the media access control (the An upper bound for the attainable modulation efficiency channel access protocol). the frequency range is limited to between 300 hertz and 3.upper cut-off frequency W/2.000/3. a “bit” refers to a user data bit.000 bit/s downstream and 48. corresponding to a bandwidth of 3.000 bit/s upstream over an analog telephone network. frequency spectrum is utilized by the physical layer protocol. the spectral efficiency cannot exceed N = 4 (bit/s)/Hz. resulting in a maximum symbol rate of 2W and an attainable modulation efficiency of 2N (bit/s)/Hz. spectrum efficiency or bandwidth = 3.Chapter 29 Spectral efficiency Spectral efficiency. N is the modulation efficiency measured in bit/symbol or bpcu.100 = tion system.000 bits per second has a modulation efficiency of 1 (bit/s)/Hz. resulting in a modulation efficiency of 32/6 = 5.ence.3 (bit/s)/Hz. If digital single-sideband modulation sometimes in combination with a forward error correc. is given by the Nyquist rate or Hartley’s law as follows: For a signaling alphabet with M alternative symbols.100 hertz. im.000/3. used. FEC overhead width W. It is the net bitrate (use. Example 1: A transmission technique using one kilohertz of bandwidth to transmit 1. Example 4: The 8VSB (8-level vestigial sideband) modulation scheme used in the ATSC digital television standard gives N=3 bit/symbol or bpcu. ing undersampling or a superheterodyne receiver).1 mitted over a given bandwidth in a specific communica(bit/s)/Hz downstream. with N = 4 bit/symbol or bpcu. In the passmaximum throughput divided by the bandwidth in hertz band transmission case. each symbol represents N = log2 M bits. Since QAM is a form of double sideband passband transmission. The modulation efficiency in bit/s is the gross bitrate (including any error-correcting code) divided by the bandwidth. ceed N (bit/s)/Hz. corresponding to 0 decibel. In a wireless network. This measure is affected not only by the single user transmission technique. a higher spectral efficiency is achieved if we consider the smaller passband bandwidth. and typically 29. In exchange for this reduction in spectral efficiency. The link spectral efficiency of a wireless telephony link may also be expressed as the maximum number of simultaneous calls over 1 MHz frequency spectrum in erlangs per megahertz. Example 7: If the SNR is 1 times expressed as a ratio.104 CHAPTER 29. high link spectral efficiency may result In digital wireless networks. and the system spectral efficiency in (bit/s)/Hz per cell or (bit/s)/Hz per sector is 1/12 of the link spectral . Higher-layer protocol overhead (above the media access control sublayer) is normally neglected. It may be applied to analog as well as digital transmission. FEC usually reduces the bit-error rate. in high sensitivity to co-channel interference (crosstalk). if ideal error coding and modulation is assumed. For example. It is a measure of the quantity of users or services that can be simultaneously supported by a limited radio frequency bandwidth in a defined geographic area.relevant measure for wireless networks would be system spectral efficiency in bit/s/Hz per unit area. SPECTRAL EFFICIENCY Example 5: The downlink of a V. the spectral efficiency is 50% of the modulation efficiency. An upper bound for the spectral efficiency possible without bit errors in a channel with a certain SNR. also known as a 4/12 reuse pattern. congestion avoidance. a data compression scheme. divided by the channel bandwidth. in a cellular telephone network with frequency reuse. As seen above. meana factor.42bis compression used in telephone modems. Thus. the link spectral efficiency can not exceed 1 (bit/s)/Hz for error-free detection (assuming an ideal error-correcting code) according to ShannonHartley regardless of the modulation and coding. which affects the capacity. If it is defined as a measure of the maximum goodput. Example 8: In a cellular system based on frequency-division multiple access (FDMA) with a fixed channel allocation (FCA) cellplan using a frequency reuse factor of 1/4. each base station has access to 1/4 of the total available frequency spectrum. the largest link spectral efficiency that can be ing that the encoder input bit rate is one half the supported by the available SNR is generally used. It can be substantially improved by dynamic radio resource management. etc. As discussed below. Note that the goodput (the amount of application layer useful information) is normally lower than the maximum throughput used in the above calculations.44 or V. the spectral efficiency cannot exceed 2N = 14 (bit/s)/Hz over the full baseband channel (0 to 4 kHz). using the same number If a forward error correction code is used. resulting in N = 7 bit/symbol. retransmissions due to co-channel interference and collisions are excluded. closed communication links such as telephone lines and cable TV networks. but also by multiple access schemes and radio resource management techniques utilized.2 System spectral efficiency or enables operation at a lower signal to noise ratio area spectral efficiency (SNR). In wireless networks. a more efficiency is reduced from the uncoded modulation effi. may however give higher goodput if the transferred data is not already efficiently compressed. the maximum possible system spectral efficiency in (bit/s)/Hz per site is 1/4 of the link spectral efficiency. This can allow for much denser geographical frequency reuse that compensates for the lower link spectral efficiency. resulting in approximately the same capacity (the same number of simultaneous phone calls) over the same bandwidth. the link spectral efficiency can be somewhat misleading. However. Since the transmitted signal before passband filtering can be considered as baseband transmission. summed over all users in the system. and in noise-limited wireless comExample 6: If a forward error correction munication system where co-channel interference is not (FEC) code with code rate 1/2 is added. This measure is also affected by the source coding (data compression) scheme. It may for example be defined as the maximum aggregated throughput or goodput. the spectral of base station transmitters. such as the V. higher protocol layer overhead.92 modem uses a pulse-amplitude modulation with 128 signal levels. flow control. the system spectral efficiency or area spectral efficiency is typically measured in (bit/s)/Hz per unit area. encoder output rate. i. is given by the Shannon-Hartley theorem. as larger values are not necessarily more efficient in their overall use of radio spectrum. On the other hand. or in (bit/s)/Hz per site.e. Then each cell has access to 1/12 of the available spectrum. because of packet retransmissions. in (bit/s)/Hz per cell. spectrum spreading and forward error correction reduce the spectral efficiency in (bit/s)/Hz but substantially lower the required signal-to-noise ratio in comparison to non-spread spectrum techniques. or E/MHz. Each base station may be divided into 3 cells by means of 3 sector antennas. in ciency figure. This corresponds to a link throughput of only 8. Bhunia. power control. Low link spectral efficiency in (bit/s)/Hz does not necessarily mean that an encoding scheme is inefficient from a system spectral efficiency point of view. "Edge—Enhanced data rates for GSM and TDMA/136 evolution".17 (bit/s)/Hz per site. Example 9: In the W-CDMA 3G cellular system. It may be used in analog cellular networks as well. consider Code Division Multiplexed Access (CDMA) spread spectrum. every phone call is compressed to a maximum of 8. E/MHz per site.000.0017 (bit/s)/Hz. Spread spectrum makes it possible to have as low a frequency reuse factor as 1. link adaptation and diversity schemes.com/tag/lte-advanced . or (E/MHz)/m2 . This corresponds to a system spectrum efficiency of over 1 × 100 × 0. High Performance for the Broadband Era”.29. However. New Age International.5. Jonas Näslund and Håkan Olofsson (1999). [3] Lal Chand Godara. CRC Press. Principles of Digital Transmission: With Wireless Applications. Information Technology Network And Internet. E/MHz per sector.com/agilent/editorial. if each base station is divided into 3 cells by means of 3 directional sector antennas. page 26. the fact that one can “layer” multiple channels on the same frequency band means that the system spectrum utilization for a multi-channel CDMA system can be very good. and spread out over a 5 MHz wide frequency channel. Springer.home.500/5.17/3 = 0. ISBN 0-306-45753-9.500 bit/s (the useful bitrate). 2002.extremetech. ISBN 0849301246. The system spectral efficiency of a cellular network may also be expressed as the maximum number of simultaneous phone calls per area unit over 1 MHz frequency spectrum in E/MHz per cell. 2006. ISBN 9780849301247 [4] Anders Furuskär. T. “Handbook of antennas in wireless communications”. 1 [5] “KYOCERA’s iBurst(TM) System Offers High Capacity. and 0.jspx?cc= IN&lc=eng&ckey=1905163&id=1905163 [7] http://www. N/A means not applicable.06 (bit/s)/Hz per cell or sector.000 = 0.3 Comparison table Examples of numerical spectral efficiency values of some common communication systems can be found in the table below. [6] http://www. Let us assume that 100 simultaneous (non-silent) calls are possible in the same cell. which is not a particularly spectral efficient encoding scheme when considering a single channel or single user.agilent.5 References [1] Sergio Benedetto and Ezio Biglieri (1999). As an example. A combined fairness measure and system spectral efficiency measure is the fairly shared spectral efficiency. 29. Ericsson Review no. This measure is also affected by the source coding (data compression) scheme. REFERENCES efficiency. [2] C.0017 = 0. The spectral efficiency can be improved by radio resource management techniques such as efficient fixed or dynamic channel allocation.4 See also • Baud 105 • CDMA spectral efficiency • Channel capacity • Comparison of mobile phone standards • Goodput • Radio resource management (RRM) • Spatial capacity • Throughput • Orders of magnitude (bit rate) 29. 29. usually known by the acronym DECT. The technology is nearly identical. which most manufacturers implement. is a standard The standard also contains several other interoperability primarily used for creating cordless phone systems.ultra low energy) was discussed at the DECT World and CATiq Conference with a whitepaper presented by Sitel (Now Dialog) Semiconductor. There are also other devices such as some baby monitors utilizing DECT. The first successful interoperability tests were announced by the DECT Forum in June 2011. that of making and receiving calls. and in these devices 106 . to access a fixed telecoms network via radio. In January 2011. unlike the GSM standards. replacing earlier cordless phone standards. It profiles. using a slightly different frequency range. with the exception of North America. the low power variant enables this standard to be used in battery powered devices such as smartphone app controllable home automation or security systems. called DECT 6. The DECT standard includes a standardized interoperability profile for simple telephone capabilities. Connectivity to the fixed network (that may be of many different kinds) is done through a base station or “Radio Fixed Part” to terminate the radio link. and in September 2011. a low power variant (DECT ULE .[1] The base unit and handset of a British Telecom DECT cordless telephone Beyond Europe. but have been eclipsed by Wi-Fi. 3G & 4G cellular also competes with both DECT and Wi-Fi for both voice and data. DECT is used primarily in home and small office systems. for data and for radio local-loop services.1 Application The DECT standard fully specifies a means for a portable unit.0. it has been adopted by Australia. In most cases the gateway connection is to the public switched telephone network or telephone jack. where it is the universal standard. are becoming common. North American adoption was delayed by United States radio frequency regulations. and a gateway to connect calls to the fixed network.Chapter 30 Digital Enhanced Cordless Telecommunications baby monitors. originated in Europe. GAPconformance enables DECT handsets and bases from difDigital Enhanced Cordless Telecommunications ferent manufacturers to interoperate at the most basic (Digital European Cordless Telecommunications). does not specify any internal aspects of the fixed network itself. This forced development of a variation of DECT. even from the same manufacturer. But. such as 900 MHz CT1 and CT2. called GAP. but is also available in many PBX systems for medium and large businesses. level of functionality. Voice applications. DECT can also be used for purposes other than cordless phones. such as a cordless telephone. Unlike standard DECT. although connectivity with newer technologies such as Voice over IP has become available. DECT has almost universally replaced other standards in most countries where it is used. Dialog Semiconductor announced the first commercially available DECT ULE devices. such as 30. Data applications also exist. but the frequency difference makes the technology incompatible with systems in other areas. DECT is also used in special applications such as remote controls for industrial applications. and most countries in Asia and South America. g.0 The “6.0 operates at 1.8 GHz cordless telephones) with later products. with OpenBTS). VoIP-over-WiFi has a range advantage given sufficient access-points. Calls continue as users move between different coverage cells.g.phones of differing brands are not guaranteed to work together. Grandstream Of these.8 in existing 2. DECT suffers from major deficits.[3] The service was promoted for only a few wideband audio over DECT. The pubhandsets is via DECT.0 does not equate to a spectrum band. By using directional antennas and sacrificing some traffic capacity. Although DECT 6. but DECT bases have higher and continuously falling costs. VOIP/IP-DECT 107 there is no gateway functionality. the 4 mW average transmission power limits the range to far less than the 10 mW permitted in Europe.323 or SIP) PABX market had some success. it was decided the term DECT 1.[4] For enterprises. Ascom. in particular in Japan and Taiwan. for large networks VoIP-over-WiFi imposes significant design and maintenance complexity to ensure roaming facilities and high quality-of-service.0 products do not support “GAP”.000 subscribers.0 is also sometimes inappropriately tion to connect one or more handsets to the public used in Australia that uses the same allocated spectrum telecoms network. standardizes cities in Italy. and all the major PABX over ethernet. On the other hand. permitting the use of highgain directional antennas to produce much higher EIRP and hence long ranges. the domestic application (cordless home teleand Spectralink developed IP-DECT solutions where the phones) has been extremely successful. among other features. therefore The DECT standard originally envisaged three major ar. which then enables use of standard cellular phones for local “inhouse” telephony. To take advantage of these 1998 Telecom Italia launched a DECT network known higher-speed networks. CAT-iq is backwards commonths and. traffic lights. In North-America.2 mi). Aastra. In the Far-East.4 GHz and 5. the Personal Handy-phone System renders the “in-house” (and PBX) concept superfluous by making the entire “last-mile” wireless. since public cellular networks rapidly out-competed DECT by coupling DECT was originally intended for use with traditional their ubiquitous coverage with large increases in capacity analog telephone networks. but is a marketing term coined for DECT devices manufactured for use in the U.2 DECT 6.0 headset will eas of application:[2] not receive calls if registered to a Uniden base unit. E. On the one hand.0 technologies are essentially identical. frequencies as Europe. • Domestic cordless telephony. and Canada. except for operating frequency. cell coverage could extend to over 10 kilometres (6. while a DECT phone must remain in proximity to its own base (or repeaters thereof). manufacturers such as Gigaset (formerly Siemens). using large numbers of base stations to provide high capacity building or urban area cov. which.S. the handsets are directly WiFi+VoIP-enabled (instead of having the DECThandset communicate via an intermediate VoIP-enabled base). snom. where. There has been only one bit-rates at their disposal than traditional analog telephone major installation of DECT for public access: in early networks could provide. The standard is also used in electronic cash terminals.4 and 5. was patible with GAP.[5] 30. The enterprise backhaul from the base station is via VoIP (H.[6] • Enterprise premises cordless PABXs and wireless LANs.3. A GE 28105EE1 DECT 6. In Europe the power limit laid down for use of the DECT spectrum (250 mW peak) was expressed in ERP. especially in comparison to DECT elsewhere. DECT 6. ETSI released the CAT-iq stanas “Fido” after much regulatory delay.0” in DECT 6. covering major dard in 2005. erage as part of a public telecoms network. having peaked at 142. while communications between base and vendors have offered DECT access options. . using many base stations for coverage. shut down in 2001. through a mechanism called handover. DECT-plus-(cabled)VoIP has several DECT has also been used for Fixed Wireless Access as a substitute for copper pairs in the “last mile” in countries such as India and South Africa. Lantiq. lic access application did not succeed.9 GHz. significant advantages and disadvantages in comparison to VoIP-over-WiFi. using a single base sta. rather than the more commonly used EIRP. The DECT and DECT 6.9 might have confused customers who equate larger numbers (such as the 2. and the commonplace lack of GAPcompatibility among US vendors binds companies to a single vendor. Other alternatives to DECT-plus-VoIP include local microcells (e.To facilitate migrations from traditional PBXs to VoIP. and remote door openers. since the UPCS band (1920-1930 MHz) used for DECT in North-America is not free from heavy interference and only half as wide as that used in Europe (1880-1900 MHz). Calls can be both within the system and to the public telecoms network.3 VoIP/IP-DECT • Public access. typically. 30.30.The term DECT 6. Philips. Like DECT. • Interference-free wireless operation to around 100 metres (110 yd) outdoors.5 MHz ISM band (IMT-FT). Additional handsets have 2. The DECT standard was developed by ETSI in several Bluetooth technology. or mito be placed around the house. video senders. The standard was first discussed in January Profile (GAP) system includes: 2011 and the first commercial products were launched later that year by Dialog Semiconductor. generally immune to interference from other DECT systems. but outside Europe spectrum is also available frequency band (1880 MHz–1900 MHz) is used in all in 1900 MHz to 1920 MHz and in 1910 MHz to countries in Europe. changed channelization and licensing costs in a nearby • 1880 – 1900 MHz in South Africa. or 1. due to its more global usage. allowing DECT devices to be sold in the U.4 GHz band. which all operate in the ISM unlicensed the same telephone jack. the Federal Communications Commission in 2005 • 1880 – 1900 MHz in Europe. Australia and South America.711.] The most DECT was developed by ETSI but has since been adopted common spectrum allocation is 1880 MHz to 1900 by many countries all over the World. all operating from crowave ovens. Wi-Fi. security. G.” of Asia.S. known as • 1880 – 1900 MHz in Hong Kong [7] Unlicensed Personal Communications Services (UPCS). .5 Standards history stance. for in30. much less indoors when separated by walls. ETR-178.1 Technical properties be type approved. G. Outside Europe. and ETS 300-176 defining how the units should 30. are less likely to experience interference from other wire• 1910 – 1930 MHz in Latin America. baby monitors and other phases. A technical report. The original DECT MHz. less devices such as baby monitors and wireless networks.. prescribes the following technical properties for DECT. Within the IMT-2000 group of technoloCarrier positions in the 902 MHz to 928 MHz ISM gies. Initially named “Digital European Cordless Telephone” at its launch by CEPT in November 1987. DIGITAL ENHANCED CORDLESS TELECOMMUNICATIONS 30. after minimal changes.722 (wideband).1 (wideband) and changed to “Digital European Cordless TelecommunicaMPEG-4 ER LD AAC (wideband and supertions” to reflect its broader range of application. Handsets can in many cases be The standard has been created to enable home automaused as intercoms. It is recognized by the ITU as fulers are specified for the whole frequency range 1880 filling the IMT-2000 requirements and thus qualifies as MHz to 1980 MHz and 2010 MHz to 2025 MHz. REN/DECT-000268-1/2/3/4/5/6/7/8) erability profiles and standards for testing. suggestion by Enrico Tosato of Italy. Subsequent standards ETSI standards documentation (ETSI EN 300 175were developed and published by ETSI to cover interop1/2/3/4/5/6/7/8. • Multiple handsets to one base station and one phone DECT ULE standard uses the 1. healthcare and energy monitoring applicaother. intercomtions that are battery powered and can easily connect to municating without telephone line connection. band (1920 MHz–1930 MHz. These were the ETS 300-175 series in 9 parts defining the air interface. following a • Audio codec: G. These channels are reserved exclu2003 2. communicating between each tion. it is used in most 1930 MHz (several countries). Operates clearly in common congested domestic radio traffic situations. DECT is referred to as 'IMT-2000 Frequency Time' band and the 2400 MHz to 2483. a battery charger station that does not plug into the telephone system. In the United States. includwideband) ing data services.729.4 DECT ULE CHAPTER 30. In 1995.6 Technical features The latest DECT variant is DECT ULE. was also published to explain the standard.1. the web using the large number of existing DECT enabled modems and be managed using a smartphone app. with only • 1900 – 1920 MHz in China.1 (“Nominal position of RF less home telephones). have been defined for the US market.6.9 GHz). till 2003. This allows several cordless telephones less interference than Zigbee. when the first round of standards were published. [. Wi-Fi networks. the name was changed from “European” to “Enhanced. its name was soon G.726 (standard codec). the first of that took place between 1988 and 1992 wireless devices. a 3G system. commonly used for domestic or carriers”) of the ETSI standard states: “DECT carricorporate purposes. Bluetooth. and sometimes as walkie-talkies.4 GHz sively for voice communication applications and therefore • 1893 – 1906 MHz in Japan.9 GHz band so suffers line socket.108 30.” • Net bit rate: 32 kbit/s It is an ETSI standard for digital portable phones (cord• Frequency: Section 4.. or DECT Ultra Typical abilities of a domestic DECT Generic Access low energy. [10] While most of the DECT standard is publicly available. and 2. They are based on HDLC. 30. The intent is that two different products from different manufacturers that both conform not only to the DECT standard. The encryption is fairly weak. which allows calls to be listened to. are able to interoperate for basic calling.2 Security The maximum allowed power for portable equipment as well as base stations is 250 mW. recorded. a specially designed variant of the ISDN data link protocol called LAPD.0 do not operate in the 2. Mobility Management and Call Control). tion. the DECT network specifications do not define cross-linkages between the operation of the entities (for example. but also includes elements unique to DECT.931-derived protocol. The architecture presumes that such linkages will be designed into the interworking unit that connects the DECT access network to whatever mobilityenabled fixed network is involved. 4 mW (100 mW peak) in the US The DECT physical layer uses: • Frequency division multiple access (FDMA). they are not subject to. the part describing the DECT Standard Cipher was only The DECT network layer always contains the following available under a non-disclosure agreement to the phones’ protocol entities: manufacturers from ETSI. the handset is capable of responding to any combination of entity traffic. 109 • Call Control (CC) • Mobility Management (MM) Optionally it may also contain others: • Call Independent Supplementary Services (CISS) • Connection Oriented Message Service (COMS) • Connectionless Message Service (CLMS) All these communicate through a Link Control Entity (LCE). they are sometimes marketed as 'WiFi friendly'.728 MHz spacing) in Europe. By keeping the entities separate. and use is prohibited by the Federal Communication Commission and Industry Canada. other attack involves impersonating a DECT base staThe DECT data link layer uses LAPC (Link Access Protocol Control). and GAP products on the market from different manufacturers are in practice interoperable for the basic functions.728 MHz spacing) in the US • Time slots: 2 x 12 (up and down stream) • Channel allocation: dynamic • Average transmission power: 10 mW (250 mW peak) in Europe.[8] • Carriers: 10 (1.4 GHz ISM band. and • 1920 – 1930 MHz in the US and Canada • North-American DECT (“DECT 6. European DECT products may not be used in the US and Canada as they likewise cause and suffer from interference with US and Canada cellular networks.4 GHz cordless phones. The call control protocol is derived from ISDN DSS1. Many DECT-specific changes have been made.0”) products may not be used in Europe/Africa as they cause and suffer from interference with the European/South African cellular networks. The DECT standard includes full testing suites for GAP. As DECT and DECT 6. 64-bit encryption. A portable device radiThe DECT media access control layer also provides ates an average of about 10 mW during a call as it is only encryption services with the DECT Standard Cipher using one of 24 time slots to transmit. connectionless and broadcast services to the higher The security algorithm has been decoded. Use of such products is prohibited by European Telecommunications Authorities and Independent Communication Authority of South Africa. nor cause interference with. and this creates great flexibility in fixed network design without breaking full interoperability.[9][10][11] Anlayers.6. The mobility management protocol includes many elements similar to the GSM protocol. . and re-routed to a different destination. which is a Q.11g Wi-Fi. Unlike the GSM protocol. • Time division multiple access (TDMA) and • Time division duplex (TDD) This means that the radio spectrum is divided into physical channels in two dimensions: frequency and time.30.11b and 802. 5 (1.6. TECHNICAL FEATURES • 1910 – 1920 MHz in Brazil. using a 35-bit The DECT media access control layer controls the initialization vector and encrypting the voice stream with physical layer and provides connection oriented. 802. DECT GAP is an interoperability profile for DECT. (DSC). As such. but also to the GAP profile defined within the DECT standard. Nevertheless. with each time slot occupying any channel. each base sta- 30.792 MHz to 1897. Most studies have been unable to demonstrate any link to health effects. and German firms Dosch & Amand and Hoeft & Wessel built niche businesses on the supply of data transmission systems based on DECT. or have been inconclusive.10 See also • Cat-iq • CorDECT • Cordless telephone • CT2 (DECT’s predecessor) • Generic access profile (GAP) • GSM Interworking Profile (GIP) • IP-DECT • Microcell • Net3 • Unlicensed Personal Communications Services . 2002. The company has demonstrated the technology to a 2.S. DECT appeared at one time to be a superior alternative to Wi-Fi. market. Each base station frame provides 12 duplex speech channels. DIGITAL ENHANCED CORDLESS TELECOMMUNICATIONS On June 8. and in particular the DPRS (DECT Packet Radio Services) bring together a number of prior interoperability profiles for the use of DECT as a wireless LAN and wireless internet access service.[14] and 30. baby monitors. was too early to find wide application for wireless data outside niche industrial applications. Whilst contemporary providers of Wi-Fi struggled with the same issues. By the time mass applications for wireless Internet had emerged. with science similar to mobile phones. due to FCC spectrum restrictions at that time. the timing of the availability of DECT. providers of DECT retreated to the more immediately lucrative market for cordless telephones. members of the deDECTed. dedicated spectrum.[18][19] 30. Olivetti’s Net3 .[11] XDECT R is a marketing term used by Uniden for its products for extending the range of DECT phones (apparently indefinitely) by using multiple repeater stations. a posting was made to the alt. though the UK Health Protection Agency (HPA) claims that due to a mobile phone’s adaptive power ability.9 Health and safety See also: Wireless electronic devices and health DECT is a UHF technology.[15] The protocol capabilities built into the DECT networking protocol standards were particularly good at supporting fast roaming in the public space.[12] This claim has since been refuted. With good range (up to 200 metres (660 ft) indoors and 6 kilometres (3. in the mid-1990s.4 mi) range in Australia.110 CHAPTER 30.8 XDECT R as of 2010 there has been a viable attack on it that can recover the key. In 2008.[13] tion can provide up to 120 channels in the DECT spectrum before frequency reuse. between hotspots operated by competing but connected providers. the industry had moved far ahead in terms of performance and DECT’s time as a technically competitive wireless data transport had passed. consensus is that there are negligible health effects from very low levels of radiation. and some national and international agencies have made specific recommendations about exposure. a DECT cordless phone’s radiation could actually exceed the radiation of a mobile phone (a DECT cordless phone’s radiation has an average output power of 10 mW but is in the form of 100 bursts per second of 250 mW. DECT operates in multicarrier/TDMA/TDD structure. The first DECT product to reach the market. a strength comparable to some mobile phones). Wi-Fi. and other cordless telephone technologies.anonymous.[17] As with all such wireless technologies. However.S.2 30. If frequency-hopping is avoided.[16] Other interoperability profiles exist in the DECT suite of standards. open interoperability and data speeds of around 500 kbit/s.7 mi) using directional antennae outdoors). and the U.1 Radio links DECT operates in the 1880–1900 MHz band and defines ten channels from 1881. Each timeslot can be assigned to a different channel in order to exploit advantages of frequency hopping and to avoid interference from other users in asynchronous fashion. high interference immunity. had opened up to DECT.7. well into the new century.org project actually did reverse engineer the DECT Standard Cipher. DECT also provides Frequency-hopping spread spectrum over TDMA/TDD structure. 30.7 DECT for data networks kilometres (1.messages newsgroup containing what was claimed to be the reverse engineered source code of the implementation of the DECT Standard Cipher for the Samsung SP-R6150 telephone. there has been persistent controversy over their health safety.344 MHz with a band gap of 1728 kHz. was a wireless LAN. A key weakness was also the inaccessibility of the U. “Health Effects from Radiofrequency Electromagnetic Fields”. FURTHER READING 111 30. [19] http://www.12. [14] talk-25c3. Personal Wireless Communication with DECT and PWT. John A.org • DECT information at ETSI • DECT reaches a New Generation at dect.i-sis.12 Further reading • WDECT • Wireless local loop • Tuttlebee. ISBN 978-0-89006-872-4. alt. Erik. [18] “What are the health risks associated with mobile phones and their base stations?".org/trac/raw-attachment/wiki/25C3/ talk-25c3.pdf[] [6] http://shop. Weinmann. W. European Telecommunications Standards Institute. [2] “Digital Enhanced Cordless Telecommunications (DECT).org. Erik. A high level guide to the DECT standardization”. (UK) Health Protection Agency. Springer.Wifi friendly home phones [9] “Serious security vulnerabilities in DECT wireless telephony”.13 External links • DECT Forum at dect. “Cryptanalysis of the DECT Standard Cipher” (PDF).bigpond. World Health Organization.com • Open source implementation of a DECT stack . Tews. (1996). 1997.org” (PDF).org • DECTWeb.11 References [1] “DECT Information”. php • Phillips. Ralf-Philipp (2008-12-29). Artech. ISBN 978-3540-19970-0. “DSC . Retrieved 10 September 2013.au/ AUSTRALIA/XDECTR_RangeTestPopUp.uniden. 2008-12-29. 2005-12-05.fr. Mac Namee. [11] Nohl. adsq2u$p00$1@wanadoo. Retrieved 2010-09-23. [16] Uniden News on XDECT R: http://www. 30. [12] “Do you like ice cream?". Heise. October 1994. “deDECTed.messages.. Gerard (1998).anonymous. Office of the Communications Authority. Kowalk (2007-03-13). Ralf-Philipp (2009-01-26). [3] “Dect for Cordless Terminal Mobility” DECT Forum Newsletter 6 March 1998 [4] “LA TELECOM SPEGNE “FIDO"" Il Messaggero 5 April 2000 [5] https://dedected. Ralf-Philipp (2010-04-04). Tews. Weinmann. Wally H. 30. [8] Wirlpool Forums . Cordless Telecommunications Worldwide. Retrieved 2008-01-19.pdf Slides of the deDECTed. • Prof.html [17] Independent Advisory Group on Non-ionising Radiation (April 2012). ETR 178. 2011 [7] “Beware of Buying Radiocommunications Equipment not Meeting Prescribed Specifications”.org presentation at the 25th Chaos Communication Congress [15] “Wireless LANs: developments in technology and standards”.30. Online Q&A. Andreas. Karsten.asp?Action= HeaderSearch&ProductName=dect+6.uk/cordlessPhonesBrainTumours.com/ProductSearch.Reverse Engineering of the Samsung DECT SP-R6150”.0 accessed on October 11. Newsgroup: Usenet: [13] Weinmann. “Rechnernetze – The DECT Standard”.com. Dr.W. [10] Schuler. IEE Journal of Computing and Control Engineering. Retrieved 2008-12-29. xDSL.[1] with the 2011 update providing up to 1 Gbit/s[1] for fixed stations. The original IEEE 802. which was formed in June 2001 to promote conformity and interoperability of the standard. HFC or FTTx). • Providing data.16e-2005) is the revision that was deployed in many countries. In many cases this has resulted in competition in markets which typically only had access through an existing incumbent DSL (or similar) operator. 31. but it can enable usage at much greater distances. given the relatively low costs associated with the deployment of a WiMAX network (in comparison with 3G. • Providing a source of Internet connectivity as part of a business continuity plan. Additionally. The forum describes WiMAX as “a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL".16 family of wireless-networks standards ratified by the WiMAX Forum.2. HSDPA. (Similarly. it is now economically viable to provide last-mile broadband Internet access in remote locations. cellular backhaul. etc. Wi-Fi refers to interoperable implementations of the IEEE 802. a service marketed in Korea. telecommunications (VoIP) and IPTV services (triple play).Chapter 31 WiMAX Mobile WiMAX (originally based on 802.2 Uses The bandwidth and range of WiMAX make it suitable for WiMAX base station equipment with a sector antenna and the following potential applications: wireless modem on top • Providing portable mobile broadband connectivity across cities and countries through a variety of devices. thus ensuring a level of interoperability with other certified products. as long as they fit the same profile. It is similar to Wi-Fi. 112 .11 Wireless LAN standards certified by the Wi-Fi Alliance. The name “WiMAX” was created by the WiMAX Forum.16 standard (now called “Fixed WiMAX”) was published in 2001. hotspots. WiMAX adopted some of its technology from WiBro. WiMAX is sometimes referred to as “Wi-Fi on steroids”[4] and can be used for a number of applications including broadband connections.[5] 31.) WiMAX Forum certification allows vendors to sell fixed or mobile products as WiMAX certified.[2] • Providing a wireless alternative to cable and digital subscriber line (DSL) for "last mile" broadband access. WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates. and is the basis for future revisions such as 802.[3] 31.1 Internet access WiMAX can provide at-home or mobile Internet access across whole cities or countries.16m-2011.1 Terminology • Smart grids and metering WiMAX refers to interoperable implementations of the IEEE 802. urban and rural backhaul is usually provided by microwave links. works Mobile WiMAX was a replacement candidate for cellular phone technologies such as GSM and CDMA. and 4G networks in both developed and developing nations. operators are aggregating sites using wireless technology and then presenting traffic on to fiber networks where convenient. Consequently. Portable units include handsets (similar to cellular smartphones). and Motorola. the use of wireless microwave backhaul is on the rise in North America and existing microwave A WiMAX USB modem for mobile access to the Internet backhaul links in all regions are being upgraded. Intel. inspiring competitors into collaboration. are known as subscriber stations (SS).[6][7] 31. the need for increased backhaul and . WiMAX in this application competes with microwave radio. though fixed-mobile convergence has been a recognized factor in the industry. or can be used as an overlay to increase capacity. In addition. In other regions.2.[8] Capacities of between 34 Mbit/s and 1 Gbit/s [9] are rou. MP3 players and similar devices. Airspan. E-line and simple extension of the fiber network itself.31. and provide: bandwidth.3 Connecting In North America. and embedded devices in laptops. Sprint Nextel. 31.3 Triple-play WiMAX directly supports the technologies that make triple-play service offerings possible (such as Quality of Service and Multicasting). Bright House. products and installations. 31. Such devices typically sit near the customer’s winanalysts point out that as wireless progresses to higher dow with the best signal. WiMAX is more similar to Wi-Fi than to other 3G cellular technologies. WiMAX Internet connectivity to multiple devices Also.1 Gateways WiMAX gateway devices are available as both indoor and outdoor versions from several manufacturers including Vecima Networks. ZyXEL.media service will accelerate. there is much emphasis by operators on consumer electronics devices such as Gaming consoles.3.3. and other private labeled devices. PC peripherals (PC Cards or USB dongles). usage habits shift. backhaul for urban operations is typically provided via one or more copper wire line connections. it inevitably competes more directly with ca• An integrated Wi-Fi access point to provide the ble and DSL. this is not a complete list of devices available as certified modules are embedded into laptops. On May 7.2 113 Middle-mile backhaul to fiber net. In many cases. Huawei. whereas remote cellular operations are sometimes backhauled via satellite. and Time Warner announced a pooling of an average of 120 MHz of spectrum and merged with Clearwire to market the service. CONNECTING 31. 3G. Fixed WiMAX is also considered as a wireless backhaul technology for 2G. The cable companies will provide media services to other partners while gaining access to the wireless network as a Mobile virtual network operator to provide triple-play services. Alvarion. The list of vendors and networks is not comprehensive and is not intended as an endorsement of these companies above othSome analysts questioned how the deal will work out: Alers.Devices that provide connectivity to a WiMAX network tinely being deployed with latencies in the order of 1 ms. MIDs (Mobile Internet devices).) WiMAX has more substantial backhaul bandwidth requirements than legacy cellular applications. However. (The exception to this is where the network is operated by an incumbent with ready access to the copper network. 2008 in the United States. prior attempts to form partnerships Many of the WiMAX gateways that are offered by manamong wireless and cable companies have generally failed ufactures such as these are stand-alone self-install indoor to lead to significant benefits to the participants. Comcast. These are inherent to the WiMAX standard rather than being added on as Carrier Ethernet is to Ethernet. therefore the opportunity to leverage cable assets is expected to increase. which are now available for Wi-Fi services. Other units. Google.2. The WiMAX Forum website provides a list of certified devices. as wireless broadband networks grow denser and throughout the home or business. The list of deployed WiMAX networks and WiMAX Forum membership list [10] provide more links to specific vendors. The new company hopes to benefit from combined services offerings and network resources as a springboard past its competitors. as proved in December 2005.2 Physical layer The original version of the standard on which WiMAX is based (IEEE 802. printer or DVR on a local wired network.16-2004. made available on June 4. IEEE 802. WIMAX • Ethernet ports to connect directly to a computer. HTC and Sprint Nextel released the second WiMAX enabled mobile phone.[15] and so the actual standard is 802. 31.16-2004 router. • Adding support for mobility (soft and hard handover between base stations).16e-2005 improves upon IEEE 802. Constant carrier spacing results in a higher spectrum efficiency in wide channels. The device.16e-2005) and OFDM256 (802.16e-2005.. and is the very basis of Mobile WiMAX.3.3. • Advanced antenna diversity schemes. 2010. Also known as scalable OFDMA (SOFDMA).16-2004 was updated by 802. It is a supplement to the IEEE opposed to the fixed orthogonal frequency-division multiStd 802. but because the allowed FFT subcarrier numbers are only 128. but radio losses mean that the subscriber may need to be significantly closer to the WiMAX base station than with professionally installed external units.16e-2005. March 23. Other bands not multiples of 1. updated in 2004 to 802. these specifi. 1024 and 2048. 31. 802. Sprint Nextel will roll out a 4G network deciding to shift and utilize LTE 4G technology instead.16e.200 are used) in 802. 2010 at the CTIA conference in Las Vegas. As such these devices are best used in areas of good coverage.plexing (OFDM) version with 256 sub-carriers (of which 2004 as amended by 802.[11] Generally these devices are connected to a notebook or net book computer. thereby improving indoor penetration • Intro and low-density parity check (LDPC) • Introducing downlink sub-channelization. Indoor gateways are convenient. other frequency bands will not have exactly the same carrier spacing. 2008. on November 12.16a.114 CHAPTER 31.frequency-division multiple access[16] (SOFDMA). 10 MHz or 20 MHz).[12] The device was only available to certain markets in Russia on the Yota network.16-2004. the EVO 4G. SOFDMA (used in 802. by: • One or two analog telephone jacks to connect a landline phone and take advantage of VoIP.[13] is capable of both EVDO(3G) and WiMAX(pre-4G) as well as simultaneous data & voice sessions. Sprint Nextel announced at CES 2012 that it will no longer be offering devices using the WiMAX technology due to financial circumstances.1 The IEEE 802. cations need to be considered together. and their installation is comparable to the installation of a residential satellite dish.16e-2005. added specifications for 31. Dongles typically have omnidirectional antennas which are of lower gain compared to other devices. 802. • Scaling of the fast Fourier transform (FFT) to the channel bandwidth in order to keep the carrier spacing constant across different channel bandwidths (typically 1.16) specified a physical layer op31.4. More advanced versions.16. also bring multiple antenna support .4.g.25 MHz.94 kHz.16d. 31.16 Standard the 2 to 11 GHz range. Fixed WiMAX to Mobile WiMAX). along with its network partner Clearwire.3 Mobile phones HTC announced the first WiMAX enabled mobile phone. 512. Carrier spacing is 10.16e-2005 in 2005 and uses scalable orthogonal WiMAX is based upon IEEE Std 802. Thus.2 External modems USB can provide connectivity to a WiMAX network through what is called a dongle. This is seen as one of the most important aspects of 802. 5 MHz.[14] ap.16d) are not compatible thus equipment will have to be replaced if an operator is to move to the later standard (e. which might not be optimal for implementations.25 MHz are defined in the standard. A higher-gain directional outdoor unit will generally result in greatly increased range and throughput but with the obvious loss of practical mobility of the unit. Outdoor units are roughly the size of a laptop PC.4 Technical information erating in the 10 to 66 GHz range. and a cost reduction in narrow channels. and hybrid automatic repeat-request (HARQ) • Adaptive antenna systems (AAS) and MIMO technology • Denser sub-channelization. including 802. the Max 4G. allowing administrators to trade coverage for capacity or vice versa • Adding an extra quality of service (QoS) class for VoIP applications. instead. the profile with the The WiMAX forum proposal defines a number of comlargest MAC frame allocation trade-off requiring more ponents. and WIMAX customers in Asia . operating in less favorable environments for RF communication. interference. In addi.29% of the overall marwhich means that other subscribers cannot use it. the scheduling algorithm can also be more bandwidth efficient. As a result.4. Modulation is chosen to be more spectrally efficient (more bits per OFDM/SOFDMA symbol). frequency re-use and bandwidth efficiency. which is typically chosen by operators that serve as Internet Service Providers (ISP). they can be more easily decoded using digital signal processing (DSP). That is.4 Specifications As a standard intended to satisfy needs of next-generation data networks (4G).4. • ASN: the Access Service Network[19] • BS: Base station. After network entry The Asia-Pacific region has surpassed the North Ameris allowed. The scheduling algorithm also allows the base sta.5 Integration with an IP-based network tion to control Quality of Service (QoS) parameters by balancing the time-slot assignments among the application needs of the subscriber station. WiMax is the most energy-efficient pre-4G technique among LTE and HSPA+. the system has to be initially designed in consensus with the base station product team to accurately project frequency use.) This could lead to cluttered frequencies with slow response times or lost frames. the system automatically steps down to a more robust mode (burst profile) which means fewer bits per OFDM/SOFDMA symbol. part of the ASN • ASN-GW: the ASN Gateway. Maximum distance is achieved by the use of the most robust burst setting.ket .compared to 1.31. The reason for which is obviously that too much interference causes the network to function poorly and can also misrepresent the capability of the network. with the advantage that power per bit is higher and therefore simpler accurate signal processing can be performed.points) between these. when the bursts have a high signal strength and a high carrier to noise plus interference ratio (CINR).4. self installation.3 Media access control layer 31. The WiMAX Forum architecture The WiMAX Forum has proposed an architecture that defines how a WiMAX network can be connected with an IP based core network. plus some of the interconnections (or reference symbols (a larger portion of the MAC frame) to be allo. Burst profiles are used inverse (algorithmically dynamic) Nevertheless.[18] tion to being stable under overload and over-subscription. part of the CSN .7 million pre-WIMAX contract.[17] 115 The system is complex to deploy as it is necessary to track not only the signal strength and CINR (as in systems like GSM) but also how the available frequencies will be dynamically assigned (resulting in dynamic changes to the available bandwidth. even if this is done automatically then the practical deployment should avoid high interference and multipath environments. In contrast. (See WiMAX MIMO) This brings potential benefits in terms of coverage. The time slot can enlarge and scribers. that is. the subscriber station is allocated an access ican region in terms of 4G broadband wireless subslot by the base station.4 million in the USA and Canada. There were around 1. • SS/MS: the Subscriber Station/Mobile Station The client’s MAC frame and their individual burst profiles are defined as well as the specific time allocation.4. and general product The WiMAX MAC uses a scheduling algorithm for functionality. However. tance. TECHNICAL INFORMATION through MIMO. power consumption. but remains assigned to the subscriber station. labeled R1 to R5 and R8: cated in transmitting a given amount of data than if the client were closer to the base station. 31. part of the ASN • CSN: the Connectivity Service Network • HA: Home Agent.31. which the subscriber station needs to compete only once for initial entry into the network. the WiMAX BS provide seamless integrato low signal attenuation. WiMAX is distinguished by its dynamic burst algorithm modulation adaptive to the physical environment the RF signal travels through. meaning throughput between tion capabilities with other types of architectures as with clients and the base station is determined largely by dispacket switched Mobile Networks. 3 GHz and other frequencies. WIMAX • AAA: Authentication. Companies will begin to use WiMAX to communicate from office to office. Elsewhere in the world.3 of 1 – 6 miles. tance of 30 miles – compared to 300 feet for WiFi. all of the mobile profiles are TDD only.7 (bit/s)/Hertz. including WiMAX. part of the CSN the IMT-2000. 5 MHz. pico. but await the complete roll out of digital TV. In the USA the FCC auction for this spectrum began in January 2008 and. • NAP: a Network Access Provider • NSP: a Network Service Provider It is important to note that the functional architecture can be designed into various hardware configurations rather than fixed configurations. EU commissioner Viviane Reding has suggested re-allocation of 500–800 MHz spectrum for wireless communication. is a relatively new tech3. in an effort to drive standardisation and de. Next. parks and coffee shops will be outfitted with WiMAX access points.4.5 GHz. GHz probably being most important in Asia. 802. (Note: WiMAX cannot deliver 70 Mbit/s over 50 km (31 mi). the biggest share of the spectrum went to Verizon Wireless and the next biggest to AT&T. This multiplies the effective spectral efficiency through multiple reuse and smart network deployment topologies. relatively near to each other and provide campus wide wireless connectivity to employees.it’s still faster and has a longer range than WiFi. reducing the range (to under 1 km) allows has decided to include WiMAX technology in the IMT. 7 MHz and 10 MHz. or at the same time. 2000 set of standards. low cost. upload more data (such as voice calls. resulting in more effective systems. but GHz. For example. 8. The current fixed profiles are defined for both TDD and FDD profiles.a device to operate at higher bitrates. WiMAX can operate at nels. a technology which competes directly with WiMAX. The mobile profiles are 5 MHz.) Since October 2007. WiMAX profiles define channel size. the longer the distance. and relatively fast. Ideally. Of In the USA. of the International Telecommunication Union (ITU-R) Conversely. 3.5-2. the architecture is flexible enough to allow remote/mobile stations of varying scale and functionality and Base Stations of varying size . however the WiMAX Forum has published three licensed spectrum profiles: 2. Pakistan's Wateen bile users could use it as a faster and longer range alternaTelecom uses 3. the slower the speed.3 GHz. femto. the 802.5–4G wireless systems offer spectral efficiencies that are similar to within a few tenths of a percent.5 course.116 CHAPTER 31. with 2.75 MHz and 10 MHz. Employee’s computers will need to use new WiMAX cards to connect to these new networks. 2.e.5 GHz.use WiMAX equipment in any country that recognizes ing Server. primarily to Sprint Nex.Like all wireless technologies. WIMAX has been very successful as it’s easy to use. tel and Clearwire.4.[20] and is already assigned. but only the above subsets are supported as WiMAX higher bitrates or over longer distances but not both.5 GHz and Another advantages of WiMAX.5 quite excited about the prospects for WiMAX is that moGHz. For example. public places such as airports. and other 3.69 GHz band at this stage) to demonstrated that customers at the cell-edge with an in- .16-2004 (fixed) has a spectral efficiency of 3. tive to WiFi and corporate or home users could use it in Analog TV bands (700 MHz) may become available for WiMAX usage. The notable advantage of WiMAX comes from combining SOFDMA with smart antenna technologies.16 standard allows a far wider variety of chan.g. and there will be other uses suggested for that spectrum.[22] a fixed environment as a replacement or backup to DSL. 31.nology that enables communication over a maximum discrease cost. products. There is no uniform global licensed spectrum for WiMAX. TDD/FDD and images and videos) and have longer distance needs – the other necessary attributes in order to have inter-operating limits of WiFi are apparent. as a result. The fixed profiles have channel 31. Australia (specifically in the 2.7 Spectral efficiency and Advantages One of the significant advantages of advanced wireless systems such as WiMAX is spectral efficiency. The direct use of frequency domain organization simplifies designs using MIMO-AAS compared to CDMA/WCDMA methods. Operating at the maximum range of 50 km (31 mi) increases profiles. At this point. the most-likely speeds of around 10MBps could be achieved with a range bands used will be the Forum approved ones. the biggest segment available is around 2. as people download more and larger files. Some coun. the Radio communication Sector bit error rate and thus results in a much lower bitrate.The reason why some telecommunication providers are tries in Asia like India and Indonesia will use a mix of 2.[21] Both of these companies have stated their intention of supporting LTE.8 Inherent limitations sizes of 3. and mini BS as well as macros. While WiMAX has its benefits.[23] This enables spectrum owners A city-wide deployment of WiMAX in Perth.4.5 MHz.6 Spectrum allocation 31. Authorization and Account. 5. However.4. 802. • Wi-Fi uses contention access — all subscriber stations that wish to pass data through a wireless access point (AP) are competing for the AP’s attention on a random interrupt basis. which includes Wi-Fi. Each connection is based on specific scheduling algorithms. 5 GHz. Like all wireless systems. computers.Using WiMAX could be an advantage. . in most cases the tween 3 and 6 Mbit/s. • Both IEEE 802. CONFORMANCE TESTING door Customer-premises equipment (CPE) typically obtain speeds of around 1–4 Mbit/s.LAN. since it is typically metres. because both are related to wireless connec. As an alternative for a are frequent. 31.11. Beceem. However.3.5 Conformance testing TTCN-3 test specification language is used for the purposes of specifying conformance tests for WiMAX im• Wi-Fi runs on the Media Access Control's plementations. with adequate capacity planning and the use of WiMAX’s Quality of Service. greatly reducing their throughput.[24] in wireless Wi-Fi router.4 GHz. most users will have a range of 4-8 Mbit/s services and additional radio cards will be added to the base station to increase the number of users that may be served as required. • Wi-Fi uses the 2.5 and 3. The WiMAX test suite is being developed CSMA/CA protocol. whereas WiMAX runs a connection-oriented MAC. one could purchase a WiMAX modem with a builttivity and Internet access.16 end user devices must be in range of the base station. such as a window.11 supports also direct ad hoc or peer to peer networking between end user devices without an access point while 802. Sequans. e. and IEEE 802. that uses licensed or unlicensed spectrum to faster than most cable modems with download speeds bedeliver connection to a network.9 Silicon implementations 117 and contention based. and PicoChip. which is connectionless by a Specialist Task Force at ETSI (STF 252)..31. • WiMAX is a long range system.g. This can cause subscriber stations distant from the AP to be repeatedly interrupted by closer stations. covering many kilo.10 Comparison work. If one were to connect the WiMAX Subscriber Unit directly to a WiMAX-enabled computer. This enables the user to place the WiMAX Subscriber Unit in the best reception area. but are not limited to. 31. • WiMAX and Wi-Fi have quite different quality of service (QoS) mechanisms: • WiMAX uses a QoS mechanism based on connections between the base station and the user device. and generally costs less than cable. available bandwidth is shared between users in a given radio sector.5 GHz bands (refer to 'Spectrum allocation' above).4. a minimum guaranteed throughput for each subscriber can be put in place. 2.[25] • Wi-Fi is more popular in end-user devices. These companies include. where an end user communicates to users or servers on another Local Area Network (LAN) using its access point or base station. define Peer-toPeer (P2P) and wireless ad hoc networks. Picture of a WiMAX MIMO board A number of specialized companies produced baseband ICs and integrated RFICs for WiMAX Subscriber Stations in the 2. allowing one to connect multiple devices to create a LAN. Although Wi-Fi and WiMAX are designed for different situations. Internet. WiMAX network operators typically provide a WiMAX Subscriber Unit that connects to the metropolitan WiMAX network and provides Wi-Fi connectivity within the home or business for local devices. and still be able to use the WiMAX network from any place within their residence. with users closer to the cell site obtaining speeds of up to 30 Mbit/s. which includes WiMAX. Wi-Fi handsets and smartphones. 3 GHz. that would Comparisons and confusion between WiMAX and Wi-Fi limit access to a single device. they are complementary. The local area network inside one’s house or business would operate as with any other wired or wireless net31. In practice.16. so performance could deteriorate in the case of many active users in a single sector. and 60 GHz radio frequency bands to provide access to a local network. WIMAX 31.1 Harmonization Early WirelessMAN standards. In order to do so. WiMAX’s main competition came from existing. The worldwide move to 4G for GSM/UMTS and AMPS/TIA (including CDMA2000) is the 3GPP Long Term Evolution (LTE) effort. all-IP networks with voice services built on top.4–3. Some vendors claim that their equipment is “WiMAX-ready”. commercialisation.7 Competing technologies Within the marketplace. the EU-wide frequency allocation for WiMAX was blocked. TIA-1143.118 CHAPTER 31. 31.6. WiSOA merged with the Wireless Broadband Alliance in April 2008.7. and services. Universal Mobile Telecommunications System (UMTS).[26] 31. low-latency. LTE has seen increasing adoption by mobile carriers around the world. It also offers a series of member events and endorses some industry events. if they are not officially WiMAX Forum Certified. existing Wi-Fi and mesh networking. In 2011.5 GHz and the 3. Speed Wi-Fi WiMAX HSPA Mobility UMTS GSM Speed vs. competition will be from the evolution of the major cellular standards to 4G. Telecommunications Industry Association 2005. CDMA2000. 2009. the home of the WiBro standard. The European standard HiperMAN and Korean standard WiBro were harmonized as part of WiMAX and are no longer seen as competition but as complementary. Another role of the WiMAX Forum is to promote the spread of knowledge about WiMAX. mobility of wireless systems: Wi-Fi.6. WiSOA focused on the regulation.3–2.2 In some areas of the world.3 The LTE Standard was finalized in December 2008.[27] Those that pass conformance and interoperability testing achieve the “WiMAX Forum Certified” designation. high-bandwidth. High Speed Packet Access (HSPA). are now WiMAX.5 GHz ranges. GSM In the future. widely deployed wireless systems The WiMAX Forum is a non profit organization formed such as Universal Mobile Telecommunications System to promote the adoption of WiMAX compatible products (UMTS). with the first commercial deployment of LTE carried out by TeliaSonera in Oslo and Stockholm in December. 31. and can display this mark on their products and marketing materials. Since then.7.2 Comparison with other mobile Internet standards and TIA-1140) that cover the air interface and core networking aspects of Wi-Max High-Rate Packet Data (HRPD) systems using a Mobile Station/Access Termi. and deployment of WiMAX spectrum in the 2.6. [28] 31. the Telecommunications Industry Association released three technical standards (TIA-1164. WiSOA logo 31. “WiMAX-compliant”.UMTS and a general desire for standardization has meant liance spectrum has not been allocated for WiMAX: in July WiSOA was the first global organization composed exclusively of owners of WiMAX spectrum with plans to deploy WiMAX technology in those bands.1 WiMAX Forum A major role for the organization is to certify the interoperability of WiMAX products. or “pre-WiMAX”. it has a certified training program that is currently offered in English and French.[29] .6 Associations 31. the wide availability of WiMAX Spectrum Owners Al. All networks now being deployed in South Korea.Main article: Comparison of wireless data standards nal (MS/AT) with a single transmitter. 16m-2011 standard was the core tech. subsequently. and several member organizations yielded results showing interference at 12 km when using the same channels for both the WiMAX systems and satellites in C-band. including the use of external subscribers.10.[34] It was anticipated that using 4X2 MIMO in the urban microcell scenario with only a single 20 MHz TDD channel available system wide.[37] By February 2011. network deployments to LTE and.[38] standing still). spectral effi.e. • WiBro (mobile WiMax in Korea) WiMAX Release 2 provided backward compatibility with Release 1. the 802. this obfuscates spectral efficiency and net through-put capabiliAs of October 2010. WiMAX subscribers in Korea. Usually the bandwidth is shared between several terminals.31.[35] • Cognitive radio • Category 5 cable • Evolved HSPA • High-Speed Packet Access • Mobile broadband • Mobile VoIP • Municipal broadband • Packet Burst Broadband 31.Worldwide. the cell sizes used. though access in North America lagged. IEEE 802. communications on a train may be poorer than when over 1 billion subscribers by the end of the year. distance from the tower and the ground speed cited coverage of over 823 million people. WiMAX operators could migrate from release 1 to release 2 by upgrading channel cards or software.11 See also jor candidates for IMT-Advanced technologies by ITU. by early 2010 WiMAX seemed to be mation. ramping quickly relative to other available technologies. It was expected that the WiMAX Release 2 would be available commercially in the 2011– 2012 timeframe. change table. In addition.16m system can support both 120 Mbit/s downlink and 60 Mbit/s uplink per site simultaneously. the WiMAX Forum claimed ties of the different wireless technologies listed below. including the quarter of 2006.31. Navy. Main article: List of deployed WiMAX networks spectrum used to achieve the listed peak rates). see Comparison of wireless data standards. the Global VSAT Forum. The WiMAX 2 Collaboration Initiative was formed to help this transition. By the end of 2008 there were 350.largest WiMAX network operator in the world in 4Q [41] announced in May 2010 that it will move new ciency comparison table and OFDM system comparison 2009.10 Deployments tentially very misleading.. and estimate (e. Among many enhancements. and the amount of spectrum available.8 Development WiMAX operations worldwide offering active services (launched or still trading as opposed to just licensed and [43] [32] The IEEE 802.S. the For more comparison tables. [40] Yota.16m standard was submitted to the ITU for IMT-Advanced standardization.[42] A study published September 2010 by Blycroft Publishing estimated 800 management contracts from 364 31.000 [39] spectral efficiency of the technology. The performance of each technology South Korea launched a WiMAX network in the 2nd is determined by a number of constraints. The IEEE 802.g.[33] IEEE 802. covering over 621 million vary by a number of factors.16m systems can • List of deployed WiMAX networks provide four times faster data speed than the WiMAX Release 1. DEPLOYMENTS 119 The following table only shows peak rates which are po.9 Interference A field test conducted in 2007 by SUIRG (Satellite Users Interference Reduction Group) with support from the U. over 592 WiMAX (fixed and mobile) networks deNotes: All speeds are theoretical maximums and will ployed in over 148 countries.[36] • Super Wi-Fi • Switched mesh • Yota Egg • Wireless bridge • Wireless local loop .still to launch). its existing networks as well. see bit rate progress trends. the comparisons listed are not normalized by physical channel size (i.16m is one of the ma. the WiMAX Forum antennas. nology for WiMAX 2. comparison of mobile phone standards.31. For more infor. Retrieved 2008-01-08. [14] “IEEE 802. [21] “Auctions Schedule”. Retrieved 201202-07.org. http://www. Circleid. [25] “HiperMAN / WiMAX Testing”. “WiMax deployments ramp globally. News release (HTC Corporation). “Is 'Wi-Fi on steroids’ really the next big thing?". HSPA and LTE access networks”. 2011. Retrieved on 2013-09-18. [10] WiMAX Forum Member Companies. November 12. Newsre- [34] “WiMAX 2 Collaboration Initiative (WCI) Frequently Asked Questions” (PDF). [28] “WBA and WiSOA join efforts on WiMAX global roaming”. 2010. suirg. 2011.com. 2010). WIMAX 31. ieee802. CNN. [41] Maravedis. Department of Commerce. WiMax Forum.16 Task Group d”. ETSI. Retrieved August 25. [3] Roger Marks (June 29. IT Business Edge.kommersant. Presentation at 2006 Wireless Communications Conference. “IEEE 802. Retrieved 200803-12.sprint. August 5. [36] “SUIRG full interference test report” (PDF). [27] “WiMAX Forum — Frequently Asked Questions”. [33] “802. WiMAX Forum. Retrieved 2008-12-10. WiFi.org.16 WirelessMAN Standard: Myths and Facts” (PDF). Wiktionary. [24] WiMAX vs. Retrieved August 26. Retrieved on 2013-09-18. [13] “Sprint Newsroom | News Releases”. but U. OFDM has developed into a popular scheme for wideband digital communication. Between the lines blog (ZDNet). Retrieved 25 November 2012. [30] “LTE”. Retrieved 2009-01-03.com.org. Federal Communications Commission.16m Air Interface Standard” (PDF).1109/CTTE.org.ru/doc. Retrieved 2008-03-12.org/sites/wimaxforum. 2009. DC: ieee802. 2006). doi:10. [19] “The Access Service Network in WiMAX: The Role of ASN-GW” (PDF). Frequency Allocation Chart” (PDF). analysis and opinion http://www. lags”. 2011. Retrieved 2012-08-22. Archived from the original (PDF) on 2009-03-04.S. Ieeexplore. 2012. [26] “WiMAX Forum Overview”. 2011. Retrieved October 30. Retrieved September 11.org. Retrieved August 20. Retrieved 2008-07-22. eetimes. wimaxforum.S. Retrieved 2008-03-12. ieee802.5557715. [38] Wimax Forum Industry Research Report http://www.org. 30 August 2012. [17] “IEEE Xplore . com/12573/the-rise-and-rise-of-hspa/ [40] Larry Dignan (February 15.com (2008-02-20).unova. 2008.telecoms. Networkworld.the free dictionary. Archived from the original on November 22.16e Task Group (Mobile WirelessMAN)". [35] “Global WiMAX network deployments surpass 500”. 2010).org/files/page/ 2011/03/Monthly_Industry_Report_March2011.org. [8] “Overcoming the wire-line bottleneck for 3G wireless services”. April 12. Wimaxforum. 2011. Retrieved 2009-10-18.com. Retrieved August 26. Retrieved 2008-03-12. supercommnews. Retrieved 2008-08-01.ieee. Retrieved 2010-10-13. [7] “WiMax signals get stronger in India”. [23] “ITU Radiocommunication Assembly approves new developments for its 3G standards”.16m submitted to ITU for IMT-Advanced standardization”. Retrieved October 30. used in applications such as digital television and audio broadcasting. Retrieved 200803-12.pdf [39] The rise and rise of HSPA | telecoms.2010.com .ru/article/2631. 2010. 2011. Marsha (2006-03-31). [12] “Scartel And Htc Launch World’S First Integrated Gsm/Wimax Handset”. [37] “WiMAX Forum”. 2008.aspx?DocsID=1310343 . [1] Carl Weinschenk (April 16. [18] “Asia takes the lead in the 4G market”. Retrieved 2008-03-12. Retrieved 2008-03-12. mustafaergen. Retrieved 2010-10-13. Retrieved 2008-03-22. lightreading. 2009. “Speeding Up WiMax”. wimaxforum. 4 April 2010. [2] “WiMax Forum . [4] Walton. [11] “dongle”. October 6. Retrieved 2010-1013.12 Notes [20] “U. Retrieved 200803-28. wimaxforum.com. whether wireless or over copper wires.com. Retrieved 2008-03-22. [15] “IEEE 802. 4Q 2009. [32] "'WiMAX 2' coming in 2011?". [22] “European Commission proposes TV spectrum for WiMax”.com.Comparison of power consumption of mobile WiMAX. 2012. Retrieved 2008-01-08.com.com. Today the initial WiMax system is designed to provide 30 to 40 megabit-per-second data rates.int. [5] Municipal Broadband: Challenges and Perspectives [6] “Sprint Eyes WiMax Backhaul”. http://www. Wiktionary . [29] Technical standards [9] “High=speed Microwave”.Technology”. leases. [16] Orthogonal frequency-division multiplexing (OFDM) is a method of encoding digital data on multiple carrier frequencies.120 CHAPTER 31. 3GPP web site. Washington.telecoms industry news. Retrieved August 31. itu. Telegeography. WiMAX Forum. zdnetasia. News release (WiMAX Forum). [31] “WiMAX and the IEEE 802.org. 31. 2010-09-01.RT . Retrieved August 26. 2010 . 2011. Fazel and S. Personal Technology. 31. EXTERNAL LINKS [42] Russia Today.html] [43] “WiMAX Directory”. 2009 ISBN 978-0-38768189-4 • Ramon Ray(2009) WiMax .Including WiMAX and LTE. ISBN 978-0-470-99821-2 • M. NY.14.Scartel dropping WiMAX. 2nd Edition. 2008. Multi-Carrier and Spread Spectrum Systems: From OFDM and MC-CDMA to LTE and WiMAX. 31.13 References • K.14 External links • Official page of the WiMAX Forum • How WiMAX Works at HowStuffWorks • Internet Protocol Journal Overview of Mobile WiMAX • Patent alliance formed for WiMAX 4G technology • WiMAX vs. Kaiser. May 21. Mobile Broadband . John Wiley & Sons.Your Fast and Longer Distance WiFi has arrived. LTE • Mobile WiMAX Throughput Measurements • Prashant Sharma (2009). TechPluto blog. • WiMAX Technical Seminar Report 121 . Retrieved 2011-02-28.[rt. “Facts About WiMAX And Why Is It “The Future of Wireless Broadband"".com/Business/2010-05-21/ scartel-dropping-wimax-lte. Springer. Ergen. Blycroft Ltd. aiming for LTE . 2 Debate faster speeds. such as IMT-2000 for 3G and IMTAdvanced for 4G. and development of 4G systems began in 2001 or 2002.[6][7] However. internaAlthough updated standards that define capabilities be. Nordic Mobile there is little room for larger channel bandwidths and new 32.[8] but later took a positive stand. some sources suggest of Things as well as broadcast-like services and lifeline that a new generation of 5G standards may be introduced communications in times of natural disaster. The first 2G system was commercially deployed in 1992.1 Background 122 . commercially available since 2013. they predict that 5G networks will also need to meet the needs of new use-cases such as the Internet Based on the above observations. those new capabilities are still being 5G is exactly about. sentatives have expressed skepticism towards 5G.11ad. and there is still a large extent of debate on what der consideration. for example the pre3G system CdmaOne/IS95 in the US in 1995. and the first 3G system appeared in 2001. see 5G (disambiguation). some industry repregrouped under the current ITU-T 4G standards. The first gigabit • Latency should be significantly reduced compared to IEEE standard was IEEE 802. 3G up to A new mobile generation has appeared approximately ev. and 4G up to 100 MHz). was introduced in 1981. NASA partnered with Machine-to-Machine Intelligence (M2Mi) Corp to develop 5G communications technology[5] • Several hundreds of thousands of simultaneous connections to be supported for massive sensor deploy. 2G up to 200 kHz. In April 2008. approximately in the early 2020s. The Next Generation Mobile Networks Alliance defines the following requirements for 5G networks: • Data rates of several tens of Mb/s should be supported for tens of thousands of users • 1 Gbit/s to be offered simultaneously to tens of workers on the same office floor Telephone.Mobile generations typically refer to non–backwardsments compatible cellular standards following requirements • Spectral efficiency should be significantly enhanced stated by ITU-R.20 MHz.11ac. 5G (5th generation mobile networks or 5th generation wireless systems) denotes the next major phase of mobile telecommunications standards beyond the current 4G/IMT-Advanced standards. and the pre-4G systems Mobile WiMAX in South-Korea 2006. soon to be followed by the multi-gigabit LTE[1] standard WiGig or IEEE 802. 4G systems fully compliant with IMT Advanced were first standardized in 2012. but skeptics argue that ery 10 years since the first 1G system. In parallel with the development of compared to 4G the ITU-R mobile generations.[3][4] Predecessor technologies have been present on the market a few years before the new mobile generation. The development of the 2G (GSM) and 3G (IMT-2000 and UMTS) standards took about 10 years from the official start of the R&D projects.launched. and first release-LTE in Scandinavia 2009. IEEE and other standard• Coverage should be improved ization bodies also develop wireless communication technologies. Prior to 2012. New mobile generations are typically assigned new frequency bands and wider spectral bandwidth per frequency channel (1G up to 30 kHz.Chapter 32 5G For other uses. The Next Generation Mobile Networks Alliance feels that 5G should be rolled out by 2020 to meet business and consumer demands.[2] In addition to simply providing 32.tional 5G development projects have yet to be officially yond those defined in the current 4G standards are un. often for higher data rates and higher frequen• Signalling efficiency enhanced cies but shorter transmission ranges. The METIS overall technical goal is to provide a system concept that supports 1000 times higher mobile system spectral efficiency as compared with current LTE deployments. physical layer net bitrates for short-distance communication).[7] In addition. lower infrastructure deployment costs. In 2012. the millimeter wave of access and backhaul. heterogeneous wireless netIn 2008. previous mobile generations have implied substantial increase in peak bitrate (i. and the network layer. unplanned disthe world’s first research centre set up specifically for 5G tribution of radio base stations and hot spots). a new EU project named CROWD (Connectivity management for eneRgy Optimised Wire32. In January 2013.[8] From users’ point of view. ized through an open IT platform based on a cloud infrasA converged fibre-wireless network that uses. It chitecture for Small Cells based on Cloud Networks). Those are the objectives in several of the research papers and projects below. with a focus on 5G wireless research as well as in the medical and computer science fields. Spain): i-JOIN (Interworking and JOINt contiguous coverage over at least urban areas and gets the Design of an Open Access and Backhaul Network Arworld to the final frontier for true “wide area mobility”.[12] . heterogeneous backhaul. A super-efficient mobile network that delivers a better performing network for lower investment cost.3 Research & Development less Dense networks) was launched under the technical supervision of IMDEA Networks Institute. and implications for existing mobile networks. iJOIN aims for a joint design and optimisation first time for wireless Internet access.[11] per square meter). Wi-Fi). where RAN functionality is flexibly centralSpectrum Access. It didates across PHY. the South Korean IT R&D program of “5G works. under the lead of Neelie Kroes. The METIS 2020 Project is driven by several telecommunications companies. would require access to spectrum under 4 GHz perhaps iJOIN introduces the novel concept RAN-as-a-Service via the world’s first global implementation of Dynamic (RANaaS). in 2013.[13] In particular. integrating smallradio channels able to support data access speeds of up to cells. for example higher number of simultaneously connected devices. If 5G appears. higher versatility and scalability or higher reliability of communications. high bit rates in larger portions of the coverage area. Heterogeneity involves multiple diIn 2012.[14] linked to project METIS and focusing on the design of Green 5G Mobile networks. iJOIN would be more a “nomadic” service (like WiFi) rather will study the requirements. up to 1 Gbit/s to be offered by 4G. a research project funded by the Attentive Network (DAN) philosophy. lower latencies. The center is funded by the National Science Foundation and a board of 10 major wireless companies (as of July 2014) who serve on the Industrial Affiliates board of the center. NYU WIRELESS was established as a multidisciplinary research center. specifically 3GPP LTE-A. and aims at reaching world-wide consensus on the future global mobile and wireless communications system. from coverage radius to technologies (4G/LTE of a 5G Innovation Centre at the University of Surrey – vs. and reflects these prognoses. the European Commission. higher system spectral efficiency (data volume per area unit).3. The connection essentially comprises “short” ing. NYU WIRELESS has conducted and published channel measurements that show that millimeter wave frequencies will be viable for multi-Gigabit per second data rates for future 5G networks.32. called 5GrEEn. operation and management albands (20 – 60 GHz) so as to allow very wide bandwidth gorithms. than a wide area “mobile” service. sustainability and affordability aspects. the major difference from a user point of view between 4G and 5G techniques must be something else than increased peak bit rate. MAC. Additionally to the development of technology canwireless links on the end of local fiber optic cable.com[9] has recorded three very distinct 5G network visions having emerged by 2014: 123 In 2012. It addresses the mobile network operators pressing need to see the unit cost of data transport falling at roughly the same rate as the volume of data demand is rising. to deprojects sign sustainable networking and software solutions for the deployment of very dense. lower outage probability (better coverage). RESEARCH & DEVELOPMENT PROJECTS frequency bands suitable for land-mobile radio. to deployments (planned vs. another project has started. and centralized process10 Gbit/s.e. Here the goal is to develop guidelines for the definition of new generation network with particular care of energy efficiency.[10] European Union under the ICT Programme FP7 was A super-fast mobile network comprising the next gen. The project targets sustainability targeted in terms mobile communication systems based on beam-division of cost effectiveness and energy efficiency. and architectural elements. lower battery consumption.launched under the coordination of IMDEA Networks Ineration of small cells densely clustered together to give a stitute (Madrid. the UK Government announced the setting up mensions. higher number of supported devices. for the tructure. Very high multiple access and relays with group cooperation” was density means 1000x higher than current density (users formed. It would be a leap forward in efficiency based on the IET Demand In November 2012. GSMHistory. mobile research. committed 50 million euros for research to deliver 5G mobile technology by 2020. constraints. April 2013. May 2013. where also users could be potential cooperative nodes thanks to the use of direct device-to-device (D2D) communications. also expected to be provided by future 4G releases. multiple wireless virtual networks operated by different service providers (SPs) can dynamically share the physical substrate wireless networks operated by mobile network operators (MNOs). wireless sensor networks and ubiquitous computing: The user can simultaneously be connected to several wireless access technologies and seamlessly move between them (See Media independent handover or vertical handover. WPAN.124 In September 2013.5G. Wi-Fi. With massive MIMO multiple messages for several terminals can be transmitted on the same time-frequency CHAPTER 32.[16] The company’s 5G research initiative does not include investment to productize 5G technologies for global telecom operators. A transmission point equipped with a very large number of antennas that simultaneously serve multiple users. In current research.[11] • Wireless network virtualization: Virtualization will be extended to 5G mobile wireless networks. this issue is addressed by cellular repeaters and macro-diversity techniques. started to work on dynamic provisioning and allocation under the emerging Cloud Radio Access Network (C-RAN). up to 90 GHz) for wireless backhaul and/or access (IEEE rather than ITU generations) • Pervasive networks providing Internet of things. NJ.[24][25][26] • Efficient support of machine-type devices to enable the Internet of Things with potentially higher numbers of connected devices. and many other peer-reviewed conference and journal papers. or any other future access technology. Robert Daniels. • Radio propagation and channel models for millimeter wave wireless communications may be found in IEEE papers: Millimeter Wave Mobile Communications for 5G Cellular: It Will Work!" in IEEE Access.” authored by Ted Rappaport. “Broadband MillimeterWave Propagation Measurements and Models Using Adaptive-Beam Antennas for Outdoor Urban Cellular Communications. • The usage of millimetre wave frequencies (e. In 5G. 5G resource.[17][18] 32. Since wireless network virtualization enables the sharing of infrastructure and radio spectrum resources.). These access technologies can be 2. network infrastructure can be decoupled from the services that it provides. where differentiated services can coexist on the same infrastructure. as well as novel applications such as mission critical control or traffic safety. Chinese telecom equipment vendor Huawei said it will invest $600 million in research for 5G technologies in the next five years. including major global 60 GHz wireless local area network (WLAN) and personal local area network (WPAN) standards.21. in IEEE Trans. maximizing its utilization. In November 2013. requiring reduced latency and enhanced reliability. also known as group cooperative relay. 4G. and encompassing the option of a flexible usage of resources for uplink and downlink transmission in each cell. over 700 pages in length. the capital expenses (CapEx) and . covers technical areas regarding potential 5G technologies. or 5G mobile networks. R.g. the concept may be further developed into multiple concurrent data transfer paths. among other papers. achieved with the cooperation of different transmission points with overlapped coverage. W Heath. Huawei will be testing 5G technology in Malta.4 Research Key concepts suggested in scientific papers discussing 5G and beyond 4G wireless communications are: The IEEE Journal on Selected Areas in Communications published a special issue on 5G . With wireless network virtualization. the Cyber-Pysical System (CPS) Lab at Rutgers University. Consequently. maximizing beamforming gain while minimizing interference. and James Murdock. containing. They have shown that the dynamic demand-aware provisoning in the cloud will decrease the energy consumption while increasing the resource utilization. Antennas and Propagation. IEEE 802.[19] IEEE Spectrum has a story about millimeter wave wireless communications as a viable means to support 5G in its September 2014 issue. See also multihoming.[27] • Multi-hop networks: A major issue in beyond 4G systems is to make the high bit rates available in a larger portion of the cell.[15] They have also implemented a real testbed for feasibility of C-RAN and developed new cloud-based interference cancellation techniques.see the issue for June 2014. Pearson/Prentice Hall has released a comprehensive text on “Millimeter Wave Wireless Communications. Jr. Vol.. 3G. especially to users in an exposed position in between several base stations. Their project is funded by National Science Foundation.[20][21][22][23] • Advanced interference and mobility management. the option of direct device-to-device transmission and advanced interference cancellation techniques. 1. a comprehensive survey of 5G enabling technologies and solutions. • Massive Dense Networks also known as Massive Distributed MIMO providing green flexible small cells 5G Green Dense Small Cells. This text. Both aiming at having a better understanding of future technical aspects of mobile communications towards the definition of the next generation mobile.[29][30] See also the IEEE 802. ITU-R). Rohde & Schwarz. comprehensive wireless-based web applications that include full multimedia capability beyond 4G speeds. the UK’s University of Surrey secured £35M for a new 5G research centre. where a visiting care-of mobile IP address is assigned according to location and connected network.[28] • Cognitive radio technology. while MNOs can produce more revenue by leasing the isolated virtualized networks to them and evaluating some new services.[27] • Wearable devices with AI capabilities.[33] • World wide wireless web (WWWW). with aspirations for the new technology to be ready within a decade. Wireless mesh network (WMN) or wireless grids. This will be done by initiating and addressing work in relevant global fora (e. and.[38] • Also on November 2012. i. HISTORY operation expenses (OpEx) of wireless (radio) access networks (RANs). • Vandermonde-subspace frequency division multiplexing (VFDM): a modulation scheme to allow the co-existence of macro-cells and cognitive radio small-cells in a two-tiered LTE/4G network. Fujitsu Laboratories Europe. Telefonica Europe. also known as smartradio: allowing different radio technologies to share the same spectrum efficiently by adaptively finding unused spectrum and adapting the transmission scheme to the requirements of the technologies currently sharing the spectrum.[3] 125 32. can be reduced significantly. the South Korean IT R&D program of “5G mobile communication systems based on beamdivision multiple access and relays with group cooperation” was formed.[11] • On 8 October 2012.5 History • In April 2008.g. as well as core networks (CNs). .[31] • IPv6. cooperative diversity and flexible modulation. Moreover.[34][35][36][37] • On 1 November 2012. rather than radio waves like Wi-Fi. Samsung. METIS will play an important role of building consensus among other external major stakeholders prior to global standardization activities. the iJOIN EU project was launched. This dynamic radio resource management is achieved in a distributed fashion. joint funded between the British government’s UK Research Partnership Investment Fund (UKRPIF) and a consortium of key international mobile operators and infrastructure providers –including Huawei.22 standard for Wireless Regional Area Networks. METIS intends to ensure an early global consensus on these systems. In this sense. According to Günther Oettinger.. • In February 2013. mobile virtual network operators (MVNOs) who may provide some specific telecom services (e. as well as in national and regional regulatory bodies.[3] • Real wireless world with no more limitation with access and zone issues. Spain). 3G and 4G) standards[32] • Li-Fi (a portmanteau of light and Wi-Fi) is a massive MIMO visible light communication network to advance 5G. • Dynamic Adhoc Wireless Networks (DAWN). ITU-R Working Party 5D (WP 5D) started two study items: (1) Study on IMT Vision for 2020 and beyond. such as the radio wave spectrum. over-the-top services) can help MNOs attract more users. (2) Study on future technology trends for terrestrial IMT systems. combined with smart antennas. VoIP. which is of key importance for taking advantage of limited and strategic resources. the European Commissioner for Digital Economy and Society (2014–19). video call. and Aircom International– it will offer testing facilities to mobile operators keen to develop a mobile standard that uses less energy and radio spectrum whilst delivering faster than current 4G speeds.[3] such as smartwatches and optical head-mounted displays for augmented reality • One unified global standard.g.[3] essentially identical to Mobile ad hoc network (MANET). Oettinger further described it as “the essential resource for the wireless connectivity of which 5G will be the main driver”. Li-Fi uses light-emitting diodes to transmit data.e. focusing on “small cell" technology. the EU project “Mobile and wireless communications Enablers for the Twentytwenty Information Society” (METIS) starts its activity towards the definition of 5G. NASA partnered with Geoff Brown and Machine-to-Machine Intelligence (M2Mi) Corp to develop 5G communications technology[5] • In 2008.32. and relies on software-defined radio.5.[27] • User centric (or cell phone developer initiated) network concept instead of operator-initiated (as in 1G) or system developer initiated (as in 2G.[39] iJOIN was selected by the European Commission as one of the pioneering 5G research projects to showcase early results on this technology at the Mobile World Congress 2015 (Barcelona. “an innovative utilization of spectrum” is one of the key factors at the heart of 5G success. Nokia and Samsung. Huawei announced plans to invest a minimum of $600 million into R&D for next generation 5G networks capable of speeds 100 times faster than modern LTE networks. NTT (Nippon Telegraph and Telephone). Hershey. 5G • On 22 June 2015.[42] CHAPTER 32. India and Israel have agreed to work jointly on development of fifth generation (5G) telecom technologies. 522–532. A pilot network will be available by the end of 2017.pdf [3] Akhtar.7 References [1] http://www. Dresden university inaugurates a 5G laboratory in partnership with Vodafone.[47][48] • On 19 November 2014.0 32.126 • On 12 May 2013. ISBN 978-1-60566-014-1. NTT DoCoMo start testing 5G mobile networks with Alcatel Lucent. United States: IGI Global. NEC. CROWD was included in the list of demonstrations at the European Conference on Networks and Communications (EuCNC) organized by the EC in June 2014 (Italy). [4] Emerging Wireless Technologies.techrepublic.[50] • 1G • 2G • 3G • Femtocell • Head-mounted display (HMD) • IEEE P1905 hybrid networking • OpenFlow/OpenRadio for sharing backhaul. Since the general model of 10 years to develop a new mobile system is being followed. Retrieved 27 September 2013. President Recep Tayyip Erdoğan announced Turkey might cancel 4G tender and move straight to 5G from 3G directly in two years. Fujitsu. Archived from the original (pdf) on 2 June 2011. Shakil (August 2008) [2005]. Standards. Ericsson.[51] 32. The core technology has a maximum speed of tens of Gbit/s (gigabits per second). and Deployment (Second ed. IMDEA Networks Institute is the project coordinator. Retrieved 2 June 2011. just in time for the 2018 World Cup. Samsung Electronics stated that they have developed the world’s first “5G” system. Pagani.[49] • On 28 April 2015. • Ka band • At the end of September 2014.[40][41] • In July 2013.ch070. that timeline would suggest 4G should be operational some time around 2011. the EU research project CROWD was selected by the European Commission to join the group of “early 5G precursor projects”.056 Gbit/s to a distance of up to 2 kilometres.[46] • On October 2014.[45] • IEEE 802.with the use of an 8*8 MIMO. the same company to launch world first 5G network in Japan. Margherita.). doi:10.[44] • 4G • On 8 May 2014. the research project TIGRE5CM (Integrated technologies for management and operation of 5G networks) is launched with the aim to design an architecture for future generation mobile networks.6 See also • On 1 October 2013. SafeCom (a US Department of Homeland Security program). .com/article/ does-the-world-really-need-5g [2] https://www. These projects contribute to the early showcasing of potential technologies for the future ubiquitous. Pennsylvania. ultrahigh bandwidth “5G” infrastructure. the transfer speeds for the “5G” network sent data at 1. ed. A look into the future of wireless communications – beyond 3G (PDF). wins Minister of Internal Affairs and Communications Award at CEATEC for 5G R&D efforts[43] • List of mobile phone generations • On 6 November 2013. Huawei and SingTel announced the signing of a MoU to launch a joint 5G innovation programme.org/uploads/media/NGMN_5G_ White_Paper_V1_0.4018/978-1-60566-014-1. Greek government announced to Euro-group council talks that potential licencing 5G and 4G technology would offer 350 million euros earnings. In testing.0 • Web 3. pp. 2G-5G Networks: Evolution of Technologies. as a result they were criticized for misleading European leaders in producing potential earnings from a technology that is supposed to roll-out after 2020. • Picocell • Ultra-wideband (UWB) • Virtual retinal display • Web 2.11u authentication • In June 2014. • In November 2014. based on the SDN (Software Defined Networking) paradigm.ngmn. it was announced that Megafon and Huawei will be developing a 5G network in Russia. No. Wireless Personal Communications.Towards Green 5G Mobile Networks”. Mérouane Debbah (July 2011). 11. Choi. Retrieved 27 September 2013. Cardoso.” IEEE Journal on Selected Areas in Communications. Zhang. “Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays”. 28.com/ 5g cell phone. Bell Labs. Mari Kobayashi. GSM History: History of GSM. Infoworld Newsletters / Networking. Baldemair. Ad Hoc Networks Elsevier 30: 128–143. Hoydis. IEEE Transactions on Wireless Communications. 9. 5g visions.. S. Balachandran (March 2013). G... Ericsson Research. Volume 57. 127 [21] T. IEEE Journal on Selected Areas in Communications. O. Hajisami. Europa. Vol.1082. Kouassi.htm [27] Abdullah Gani. I. vol. pp. Fodor. Vintage Mobiles. [7] “The METIS 2020 Project – Mobile and Wireless Communications Enablers for the 2020 Information Society” (pdf).C. doi:10. Buzzi. 15 January 2013. Gesbert. [14] “5GrEEn project webpage . ten Brink. [24] D. 24–30. vol. 2011 IEEE International .”.we have reached the channel limits”. “Wireless Network Virtualization: A Survey. G. Victor Croitoru. Tullberg. [8] “Interview with Ericsson CTO: There will be no 5G . Ghauri. E. [15] Pompili. 31. Simeone. Signal Processing Magazine. [17] http://www. user”. Retrieved 27 September 2013.eu.timesofmalta. REFERENCES [5] “NASA Ames Partners With M2MI For Small Satellite Development”. Larsson. 9. [10] “Demand Attentive Networks (DAN)". no. “Dynamic Provisioning and Allocation in Cloud Radio Access Networks (C-RANs)". “Optimal Resource Allocation in Coordinated Multi-Cell Systems”. Dahlman. no. Reciprocity-based cognitive transmissions using a MU massive MIMO approach.32.IEEE. Rosli Salleh. ISSN 1536-1276.Guildford. Deneire. 6. Lina Yang. IEEE Communications Surveys & Tutorials. H. Issue 2. Selen. [25] Emil Björnson. Viswanathan. 2013 [30] Cornelia-Ionela Badoi. Liang. 2. pp. Retrieved 27 September 2013. “The Future of Mobile Wireless Communication Networks” (pdf). Soong. WSEAS Transactions on Information Science and Applications archive. “Multi-cell MIMO cooperative networks: A new look at interference”. A. Retrieved 3 November 2014. 8. 32. H. Omar Zakaria (February 2009).huawei. Xichun Li.40. Prencipe (28 February 2003).. F. Cognitive radio. DNA India. F.L. “Evolving Wireless Communications: Addressing the Challenges and Expectations of the Future”. pp. [9] “what is 5g. “5G based cognitive radio”. [29] Loretta W. Retrieved 27 September 2013. “Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas”. W.K. [22] J.vol. 9. vol. S.60. 160–171. [16] http://pr. Abudulla Gani. [13] “Mobile communications: Fresh €50 million EU research grants in 2013 to develop '5G' technology”.G. G. Tufvesson. S. S. 441–464. Retrieved 27 September 2013. and J. [26] R.timesofmalta. Number 3. O. Marzetta (November 2010). pp. University of Surrey . NOW – The Essence of Knowledge. Hariharasudhan (March 2015). 26 February 2013. E.1007/s11277-010-0082-9. Retrieved 27 September 2013. Dario..com/ articles/view/20150714/local/ updated-agreement-for-5g-technology-testing-signed. Hanly. Eduard Jorswieck (2013). Retrieved 27 September 2013. Alcatel-Lucent. Marco Maso.com/en/news/hw-314871-5g. Retrieved 27 September 2013. no. International Conference on Communication Software and Networks. Abolfazl. Mobile Networks.7. IEEE Journal on Selected Areas in Communications. IDG Group. Persson. Richard Yu (2014). A. 576618# [28] C.. [20] B. 1380–1408. S. Alcatel-Lucent. “Massive MIMO in the UL/DL of Cellular Networks: How Many Antennas Do We Need?". no. no. Lozano. “What will 5G be?. Retrieved 27 September 2013. a 5g device. L. 23 May 2011. ISBN 978-07695-3522-7. Omar Zakaria. Retrieved Jan 2013. IEEE Vehicular Technology Magazine. [12] “5G Innovation Centre”. METIS. Volume 6. pp. [19] J. L. W. T. Shamai. Foundations and Trends in Communications and Information Theory. ISSN 1790-0832. F. EIT ICT Labs. 6 July 2013. 113–381. 56– 61.1. [11] The Korean IT R&D program of MKE/IITA: 2008-F004-01 “5G mobile communication systems based on beam-division multiple access and relays with group cooperation”. [23] Rusek. Mildh. Neeli Prasad. D. Marzetta. K. Parkvall. 1065 . vol. Edfors. Huang. [6] Xichun Li. pp. 3590–3600. “Tomorrow’s [18] http://www.. 1. Retrieved 27 September 2013. “Orthogonal LTE twotier Cellular Networks” (pdf). 576179 Retrieved 27 September 2013. 2-3. “Multi-Bandwidth Data Path Design for 5G Wireless Mobile Internets”. Retrieved 27 September 2013.30. could forever articles/view/20150712/local/ alter the power balance from wireless service provider to pm-thanks-sai-mizzi-as-chinese-telecoms-giant-prepares-to-test-5g-in. Yu (December 2010). M. IEEE International Conference on Communications (ICC). EURECOM. Debbah (February 2013). Andrews. no. Buon Kiong Lau. S. Y. Nor Badrul Anuar (February 2009). vol. pp. Bell Labs. pp. [31] Leonardo S. Ramjee Prasad. Retrieved 27 September 2013. Hanly. June 2014. Some Research Issues and Challenges”. CNews. [37] Philipson. 19 November 2014. 25 September 2014. ". University of Surrey. 19 November 2014. Reuters. [47] ""Мегафон" и Huawei начинают создание сети 5G”. [35] “The University Of Surrey Secures £35M For New 5G Research Centre”. Retrieved 19 November 2014. [39] “Speech at Mobile World Congress: The Road to 5G”. Telecompaper. Retrieved 28 April 2015. Retrieved 11 November 2013. University Sv. [40] " . Some of the world biggest telecoms firms have joined forces with the UK government to fund a new 5G research centre. Cambridge Wireless. They say the new tech could be ready within a decade. to be based at the University of Surrey.8 External links • 5G Fifth generation Technology 5G Technology Technical Paper . 20 November 2013 [34] Kelly. March 2015. TechRadar. Retrieved 27 September 2013. 8 October 2012. [46] “Dresden university to inaugurate 5G laboratory”. Alice (9 October 2012). Retrieved 15 October 2012. while delivering faster speeds than current 4G technology that’s been launched in around 100 countries. 5G Conference on Communications (ICC). Retrieved 25 July 2013. 25 July 2013. November 2012. [36] “5G research centre gets major funding grant”. [48] “Huawei plans to trial 5G mobile internet at the 2018 World Cup”. 8 October 2012. cellular-news. BBC News Channel. Retrieved 15 October 2012. [45] “Japan’s NTT DoCoMo to Start Testing 5G Mobile Networks”. Retrieved 27 September 2013. The Times Of India. The facility.Kenya”. switch to 5G: newspaper”. Retrieved 25 September 2014. [51] http://www. Retrieved 7 January 2013. Kiril i Metodij. “Britain aims to join mobile broadband leaders with £35m '5G' research centre”. [32] Toni Janevski (10–13 January 2009). Jochan (6 November 2013). 12 May 2013. [33] National Instruments and the University of Edinburgh Collaborate on Massive MIMO Visible Light Communication Networks to Advance 5G. Retrieved 2014-0508. Spencer (13 October 2012). Consumer Communications and Networking Conference. “Huawei plans $600m investment in 10Gbps 5G network”. “BBC Click Programme . [41] “General METIS presentations available for public”. will offer testing facilities to operators keen to develop a mobile standard that uses less energy and radio spectrum. 3 October 2013. “5G Mobile Phone Concept”. 2014-05-08. pp. Retrieved 15 October 2012. [50] “Turkey minister says might cancel 4G tender. 19 November 2014.capital. Retrieved 21 November 2014.5 Retrieved 12 May 2013. Facility of Electrical Engineering & Information Technology. Retrieved 19 November 2014. [49] “SingTel and Huawei Ink MOU to Launch 5G Joint Innoviation Program”. BBC News (BBC News Online). [44] Embley. including several British cities. Retrieved 3 October 2013. Huawei. 1–5. 28 April 2015.128 CHAPTER 32. The Daily Telegraph (London: Telegraph Media Group). The Independent (London). [42] “India and Israel have agreed to work jointly on development of 5G”. [43] “DoCoMo Wins CEATEC Award for 5G”.gr/story/3035583 32. [38] “METIS projet presentation” (PDF). 2009 6th IEEE [1-4244-2308-2]. To draw the raster. the drive electronics synchronize the scanners real image is either viewed directly or. a horizontal scanner moves the beam to draw a row of pixels.[1] cal system and the resulting virtual image is viewed. The position on the retina a display technology that draws a raster display (like a where the eye focuses the spot is determined by the angle television) directly onto the retina of the eye. focused through the eye. tern. the source can be modulated directly. an image is formed directly 33. as in the case with and intensity modulator with the incoming video signal most head-mounted displays. or A virtual retinal display (VRD). defects in the eye’s optical system. The use of a coherent source (such as a laser diode) allows the system to draw a diffraction limited spot on the retina. A block diagram of the other display devices VRD is shown in the Figure above.in such a manner that a stable image is formed. The intensity modulated moving spot. the seen image could be augmented with other information and bright- 129 . angle-ofview and display brightness. The lens and cornea of the eye will then focus the beam nal scan display (RSD) or retinal projector (RP). draws 33. is on the retina. but also to the quality of the display and the environment in which the display is located. To create an image with the VRD a photon source (or three sources in the case of a color display) is used to generate a coherent beam of light. In a conventional display a real image is produced. This angle is determined sees what appears to be a conventional display floating in by the scanners and is continually varying in a raster patspace in front of them. A variety of scan patterns are possible. The vertical scanner then moves the beam to the next line where another row of pixels is drawn.2 Comparison to LCDs and on the retina of the user’s eye.1 Mechanics an image on the retina. such as ambient brightness. An image that is generated electronically is viewed with the optical system of the eye. The brightness of the focused spot is determined by the intensity modulation of the light beam. at the proper position on the retina. in Liquid crystal displays (LCDs) currently are the primary active display devices for the presentation of entertainment and information. The image you see is subject not only to the quality of the optical system of the eye. The resulting modulated beam is then scanned to place each image point. as in the case of a laser diode. With a VRD. or pixel. forming a spot. The scanner could be used in a calligraphic (vector) mode. If the source has enough modulation bandwidth. as well as the problems of the display environment. In a VRD no real image is ever produced.in a raster mode. The modulation can be accomplished after the beam is generated. projected through an opti. such as damaged cornea and lens and reduced retinal sensitivity could be bypassed. The eye’s persistence allows the image to appear continuous and stable. which the lines that form the image are drawn directly. the optical beam must be properly projected into the eye. The user at which light enters the eye. also known as a reti. much like standard computer monitors or television. Additionally. The goal is for the exit pupil of the A diagram showing the workings of the virtual retinal display VRD to be coplanar with the entrance pupil of the eye. The light beam is intensity modulated to match the intensity of the image being rendered. After scanning. The projection moves the virtual image to a distance that allows the eye to focus comfortably. The Finally.Chapter 33 Virtual retinal display Not to be confused with Retina Display. Use of the raster method of image scanning allows the VRD to be driven by standard video sources. Rather. It is the wavefront curvature which determines where the eye must focus in order to 33. it ited by the aberrations in the lens of the eye and by the could project an animated. far better than the best • Bypasses many of the eye’s optical and retinal de. The curvature of the wavefront as it enters the pupil can be used as part of a wearable computer system. They share some of the same A point source emits waves of light which radiate in everdisadvantages however. the • Potentially very small and lightweight. approaching that of human vision Only recently a number of developments have made a • Full color with better potential color resolution than true VRD system practical. Limited brightness made them useful only in indoor settings grees as well. ing a defocused image directly in front of the user’s eye This approach produces several advantages over conven. requiring some sort of optics to expanding circles about the point. Eye tracking is currently used in advanced still and video cameras for focusing on the object In the past similar systems have been made by projectyou wish to record.[2] Later work at the University of Washington in the Human Interface Technology Lab re33. In this role VRDs have the potential advantage of being much smaller than existing understanding the VRD. normally in the form of large glasses.be laid over one’s view of real objects. and the fact that the image would appear focused • Large field and angle of view. send the image into the eye. typically similar to the sunlooking at the source. the VRD If the eye is an infinite distance from the source. The lens of the eye images the system scanning light into only one eye allows images to plane waves to a spot on the retina.4 History systems for input. will see a small portion of the waveglasses system used with previous technologies. If applied to video games. for instance.[3] is determined by the distance of the eye from the source.130 CHAPTER 33. The user focused their eyes on the background. in 1986. and adaptive optics • Brightness and contrast ratio sufficient for outdoor have allowed systems to dynamically correct for irreguuse larities in the eye (although this is not always needed). Using Rayleigh’s cri.on a small “screen”.5 Advantages create a sharp image. gamers could have an enhanced sense of reality that liquid-crystal-display glasses could never provide. The spot size is lim. It is the angle engine or the human body. The disadvantage of these systems was the limited area covered by the “screen”. The result is a high-resolution screenless display with ex• True stereo 3D display with depth modulation cellent color gamut and brightness. X-ray-like image of a car’s diffraction of the light through the pupil. greater than 120 de. For example. at which the plane wave enters the eye that determines where on the retina the spot is formed. less curvature is exhibited by the wavefronts. VRD system also can show an image in each eye with an enough angle difference to simulate three-dimensional scenes with high fidelity. Apart from the advantages mentioned before. Neglecting the aberrations in the lens of the eye. plane waves enter the pupil. glasses high weight of the small televisions used to project the mountable display. VIRTUAL RETINAL DISPLAY ness of the system doesn't affect the image formed on the angular resolution = retina 1. follows:[1] and as such it is more efficient for mobile devices that are . one because the VRD can refocus dynamically to simulate can determine the limit of the eye’s resolution based near and distant objects with a far superior level of reon diffraction through the pupil.television technologies. In particular the development of high-brightness LEDs have made the displays bright conventional displays enough to be used during the day.22λ D Although the VRD is an output device.only if the user was focusing at a particular “depth”. • High resolution.3 Eye sulted in a similar system in 1991. Two points focus to different spots on the retina because the wavefronts from the points are intersecting the pupil at different angles.alism. television-based systems. Most of the research into VRDs to date has been in combination with variA brief review of how the eye forms an image will aid in ous virtual reality systems. where the tional display devices:[1] screen appeared to be floating. teria the minimum angular resolution is computed as This system only generates essentially needed photons. fects The VRD was invented by Kazuo Yoshinaka of Nippon Electric Co. It also front. The pupil of an eye. As the source moves farther away. the technology lends itself to augmentation with eye tracking or eyegaze 33. Damage to the eye could result if the laser stopped scanning with the beam focused on a single point. Brother. but not so simple with a LED. University of Washington. To ensure that VRD device is safe. Furness III. and does not rest on a single point for an extended period of time. as they are of a far lower intensity than those that are deemed hazardous to vision. Human Interface Technology Laboratory. [2] DISPLAY DEVICE published 1986-09-03 (Japanese publication number JP61198892) 33. 2010). light must be collected and focused down in a point.6.7. Johnston.1 Safety It is believed that VRD based Laser or LED displays are not harmful to the human eye. This problem is overcome in VRD systems as they are scanned. 33. 2011-08-24. Retrieved 2013-10-13.8 See also • Smartglasses • Optical head-mounted display • Augmented Reality • Head-mounted display • Head-up display • List of emerging technologies • Visual prosthetic • Physics of the Future • Google Glass • Magic Leap • Avegant Glyph 33.uk.5. Ph.com. MANUFACTURERS AND COMMERCIAL USES only designed to serve a single user.1 [4] Thomas Ricker (September 17. Engadget. 131 33. Richard S. and Thomas A. This kind of device is also less vulnerable to TEMPEST type side-channel leak of information. Retrieved 2013-10-13. rigorous safety standards from the American National Standards Institute and the International Electrotechnical Commission were applied to the development of such systems.D.6 Utilities [3] Virtual Retinal Display (VRD) Group 33. This can be prevented by an emergency safety system to detect the situation and shut it off. Military utilities VRDs have been investigated for military use as an alternative display system for Helmet Mounted Displays.5. Michael Tidwell. Optical damage caused by lasers comes from its tendency to concentrate its power in a very narrow area.[4] able to see the image displayed. 2011 Brother announces commercialization of “AiRScouter” see-through type head-mounted display”. Advances in LED technology will be needed to further concentrate the light coming from these devices. [1] The Virtual Retinal Display – A Retinal Scanning Imaging System.7 Manufacturers and commercial uses Another important advantage is privacy: Only the in• Brother Industries from Japan exhibited VRD systended user (in the usual case of single-user devices) is tem named AirScouter in September 2010. . the beam is spread over a greater surface area. It was subsequently commercialised in August 2011. [6] “AiRScouter – Head Mounted Display – Brother UK”. 2010-10-20.[5][6] 33. [5] “August 24. Brother. David Melville. However no VRD-based system has yet reached operational use and current military HMD development now appears focused on other technologies such as holographic waveguide optics. This is an inherent property with lasers. “Brother’s AirScouter floats a 16-inch display onto your eye biscuit (video)".33.2 LED enhancements 33.9 References Although the power required is low. constantly shifting from point to point with the beams focus.co. A VRD could potentially use tens or hundreds of times less power for Mobile Telephone and Netbook based applications. • AirScouter VRD system from Brother Industries – Sep 2010 (Engadget) • YouTube video for AirScouter VRD system from Brother Industries – Sep 2010 CHAPTER 33.10 External links • Animations of how a VRD works • Lewis. IEEE Spectrum. (May 2004). VIRTUAL RETINAL DISPLAY . John R. “In the Eye of the Beholder”.132 33. Over a dozen CDMA operators have migrated to GSM including operators in Mexico. D-AMPS (TDMA-based. so more cells had to be placed in the same amount of space.a. however. 2G • IS-136 a. used exclusively in Japan over their predecessors were that phone conversations were digitally encrypted.Chapter 34 2G For other uses. and connect the radio towers (which listen to the handsets) to disadvantages the rest of the telephone system. Today accounts for over 80% of all subscribers around the world. and 2G introduced data Canada services for mobile. picture mesprevalent in the Americas but most have migrated sages and MMS (multi media messages). Second generation 2G cellular telecom networks were commercially launched on the GSM standard in Finland by Radiolinja (now part of Elisa • PDC also know as JDC (Japanese Digital Cellular) Oyj) in 1991. 2G services are frequently referred as Personal CommuAfter 2G was launched. Today accounts for about 17% of all subscribers globally. 2. was once to provide the services such as text messages.k. used in the Americas and parts of Asia. advantages. 2G (or 2-G) is short for second-generation wireless telephone technology. • IS-95 aka cdmaOne (CDMA-based.[1] Three primary benefits of 2G networks (TDMA-based). proprietary network used by more efficient on the spectrum allowing for far greater Nextel in the United States and Telus Mobility in mobile phone penetration levels. 3G. see 2G (disambiguation).1 2G technologies 2G technologies can be divided into Time Division Multiple Access (TDMA)-based and Code Division Multiple Access (CDMA)-based standards depending on the type of multiplexing used. Using digital signals between the handsets and the towers increases system capacity in two key ways: 34. or PCS.2G Data Transmission Capacity:[3] 133 . allowing more calls to be transmitted in same amount of radio bandwidth.75G. 2G systems were significantly • iDEN (TDMA-based). commonly technologies enabled the various mobile phone networks referred as simply 'TDMA' in the US). This meant that cells had to be smaller. originally from Europe but used in most of the world outside North America. systems were retrospectively dubbed 1G.2 Capacities. India and Australia. starting with SMS text messages. 2G has been superseded by newer technologies such as 2. This was possible because cell towers and related equipment had become less expensive. radio signals on 2G networks are digital. sages sent over 2G are digitally encrypted. and 4G. the previous mobile telephone nications Service. allowing for the transfer of data in such a way that only the intended receiver can receive and read it. While radio signals on 1G networks are analog. commonly re. All text mesto GSM. Both systems use digital signaling to 34. in the United States. Over 60 GSM operators are also using CDMA2000 in the 450 MHz frequency band (CDMA450). • The digital systems were designed to emit less radio power from the handsets.[2] • Digital voice data can be compressed and multiplexed much more effectively than analog voice encodings through the use of various codecs. 2G networks are still 34.5G. The main 2G standards are: • GSM (TDMA-based).1 Capacity used in many parts of the world.2. ferred as simply CDMA in the US). [4] 34. while digital has occasional dropouts. dig. The shut down will be complete by the end of 2016.1 2.The • Analog has a smooth decay curve.75G services because they are several 1 April 2017 times slower than present-day 3G service. by dropping calls or being unintelligible. though. you the evolution of GSM networks to 3G occurred with the have a theoretical transfer speed of max.call and a disadvantage. the lossy compression they use reduces their quality.3 Evolution 2G networks were built mainly for voice services and 34. CDMA2000 networks similarly evolved through the introduction of 2. analog will experience static. 50 kbit/s introduction of General Packet Radio Service (GPRS). Enhanced GPRS (EGPRS). As conditions worsen. as an extension on top of standard GSM.2 Disadvantages GPRS networks evolved to EDGE networks with the introduction of 8PSK encoding.5G or 2.5G (GPRS) 2.4. exjagged steppy one. The first major step in Various carriers such as AT&T have made announcements that 2G GSM technology in the United States is in the process of being shut down so that carriers can reclaim those radio bands and re-purpose them for future technology needs. will sound better. you have a theoretical transfer speed of max. Talking on a digital cell phone.4. but digital has a 2G digital service provided very useful feature like.Singtel. but is mostly not a problem on 2G systems deployed on lower frequencies.4.2 2. 34. 2014. EDGE was deployed on GSM networks beginning in 2003—initially by AT&T in the United States.134 CHAPTER 34. or IMT Single Carrier (IMT-SC) is a backward-compatible digital mobile phone technology that allows improved data transmission rates. • In less populous areas. which was shut down on September 30. generally holding a call longer and allowing at least 34. lic to be 2.3. a caller hears less of the tonality of Sasktel announced that it would be shutting down its someone’s voice.4 United States 34. National regulations differ greatly among countries which dictate where EDGE is standardized by 3GPP as part of the GSM fam2G can be deployed.5G ("second and a half generation") is used to describe 2G-systems that have implemented a packetswitched domain in addition to the circuit-switched domain. All 2G GSM devices will lose service at some point between now and the end of 2016. Under slightly worse conditions.34. and short messaging. M1 and StarHub will cease 2G services effective [8] [9] [10] . This can be both an advantage pended capacity and unique service such as caller ID. meaning that the range of 34. but are considered by the general pub.4 2G Shut Down ital will start to completely fail.4.1 Australia some of the audio transmitted to be understood.3 Advantage Optus announced that they will shut down their GSM network in April 2017. while analog slowly gets worse.3. It does not necessarily provide faster services because bundling of timeslots is used for circuit-switched data services (HSCSD) as well.5G • With EDGE (Enhanced Data Rates for GSM Evolution). the weaker digital signal transmitted by a cellular phone may not be sufficient to reach a cell tower. 34.3 Singapore slow data transmission (defined in IMT-2000 specification documents). 1 Mbit/s (500 kbit/s in practice).[7] 34.2. ily and it is an upgrade that provides a potential threefold increase in capacity of GSM/GPRS networks. (40 kbit/s in practice).75G (EDGE) 34. Telstra announced that they will shut down their GSM network by the end of 2016. [5] • While digital calls tend to be free of static and background noise. Enhanced Data rates for GSM Evolution (EDGE). Under good conditions.2 Canada sound that they convey is reduced.[11] .[6] starting with its EV-DO network. 2G • With GPRS (General Packet Radio Service). This tends to be a particular problem on 2G systems deployed on higher frequencies. digital forwarding. CDMA networks in 2015 or early 2016.2. telstra.en. 2014.au/article/581224/ optus-shut-down-2g-network-2017/ [6] Addressing the demand for faster data [7] beginning with its EV-DO network.SaskTel Turning Down EV-DO Data Service [8] http://info. 2G GSM radios must be replaced by newer generation radios to avoid service outages. Retrieved December 23. [3] http://support. [2] “CDMA Worldwide”. also known as 0G • 1G • 3G • 4G • 5G • 2G spectrum scam.sg/AboutM1/NewsReleases/ 2015/Singapore%20to%20cease%202G%20services% 20from%20April%202017.singtel.computerworld. April 20.aspx [10] http://www.be/app/answers/detail/a_id/ 13580 [4] http://exchange.com/about-us/news-releases/ singapore-cease-2g-services-april-2017 [9] https://www. Retrieved December 23.marketwatch. India 34.html [11] http://www.m1. 2004. 2009.com/2GSunset/Overview 135 .5 See also • List of mobile phone generations • Mobile radio telephone.starhub.[12] 34. Archived from the original on 30 January 2010.6.com.telguard.6 References [1] “Radiolinja’s History”.com/story/ att-to-shut-down-2g-network-by-2017-2012-08-03 [12] http://www.com. 2009.com.belgacom. REFERENCES This shut down is having a notable impact on the electronic security industry where many 2G GSM radios are in use for alarm signal communication to Central Station dispatch centers.com/about-us/newsroom/2015/june/ singapore-to-cease-2g-services-from-april-2017. which was shut down on September 30.34.au/2014/07/23/ its-time-to-say-goodbye-old-friend/ [5] http://www. ITU later decided that LTE together with the aforementioned technologies can be called 4G technologies. increasing the capacity and speed using a different radio interface together with core network improvements. due to marketing pressures and the significant advancements that WiMAX. LTE. an abbreviation for Long-Term Evolution. However. The goal of LTE was to increase the capacity and speed of wireless 4G sign shown in notification bar on an Android-based smart. com- and data terminals. It is based on the GSM/EDGE and UMTS/HSPA network technologies. LTE (as specified in the 3GPP Release 8 and 9 document series) does not satisfy the technical requirements the 3GPP consortium has adopted for its new LTE-Advanced standard.Chapter 35 LTE (telecommunication) “Long-term evolution” redirects here. see Evolution and E. For the biological concept. Adoption of LTE technology as of December 7.data networks using new DSP (digital signal processing) phone. 2014 Countries and regions with commercial LTE service Countries and regions with commercial LTE network deployment on-going or planned Countries and regions with LTE trial systems (pre-commitment) Although marketed as a 4G wireless service.[1][2] The standard is developed by the 3GPP (3rd Generation Partnership Project) and is specified in its Release 8 document series. HSPA+ and LTE bring to the original 3G technologies.[5][6] 35.[4] To differentiate LTE Advanced and WiMAX-Advanced from current 4G technologies. with minor enhancements described in Release 9. The different LTE frequencies and bands used in different countries will mean that only multi-band phones will be able to use LTE in all countries where it is supported. However other nations and companies do play an active role in the LTE project.[3] The LTE Advanced standard formally satisfies the ITU-R requirements to be considered IMT-Advanced. ITU has defined them as “True 4G”.1 Overview See also: LTE timeline and List of LTE networks LTE stands for Long Term Evolution[7] and is a registered trademark owned by ETSI (European Telecommunications Standards Institute) for the wireless data communications technology and a development of the GSM/UMTS standards. The requirements were originally set forth by the ITU-R organization in its IMT-Advanced specification. coli long-term evolution experiment. A further goal was the remonly marketed as 4G LTE. LTE is the natural upgrade path for carriers with both GSM/UMTS networks and CDMA2000 networks. is a standard for wireless design and simplification of the network architecture to communication of high-speed data for mobile phones an IP-based system with significantly reduced transfer 136 . techniques and modulations that were developed around the turn of the millennium. The IP-based network architecture. each E-UTRA cell will support up to four times the data and voice capacity supported by HSPA[21] ). known as the “LTE Rocket™ stick” then followed closely by mobile devices from both HTC and Samsung.4 MHz to 20 MHz and supports both frequency division duplexing (FDD) and time-division duplexing (TDD). the LTE/SAE Trial Initiative (LSTI) alliance was founded as a global collaboration between vendors and operators with the goal of verifying and promoting the new standard in order to ensure the global introduction of the technology as quickly as possible. 2011 offering the Sierra Wireless AirCard® 313U USB mobile broad- band modem.[18] Services are expected to commence in 2013. uplink peak rates of 75 Mbit/s and QoS provisions permitting a transfer latency of less than 5 ms in the radio access network. from 1. 2009 as a data connection with a USB modem. OVERVIEW 137 HTC ThunderBolt. LTE was first proposed by NTT DoCoMo of Japan in 2004.[20] The simpler architecture results in lower operating costs (for example. The LTE wireless interface is incompatible with 2G and 3G networks.[17] Initially. LTE has the ability to manage fast-moving mobiles and supports multi-cast and broadcast streams.35. The LTE services were launched by major North American carriers as well. Below is a list of countries by 4G LTE penetration as . Sprint and MetroPCS in the United States. Bell and Telus in Canada. CDMA operators planned to upgrade to rival standards called UMB and WiMAX. so that it must be operated on a separate radio spectrum. which was standardized in March 2011.[9][10] The LTE standard was finalized in December 2008. supports seamless handovers for both voice and data to cell towers with older network technology such as GSM. and studies on the new standard officially commenced in 2005. The evolution of LTE is LTE Advanced. au by KDDI in Japan. LTE supports scalable carrier bandwidths. but all the major CDMA operators (such as Verizon. SK Telecom in South Korea and China Telecom/China Unicom in China) have announced that they intend to migrate to LTE after all. Rogers Wireless was the first to launch LTE network on July 7.[19] The LTE specification provides downlink peak rates of 300 Mbit/s. 2011[13][14] both offered by MetroPCS and HTC ThunderBolt offered by Verizon starting on March 17 being the second LTE smartphone to be sold commercially.1. with the Samsung SCH-r900 being the world’s first LTE Mobile phone starting on September 21. UMTS and CDMA2000. called the Evolved Packet Core (EPC) and designed to replace the GPRS Core Network. the second commercially available LTE smartphone Telia-branded Samsung LTE modem latency compared to the 3G architecture. 2010[11][12] and Samsung Galaxy Indulge being the world’s first LTE smartphone starting on February 10.[15][16] In Canada. and the first publicly available LTE service was launched by TeliaSonera in Oslo and Stockholm on December 14.[8] In May 2007. • Support for MBSFN (Multicast-Broadcast Single Frequency Network). GSM/EDGE. exemplified by support for terminals moving at up to 350 km/h (220 mph) or 500 km/h (310 mph) depending on the frequency band. • Support for all frequency bands currently used by The LTE standard supports only packet switching with its all-IP network.62 miles) or even less.[24] • OFDMA for the downlink. 3 MHz. Five different terminal classes have been defined from a voice centric class up to a high end terminal that supports the peak data rates. and is a competitor for DVB-H-based TV broadcast. (W-CDMA has no option for other than 5 MHz slices.g. cdmaOne.6 GHz in EU) are used to support high speed mobile broadband. and when a voice • Support for cell sizes from tens of metres radius call is to be initiated or received. so with the adoption • Increased spectrum flexibility: 1. should coverage be unavailable. 30 km (19 miles) having reasonable vide services quickly.4 Mbit/s depending on the user equipment category (with 4×4 antennas using 20 MHz of spectrum). and.[22][23] 35. This feature can deliver services such as Mobile TV using the LTE infrastructure. higher frequency bands (such as 2. it will fall back to (femto and picocells) up to 100 km (62 miles) rathe circuit-switched domain. All terminals will be able to process 20 MHz bandwidth. In this case. Its main features are: • Peak download rates up to 299. carriers will have to re-engineer their voice call MHz. Voice calls in GSM. • Packet switched radio interface. as it transits from the existing UMTS circuit + packet switching combined network. UMTS and CDMA2000). UMTS and IMT systems by ITU-R. Users can start a call or transfer of data in an area using an LTE standard. SC-FDMA for the uplink to conserve power. cell sizes may be 1 km (0.3 Voice calls • Improved support for mobility. CDMA2000 are circuit switched..6 Mbit/s and upload rates up to 75. lower latencies for handover and connection setup time than with previous radio access technologies. 15 MHz and 20 MHz wide cells are network. to an all-IP flat architecture system. • Supports at least 200 active data clients in every 5 MHz cell. 10 MHz. continue the operation without any action on their part using GSM/GPRS or W-CDMA-based UMTS or even 3GPP2 networks such as cdmaOne or CDMA2000. A large amount of the work is aimed at simplifying the architecture of the system. 5 of LTE. • Low data transfer latencies (sub-5 ms latency for small IP packets in optimal conditions).[25] • Simplified architecture: The network side of EUTRAN is composed only of eNode Bs. When using this sodius macrocells. However. and up to 100 km cell sizes supported longer call setup delay. 5 km (3.4 MHz. can protimal cell size. In city and urban areas. leading to some problems rollingVoice over LTE (VoLTE) Main article: VoLTE out in countries where 5 MHz is a commonly allocated width of spectrum so would frequently already be in use with legacy standards such as 2G GSM and Circuit-switched fallback (CSFB) In this approach.138 measured by Juniper Networks in 2013 and published by Bloomberg.[26] Three different approaches sprang up: standardized. • Support for inter-operation and co-existence with legacy standards (e.1 miles) is the opstead of deploying the IMS. and therefore. . • Support for both FDD and TDD communication systems as well as half-duplex FDD with the same cs domLTE CSFB to GSM/UMTS network interconnects radio access technology. 35. the disadvantage is performance. In the lower frequency bands to lution.) LTE just provides data services. operators just need to upgrade the MSC inbe used in rural areas. LTE (TELECOMMUNICATION) with acceptable performance.2 Features See also: E-UTRA Much of the LTE standard addresses the upgrading of 3G UMTS to what will eventually be 4G mobile communications technology. E-UTRA is the air interface of LTE. CHAPTER 35. [32] 35. which defines the protocols through which a mobile handset can perform voice calls over a customer’s private Internet connection.[39] As a result. albeit at the cost of having to upgrade the entire voice call infrastructure. because VoLTE (IMS) promises much more flexible services. 17. the handset works simultaneously in the LTE and circuit switched modes. VoLTE will also require Single Radio Voice Call Continuity (SRVCC) in order to be able to smoothly perform a handover to a 3G network in case of poor LTE signal quality. with the LTE mode providing data services and the circuit switched mode providing the voice service. usually over wireless LAN. but the recommended speech codec for VoLTE is Adaptive Multi-Rate Wideband.[28] The idea was to use the same principles as GAN (Generic Access Network.[29] 139 feature. To ensure compatibility.5 kHz and up(MBMS) enhanced for LTE coming wideband audio services branded as HD Voice up to 7 kHz. 3GPP demands at least AMRNB codec (narrow band). the demand for voice calls today has led LTE carriers to introduce CSFB as a stopgap measure. 12. 40) [35][36] and 1800 MHz and 2300 MHz in Australia[37][38] and New Zealand (bands 3. 1900. LTE handsets will 35.7 See also known as HD Voice. 2600 MHz in Europe (bands 3. each of which is designated by both a frequency and a band number.[40] so that “any analysis of essential LTE patents should take into account While the industry has seemingly standardized on VoLTE more than ETSI declarations. 700. Full-HD Voice supports the entire bandwidth • Flat IP – flat IP architectures in mobile networks range from 20 Hz to 20 kHz. also known as UMA or Unlicensed Mobile Access). using applications like Skype and Google Talk to provide LTE voice service. FREQUENCY BANDS Simultaneous voice and LTE (SVLTE) In this approach. 5. 20).[31] Where previous cell phone voice • eMBMS – Multicast Broadcast Multimedia Services codecs only supported frequencies up to 3. as of March 2012. 1800 and 2600 MHz in Asia (bands 1. phones from one country may not work in other countries. 800.4 Frequency bands See also: E-UTRA § Frequency bands and channel bandwidths The LTE standard covers a range of many different bands. 850. The lack of software support in initial LTE devices as well as core network devices however led to a number of carriers promoting VoLGA (Voice over LTE Generic Access) as an interim solution. VoLGA however never gained much support. 2500 and 2600 MHz (Rogers Communications.”[41] for the future.5 Patents According to the European Telecommunications Standards Institute's (ETSI) intellectual property rights (IPR) database. an implementation of the AAC-ELD (Advanced Audio Coding – Enhanced Low Delay) codec • E-UTRA – the radio access network used in LTE for LTE handsets. 3. 7. This codec is mandated in 3GPP networks that support 16 kHz sampling. The disadvantage of this solution is that the phone can become expensive with high power consumption.1 Enhanced voice quality of the better known models. 13. When placing or receiving a voice call. 13. 900. which does not have special requirements on the network and does not require the deployment of IMS either.3. 40). 26. In North America. also 35.35. 750. Users will need a multi-band capable phone for roaming internationally. 7. both the caller and redard cipient’s handsets as well as networks have to support the .[33][34] 800. 700. The table below mentions only some 35. 8.4. 35. This is a solution solely based on the handset. One additional approach which is not initiated by operators is the usage of over-the-top content (OTT) services.[40] The ETSI has made no investigation on the correctness of the declarations however.6 Devices fall back to old 2G or 3G networks for the duration of the call. 2500 MHz in South America. about 50 companies have declared. 4. 1800. many LTE supporting mobile phones and tablet phones are being released for sale to the public across the world. 41). 11. 1700/2100 (AWS).[30] • 4G-LTE filter Fraunhofer IIS has proposed and demonstrated “Full• Comparison of wireless data standards HD Voice”. 25. As of 2015. Bell Canada) are used (bands 2. 7. 800.[27] Most major backers of LTE preferred and promoted VoLTE from the beginning. For end-to-end Full-HD • HSPA+ – an enhancement of the 3GPP HSPA stanVoice calls to succeed however. holding essential patents covering the LTE standard. 2011-11-08. [35] CSL begins dual-band 1800/2600 LTE rollout [36] Oredoo . Retrieved December 3. 2011-03-16. Retrieved 2012-1028.html#slide1 [1] “An Introduction to LTE”. Baker: LTE – The UMTS Long Term Evolution.com. Retrieved 2012-10-28.The Technology [37] Telstra switches on first LTE network on 1800MHz in Australia [38] Optus still evaluating LTE . [28] VoLGA whitepaper [29] Qualcomm Chipset Powers First Successful VoIP-OverLTE Call With Single Radio Voice Call Continuity [30] Erricsson .int. 3GPP LTE Encyclopedia. [11] Temple. Retrieved 2012-03-15. Ericsson. Retrieved 11 March 2012. Motorola. developed by China • UMB – a proposed competitor to LTE. Telegeography. • System architecture evolution – architecturing of core networks in LTE [17] “Rogers lights up Canada’s first LTE network today”. • WiMAX – a competitor to LTE [20] LTE – an introduction (PDF). • LTE in unlicensed spectrum • Next-generation network [15] “Verizon launches its first LTE handset”. Toufik. 2011-02-09. 2011. [25] “Evolution of LTE”. Stephen. 2009. Itu.int. LTE World. 2010.com/slideshow/2013-09-19/ countries-with-the-most-4g-mobile-users. Retrieved July 3. [4] “ITU-R Confers IMT-Advanced (4G) Status to 3GPP LTE” (Press release). 29 October 2009. [10] “LTE/SAE Trial Initiative (LSTI) Delivers Initial Results”. Retrieved 2012-03-15. the re- • TD-LTE (LTE TDD) – an alternative LTE standard [18] LTE – An End-to-End Description of Network Architecture and Elements. 3GPP LTE Encyclopedia. [24] Sesia.com.com. Retrieved 11 March 2012. Retrieved 1 March 2012. too [31] Fraunhofer IIS Demos Full-HD Voice Over LTE On Android Handsets [32] “Firm Set to Demo HD Voice over LTE” [33] “EC makes official recommendation for 790–862 MHz release”. 2011.int. “Press Release: IMT-Advanced (4G) Mobile wireless broadband on the anvil”. LTE (TELECOMMUNICATION) • LTE Advanced – the successor to LTE [14] “MetroPCS snags first LTE Android phone”. never commercialized [19] “AT&T commits to LTE-Advanced deployment in 2013. come March 17th”. Unwired View. Retrieved 18 May 2012. now available at MetroPCS”. • QoS Class Identifier (QCI) . [9] “LSTI job complete”. • Zadoff–Chu sequence [21] “Long Term Evolution (LTE)" (PDF). [27] Huawei Communicate Magazine. [3] “Newsroom • Press Release”. Motorola. [13] “MetroPCS debuts first 4G LTE Android phone. 16 May 2010. 2010. Samsung Galaxy Indulge”. 3GPP. 2010. Retrieved 2012-03-15. September 2011. Engadget. Retrieved 2012-03-15.8 References [22] http://www. Itu. Rohde & Schwarz. [23] http://gigaom. 16 January 2012. Hesse and Mead unfazed”. 35. Retrieved 1 March 2012. 2009. From Theory to Practice. Retrieved April 11. 2011” [5] pressinfo (2009-10-21). page 11. History of GMS: Birth of the mobile revolution. Issue 61. 7 November 2007. 2009.LTE delivers superior voice. [26] “Voice and SMS in LTE Technology White Paper.the mechanism used in LTE networks to allocate proper Quality of Service to bearer traffic [16] “HTC ThunderBolt is officially Verizon’s first LTE handset. [12] “Samsung Craft. the world’s first 4G LTE phone. Itu. “Vintage Mobiles: Samsung SCH-r900 – The world’s first LTE Mobile (2010)". [6] “Newsroom • Press Release”. CNW Group Ltd.com/2013/09/20/ mapping-out-the-worlds-lte-coverage-its-in-fewer-places-than-you-think/ [2] “Long Term Evolution (LTE): A Technical Overview” (PDF). 2011-07-07. Wiley. Retrieved 2012-03-15. Retrieved 2012-10-28. September 21. Phonearena.bloomberg. Networkworld. 20 October 2010. Retrieved 2012-1028. Retrieved 1 March 2012. Android and Me.140 CHAPTER 35. Retrieved October 24. [34] “Europe plans to reserve 800MHz frequency band for LTE and WiMAX”. [7] ETSI Long Term Evolution page [8] “Work Plan 3GPP (Release 8)". gsmarena. Parkvall.com/ipad-mini-3/specs/ [54] http://www. 3. 2nd edition. Fazel and S. Ahson.com/iphone-5c/specs/ [44] http://www.apple.saygus. 2009 ISBN 978-0-470-682616 • Sajal K. CreateSpace. May 2014 • Erik Dahlman.motorola. ISBN 978-1-4200-7210-5 • F.com/ x-tel-9500-rugged-waterproof-industial-outdoor-action-sport-business-smartphone/ 2. [41] Elizabeth Woyke (2011-09-21). Stefan Parkvall. Meyer. Second comment by the author: “Thus. Johan Sköld “4G – LTE/LTE-Advanced for Mobile Broadband”. pp. 2012.htc. ISBN 978-0-12-385489-6 • Stefania Sesia.apple. Academic Press.html [59] http://www.php [61] http://www. Retrieved March 10.” IEEE Commun. John Wiley & Sons. Retrieved March 10. ISBN 978-0-470-99821-2 • Agilent Technologies.com/in/en/smartphones/a-series/ a6000/ [58] http://www.9 Further reading • Gautam Siwach. ipeg. J. any analysis of essential LTE patents should take into account more than ETSI declarations. NY. Mag.com/kb/SP647 [48] http://support. A. [47] http://support. “The 3G Long-Term Evolution – Radio Interface Concepts and Performance Evaluation. Parkvall. “Identifying The Tech Leaders In LTE Wireless Patents”. Multi-Carrier and Spread Spectrum Systems: From OFDM and MC-CDMA to LTE and WiMAX. TechCrunch. 2009 • Mustafa Ergen. and M. IEEE Canadian Conference on Electrical and Computer Engineering. ISBN 978-0-470-82467[64] http://xmapsystems. .com/iphone-6/specs/ [46] Greg Kumparak (9 September 2014). Ekström. Per Beming. “Long Term Evolution: 3GPP LTE Radio And Cellular Technology”. Ekström.com/samsung_galaxy_ alpha-6573. vol. Y. John Wiley & Sons (April 2010): “Mobile Handset Design”.com/us/consumers/ nexus-6-header/Nexus-6/nexus-6-motorola-us.html [43] https://www.com/ipad-mini-2/specs/ [53] https://www. [40] “Who Owns LTE Patents?". Johan Sköld.9. Cambridge University Press. Issam Toufik. ISBN 978-0-12-374538-5 • Borko Furht. M. Stefan Parkvall.com/samsung_i9300_galaxy_s_ iii-4238. Australia.com/us/smartphones/htc-one-m8/ [55] http://www. Kaiser. Syed A. 2010. J. Furuskär.apple. John Wiley & Sons. Karlsson. A..apple. Forbes.” [42] businesstoday. S. Amir Esmailpour “LTE Security Potential Vulnerability and Algorithm Enhancements”. J. Academic Press.com/kb/SP662 [49] https://www. 2nd Edition. “Technical Solutions for the 3G Long-Term Evolution.gsmarena. "LTE in BULLETS".com/iphone-5s/specs/ [45] https://www. Karlsson. Retrieved 14 September 2014. Khan. “3G Evolution – HSPA and LTE for Mobile Broadband”. H. March 2006.apple.apple. Melbourne.gsmarena. Second Edition including Release 10 for LTE-Advanced. “LTE for 4G Mobile Broadband – Air Interface Technologies and Performance”.com/ipad-mini/specs/ [52] https://www.com/ipad-air/specs/ [50] https://www. “Apple Announces Two New iPhones: iPhone 6 And iPhone 6 Plus”. and Matthew Baker. 2011. M. 2009 • H. Canada. Wahlqvist.htc. Toronto.php [60] http://www. Dr.com/sony_xperia_z4_tablet_ lte-7069. 2008.lenovo.com/samsung_galaxy_core_lte_ g386w-6846. Das. FURTHER READING [39] “New Zealand 4G LTE launch”. Jading.apple. 2008. Springer.apple. John Wiley & Sons.com/ipad-air-2/specs/ [51] https://www.” IEEE Vehicular Technology Conference (VTC) 2006 Spring.htc. “Mobile Broadband – Including WiMAX and LTE”. Dahlman.35.in/story/ apple-iphone-5-and-lte-what-it-means-for-you/1/ 188194. March 6. 38–45 • E. “LTE – The UMTS Long Term Evolution – From Theory to Practice”.com/uk/smartphones/htc-one-mini-2/ [57] http://shopap. May 2006 • K.php 141 35. 2009. ISBN 978-0-470-66025-6 • Chris Johnson. no. Crc Press. "LTE and the Evolution to 4G Wireless: Design and Measurement Challenges". 2012.php [62] http://www. ISBN 978-1-4528-3464-1 • Erik Dahlman. and S.com [63] http://www.apple. 2011. 2012. 28 February 2013. Furuskär.gsmarena.com/us/smartphones/htc-one-mini/ [56] http://www.intoday.apple. Torsner.” IEEE CCECE. 44. Lundevall. 142 CHAPTER 35. • LTE Uplink Interference Modeling . Wolf-Dietrich Moeller. RF&Microwave Designline. Chichester 2013. 2005 • LTE technology introduction • “3G Long-Term Evolution” by Dr. "What is TD-LTE?". Erik Dahlman at Ericsson Research • “Long-Term 3G Evolution – Radio Access” by Dr. no.1 White papers and other technical information • LTE Technology Overview and Tutorial Series including Webinars and Video presentations • “The Long Term Evolution of 3G” on Ericsson Review. Stefan Parkvall at Ericsson Research • “3GPP Long-Term Evolution / System Architecture Evolution: Overview” by Ulrich Barth at Alcatel • The 3G Long-Term Evolution – Radio Interface Concepts and Performance Evaluation • LTE and the Evolution to 4G Wireless Design and Measurement Challenges – “LTE Security” • Role of Crypto in Mobile Communications “LTE Security” • Dr. Günther Horn. Paul. “LTE Security”. September 2011. LTE (TELECOMMUNICATION) • Beaver. • Dan Forsberg. 2012.10 External links • LTE homepage from the 3GPP website • LTE A-Z Description 3GPP LTE Encyclopedia • 4G/LTE community website • LTE Frequently Asked Questions • LTE Deployment Map 35. Second Edition. John Wiley & Sons Ltd. Valtteri Niemi.10. Maode Ma "Security Investigation in 4G LTE Wireless Networks". 2. ISBN 978-1-118-35558-9 35. is the fourth generation of mobile telecommunications technology. as discussed in the technical definition section be. 3D television. is abandoned in all 4G candidate systems and replaced by OFDMA multi-carrier transmission and other frequency-domain equalization (FDE) schemes. wider channel frequency bandwidth in Hertz. provided they represent forerunners to IMT-Advanced compliant versions and “a subTwo 4G candidate systems are commercially deployed: stantial level of improvement in performance and capato the initial third generation systems the Mobile WiMAX standard (first used in South Ko. deployed Mobile WiMAX networks since 2008. 2010. making it possible to transfer very high bit rates despite extensive multi-path radio propagation (echoes).1 Technical understanding In March 2008. as well as other beyond-3G technologies that do not fulfill the IMT-Advanced requirements. a 4G system does not support traditional circuit-switched telephony service. Swe. ITU-R recognized that these two technologies. A 4G system. see 4G (disambiguation). and cloud computing. could nevertheless be considered “4G”. the spread spectrum radio technology used in 3G systems. short for fourth generation. succeeding 3G and preceding 5G. rea in 2007).16m') and LTE Advanced (LTEfirst-release versions should be considered to be 4G or A) are IMT-Advanced compliant backwards compatible not. setting peak speed requirements for 4G service at 100 megabits per second (Mbit/s) for high mobility communication (such as from trains and cars) and 1 gigabit per second (Gbit/s) for low As opposed to earlier generations. 36. standardized during the spring 2011. high-definition mobile TV. and LTE smartphones arriving in 2011. named the International Mobile Telecommunications Advanced (IMT-Advanced) specification. Services were expected in 2013. On December 6. For other uses. and promising speeds in the order of 1 low. As seen below. with WiMAX smartphones becoming available during 2010. gaming services. Potential and current applications include amended mobile web access. 36. 3G and 4G equipment made for other continents are not always compatible because of different frequency bands.[1] Since the first-release versions of Mobile WiMAX and LTE support much less than 1 Gbit/s peak bit rate. 4G. to smartphones. a generation of network refers to the deployment of a new non-backward-compatible technology. for example to laptops with wireless modems. Mobile WiMAX is not available for the European market as of April 2012. nonbackwards-compatible transmission technology.Mobile WiMAX Release 2 (also known as WirelessMANden since 2009). higher peak bit rates. The peak bit rate is further improved by smart antenna arrays for multiple-input multiple-output (MIMO) communications. in addition to the usual voice and other services of 3G. IP telephony. video conferencing. In the United States. but are often branded 4G by service providers. and the first-release Long Term Evolution (LTE) standard (in Oslo. provides mobile broadband Internet access. the International Telecommunications Union-Radio communications sector (ITU-R) specified a set of requirements for 4G standards.Chapter 36 4G This article is about the mobile telecommunications mobility communication (such as pedestrians and stationstandard. It has however been debated if these Advanced or IEEE 802. while MetroPCS became the first operator to offer LTE service in 2010. According to operators.2 Background The nomenclature of the generations generally refers to a change in the fundamental nature of the service. USB wireless modems were among the first devices able to access these networks. ary users). Norway and Stockholm. and higher capacity for many 143 . they are not fully IMT-Advanced compliant.versions of the above two systems. new frequency bands. Sprint (previously Clearwire) has Gbit/s.bilities with respect [2] now deployed”. and to other mobile devices. but all-Internet Protocol (IP) based communication such as IP telephony. 16m spec) and LTE Advanced are deployed. i. New mobile generations have appeared about every ten years since the first move from 1981 analogue (1G) to digital (2G) transmission in 1992. While the ITU has adopted recommendations for technologies that would be used for future global communications.e. re• 802. the ITU-R standardization organiza• LTE Advanced standardized by the 3GPP tion released the IMT-2000 requirements as a framework for what standards should be considered 3G systems.[8] Some sources consider first-release LTE and Mobile WiMAX implementations as pre-4G or near-4G. in indoor cases. instead relying on the work of other standard bodies such as IEEE. whilst sources to support more simultaneous users per cell. latter’s standard versions were ratified in spring 2011. spread spectrum transmission and at least 200 kbit/s peak bit rate.16m standardized by the IEEE (i. B.do not fully comply with the planned requirements of 1 tional Mobile Telecommunications Advanced). as a new specification series. in 2011/2012 to be followed by “real” 4G. 3bit/s/Hz/cell for downlink and 2. which do not follow the ITU-R defined principles for 4G standards.75-bit/s/Hz in the uplink 36. which is avail. LTE Advanced will be based on the existCDMA2000 family is the EV-DO Rev. but [4] and in 2011 accelerated up to 42 Mbit/s peak bit rate are still far from being implemented. and that the • Be able to dynamically share and use the network re.9G'.4 System standards . This was followed.144 simultaneous data transfers (higher system spectral efficiency in bit/second/Hertz/site).[6] Basically all proposals are based on two technologies: In the mid-1990s. commonly • Be based on an all-IP packet switched network. and 6.[1][5] • Have peak link spectral efficiency of 15-bit/s/Hz in the downlink.e. they do not actually perform the standardization or development work themselves. The upstream) without MIMO.ing LTE specification Release 10 and will not be defined able since 2010 and offers 15. The WiMAX Forum and 3GPP. In September 2009. that they [1] as nomadic/local wireless access. In the. referred to as '3. the technology proposals were submitted to the International Telecommunication Union (ITU) as 4G candidates. are based on a new radio-interface paradigm . optionally up to 40 MHz. 4G (meaning that 1 Gbit/s in the downlink should be possible over less than 67 MHz bandwidth). by 3G multi-media support.3 IMT-Advanced requirements gies that have been studied as the basis for LTE Advanced is included in a technical report.standards are not backwards compatible with 3G. as they This article refers to 4G using IMT-Advanced (Interna. but have not standardized in 2010 as part of Release 10 of the 3GPP been deployed yet. Implementations of Mobile WiMAX and first-release The fastest 3G-based standard in the UMTS family is LTE are largely considered a stopgap solution that will the HSPA+ standard.67 Mbit/s downstream. ITU-R specified the IMT-Advanced (International Mobile Telecommunications Advanced) requirements for 4G systems.was approved in June 2008. CHAPTER 36. only with one antenna. by ITU-R. A summary of the technolo- 36. The fastest 3G-based standard in the specification. An IMT-Advanced cellular system must fulfill Confusion has been caused by some mobile carriers who the following requirements:[4] have launched products advertised as 4G but which according to some sources are pre-4G versions.[1] • Smooth handovers across heterogeneous networks.25-bit/s/Hz/cell for uplink. which is commercially available offer a considerable boost until WiMAX 2 (based on the since 2009 and offers 28 Mbit/s downstream (22 Mbit/s 802. • Use scale-able channel bandwidths of 5–20 MHz. • System spectral efficiency is. • The ability to offer high quality of service for next generation multimedia support. In 2008. downstream using either DC-HSPA+ (simultaneous use The first set of 3GPP requirements on LTE Advanced of two 5 MHz UMTS carriers)[3] or 2x2 MIMO. some of the standards are forwards compatible with IMT2000 compliant versions of the same standards. as defined Gbit/s for stationary reception and 100 Mbit/s for mobile. WiMAX) quiring 200 kbit/s peak bit rate.9G systems as new-generation is that they use difup to approximately 1 Gbit/s for low mobility such ferent frequency bands from 3G technologies . in 2001.[7] LTE Advanced was to be ory speeds up to 672 Mbit/s are possible. but today can be called • Have peak data rates of up to approximately 100 4G according to ITU-R. which refers to all-Internet Protocol (IP) packet-switched networks giving mobile ultra-broadband (gigabit speed) access. A common argument for brandMbit/s for high mobility such as mobile access and ing 3. [19] KT Telecom closed to 100 Mbit/s in the downlink and 50 Mbit/s in the uplink its 2G service by March 2012. and branded 4G. SYSTEM STANDARDS 36.36.[14] Verizon Wireless. the five publicly 36.16m or WirelessMAN-Advanced evolution of 802.[12] (Ericsson and Nokia Siemens Networks systems) and Oslo (a Huawei system) on December 14. which is focused on global communication systems that will be available several years from now.16m or WirelessMAN-Advanced The first LTE USB dongles do not support any other radio interface. Release 10 of LTE is expected to achieve the IMT Advanced speeds. and has offered The pre-4G 3GPP Long Term Evolution (LTE) technol. now named Evolved UMTS Terrestrial Radio Access (E-UTRA).e. antenna arrays. The IEEE 802. LTE has a theoretical net bit rate capacity of up slated to go nationwide by 2012. ogy is often branded “4G-LTE”. formally submitted by the 3GPP organization to ITU-T in the fall 2009. i.1 145 IMT-2000 compliant 4G standards As of October 2010. with the objective The world’s first publicly available LTE service was to fulfill the IMT-Advanced criteria of 1 Gbit/s for sta. LTE Advanced See also: 3GPP Long Term Evolution (LTE) below LTE Advanced (Long Term Evolution Advanced) is a candidate for IMT-Advanced standard. This upgrade path makes it more cost effective for vendors to offer LTE and then upgrade to LTE Advanced which is similar to the upgrade from WCDMA to HSPA.4.access to LTE service since 1 July 2011 for data devices. Stockholm tionary reception and 100 Mbit/s for mobile reception.commercial 4G LTE services since 1 January 2012.[16] Sprint.16e is under development.8 GHz multiple-output (MIMO).4.[10] LTE Advanced is essentially an enhancement to LTE. and expected to be released in 2013. ments. ITU-R Working Party 5D approved two industry-developed technologies (LTE Advanced and WirelessMAN-Advanced)[9] for inclusion in the ITU’s International Mobile Telecommunications Advanced program (IMT-Advanced program).[15] AT&T Mobility. Cellular. See also: LTE Advanced above .[13] As of November 2012. It is not a new technology. Coordinated Multi-point Transmission will also allow more system capacity to help handle the enhanced Telia-branded Samsung LTE modem data speeds. 3GPP Long Term Evolution (LTE) U.[18] T-Mobile Hungary launched a public beta test (called friendly user test) on 7 October 2011. LTE and LTE Advanced will also make use of additional spectrums and multiplexing to allow it to achieve higher data speeds. SK Telecom and LG U+ have enabled does not fully comply with the IMT-Advanced require. The user terminals were manufactured by Samsung.S. are used. Release 8 currently supports up to 300 Mbit/s of download speeds which is still short of the IMT-Advanced standards. 2009. and complete the nationif a 20 MHz channel is used — and more if multiple-input wide LTE service in the same frequency around 1.4. but rather an improvement on the existing LTE network.opened in the two Scandinavian capitals. IEEE 802. The target of 3GPP LTE Advanced is to reach and surpass the ITU requirements. by June 2012.[17] and T-Mobile US. but the first LTE release In South Korea.2 Forerunner versions available LTE services in the United States are provided by MetroPCS.[11] The physical radio interface was at an early stage named High Speed OFDM Packet Access (HSOPA). announced it was ending development of the technology. one of the two variants of the LTE air interface technologies.20) systems TD-LTE for China market The iBurst system (or HC-SDMA. After a series of field trials. could challenge LTE. ident said: “the Chinese Ministry of Industry and China Mobile in the fourth quarter of this year will hold a largescale field test. iBurst and MBWA (IEEE 802.[21] UMB (formerly EV-DO Rev. The above news also confirms IBM’s state. operator . Belarus and Nicaragua WiMax broadband internet access is offered by a Russian company Scartel. In June 2006. Ericsson’s vice pres. and the amount of spectrum available.(e. communications on a train may be poorer than when ment that while only 8% of the operators are consider. comparison of mobile phone standards.20. also known as IEEE 802. is not yet mature. the cell sizes used.table. and is also branded 4G. UMB’s lead sponsor.” But 36. Yota. 4G In the United Kingdom. Ulf Ewaldsson. Usually the bandwidth is shared between ing the use of WiMAX.didate systems as well as other competing technologies. Qualcomm. branding it as a “4G” network even though the current version does not fulfil the IMT AdAt an early stage the Flash-OFDM system was expected vanced requirements on 4G systems. one after the other turning to TD.146 CHAPTER 36. South Korea. see Comparison of wireless data standards.vary by a number of factors. WiMAX can provide the fastest several terminals. It was later further developed into the Mobile Broadband Wireless Access (MBWA) system. but many domestic and international The following table shows a comparison of the 4G canwireless carriers are. including the spectral efficiency of the technology.[23] to be further developed into a 4G standard. the world’s first commercial mobile WiMAX service was opened by KT in Seoul. including the use of external ering LTE because this is the main source of their fu.[20] and by O2 and Vodafone in August 2013. network data standard. LTE services were launched by 36. whether this candidate systems standard advocated by China Mobile will be widely recognized by the international market is still debatable. C) Main article: Ultra Mobile Broadband Mobile WiMAX (IEEE 802.5 Data rate comparison has quickly occupied the Chinese market. TD-LTE. the former (LTE) is also the most powerful 4G mobile communications leading technology and 36. as of 29 Flash-OFDM September 2008.16e) The Mobile WiMAX (IEEE 802.China Mobile. LTE.[24] The objective was to achieve data speeds over 275 Mbit/s downstream and over 75 Mbit/s upstream. Just as Long-Term Evolution (LTE) and WiMAX are being vigorously promoted in the global telecommunications industry.g.antennas.16e-2005) mobile wireless broadband access (MWBA) standard (also known as WiBro in South Korea) is sometimes branded 4G. In Russia.standing still). For more inforTD-LTE is not the first 4G wireless mobile broadband mation.4. spectral effiis expected to be released into the commercial phase in ciency comparison table and OFDM system comparison the next two years. but it is China’s 4G standard that was amended and published by China’s largest telecom For more comparison tables. The performance of each technology network transmission to its customers on the market and is determined by a number of constraints. distance from the tower and the ground speed ture market. High Capacity Spatial Division Multiple Access) was at an early stage considered to be a 4G predecessor. Sprint has begun using Mobile WiMAX. favouring LTE instead.6 Principal technologies in all viewing from the current development trend. Ericsson will help the hand. . Notes: All speeds are theoretical maximums and will IBM’s data shows that 67% of the operators are consid. by then. and offers peak data rates of 128 Mbit/s downlink and 56 Mbit/s uplink over 20 MHz wide channels.[22] UMB (Ultra Mobile Broadband) was the brand name for a discontinued 4G project within the 3GPP2 standardization group to improve the CDMA2000 mobile phone standard for next generation applications and requirements. see bit rate progress trends.3 Discontinued candidate systems EE in October 2012. In November 2008. They also make it possible to control the bandwidth and form the spectrum in a flexible way. LP-OFDMA) in the uplink: Variable bit rate by assigning different sub-channels to different users based on the channel conditions In addition to improvements in these multiplexing systems. In the early . they require advanced dynamic channel allocation and adaptive traffic scheduling. a method of sharing a limited number of addresses among a larger group of devices. new access schemes like Orthogonal FDMA (OFDMA). Apart from this.20 • MIMO: To attain ultra high spectral efficiency standard. However. • Turbo principle error-correcting codes: To minimize the required SNR at the reception 36. These are based on efficient FFT algorithms and frequency domain equalization. resulting in a lower number of multiplications per second. termed smart or intelligent antenna. For the LTE (telecommunication). 36.6.36. Single-carrier FDMA is used for the uplink since OFDMA contributes more to the gested 4G technologies: PAPR related issues and results in nonlinear operation of • Physical layer transmission techniques are as amplifiers. although NAT will still be required to communicate with devices that are on existing IPv4 networks. the process of IPv4 address exhaustion was expected to be in its final stages.cies as older technologies like CDMA.20. • Mobile-IP utilized for mobility • IP-based femtocells (home nodes connected to fixed Internet broadband infrastructure) As opposed to earlier generations. MC-CDMA is in the proposal for the IEEE 802. By the time that 4G was deployed.a. IPv6 removes the need for network address translation (NAT). IPv6 is essential to support a large number of wireless-enabled devices. Internet protocol and IPv6 • Channel-dependent scheduling: To use the timevarying channel Unlike 3G. multiple antenna technologies are emerging to achieve the goal of 4G systems such as high rate. Interleaved FDMA.4 Advanced antenna systems Main articles: MIMO and MU-MIMO The performance of radio communications depends on an antenna system. Verizon has posted specifications that require any 4G devices on its network to support IPv6. IEEE 802. in the context of 4G.1 147 Key features WiMax is using OFDMA in the downlink and in the uplink. Therefore. which is based on two parallel infrastructures consisting of circuit switched and packet switched net• Link adaptation: Adaptive modulation and errorwork nodes. Recently. more efficient systems such as 64QAM are being proposed for use with the 3GPP Long Term Evolution standards. Whereas earlier standards largely used Phase-shift keying. for example (OFDMA) or (single-carrier FDMA) (SC-FDMA. As of June 2009. scalability and higher data rates can be achieved.2 Multiplexing and access schemes Recently. also known as cooperative relaying. a.k. antenna and multi-user MIMO • Frequency-domain-equalization. This is an added advantage especially in the MIMO environments since the spatial multiplexing transmission of MIMO systems inherently require high complexity equalization at the receiver.[29] 36. high reliability. and long range communications. UMB and OFDM standards[28] lack soft-handover support. linearly precoded OFDMA. improved modulation techniques are being used.6. correcting codes This will require low-latency data transmission.6. • Frequency-domain statistical multiplexing. PRINCIPAL TECHNOLOGIES IN ALL CANDIDATE SYSTEMS 36. 4G systems do not support circuit switched telephony. 4G will be based on packet switching only. OFDMA is used The following key features can be observed in all sug. by contrast.3 IPv6 support side Main articles: Network layer.6.6. for example multi-carrier modulation (OFDM) in the downlink or single-carrier frequency-domainequalization (SC-FDE) in the uplink: To exploit the frequency selective channel property without complex equalization The other important advantage of the above-mentioned access techniques is that they require less complexity for equalization at the receiver. By increasing the number of IP addresses available. Single Carrier FDMA (SC-FDMA).for the downlink. IFDMA provides less power fluctuation and thus requires energy-inefficient linear amplifiers. Simifollows:[27] larly. These access schemes offer the same efficienby means of spatial processing including multi. and Multi-carrier CDMA (MCCDMA) are gaining more importance for the next generation systems. gained importance for its bandwidth conservation and power efficiency. while 2. eliminating the spoke-andhub weakness of 2G and 3G cellular systems. the final form of a 4G device will constitute various standards. Google.[39][40][41] • In November 2008. Independent streams can then be transmitted simultaneously from all the antennas. 36. by issuing a Circular Letter calling for candidate Radio Access Technologies (RATs) for IMTAdvanced. Imagine. multiplies the base data rate by (the smaller of) the number of transmit antennas or the number of receive antennas.[32] • In mid-2006. Comcast. South Korea. Sprint. The DARPA selected the distributed architecture and end-to-end Internet protocol (IP).5 Open-wireless Architecture and Software-defined radio (SDR) One of the key technologies for 4G and beyond is called Open Wireless Architecture (OWA). The other category is closed-loop multiple antenna technologies.5G GPRS system.[31] • In April 2006. EU commissioner Viviane Reding suggested re-allocation of 500–800 MHz spectrum for wireless communication. the strategic vision for 4G—which ITU • In January 2008. KT started the world’s first commercial mobile WiMAX service in Seoul. later renamed 3GPP Long Term Evolution (LTE) air interface E-UTRA. designated as IMT-Advanced—was laid out. • In January 2008.[42] . This is called transmit or receive diversity. KT demonstrated mobile WiMAX service in Busan. Both transmit/receive diversity and transmit spatial multiplexing are categorized into the space-time coding techniques. • In February 2007. including WiMAX. a U. On 7 May 2008. Skyworks Solutions released a front-end module for e-UTRAN. Apart from this. This means that in 4G.S. Sprint announced that it would invest about US$5 billion in a WiMAX technology buildout over the next few years[33] ($5. ITU-R established the detailed performance requirements of IMT-Advanced. NTT Docomo demonstrated eUTRA data rates of 200 Mbit/s with power consumption below 100 mW during the test. and 1 Gbit/s while stationary. South Korea. • In November 2005. and Time Warner announced a pooling of an average of 120 MHz of spectrum. called MIMO (as a branch of intelligent antenna).[30] Since the 2. which does not necessarily require the channel knowledge at the transmitter. This technology. Since that time Sprint has faced many setbacks that have resulted in steep quarterly losses. SDR is one form of open wireless architecture (OWA). • In 2005. many transmission schemes were proposed.e. As a result. Sprint merged its Xohm WiMAX division with Clearwire to form a company which will take the name “Clear”. supporting multiple wireless air interfaces in an open architecture platform.85 billion in real terms[34] ). the biggest share of the spectrum went to Verizon Wireless and the next biggest to AT&T. two infrastructures in parallel. This can be efficiently realized using SDR technology.[37] Both of these companies have stated their intention of supporting LTE.5G and 3G systems require both packet-switched and circuit-switched network nodes. spatial multiplexing. Federal Communications Commission (FCC) spectrum auction for the 700 MHz former analog TV frequencies began.[36] The 4G system was originally envisioned by the Defense Advanced Research Projects Agency (DARPA). and believed at an early stage in peer-to-peer networking in which every mobile device would be both a transceiver and a router for other devices in the network.7 History of 4G and pre-4G technologies • In September 2007. to cater for the growing data rate needs of data communication. In 4G systems. OFDMA transmission technology is chosen as candidate for the HSOPA downlink. the circuit-switched infrastructure is abandoned and only a packet-switched network is provided. which is categorized to the area of the radio convergence. traditional voice calls are replaced by IP telephony.[35] and is planning on releasing the first commercial network in 2010. Intel. the reliability in transmitting high speed data in the fading channel can be improved by using more antennas at the transmitter or at the receiver. which require channel knowledge at the transmitter. 36. 4G 1990s. and circuit switched nodes for voice calls. cellular systems have provided dual infrastructures: packet switched nodes for data services. Spatial multiplexing involves deploying multiple antennas at the transmitter and at the receiver. Since 4G is a collection of wireless standards. NTT DoCoMo completed a trial in which they reached a maximum packet transmission rate of approximately 5 Gbit/s in the downlink with 12×12 MIMO using a 100 MHz frequency bandwidth while moving at 10 km/h.148 CHAPTER 36.[38] • On 15 February 2008. Bright House. i. One technology. • In 2002.6. the Japanese company NTT DoCoMo tested a 4G communication system prototype with 4×4 MIMO called VSF-OFCDM at 100 Mbit/s while moving. and the network infrastructure created by Huawei (in Oslo) and Ericsson (in Stockholm). all three Saudi telecom companies STC. Ericsson demonstrated mobileTV over LTE.[58][59] • On 31 January 2012. first in India. • In 2011. • On 25 August 2010. the HTC Thunderbolt offered by Verizon in the U. the Max 4G[44] • In 15 December 2008. Estonia’s EMT opened LTE “4G” network working in test regime. which offers 4G in the country. the ITU stated that LTE. the largest food and beverage conglomerate in southeast Asia.[46] • In December 2009. the first commercial LTE deployment was in the Scandinavian capitals Stockholm and Oslo by the Swedish-Finnish network operator TeliaSonera and its Norwegian brandname NetCom (Norway). will meet or even exceed IMT-Advanced requirements following the ITU-R agenda. LG and Nortel demonstrated eUTRA data rates of 50 Mbit/s while travelling at 110 km/h. TeliaSonera branded the network “4G”. Thailand's AIS and its subsidiaries DPC under cooperation with CAT Telecom for 1800 MHz frequency band and TOT for 2300 MHz frequency band launched the first field trial LTE in Thailand with authorization from NBTC. Argentina's Claro launched a pre-4G HSPA+ network in the country.[62] • On 20 May 2012.[60] • In February 2012.[55] • On 28 April 2011.[47] • On 14 December 2009.3 Mbit/s uplink in Stockholm. Norway and Finland. was the second LTE smartphone to be sold commercially. and single-insingle-out. Lithuania's Omnitel opened a LTE “4G” network working in the 5 largest cities. Azerbaijan’s biggest mobile operator Azercell launched 4G LTE. Telcel launches in Mexico the 4G LTE network in 9 major cities • On 4 June 2010.[2] • On 12 December 2010. 2011.[63] • On 10 October 2012. Thailand's Truemove-H launched a pre-4G HSPA+ network with nationwide availability. 2010. Lithuania’s LRTC announcing the first operational “4G” mobile WiMAX network in Baltic states. 4G LTE was launched on December 26. the Samsung Galaxy Craft offered by MetroPCS is the first commercially available LTE smartphone[54] • On 6 December 2010.7. the 3GPP organized a workshop on IMT-Advanced where it was decided that LTE Advanced. Mobily and Zain announced that they will offer 4G LTE for USB modem dongles.[61] • On 10 April 2012. Sprint began advertising “4G” service in selected cities in the United States. the HTC Evo 4G. VivaCell-MTS launches in Armenia a 4G/LTE commercial test network with a live demo conducted in Yerevan. WiMax and similar “evolved 3G technologies” could be considered “4G”. which should provide physical layer net bitrates of up to 50 Mbit/s downlink and 25 Mbit/s in the uplink.[50] • On November 4.[57] • In 2011.[51] • In December 2012. Sprint released the first WiMAX smartphone in the US. with further development for phones by 2013.[43] • On 12 November 2008.[56] • In September 2011.[53] . The modem devices on offer were manufactured by Samsung (dongle GT-B3710). despite average download speeds of only 3–6 Mbit/s with peak speeds of 10 Mbit/s (not available in all markets). • On March 17.[52] • In Kazakhstan.8 Mbit/s downlink and 5. just after receiving the circular letter.[48][49] TeliaSonera used spectral bandwidth of 10 MHz. 2012 in the entire territory in the frequency bands 1865–1885/1760–1780 MHz for the urban population and in 794-799/835-840 MHz for those sparsely populated • In July 2010. • On 3 March 2009. HTC announced the first WiMAX-enabled mobile phone.[45] Around the same time Globe Telecom rolled out the first WiMAX service in the Philippines. Introductory tests showed a TCP throughput of 42.36.S. The joint-venture formed witribe Philippines. Latvia's LMT opened LTE “4G” network working in test regime 50% of territory. has signed a memorandum of understanding with Qatar Telecom QSC (Qtel) to build wireless broadband and mobile communications projects in the Philippines. • In April 2008. Uzbekistan's MTS deployed LTE in Tashkent. Bharti Airtel launched 4G LTE in Kolkata. Vodacom (Vodafone South Africa) became the first operator in South Africa to launch a commercial LTE service. • On 25 February 2010. San Miguel Corporation. utilizing the new eMBMS service (enhanced Multimedia Broadcast Multicast Service). an evolution of current LTE standard. HISTORY OF 4G AND PRE-4G TECHNOLOGIES 149 • In April 2008. TeliaSonera plans to roll out nationwide LTE across Sweden. at the ITU World Radiocommunication Seminar 2010. an accelerated plan to position the country among the leading emerging countries in communications and technology. the network is available only through fixed home equipments. 2014.[77] Assam.150 36. there are over 160 million 4G users. Rajasthan. the mobile 4G is yet to be launched in late 2015.[66] Discussions about the introduction of 4G surfaced since 2012 by the National Telecom Regulatory Agency (ANRT) and the 3 major providers. a group consisting of China Mobile.[82] .[75] • Bharti Airtel launched 4G on mobiles in Bangalore. Pune. Telkomsel will conduct 4G LTE network trial. 2014 • Bharti Airtel in July 2014. the company with a 79% share of the market released its 4G network on December 4. RIL 4G services are currently available only in Jamnagar.7. on a trial basis. mobile network. Bolt 4G is only available on 2300 MHz covering Jakarta and the surrounding cities.[67] As of November 2014. Mohali and Panchkula). 2014 in Nairobi and Mombasa ahead of rivals Airtel Kenya. April 29. controversies circulated around the use of the term 4G to describe the India uses 2.[76] Until July 2014. XOLO LT 900 and LG G2 (model D802T). Maroc Telecom. Algeria Algérie Télécom announced the official launch of its new fixed-wireless LTE high-speed Internet.Madurai and Chandigarh region (The Tricity or Chandigarh region consists of a major city Chandigarh. with brand Bolt 4G. 4G Deployment plans Africa Rwanda As of 11 November 2014 Rwanda became the newest country to begin introducing 4G LTE services in its capital Kigali after months of testing. including 100 highpriority markets in 2015. 2013 in Bali. Ajitgarh. Ludhiana. Bihar and Odisha. • Aircel in July 2014. 2013 announced the commencement of test of its Long-term Evolution (LTE) 4G Indonesia During APEC meeting on October 1–8.75G services in Afghanistan on 19th Feb. Customers in these cities access 4G services through dongles and wifi modems on Apple iPhone 5S and 5C.[65] Morocco In 2009.[68] The official launch of 4G is due in early 2015.[71] signed the commitment towards TD-LTE standards for the Asian region. Airtel had also partnered with Samsung India to introduce 4G services in Chennai. Since May 2015. thus becoming the first in India to offer such a service on 14th Feb. and accorded 4G licenses to the main operators. called Global TD-LTE Initiative (GTI) in Barcelona.[72] Tikona Digital Networks holds broadband wireless access spectrum in the 2300 MHz band and is waiting for the appropriate time and maturity of the 4G ecosystem China In China. Morocco launched Maroc Numeric 2013. Bharti Airtel and SoftBank Mobile came together.[73] On June 2013 prior to the official launch in Kolkata. Spain and they Since November 2013.1 CHAPTER 36. Mumbai and Kolkata and expand to cover 700 cities. Jio Infocomm. the West) and Himachal Pradesh. Meditel and Inwi have already realised tests over mobile 4G and succeed to reach debits up to 100Mbit/s. Hoshiarpur. It must be noted that Bharti Airtel’s 4G network does not support mainstream 4G phones such as Samsung Galaxy Note 3.[74] • RIL is launching 4G services through its subsidiary. ANRT have reviewed all applications.3 GHz frequency (band 40). launched 4G in four circles Andhra Pradesh. Phagwara and Kapurthala. PT Internux. has commercialized LTE 4G service using TDD-LTE. Tikona holds 4G spectrum[79] licences in five circles in northwest India. offers.[78] Just few days after the announcements.[69] On 12 March 2015. using TD-LTE technology. Uttar Pradesh (East and Afghanistan Telecom giant Etisalat Afghanistan. before making a foray into the space. As part of the program it will [81] PATI LTE Trial Edition” prepaid SIM card. Tuesday. Telkomsel 4G LTE network will operate at 1800 sell “simIndia Bharti Airtel launched India’s first 4G service. Bangalore.[70] Although the company brands its offer as 4G. Patiala. Hyderabad. but licenses and auctions were delayed until late 2013. where it is testing the new TD-LTE technology. • Bharti Airtel 4G services are available in Kolkata. in Kolkata on 10 April Asia 2012. Jalandhar. expanded 4G services to many cities in Punjab like Amritsar.[80] first telecom company to launch 3. covering Gujarat. yuMobile and Orange Kenya. MHz frequency. Visakhapatnam.[64] Kenya Safaricom. Initially. Reliance’s 4G rollout is planned to start in Delhi. Samsung Galaxy S4 and others. Al. announced their 4G LTE networks to be ready after months of testing and evaluations. they opted not to go all the way. 2013. On April 2. • Saudi Arabia: In mid September 2011. • Oman: In July 2012. Mobitel launched FD-LTE service in LTE commercially. 2014. • Lebanon: In 2012. with more sites following shortly in Manila. It is expected that by the end of 2013 the service will be available across the whole country. The 2. the national telecommunication operator JSC Kazakhtelecom launched 4G services in both Astana and Almaty.and other select regions. Qtel. Negotiation on refarmbid for the ‘superior’ 10 MHz band. On May 2. with the number expected to rise to over 4000 by the end of 2012.[89] Maldives 4G technology was introduced for the 1st time in Maldives by Ooredoo (formerly known as Wataniya) in April 2013. with the goal of • Qatar: 15 April 2013. Mobilink and Zong by TOT Corp. HISTORY OF 4G AND PRE-4G TECHNOLOGIES 151 Kazakhstan By the end of 2012. Globe subscribers will soon enjoy best-in-class mobile and broadband services months of testing and evaluations. Davao.. 2014. Cebu. 2013. Dialog Axiata launched South Asia’s first FD-LTE service in Sri Lanka. Ufone preferred to bid on the cheaper 5 MHz band.7.[94] On January 19. And 4G LTE was officially South Korea On July 7. having acquired the 10 MHz band. Hulhumale.36. Etisalat announced the was the first local brand to release LTE ready mobile commercial launch of 4G LTE services covering phone in the Philippines with its Cherry Mobile W900 over 70% of country’s urban areas. on 3 June 2014 Vodafone Launched 4G in Doha [86] Sri Lanka On December 30. or US$58. Globe launched its 4G LTE network covering key commercial as well as residential areas in Makati. Omantel launched 4G LTE commercially. mos S2. Middle East Auction Thailand Thailand National Broadcasting & TelecomOn July 7.3 GHz spectrum is currently held only company to win a 4G license. Nawras Smart Communications was the first to roll out the 4G LTE in the country (Philippines).8 the auction of 3G/4G operators in Pakistan[88] On 23 April 2014.700 4G LTE network sites. As of May.[83] In February 2013. Dialog Broad• Iran: MTN Irancell launched Iran’s first 4G LTE band Networks launched Sri Lanka’s first fixed TD-LTE network in November 2014 shortly after regulatory’s service. the Government of Pakistan announced munications Commission (NBTC) has earmarked 1.000. Pakistan Telecommunication Authority allowed Warid Telecom to go public with 4G LTE services.8 GHz and 2. Philippines As part of its massive network upgrade. qualified for a 4G licence too.Truemove-H has launched Thailand’s first commercial though Mobilink. Sri Lanka Telecom successfully [95] Pakistan Main article: Pakistani Telecom Spectrum demonstrated & launched its 4G LTE service.3 GHz spectrum for 4G services.000. Alfa and touch. Ooredoo operates its 4G network in both 700 MHz and 1800 MHz. 2013.[87] Sri Lanka. Zain Jordan launched 4G On June 2. In September. Globe[90] has launched its 4th Generation Long-Term Evolution (4G LTE) network for mobile and broadband. their recent Flagship Cosmos One Plus and the Newly Released Cosonly few areas have been covered. Zong became the country’s first and trum will expire.182 of 2014 when the license for GSM service on the specbillion in revenues. an. across the Philippines. a state enterprise. the government auctioned of 3G and GHz will be available for auction around the 4th quarter 4G licenses to cellular service providers raising $1. launched its first 4G LTE commercially in Qatar. Globe has completed over 2. South Korea announced plans to spend 60 billion won. The 1. (now called Ooredoo) having the highest mobile phone market share by 2012. As more key activations are nounced their 4G LTE networks to be ready after completed in the coming months.[84][85] nationwide with partner establishments.[93] • Jordan: In February 2015. 2012. veloping 4G and even 5G technologies.[92] approval. Villingilli and Maafushi Island. Warid has planned to launch the service. on delaunched in April 2013. Mobily. To date. 4G LTE service on 8 May 2013 using 2100 MHz Band . Over 900 sites served launched 4G LTE commercially.[91] after that Ooredoo also launched 4G+. while Telenor and ing part of the band is ongoing. 2013 LTE and Ultra others are Cosmos Force. and the hope of becoming an international standard. Cherry Mobile • UAE: In December 2012. Currently serving over 33% of the population in Male. 2008. South nies set up 60 cells in Innsbruck which are since July 2009 Africa. 5 April 2011. A1 Telekom Austria announced that the company has switched on their 1000th Germany After the multiband spectrum auction eNodeB. vices in Turkmenistan.for LTE 800 MHz on more than 200 sites. Linz. Romania. Graz and Innsbruck. Klagenfurt.[124] plans for further LTE coverage.[104] After A1 Telekom Austria and T-Mobile Austria started Belgium On 28 June 2011. A1 Telekom Austria integrated Circuit. At this time.[99] cember 2013. according to a press release.04. United Kingdom. The company signed a roaming Europe agreement with Swisscom following by further countries Austria In August. Deutsche[125] Cologne. T-Mobile Austria launched commercial (Si. Croatia. 2010 A1 Telekom Austria tested LTE with its one of their new A1 Go! contract plans.05. A1 added LTE Roaming in Slovenia [119] On 28 July 2011. Lille and claims to reach 30% of the Austrian population with its Nantes. A1 Telekom Austria is the first Austrian operator which introduced LTE Roaming.[118] On 11 June 2014. If Customers of A1 Telekom Austria in service. It was the first 4G commercial launch in France. United States) in 2014. Vodafone started LTE by using 800 vice for Smartphones. 800 EnodeB’s were used.[97] International LTE Roaming: 19.(planned: Brazil. 2009 Huawei and T-Mobile intro. on 29 November 2012. A1 Telekom Austria first 4G business plan in Marseille. LTE service in Vienna. Slovenia.[120] On 3 July 2012 it confirmed In March. Bregenz.[103] On 6 May 2014. . Germany. Until the end of 2013 Deutsche Telekom launched LTE service parts of the city Bregenz. Both compa. Huchtison 3 and TMobile Austria intent to appeal auction results.[107] (12.[111][112] Turkmenistan On 18 September 2013. 2013. the multiband spectrum auction 1 June 2011.mobil). Austrian Media announced that Hutchison 3 is waiting for approval to refarm 1800 MHz frequency to go further with LTE deployment.[123] On 7 October 2013. 1800 MHz in was completed. 4G I. Deutsche Telekom trialed LTE by using LTE. December.[105] try’s first 4G network.[117] A1 Telekom Austria started the first commercial (FDD)LTE service in Austria on 19 October 2010. Canada. Then. Smartphone (HTC Velocity 4G) for the Austrian market. o2 offers LTE on 800 MHz which is available . Pölten with 3 eNodeB’s.20.152 CHAPTER 36. in Lyon. [109] Pölten will be covered with LTE. 2013. Salzburg and St. Lyon.[106] At the beginning of July.[103] France On 22 November 2012. Dornbirn Germany is as follows: and Lustenau are covered by A1 Telekom Austria 30 August 2010. A1 announced commercial service MHz frequency band was completed. Spain.[114] On October 18. now On 11 March 2014.[125] on 800 MHz.[108] the 800 MHz frequency. T-Mobile Austria started LTE ser.Netherlands. Austrians ing figure shows the current allocation for this frequency largest mobile operator covers currently 45% of the popband:[101][102] ulation with LTE. the national On 4 December 2013. 2010. extending to Montpellier. South Korea. The company also announced MHz frequency. launched in Departner Huawei in Vienna. 2013.Klosterneuburg is covered with LTE.[115][116] • *License holder formerly Orange Austria. Iniatially A1 Telekom Austria covered Vienna with 49 eNodeB's and St.the outroll in 5 major cities and announced the commer[121] switched fallback (CSFB) and launched the first LTE cial launch to take place before the end of 2012.[100] The follow. 2012.[98] want use LTE abroad they need either a LTE package or In June. The company plans to cover more than 50% of the population until the end of 2014. Orange launched the At the end of November. the allocation procedure for 2600 On 28 January 2014. The duced Europe’s largest trial LTE network. Telekom started LTE service on On October 21. 2013. Italy. according to A1 Telekom Austria [113] telecommunication operator TM Cell launched 4G ser. The following figure shows the current allocation for this frequency band:[110] 1 July 2011.1 December 2010. 2013. Belgium's largest telecom their LTE service Austria’s smallest operator 3 introduced operator Belgacom announced the roll out of the counLTE commercially on 18 November 2011. 2012.[96] At the end of November.2010[122] ) the frequency allocation in At the beginning of September. SFR launched 4G LTE network. T-Mobile announced top LTE transHutchison Drei Austria GmbH mission speed raises to 150 Mbit/s. New Zealand. 2012 the Commission for CommuniFreiburg. Thomasis available in areas which are covered by the 1800 MHz town.glin) across the country. vice for the following cities in Baden-Württemberg: On November 15. Celle. Gorey. Limerick.[126] telecoms regulator ComReg.[138] in Germany (Telekom) and Hong Kong (CSL) in June 2014. and 2600 MHz frequency. Deutsche Telekom announced LTE Orange in Spain.[129] On 14 October 2013. Deutsche Telekom announced LTE for sued the mobile code 088 in Ireland and will be [139][140] for the provision of 4G mobile communications. Meteor. Bunclody. Millstreet. Mainz. an Irish wired and Greenland TELE Greenland started LTE service (800 wireless broadband company. 1800 MHz bands in Ireland from 2013 to 2030. Dunmanway. Rhineland-Palatinate: Kaiserslautern. Schleswig-Holstein: Neumünster. frequency. Heidelberg. including Oberreichenbach received a mobile communications license from the Irish in the Black Forest or Zscherben in Saxony-Anhalt.[142] 7 February 2013. Three launched their 4G network Berlin.[135] services in some cities: International LTE Roaming: 22 May 2014. Ludwigshafen. Leipzig and Munich.500 cities (November 2014) other networks. so called by Deutsche Telekom. International LTE Roaming: From 5 May 2014 cusThe company also plans further agreements with other tomers of TIM are able to use 4G while roaming in operators. Vodafone started their 4G of2 July 2013. Deutsche Telekom announced LTE ser. Kanturk. Hanau. Greece. Norway (Telenor). (Belgium (Mobistar). Oldenburg. Carrigacategory 4 with download speed of 150 Mbit/s at the IFA.[136] • 3 Italia: 280 cities (November 2014). O2 Ireland Saxony: Halle (Saale). • WIND: 300 cities (November 2014) France (Orange). Galway.[133] 5 March 2014. Vodafone also plans to launch LTE Roaming in other countries and on • Vodafone: 2. o2 added LTE service in Duisburg. Paderborn. Spain and UK.[132] Smartphones and turned 4G service in eight additional 20 February 2014. Hamburg. Hildesheim. Cobh. Cork. Digiweb launched a mobile broadband network using 3 July 2012. line. New LTE category 4 or LTE+. HISTORY OF 4G AND PRE-4G TECHNOLOGIES 153 in several rural communities.[147] TIM added new roaming partners Roaming for The Netherlands (KPN) and UK (EE). Dungarvan. Berlin. Portugal. This auction awarded Hesse: Darmstadt.[146] 17 June 2014. Ross.[148] Ireland In May 2005. Velbert. All of the winning bidders in the auction have indicated that they intend to move rapidly to deploy Thuringia: Erfurt and Gera. Mallow. announced that they had MHz . Carrigtohill. Italy. Deutsche Telekom announced 580 towns (Ballincollig. Bagnelstown. Telefónica and Vodafone have an. Deutsche Telekom announced LTE towns (Carlow.[128] advanced services. Italy (TIM). Rosslare Harbour.FLASH-OFDM technology at 872 MHz.[131] Lismore. Tullow. Wexford and Waterford.500 cities (November 2014) and 60 cities in in the following six European countries. Rosslare Strand and Killor[144] 15 November 2013. [130] and Hamburg. Enniscorthy. Fermoy. Deutsche Telekom announced LTE Roaming for six European countries. Galway. Wexford. Friedrichshafen. Digiweb. Mannheim. Bremen. Cloyne.On 9 December 2013. Kenmare. nounced that they are testing LTE-Advanced in the Ger.[149] . Killarney. all of Italy’s ISP have been offering or have plans to offer 4G Mbit/s for Q3 in 2014. 900 MHz and ony: Braunschweig. o2 claimed to do the world’s first hanthrough Meteor and dovers of voice calls from LTE to UMTS under realistic Eircom launched their 4G network [143] eMobile on 26 September 2013. at the CeBIT in Hannover Deutsche Telekom announced the launch of LTE-A with 300 Italy Since the first half of December 2012. [127] Bonn. Essen fer (mobile broadband only) in six cities (Dublin. Vodafone switched on 4G for man cities of Munich and Dresden. Poland (Orange) and Spain (Orange)) Followed by the UK. E-Plus started commercial LTE service in On 27 January 2014. Enniscorthy. Pforzheim. Heilbronn. The winNorth Rhine-Westphalia: Gütersloh. Middleton. Karlthe results of its sruhe. ners of spectrum were Three Ireland. Cork. Lower Saxspectrum rights of use in the 800 MHz. Nuremberg and Leipzig by using the 1800 MHz in Dublin. Vodafone added LTE Roaming within the Vodafone Group • TIM: 2.[137] Switzerland on Swisscom and from 14 May 2014 on 19 August 2014. Limerick. Newmarket. This service will be isused 24 April 2012. conditions. Tralee.7. cations Regulation (ComReg) announced [141] multi-band spectrum auction.Band 20) at the beginning of December 2013. Kinsale) on. LTE Advanced The Netherlands.[134] 10 March 2014.36.[145] Mbit/s data speed during LTE-A trials in Alzey. and Vodafone. Waterford and Kilkenny) and 23 5 September 2013. in France and Telenor in Norway. Tele2 will stay a MVNO (i. Austria.[173] After the multiband spectrum auction the frequency allo.e. Tele2 launched LTE..[159] Tele2 will launch their network proba. KPN is the first network provider that has deployed a nationwide 4G network in the Netherlands.154 CHAPTER 36. Macedonia at the beginning of December 2013. As of Q1 2014. Romania. Galați. 2014. being a lower-budget provider. Bacău. Hong Kong. download speed was increased to 150 Mbit/s. while upload speed was up to 50 Mbit/s.[163][164] . Cluj-Napoca. Poland On 31 August 2011.6 GHz LTE network would be required to meet Russian Federation Yota launched LTE service in regulatory requirements. Iași.[171] International LTE Roaming: Since mid-May 2014 Orange offers LTE Roaming service which is currently available in the networks of Orange in Moldova. Switzerland. and Denmark. Following by operators in the US. Japan.MegaFon launched LTE service in April 2012. P4. while T-Mobile announced only a roll-out in Q4 of 2013. On 25 October 2012. Russia.In April. Greece. will probably never reach a nationwide coverage.[161] Romania On 31 October 2012. Craiova.[177] and China are scheduled to be included in March. T-Mobile announced nationwide coverage by the end of 2015. Germany. Vodafone and NOS) offer 4G internet services: site/antenna-sharing.[153] to 100 Mbit/s.[156] • Plus (Polkomtel) . The download speed was up and the USA. 2014: Canada. Canada and Finland will be in. the construction of LTE networks cooperate: Vip launched LTE service at the beginning of July 2014. Constanța.Beeline launched LTE service in May 2013. China. Germany. Aero 2. because they are using (MEO.[150] Post Telecom (formerly LuxGSM[151] ) cember 2013. Tele2 will buy network capacity) on the T-Mobile network for 2G/3G Services and a MVNO on the KPN network for 2G/3G Business Services (previously Versatel). Vodafone has launched the 4G network in August [158] 2013.[175] Network available in Chechnya. only a small 2. Spain. Switzer.[167] International LTE Roaming: On 24 June 2014 Orange announced LTE Roaming for the following countries from July 1. the UK 4G commercially in Poland. Plus (Polkomtel) launched Italy. Poland and Spain and will also be extended to other networks during 2014. Orange • P4 (PlayMobile) The following figure shows the current allocation for this Netherlands After the multiband spectrum auction in frequency band:[168] Q4-2012 KPN announced that the deployment of 4G services would start in February 2013 and that nationwide Spectrum auction LTE800 5x (2x5MHz) and LTE 2600 14x (2x5MHz). Brazil Rostelecom launched LTE service in June 2013. Arad and Timișoara. 2014. the UK.[165] launched LTE in October 2013. Emitel and NetNet. coverage will be available in Q1 2014. Croatia and Slovenia will be added in April. Vodafone has launched 4G tests.[154] In Poland. Sferia • NetWorkS! .[170] Now 4G connectivity is available in several cities: Otopeni. Vodafone is claiming national coverage.[176] land.[174] International LTE Roaming: On 16 February 2014 Vainakh Telecom launched LTE service in January KPN announced LTE Roaming agreement with Orange 2013.[169] Participate in the auction: Polkomtel. Tele2.Portugal All 3 mobile phone operators in Portugal bly in the same time as T-Mobile.[152] All operators are us. T-Mobile. Poland and Saudi Arabia later this month. Netcom launched LTE 800 MHz.Scandinavia TeliaSonera started deploying LTE (branded “4G”) in Stockholm and Oslo November 2009 cluded in June. March 2012. As of Q1 2015. Brașov.[155] Malta 4G technology was introduced in Malta by Vodafone on 9 October 2013. It uses 1800 MHz spectrum belonging to Republic of Macedonia T-Mobile introduced 4G in CenterNet and Mobyland. South Korea.[172] Network operator ZUM’s plans remain unknown.[157] Orange.[160] Vodafone has announced it would reach nationwide coverage in 2014. Spain.CenterNet. 4G Luxembourg Orange and Tango launched LTE in Oc.Norway After the multiband spectrum auction in Detober 2012.[166] ing the 1800 MHz frequency. In May.T-Mobile. Mobyland.[173] cation in the Netherlands is as follows:[162] MTS launched LTE service in September 2012. (E-UTRA Bands 20. The following frequency range is in service for LTE. Singapore: M1). 3 und 7) In May 2013 Swisscom upgraded its LTE network from category 3 to category 4.[195] International LTE Roaming: Swisscom is the first European operator which offers international LTE Roaming.On 17 Februar 2014.[189] Bouygues Telecom) and the Middle East (Saudi Arabia: Mobily). Europe (France: After the multiband spectrum auction in July 2011. 1800 MHz and 2600 MHz.6 GHz frequency (E.36. Swisscom added new roaming mum speed of 100 Mbit/s. France: SFR. and Finnish cities during 2010. 800 MHz. Valladolid and Sunrise was the last operator in Switzerland who introVigo on the mainland.[193] The following frequency partners (Canada: Telus.2012[192] ) the frequency allocation in Switzerland On 29 January 2014.[183] customer. Leukerbad.000 4G masts with top bandwidths of between 1 and 10 Gbit/s.[180] Mbit/s. simultaneously in six of the coun. Moritz/Celerina. 22. Vodafone announced LTE service UPC Cablecom will connect more than 1.[198] On week 9. Since the 21 of June 2013 customers of Swisscom are able to use LTE network of the South Korean operators SK Telecom and KT. (ESlovenia After the multiband spectrum auction in April UTRA Bands 20. On 11 March 2012.7. Valencia. commercial service of its category 3 LTE network with maxi. The smallest operator in Switzerland offers speed up to 100 Mbit/s. According to SwissOn May 13. and in several Swedish. Zaragoza. 4G is available in Spain thanks to 3) The operator will use other frequency bands (800 MHz Vodafone 4G. Philipfor Logroño.the next countries where customers of the former statetry’s largest cities: Madrid. Maximum Mbit/s.02.[187][188] pines: Globe Telecom. Norwegian. In June 2010. A Coruña.[201][202] Switzerland In September 2010.even MVNO of 50Mbit/s. owned company will be able to use LTE roaming. which will use the 1800 MHz band and offer speeds up to 100Mbit/s.[205] Swisscom announced on 29 November 2012. 3 und 7) Orange LTE offers up to 100 2014. Vodafone announced LTE service At the end of November 2013. 800 MHz.Roaming partners in Asia (Hong Kong: China Mobile UTRA Band 7). Barcelona. Swisscom tested On 19 December 2013.[186] On 12 March 2014. According to the company. Orange and UPC Cablecom anBurgos.02. services will and 2600 MHz . Sunrise announced 300 Mbit/s LTE trials by using LTE-A carrier aggregation.[194] Spain On May 9.[182] 1800 MHz frequency for LTE service.[202][203] 3) for further testing in Grindelwald. Hong Kong: .[184] speed depends on the subscribed plan. Swedish television companies used 4G to broadcast live television from the Swedish Crown Princess’s wedding. As of the upgrade the maximum speed has become 150 Mbit/s. Gstaad.[194] Slovakia After the multiband spectrum auction[179] the Orange started LTE on 28 May 2013.[190] In December 2011 after the LTE HK and PCCW) and Europe (Austria: A1). Cordoba. and will first be launched in Madrid on July 19. 2013.[197] Prepaid customers of Sunrise are able to download speeds of up to 150Mbit/s and upload speeds use LTE with maximum network speed .[196] Malaga and Murcia.8 GHz frequency (E-UTRA Band networks. Swisscom added new LTE LTE in Grenchen by using the 2. Alicante. At this time field experiment in Grenchen has become a success the Swisscom covers nine countries and twelve foreign LTE company used the 1. Swisscom added new LTE Roaming partners in Asia (Japan: Softbank.E-UTRA Bands 7 and 20) in the fuuse 1800 MHz and 2600 MHz spectrum and will offer ture as well. HISTORY OF 4G AND PRE-4G TECHNOLOGIES 155 (as seen above).[181] On 7 March 2014. Swisscom added new LTE Roaming Montana. Commercial service is available as of 19 Islands and Las Palmas in the Canary Islands — will be June 2013. Saas-Fee and St. A further nine cities — Bilbao. Yoigo announced its service. Seville. In 2013 Sunrise is using only the live by the end of 2013. 2014.[199][200] for Castilla La Mancha. The second largest operator was the first who introduced prepaid LTE in frequency allocation in Slovakia is as follows: Switzerland. Palma de Mallorca in the Balearic duced LTE. (E-UTRA Band Since 30 May 2013.[191] partner in Russia (MegaFon). The company will upgrade the maximum speed up to 150 Mbit/s at the end of 2013. Over the next two years.[178] range is in service for LTE. Commercial is as follows: service is planned for Q3 2014. On 22 January 2014.[202][204] After the multiband spectrum auction (06. Orange Espana announced it will launch its com Canada (Rogers) and Hong Kong (SmarTone) are 4G network on 8 July.[185] nounced a new partnership. 1800 MHz and 2600 MHz. during the Mobile World Congress Since the beginning of July 2013 Swisscom prepaid cusin Barcelona Vodafone tested LTE-A with speed of 540 tomers are able to enter the LTE network. Vodafone announced LTE service for On 19 November 2013. [224] EE announced further LTE roaming agreements with On 16 June 2014. [234] tober 13.[216] provid. MVNO. Norway: Telenor. Ofcom announced that mobile network operators would be allowed to repurpose their existing 2G and 3G spectrum. Porwork. that it calls 4G.[202] ing a nationwide rollout in 2014. the major Canadian Brazil On 27 April 2012. EE. USA: AT&T) to their LTE service in December 2013.[227] across the town to allow testing of HD video conferencing and mobile PlayStation games. Great Britain. 1. O2.[230] On 9 July 2013. specifically in the 900. As part of Ofcom’s approval of the company’s rollout of 4G it was announced on 22 August that 3 had acquired part of EE’s 1.[211] The 4G service from EE was announced on 11 September 2012 and launched on 30 October initially in 11 cities. covers 97% of the population as of December 2013.600 MHz band. Vodafone and 3. 2012.[207] of EE will access the LTE networks of both operators On 8 October 2014.upgraded to 4G. have announced that they will be cooperating towards building a fourth generation (4G) LTE wireless broadband network in Canada. 4G LTE service in the UK in the London Borough of Southwark. Germany.[208] roaming destination including the USA. Greece. On 21 August 2012.[214] cdmaOne and EV-DO carriers. Italy. lizes WiMAX.On 12 June 2014. to use its existing spectrum in the 1. Italy. Verizon Wireless announced plans for a joint effort with the Vodafone Group to transition its networks to the 4G standard LTE. Canada Telus and Bell Canada.[231] ing information on the upcoming auction and the consumer benefits that new services will deliver. UK Broadband launched the first commercial Belfast over the summer. to enable 4G data services. Only Sprint still utiplc).[235] International LTE Roaming: AT&T signed LTE roaming agreement with EE on 17 December 2013. Vodafone announced LTE rollout for [228] ary 2012. the owner of the Orange and TMobile networks. As a transitional measure.[222][223] On 10 June 2014. Netherland. AT&T. The company also mentioned an upcoming to a selected few thousand customers in London precedRussia operator (MTS) for 3. Brazil’s telecoms regulator Agência Nacional de Telecomunicações (Anatel) anOn 12 November 2012 Ofcom published final regulations nounced that the 6 host cities for the 2013 Confederations and a timetable[215] for the 4G mobile spectrum auction. Plintron has completed its LTE core interoperability with O2 UK. they are implementing 3G UMTS network that went live in November 2009. Verizon Wireless announced their intentions to August 2013.[218] The four major networks. Swisscom commercially launched 300 Orange in France and Spain on March 2014. Customers Mbit/s LTE by using LTE-A carrier aggregation. Abica Lim. but plans to end its use of WiMax by On September 20.800 and 2. Swisscom added for the upcoming World Cup in Brazil new roaming partners among other countries (Belgium: Belgacom. the winners of the 4G spectrum auction were announced by Ofcom. France: Orange. On December Both O2 and Vodafone launched their 4G networks on 29 9. Portugal and Romania. 2014 and Nextel did on OcOn 20 Februband as well as in the 2. Plintron World’s largest Multi-Country MVNE Enables Lycamobile to be in the 4G League in UK.roaming for their Red 4G customers in Greece.800 MHz band to launch fourth-generation (4G) mobile services.[212][213] The network aims to cover 70% of the UK by 2013 and 98% by 2014. Ofcom auctioned off the UK-wide 4G spectrum previously used by Mexico 4G technology was introduced by Telcel on [232] Movistar launched its 4G netthe country’s analogue television signals in the 800 MHz November 7. announced they were to trial 4G LTE services for high speed M2M applications.156 CHAPTER 36. Further more Swisscom also announced more LTE Roaming in Germany. Vivo. Cup to be held there will be the first to have their networks It also launched a new 4G consumer page. Spain: Orange).800 MHz spectrum for part of their own 4G network. the United Kingdom's regulator Ofcom allowed EE.100 MHz bands. 2014. Switzerland and the Netherlands by the Summer.The Americas ited. . March 2014.[209] On 29 Febru. Vodafone added 4G Telefónica Europe) used Slough for testing the 4G net. 2008. ary 2013.[220][221] The 3 network launched their 4G build and roll out an LTE network by the end of 2009.[219] 2015. with Huawei installing LTE technology in six masts tugal and Spain. The company also announced in a press release that it will extend its 4G coverage across major LTE by using LTE-A carrier aggregation. Italy: TIM. were awarded spectrum along with United States Verizon Wireless. Swisscom demonstrated 450 Mbit/s immediately. Brazil: Claro Oi. [233] [217] work on September 22.[202][206] LTE MVNE: On 1 April 2014.[229] Bell Canada claims that its HSPA+ (3G) network. initially it was only available roaming list.[210] In October 2012. 2007. for 4G services. T-Mobile and Niche Spectrum Ventures Ltd (a subsidiary of BT Group Sprint Corporation all use 4G LTE.[225][226] United Kingdom In 2009 O2 (a subsidiary of At the beginning of May 2014. 4G Huchison 3. [224] 2600 MHz spectrum for the provision of 4G FD-LTE services in April 2013. a small village by Lake Brunner on the West Coast with only 250 people. taneously connected to several wireless access technolo2014 in parts of Auckland. currently available mutu. Telstra and Optus are expected to participate in both. and is supposed to complete a rollout of 175 cities by the end of 2011.4 devices. Spark and 2degrees 4G networks operate on 1800 MHz (Band 3).[247][248] beled 4G as of October 2008.Cat 3 devices at launch. Whitianga and Whangamata.[241][242] company achieved a throughput of 520 Mbit/s.[240] Australian Communications and Media Authority International LTE Roaming: AT&T signed LTE (ACMA) will auction 700 MHz "digital dividend" and roaming agreement with EE on December 17. and also by Beam-Division Multiple Access (BDMA).3 GHz band for 4G TD-LTE less of devices. especially to users in an exposed position in between several base stations. As of 15 January 2014. and Te AwaSprint offers a 3G/4G connection plan. then Hamilton. Fiji Vodafone Fiji started category 3 LTE service On 19 December 2013 Optus claims to set up the world’s (1800 MHz .[249] prehensive white paper which indicates that the 10 MHz Vodafone Australia have indicated their roll out of 4G of dedicated spectrum currently allocated from the 1700 FD-LTE will use 20 MHz bandwidth and initially support MHz spectrum for public safety will provide adequate ca.MHz (out of 15 MHz available) bandwidth in the 1800 nicate between agencies and across geographies.[243] Moana. Tauranga before Christmas.36. this issue is addressed by macro-diversity techniques. Pervasive networks are an amorphous and at present enChristchurch.[244] Vodafone went on to launch 4G in this frequency in Papakura on July 22. then quickly move to support Cat pacity and performance necessary for normal communi. Levin and Dunedin in 2015.[246] Telstra launched the country’s first 4G network (FD-LTE) in September 2011 claiming “2–100 Mbps” speeds and announced an “aggressive” expansion of that network in Sprint had deployed WiMAX technology which it has la2012. Vodafone has since expanded coverage to a total of 36. the first 4G network was introduced in parts of Auckland by Vodafone NZ on 28 February 2013 using the 1800 MHz frequency (Band 3). Spark has 4G coverage in Wellington. In June 2010 the FCC released a com.[245] then extended coverage gies and can seamlessly move between them (See vertical . that it intends to upgrade its current Next G network to 4G with Long Term Evolution (LTE) technology in the central business districts of all Australian capital cities and selected regional centers by the end of 2011.S. cations as well as serious emergency situations. In current research. and cover the existing 3G network by the end of 2013. along with Verizon Wireless. Main article: 5G A major issue in 4G systems is to make the high bit rates available in a larger portion of the cell. Christchurch. also known as group cooperative relay.Band 3) at the beginning of December first TD-LTE Advanced carrier aggregation network.[250][251] New Zealand In New Zealand. Sprint has also launched an LTE network Australia Main article: 4G connectivity in Australia in early 2012. Verizon Wireless has said that they will start to Wellington on September 8. has chosen to migrate toward LTE from 2G/GSM and 3G/HSPA by 2011.[236] Verizon Wireless has announced that it plans to augment its CDMA2000-based EV-DO 3G network in the United States with LTE. Fielding.[47] It delivers rates up to 10 Mbit/s. tirely hypothetical concept where the user can be simul2degrees launched their 4G (band 3) service on June 30.[239] width in the 1800 MHz band.8 Beyond 4G research 59 centers.[252] The Vodafone. two thirds of the US population by mid-2012. 2014. in select cities in the United States.after acquiring Vivid Wireless in 2012. regard. Vodafone and Spark have also deployed 4G on 700 MHz (APT Band 28) while 2degrees carries out a trial for this frequency in Auckland. BEYOND 4G RESEARCH 157 Since then.[237] AT&T.MHz band and added the 2. by combining four 20 MHz channels of the 2300 MHz spectrum band into 80 MHz. FCC is exploring the possibility of deployment and operation of a nationwide 4G public safety network Optus have established a 4G (FD-LTE) network using 10 which would allow first responders to seamlessly commu. Auckland. 2014. The U. This was a test of rural broadband services in the 700 MHz range. It was the first US carrier Telstra will use a mixture of 10 MHz and 15 MHz bandto offer a WiMAX phone. The 2013.[238] Telstra announced on 15 February 2011. got 4G coverage in May 2013. their roll out by the end of 2010. while Vodafone has stated it will Oceania only participate in the 2600 MHz auction. 2013.8. TechRepublic. ITU. 5 July 2011. [14] “MetroPCS Launches First 4G LTE Services in the United States and Unveils World’s First Commercially Available 4G LTE Phone”.4G/LTE — Ericsson. [5] Moray Rumney.com. Retrieved March 24. Retrieved August 21. drives HSPA investments LteWorld February 7. (2010. Ylva. 4G handoff. [21] Miller. [16] Brian Bennet (5 April 2012). Engadget. David (April 2009). 6 April 2013.10 References [1] ITU-R. WiMax Forum. BBC News. Stefan.16m System Description Document. [24] Qualcomm halts UMB project. [15] Jason Hiner (12 January 2011). Zangi. J. [22] Shukla. “Super-Fast 4G Wireless Service Launching in South Korea”. Dahlman. [23] “Sprint announces seven new WiMAX markets. [26] “WiMAX and the IEEE 802. Retrieved August 21. Retrieved November 26. 36. T-Mobile USA. Retrieved April 11. 3GPP. Stefan. 2011. Furuskär. says 'Let AT&T and Verizon yak about maps and 3G coverage'". LTE Advanced – nology. 2009. 2012. Archived from the original on 25 March 2010. Astely. Erik. Retrieved April 8.158 CHAPTER 36. PC Magazine. 2008 [25] “LTE”. use of mesh routing protocols to create a pervasive network. Reuters. [20] “EE launches Superfast 4G and Fibre for UK consumers and businesses today”. 2010. 2013).4304/jcm. Cellular’s first 4G LTE phone: Samsung Galaxy S Aviator”. [11] Parkvall. March 23. 2010. Stefan. [17] “Sprint 4G LTE Launching in 5 Cities July 15”. [3] 62 commercial networks support DC-HSPA+. Report M. 2010. CNet. 3GPP.9 See also • List of mobile phone generations • 4G-LTE filter • Mobile radio telephone (also known as “0G”) • 1G • 2G • 3G • LTE (telecommunication) (4G LTE) • LTE Advanced (4G) • 5G [12] The Draft IEEE 802. Retrieved July 13. Asia-Pacific Business and Technology Report. 2013. 21 September 2010. Included in this concept is also smart-radio (also Evolving LTE towards IMT-Advanced (PDF). fellow South Koreans seethe with envy”. Retrieved April 5. 2011. Retrieved August 20. November 13th. 2013. Retrieved April 8. Magnus. Retrieved November 24. 2010. Retrieved August 29. These access technologies can be [10] Parkvall.S. 2011. Jading. Retrieved November 3. September 2008 [6] Nomor Research Newsletter: The way of LTE towards 4G [7] “3GPP specification: Requirements for further advancements for E-UTRA (LTE Advanced)". .146-154. Anders. TechSpot.3. 2011). UMTS. International Telecommunication Union.16m Air Interface Standard” (PDF). Vehicular known as cognitive radio) technology to efficiently manTechnology Conference Fall 2008. “The evolution of LTE toward LTE Advanced”. 2012. Agilent Measurement Journal. Stockholm: Ericsson age spectrum use and transmission power as well as the Research. 21 October 2010 [18] “We have you covered like nobody else”. Joe (August 29. October 30. Unstrung. 2012 [4] Vilches. “Vodafone and O2 begin limited roll-out of 4G networks”. Samsung Make LTE Connection — Telecom News Analysis”. Everything you need to know about 4G Wireless Technology. Requirements related to technical performance for IMT-Advanced radio interface(s).21). IEEE 802. Retrieved April 6. or any other future access techKambiz (21–24 September 2008). [19] “SK Telecom and LG U+ launch LTE in Seoul. 36. Anuradha (October 10. 2008-04-20 [13] “Light Reading Mobile . 2013. EE. [8] “3GPP Technical Report: Feasibility study for Further Advancements for E-UTRA (LTE Advanced)". 3GPP web site. 4 April 2010. 2011. Wi-Fi. MetroPCS IR.4. 2013. 2011. doi:10. Olsson. Journal of Communications 4 (3): 146–54.2134. 27 June 2012. [9] “ITU paves way for next-generation 4G mobile technologies” (press release). “Meet U. “IMT-Advanced: 4G Wireless Takes Shape in an Olympic Year”. April 29). Retrieved 201202-07. 2012. EDGE. “How AT&T and TMobile conjured 4G networks out of thin air”. Retrieved August 29. Wänstedt. 2013. Approved in November 2008 [2] “ITU World Radiocommunication Seminar highlights future communication technologies”. come March 17th”. B. K. Telegeography. The Wall Street Journal. Archived from the original on 29 May 2010. NTT DoCoMo Press. [53] МТS kompaniyasi O’zbekistonda 4G tarmog’i ishga tushirilishini e’lon qiladi (in Uzbek) [54] MetroPCS. 12 November 2008. [36] Reynolds. 2009). A (2009). Skyworks press release (Free with registration). [55] VivaCell-MTS launches in Armenia 4G/LTE [56] ""Omnitel” skelbia pirmoji Lietuvoje pradėjusi tiekti 4G LTE ryšio paslaugas” (in Lithuanian).” November 2008. Sprint.rdb. [57] “Mobily Announces 4G LTE Service in Saudi Arabia (STC and Zain too)". 2010. Morgan Kaufmann [31] “KT Launches Commercial WiBro Services in Korea”.archive.no . 2012. 2012. “The Sprint HTC EVO 4G Review”. “Verizon mandates IPv6 support for next-gen cell phones”. “High Throughput WLAN/WPAN” (PDF). E24. Sprint. AIS.org) [44] “Scartel and HTC Launch World’s First Integrated GSM/WiMAX Handset” (Press release). Peterson. W.lt. Archived from the original on February 22. WWRF. Retrieved June 23. 1NEWS. [48] “Teliasonera First To Offer 4G Mobile Services”. 2010. 2008. SaudiMac. Melanie (September 14. Retrieved June 10. The Times Of India.gov. 2012). 2008) (Access through web. Retrieved September 14. Ericsson.ee. [30] Zheng. Retrieved November 26. WiMAX Forum.2134.)" (free registration required). [60] “4G Thailand : First 4G field trial of Thailand”.AZ. Retrieved March 1. 2008. 2011. 2011. Retrieved April 8. Retrieved February 27. Federal Reserve Bank of Minneapolis. [37] “Auctions Schedule”. February 15. [46] “LRTC to Launch Lithuania’s First Mobile WiMAX 4G Internet Service” (Press release). REFERENCES 159 [27] G. 2009) San Miguel Corporation. “Requirements related to technical performance for IMT-Advanced radio interface(s).ma/?lang=en&Id=34518 [67] http://www. [64] http://www. [41] “Skyworks Introduces Industry’s First Front-End Module for 3. zdnetasia. 2011. Bonneville. [59] “HTC ThunderBolt is officially Verizon’s first LTE handset. [62] “Bharti Airtel launches India’s first 4G service”.9G Wireless Applications. February 14. Retrieved March 19. 3 March 2009. 2008 [28] “4G standards that lack cooperative relaying”. 2007.9G Wireless Applications. [43] Nortel and LG Electronics Demo LTE at CTIA and with High Vehicle Speeds :: Wireless-Watch Community at the Wayback Machine (archived June 6. 2005. 2011. Electronics Weekly. AnandTech. 2008.com/article/2014/11/10/ morocco-telecommunications-idUSL6N0T02C720141110 . 2014.10. December 14. Retrieved September 14. de Courville (2004). Retrieved July 31. Retrieved March 12. Wireless News. “Azercell объявил о запуске 4G”. Retrieved September 14. “NTT DoCoMo develops low power chip for 3G LTE handsets”. 11 February 2008. WirelessWeek. 2011. [42] ITU-R Report M.com. 2010.reuters. [45] San Miguel and Qatar Telecom Sign MOU at the Wayback Machine (archived February 18. Retrieved November 26. 2008. 2008. [34] Consumer Price Index (estimate) 1800–2014. Fettweis. 10 April 2012. HTC Corporation. 2009. Raigo (25 February 2010). (Skyworks Solutions Inc. April 28. Schott. 2011. delfi. Retrieved January 31.com. [47] “4G Coverage and Speeds”. Retrieved July 31. [58] “Verizon launches its first LTE handset”. [52] Anand Lal Shimpi (June 28. 2008. [29] Morr.NetCom 4G (in English) [50] Daily Mobile Blog [51] Neudorf. November 15.invest. “Wireless Networking Complete”.”. “EMT avas 4G testvõrgu” (in Estonian). [35] “DoCoMo Achieves 5 Gbit/s Data Speed”. Gosse. 2010. Retrieved April 28. FCC. M. Retrieved July 31. [32] “KT’s Experience In Development Projects”. 2011. Archived from the original on 24 January 2008. March [33] “4G Mobile Broadband”. [63] 1st news (May 24. 2010. [40] “Wireless News Briefs — February 15. Safaricom races ahead of rivals with 4G network. Phonearena. Derek (June 9. [38] “European Commission proposes TV spectrum for WiMax”. Retrieved November 26. H. 2012. [61] “demonstrates Broadcast Video/TV over LTE”. 2008.html [65] . 2007).36. 2008. Retrieved January 8. February 9. March 16. December 15. P. Retrieved July 31. E. 2012. 2009. 2008. [66] http://www. Archived from the original on 14 December 2007. Davie.rw/home/newsdetails/article/ olleh-rwanda-networks-launch-4g-lte. WiMAX Forum. 2012. Retrieved September 26. L. Retrieved January 8. 2010). Farrel. 2008”. Zimmermann. [49] NetCom.com. [39] “Skyworks Rolls Out Front-End Module for 3. 2013. 2009. 2013. Retrieved August 21. August 24. Archived from the original on 27 March 2010. live im A1 Netz” (in German). Nawras. [83] “Omantel launches Oman’s first 4G LTE mobile broad. cember 8. [78] “Aircel launches First 4G Mobile Services in Bihar”. 8. Retrieved November 16. 2010. Retrieved August 21. you”. Retrieved August 21. Retrieved 20 Mbit/s” (in German).archive. [101] “2600 MHz paired Spectrum”. band network”. [85] “4G”. Der Standard. June 29. The Economic Times. 2013. [104] “T-Mobile verspricht mobiles Internet mit bis zu 100 [82] “Indonesia finally gets a taste of 4G”. October 7. 2013. Les opérateurs testent la 4G à Marrakech [93] Dialog Launches First Mobile 4G-LTE Service [69] LTE in Morocco by early-2015 [94] Mobitel Launches Mobile 4G-LTE Service [70] http://www. 2013.php?p=4glte [95] Superior “SLT Broadband” broadens its reach via fixed 3G/LTE technology [71] http://www. Retrieved December 8. Marhaba. die nächste Mobilfunkgeneration. Retrieved [92] Dialog launches first fixed 4G-LTE service in Sri Lanka December 8. Retrieved December 8. unwiredview. [107] “1. 2013. Retrieved May 27. 2013.com. 2012. A1 [86] “Ooredoo Announces 4G LTE Commercial Launch for Telekom Austria. A1 Telekom Austria. [106] “A1 erreicht bereits jeden dritten Österreicher mit LTE” [84] “Life gets even faster with the launch of 4G”. 2013. February 12. 1606-20809-la-4g-en-mode-fixe-d-algerie-telecom-est-une-supercherie-selon-un-expert [97] TMCELL starts to connect the subscribers to the LTE net[73] “Airtel launches 4G in Kolkata — The Times of India”. August 7. Retrieved December 8. broadband network”. 2013. 4G [68] Télécoms. 2008. 2011. 2013. 2013.telegeography. ReNovember 2013. March 14. 2013. RTR.com. Telecoms. Retrieved December 8. 2014.biharprabha. http://www. Retrieved December 8. news.com.org. RTR. [102] “2600 MHz unpaired Spectrum”.algerietelecom. [109] “T-MOBILE BRINGT LTE AUF SMARTPHONES” (in German). 2013. Generation wächst” (in German). May [72] http://www. (in German). [98] “T-Mobile Austria betreibt Europas größtes LTE-Netz in [74] “Airtel ties up with Samsung. 2013. 2013. 2013. Retrieved December April”. September 4.com. A1 Telekom Austria. Retrieved December 8. October 19. 2011. 2013. 2010. 2013. Retrieved June 18. Retrieved December 8. A1 Telekom Austria. A1 Telekom Austria. Retrieved October 3. IANS. Retrieved December 8.thaipr.agenceecofin.Empowering web. news. Futurezone. 2013. [88] 4G Licence in Pakistan [89] $1.[105] “Drei startet den LTE-Turbo” (in German). [75] “Reliance Jio 4G service to be rolled out nationwide in 2015”. July 28.in/company-stories/item/ [103] “A1 Telekom Austria startet LTE in der Bundeshauptstadt 15209-tikona-digital-networks-biding-its-time-for-launching-4g Wien” (in German). November 28. February 14. Innsbruck” (in German).tele. Nawras. 2010.net.com/operateur/ 10. work The Times Of India. 2013. July 15. 2010. RTR. September 20. 15 May 2015. . [99] “LTE.5 million”. 2013. T-Mobile Austria. [79] Tikona Digital Networks [80] http://www. Retrieved De2015. Retrieved December 19. 2013. 2013.biharprabha. [81] “Telkomsel to serve 2013 APEC meeting with its 4g LTE 2010. trieved December 8. [91] “Korea to Begin Developing 5G”. November 26. trial network”. par with global telecommunication offerings”. 2012. 2013. 2010.Globe Network . starts 4G trials in Chennai”. October 21. October 18. teltarif.dz/siteweb. 2013.de.160 CHAPTER 36.com/products/ commsupdate/articles/2014/03/18/ [96] “True Move H – The First To Offer LTE Service On 2100 algeria-to-launch-fixed-lte-in-may-2014-mobile-4g-in-2015 MHz In Thailand While Reinforcing Its Leadership As The Largest 3G Operator. October 18. Zain Facebook Page.”.net/. Muscat Daily. 2015. 2013. 2010. sults”. [108] “A1 erweitert Glasfasernetz und Mobilfunknetz der [87] “Zain Jordan launches Jordan’s first 4G LTE mobile vierten Generation im Großraum Bregenz” (in German). [100] “2. Retrieved February 17. Retrieved 16 July 2014. IANS. Retrieved [77] “Aircel launches highest speed 4G services bringing it at December 8. July 8. 2014.182 billion raised in spectrum auction: Live updates [90] “4G .Auction Results”. RTR. Retrieved December 8.000 4G/LTE Stationen im Netz von A1: Mobilfunknetz der 4. 2014. [110] “Multiband Auction 800/900/1800 MHz (2013) . [111] “T-Mobile Austria confirms intent to appeal auction reRetrieved April 8. February 17.6 GHz frequency auction completed – Revenues total EUR 39. [76] “4g in punjab”. 36. 2014. Retrieved June 4. Vodafone Ireland. teltarif. 2014. 2010. December 4. 2013. Vodafone Ireland. 2013.webnews. 2014. trieved March 3. Retrieved January 29. 2014. 2012. December 9. Retrieved March 3. May 20. 2014. Re2014.ie. May 30. 2012. 2013. 2013. 2014. September 5. Leipzig und München” (in German). 2013. für 1 Euro” (in German). . November 30. Retrieved December 22. [113] “A1 erweitert Glasfasernetz und Mobilfunknetz der [131] “LTE+: Network turbo with up to 150 Mbit/s”. 2014. 2013. [138] “Deutsche Telekom starts LTE roaming in Netherlands 2014. Hamburg. 2014. 2014. 2014. May 22. November 28. Retrieved May 6. May 6. August 30. 2014. Austrian Regulatory Authority for Broadcasttrieved March 11. RTÉ. 2014. Retrieved May [117] “T-Mobile Austria raises top LTE transmission speed to 22. Retrieved November 15. www. July 3. 2010. Retrieved November 15. March 11.it/2014/06/19/ 3-italia-coperte-oltre-130-citta-con-la-rete-4g/ [127] “LTE für Bonn. Retrieved March 11. derStandard. A1.10. Telecompaper. 2013. December 19. Retrieved November 15. [122] “Frequenzvergabeverfahren 2010” (in German). 2014. February 20. [118] “LTE-Netzausbau: “3” wartet auf Genehmigung” (in Ger2014.de. 2013. ber 30. March 10. June 17. Re[132] “Telefonica und Vodafone testen LTE-Advanced”. 2014. Tele. 2013. and UK”. Austria. 2013. 2011. 2013. 2012. comreg. 2014. [148] “TIM expands 4G roaming to Hong Kong and Germany”. Retrieved December [142] “ComReg reveals 4G auction results . heise trieved December 8. ber 23. Telefónica. Retrieved May 22. [135] “Deutsche Telekom: Ab Sommer bis zu 300 MBit/s über [116] “Multiband Auction 800/900/1800 MHz (2013) . Retrieved March 3. 31 Towns across Ireland”. October 14. 2014. windfall for Irish Govt”. man). June 4. March 13. Retrieved DecemRetrieved March 3. [128] “Deutsche Telekom bringt LTE in den Freistaat Thüringen” (in German). abroad”. 2014. 2013. 2014. Dezember LTE-Surfstick mit Vertrag [144] “Vodafone Ireland 4G Mobile Broadband Goes Live”. [125] “Das ist LTE” (in German). vierten Generation im Großraum Klosterneuburg” (in German). 2014. calls from LTE to UMTS under realistic conditions”. Retrieved March 11. Jantrieved March 3. 2012. 2014. [143] “Ireland’s first 4G phone service goes live”. ing and Telecommunications (RTR). Retrieved December 20.com. [126] “O2 LTE für Zuhause”.€450m instant 8. Retrieved February 20.[130] “O2 LTE 4G all over Germany: Starting July 2. A1 Telekom [133] “DT leads the way to LTE Advanced”. Telecompaper. teltarif. teltarif. Deutsche Telekom. 2014. [136] “Vodafone Deutschland bietet ab sofort LTE-Roaming in Europa an”. 2014. Telecompaper. Re800 MHz”. 2013. [147] “TIM offers 4G roaming in Switzerland and Spain”.siliconrepublic. November 15. Telefónica.Results LTE” (in German). Retrieved May 6. May 6. March 3. 2014.mobil first Slovenian operator with LTE roaming August 19. Retrieved March 11. June 11. [123] “Deutsche Telekom nimmt ersten LTE-Sender in Betrieb”. Retrieved NovemTelefónica. August 19. Retrieved June 17. trieved September 26. Deutsche Telekom. 2014. A1 Telekom Austria. [146] http://www. Retrieved January 29. 2013. Retrieved June [139] Press Release: Digiweb Mobile Takes 088 12. 2013. April 24. Retrieved December speed areas are on air”. 2014. Retrieved [137] “Mit LTE auch im Ausland schneller surfen” (in German). [129] “Telefónica Deutschland: World’s first handovers of voice [149] “Tele Greenland to roll out 4G LTE on 1 December”. [120] Roll-out of the first 4G network in Belgium and strategic [140] RTÉ News article: provider partnership with Fon Ireland gets new mobile phone [141] “ComReg Announces Results of its Multi-Band Spectrum Auction” (PDF). June 7. February 7. [114] “A1 ermöglicht als erster Mobilfunkbetreiber Österreichs 4G/LTE Nutzung im Ausland” (in German). REFERENCES 161 [112] “H3G to spearhead Austrian spectrum appeal”. Bundesnetzagentur. [134] “LTE bei E-Plus für alle ohne Aufpreis: Am Mittwoch [115] “A1 startet LTE 800 High-Speed Mobilfunknetz am Stadgeht’s los” (in German).de. Telecompaper. online. 2010. November 29.de. 150Mbps”. teltarif. 2014. all high Geography. 2013. 2014. TeleGeography. Retrieved [119] “Si. TeleGeography. Retrand und im ländlichen Bereich” (in German). teltarif. 2013. 2014.[145] “Vodafone Switches on 4G for Smartphones in 6 Cities & trieved March 3.de. 2014. uary 28. 2013. 2014. 2013. Deutsche Telekom. 2014. Re.de. [121] Belgacom extends 4G network in five more cities [124] “Vodafone: Ab 1. Re8. Retrieved March 13. [177] “Rostelecom launches LTE in Sochi”. 2013. 2013. at home and abroad” (in Dutch). [186] “Vodafone lanza 4G en toda Castilla La Mancha” (in Spanish). technology LTE in Grenchen”. hotnews. Retrieved June 18. 4G [150] “Orange unveils 29 October LTE launch date”. 2013. Retrieved March 13. Retrieved June 26. Telecompaper. March 12. October 7. klanten 2014. January 8. [156] Times of Malta. [153] “Orange is the first provider in Luxembourg to offer 4G roaming” (PDF). Retrieved May 14. 2014. TeleGeography. Telecompaper. TeleGeography. April 24. June 20. Retrieved March 13. 4G Americas. March 13. 2014.ro. 2014. May 14. February 16. May 28. 2014. Retrieved August 21. [154] “T-Mobile Macedonia opens 4G network to end users”. 2014. [168] Frequency list in Poland [188] “Vodafone Spain brings LTE service to Logrono”. network”. March 14. 2014. 2013. 2014. Retrieved February [184] “MWC: Vodafone Spain demonstrates 540Mbps using 19. trieved June 18.no. in Chechnya”. Retrieved January 9. raphy. Retrieved June [175] “Roskomnadzor objects to Vainakh Telecom LTE launch 26. seven cities”. [187] “Vodafone lanza 4G en Logroño” (in Spanish). [178] “Hartă acoperire internet și voce” (in Romanian). 2014. Retrieved June 5. [185] “Vodafone lanza 4G en Burgos” (in Spanish). LuxGSM to rebrand as Post Tele. 2014. [152] “4G Americas Western Europe Deployment Status Up. 900 MHz og 1800 MHz)". 2014. npt. Teleccompaper. [159] T-Mobile komt in september met meer 4G info [160] “KPN accelerates 4G roll-out in The Netherlands”. Retrieved December 30. March 1. KPN. . [165] “Auksjon #14 (800 MHz. May 28. Geography. [151] “P&T Luxembourg. [180] “SWAN wins 4G mobile licence alongside three incumbents”. MTS goes live in Moscow. zdnet. 2013. March 11. June 14. “Vodafone rolls out 4G broadband”. January 23. February 19. [163] “KPN expands 4G coverage.com. [157] “KPN versnelt 4G-uitrol in Nederland”. Retrieved July 6.com. Re26. magazine din 10 orase din Romania/Internet la viteze de pana la 75 Mbit/s poate fi incercat pe modem USB. TeleGeog. Retrieved January 9. 2014. January 9. launch. 2013. 2014. TeleGeography. Retrieved June 5. TeleGeography. 2014. May 9. Retrieved June 18. 2014. Retrieved March 14. Retrieved March 1. Retrieved April 30. 2014. June 4. Tele2014. TeleGeography. BandaAncha. Retrieved June 5. 2013.[174] “Russian LTE round-up: Rostelecom postpones MVNO date”. Vodafone. TeleGeography. TeleGeography. 2014. zdnet.— hotnews. 2014. Retrieved February 19. [183] “Vodafone wins Spain’s 4G race with surprise launch in 2014. Retrieved June 26. KPN. 2014. [161] “Tele2 Stays MVNO for 2G/3G on T-Mobile network [181] “Spain to get first 4G mobile network in July”. TeleGeography. TeleGeograph. Retrieved June ership disputes”.[172] “Orange Romania launches 4G roaming”. 2014. Orange. TeleGeography. Retrieved June 18. 2013.ro”. 2014. Vodafone. March 7. 2014. at home and abroad”. Vodafone. Swisscom. 2013. (Dutch Article)". [155] “Vip Operator switches on LTE network c”. zdnet. Kazan boasts 4G triple2014. 2014. December 4. 2012. FDD/TDD-LTE CA setup”. Retrieved June 18. [176] “Vimpelcom launches LTE network in Moscow”. 2012. [179] “Výsledky elektronickej aukcie” (in Slovak). 2014. April 29. launches 4G on 1 May. 2014. resolves owncom”. 2014. 2014. 2013. tableta [190] “Swisscom demonstrates 4G mobile communications si hotspot mobil . Times of Malta.eu. [162] “Dutch multiband spectrum auction ends with four win[182] “Orange trumps rival Yoigo to launch first Spanish 4G ners”. Vodafone. Retrieved March [167] may adds-data-to-large-−1010720 “Tele2 Norway 13. 2014. 2014. [164] “KPN expands 4G coverage. 2014. September 5. December 6. 2014. adds data to 'Large'". 2013. 2013. 2012. KPN. Telecompaper. 2012. Retrieved April 30.com. [166] “Telenor Norge begins 800MHz LTE rollout”. 2014. May 13. threat”. 2014.162 CHAPTER 36. [171] Vodafone Romania covering map 2010. 2014. Retrieved July 14. September 28. [169] Auction LTE800 and LTE2600 in Poland [170] “Vodafone permite testarea tehnologiei LTE/4G in 17 [189] “Frecuencias telefonía móvil” (in Spanish). Retrieved December 18. June 24. 2014. 2014. 2013.[173] “MegaFon launches 4G services via Yota. Telekomu[158] V o dafone verhoogt snelheid mobiel internet voor álle nikačný úrad SR. LondonlovesBusiness. [200] “upc cablecom to connect mobile phone masts for Or.10. 2012. “EE by gum! 4G (almost!) launches. “O2 4G mobile network launch date announced for the UK”. June 19. 2013. 2013. The Daily Telegraph (London). 2013). trieved January 30. Sunrise. Sunrise.co. December 17. 2013. Ben (August 28. 2012. 2013. OFCOM. 2014. 2012. 2013. 1800MHz and 2100MHz to 4G Mobile Broadband”. 2009). Orange. 2010. The Daily Tele[193] “Swisscom launches Switzerland’s first 4G/LTE network”.telecoms. ein solides Quartalsergebnis” (PDF). 2012. Q&A with the man making it happen | 2013. Hongkong und Singapur. Leo (August 1. Retrieved December 1. 2012. [209] Neate. UPC Cablecom. [207] “Swisscom speeds up mobile communications even more [225] “EE CUSTOMERS TO BENEFIT FROM SUPERFAST with the rollout of LTE advanced”. 20 February 2013. 2013. May 28. Retrieved June 17. December 19. Shruti (September 11. //www. http: [206] “Swisscom lets you surf even faster in Europe and Brazil”. Rupert (December 12. 2013. Swisscom. Retrieved July 14. 2013. Ofcom. Com. [222] “Three UK Delays 4G Mobile Broadband Launch to Q4 Swisscom. Swisscom. Retrieved March 13. cember 19. Retrieved [218] “Ofcom announces winners of the 4G mobile auction”. Retrieved November 12. Com. Retrieved Detrieved August 22. [204] “Pünktlich zu den Olympischen Spielen in Sotchi: Mit August 7. Japan.36. 2013. 2014. Retrieved Au[196] “4G/LTE roaming for Swisscom customers”. 2013”. 2013. Archived from the original on 2 April Swisscom.uk. Reman). [212] “EE to launch 4G mobile services in 16 UK cities in 2012”. Swisscom Roaming über 4G/LTE neu auch in Russland und damit in insgesamt zehn Ländern” (in German). 2013. 2013. [215] “Ofcom finalises 4G auction rules”. 2013. Retrieved July 31. November 19. [197] “Sunrise LTE FAQ”. 2013). darunter Frankreich. Sunrise.uk. ReRetrieved December 1. [198] “4G/LTE: Mobiles Highspeed Internet für alle Sunrise Kunden”.com/. Retrieved August 28. [217] Warman. Matt (May 13. in France”. Retrieved August 22. EE.[220] Kelion. 2014. 2013. LondonlovesBusiness. SourcingFocus. [223] Woods. Retrieved April 8. . “Ofcom UK Open November 25. June 10.” (in Ger. [203] “Swisscom bietet 4G/LTE-Roaming ab heute in Österreich und damit nun in neun Ländern an. 2013. Orange. Sunrise and Swisscom purchase mobile radio October 9. ISPreview. 2013. 2014. ange” (PDF). 2014. Mark (July 9. ofcom. Shruti. (PDF) (in German). June 16.com. February 23. call to be 4G mobile phone trailblazer”. Geschwindigkeit von bis zu 450 Mbit/s” (PDF) (in German). 2013. “4G mobile phone launch ‘before Christmas’". Retrieved July 14. 2013. October 8. 2014. BBC News. 2014. November 28. Swisscom. Swisscom. February 29. 2014.org. Retrieved January 23. [213] Tripathi. 2012. November 19. frequencies at auction”. May 23. “It’s live! EE launches superfast 4G 2013. [221] “Vodafone announces 4G launch in UK”. [194] “Swisscom customers can now surf even faster on the [210] “4G LTE Network From UK Broadband Goes Live In London | TechWeekEurope UK”. graph (London). Retrieved August 30. 2012. 4G IN FRANCE AND SPAIN”. 2012. December 20. ReThe Next Web. 2013. [224] “AT&T signs LTE roaming agreement with EE”. trieved November 12. March 27. 2010. 2012). 2014. 2013. Retrieved October 30. 2013. March 13. [219] Jackson. SourcingFocus. 2012). Features”. 2013. 2012. 2011. June 20. [211] “Everything Everywhere sells services to 3 allowing for 4G”. Retrieved February 20. BBC News. [199] “Orange looking to fibre optic in the further expansion of its 4G capacities” (PDF). [202] “List of LTE Roaming partners” (PDF). Retrieved October 30. 2014. 2013. 2014. BBC News. January 29. Retrieved July 14. Re[201] “Fast data connections now also available while holidaying trieved May 14. 2012. 2013. gust 22. December 1. [214] Tripathi. 2013.org. Retrieved July 14. 2013. November 26. 900MHz. [195] “Orange übernimmt die Marktführerschaft bei 4G. 2012. 2013. “Three finally unveils 4G [205] “Das Sunrise LTE-Mobilfunknetz wird noch schneller” rollout plans: The stage is now set for UK’s 4G future”. “Slough accepts the Retrieved July 14. 2013. July 14. Retrieved July 14. Retrieved June 10. Swisscom. Retrieved December 1. [208] “Factsheet LTE Advanced Theoretische Swisscom. Swisscom. 2013. REFERENCES 163 [191] “LTE pilot project in seven tourist regions starting today”. 2013). Retrieved [192] “Orange. Techweekeu4G/LTE network”.uk. 2013. mobile network in 10 cities | News”. Swisscom. ofcom. September 11. 2013. 2014.[216] “4G”. Relanciert weitere Service Excellence Initiativen und erzielt trieved September 9. Retrieved Swisscom. January 22. Retrieved December 1. Retrieved rope.com. December 8. Retrieved August 22. [239] “World’s First 3G/4G Android Phone. [247] Colley. June 30. 2013. 11 October 2014. Performance and Cost”. “Next Generation Network [250] “Optus introduces world’s first TD-LTE Advanced carrier Evolution”. 2013).164 CHAPTER 36. Retrieved November 26. aggregation network”. Retrieved Decemveal auction date on 5 June ber 30. Cambridge. February 15.cnet.com. 2012. 2014. [237] “America’s Most Reliable Network”. [243] 4G is Live now | LTE Network | Vodafone NZ [244] “Small. “Research Directions for Fourth Generation Wireless” (PDF). Coming this Summer Exclusively from Sprint” (Press release). [231] Anatel will begin reviewing 4G tender proposals and reTelecoms.com. 2011). 2014. Retrieved December 7. Roger (September 27. June 2010. MA.co. (118kb) • Information on 4G mobile services in the UK . Retrieved April 8. [228] “VODAFONE ANNOUNCES ARRIVAL OF 4G IN [249] “Optus to build faster 4G network with acquisition of NORTHERN IRELAND” (PDF). TeleGeography. Retrieved August 21. [246] Telstra to launch 4G mobile broadband network by end 2011 Telstra. Spain”. August 21. 4G [226] “EE signs 4G roaming agreements in France. 2010. 2007. PC Magazine. html 36. 2012). [236] Cheng.nz. 2014.com/products/ [252] IT R&D program of MKE/IITA: 2008-F-004-01 “5G commsupdate/articles/2012/11/07/ mobile communication systems based on beam-division telcel-announces-launch-of-commercial-lte-in-nine-cities/ multiple access and relays with group cooperation”. Vodafone. Retrieved December 29.com. 2013. HTC EVO™ 4G. 2013.html [235] “Sprint to Scrap WiMAX by Late 2015”.Ofcom . 2013. Proceedings of the 10th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 01). Stuff. 2014. rural NZ town gets 4G”. March 13. News. 2013. [240] FCC White Paper. Retrieved August 21. 2013. Retrieved June 18. Vodafone Fiji.4G”. Electronista.mx/computacion-tecno/ 2014/red-4g-telcel-celulares-smartphones-90882. Sprint.LTE”. June 12. 23 March 2010. 3 News NZ. Verizon Wireless. Telstra. Retrieved May 2. 2008). “The Public Safety Nationwide Interoperable Broadband Network. trieved October 30. 2013. [248] “4G Network .telegeography. 2014. [245] “2degrees turns on Auckland 4G”. February 20. Retrieved July 31. mx/computacion-tecno/2014/ movistar-lanza-su-nueva-red-4g-lte-en-mexico-94798. Vodafone to share same 4G network”. [227] “Vodafone cuts cost of EuroTraveller roaming option”. Retrieved 2014. BELL. September 21. [238] “AT&T. Retrieved March 13. [251] “Optus tests TD-LTE Advanced carrier aggregation”. 2001).com. May 2.eluniversal. ReTelecompaper.Mobile Phones & Plans”. Vividwireless”. 2011 • 3GPP LTE Encyclopedia • Nomor Research: White Paper on LTE Advance the new 4G standard • Brian Woerner (June 20–22. 2014. “Bell . Massachusetts Institute of Technology. 2013. 2013. 2013. USA. “Telstra’s 4G plan to Telecompaper. TELUS. Andrew (August 29. [230] BELL (December 4. Verizon. reach 14 million”. A New Model For Capacity. 2012. December 19. 2013. [242] “FAQ’s . 2012. Retrieved October 12. Retrieved December 30. [233] http://www. The Australian. 2010. 2014. [241] “Vodafone Fiji’s 4G network goes live”. [232] https://www. May 25. [229] TELUS (October 10. Optus. December 5. December 19.eluniversal. “Sprint to launch own 4G LTE network in early 2012 (scoop) | Mobile — CNET News”. Optus.11 External links [234] http://www. According to the 3GPP.[3] • 3GPP2 (a different organization from 3GPP) based their CDMA2000 Multimedia Domain (MMD) on 3GPP IMS.g.. IMS uses IETF protocols wherever possible. 37.[1] IMS is not intended to standardize applications. It first appeared in Release 5 (evolution from 2G to 3G networks). 3GPP2 and ETSI TISPAN by requiring support of networks other than GPRS. Historically.g. Its original formulation (3GPP Rel-5) represented an approach to delivering "Internet services” over GPRS. i.IP developed the initial IMS architecture. interworking with non-IMS An example of a global standard based on IMS is MMTel.248 networks.248 networks offers the possibility to connect terminals of the old legacy networks to the new generation of networks based on IP networks. Since it is becoming increasingly easier to access content and contacts using mechanisms outside the control of traditional wireless/fixed operators. networks. formed in 1999. • 3GPP release 6 added interworking with WLAN. mobile phones have provided voice call services over a switched-circuit-style network. • IMS was originally defined by an industry forum called 3G. when SIP-based multimedia was added.. To ease the integration with the Internet. presence. services need not have their own control functions. but rather to aid the access of multimedia and voice applications from wireless and wireline terminals. policy and charging control (PCC). From a logical architecture perspective. which was brought to the 3rd Generation Partnership Project (3GPP). This vision was later updated by 3GPP. Alternative methods of delivering voice or other multimedia services over IP have become available on smartphones (e. Support for the older GSM and GPRS networks was also provided. • 3GPP release 7 added support for fixed networks by working together with TISPAN release R1. multiple registration and forking. speech recognition and speech-enabled services (Push to talk). as part of their standardization work for 3G mobile phone systems in UMTS networks.e. adding support for CDMA2000. and not on the customer device but in the network itself. IMS is an architectural framework to provide such standardization.IP. VoIP or Skype). the function of AGCF (access gateway control function) and PES (PSTN emulation service) are introduced to the wire-line network for the sake of inheritance of services which can be provided in PSTN network. rather than strictly over an IP packet-switched network. to create a form of fixed-mobile convergence (FMC). Alternative and overlapping technologies for access and provisioning of services across wired and wireless networks include combinations of Generic Access Network. inter-operability between IMS using different IPconnectivity networks.[2] band connection to the IMS.Chapter 37 IP Multimedia Subsystem The IP Multimedia Subsystem or IP Multimedia Core Network Subsystem (IMS) is an architectural framework for delivering IP multimedia services. such as Wireless LAN. AGCF works as a bridge interconnecting the IMS networks and the Megaco/H. e. 3G. but they have not become standardized across the industry. SIP User Agent functionality is included in the AGCF. 165 . Megaco/H. This is done by having a horizontal control layer that isolates the access network from the service layer. AGCF acts a SIP User agent towards the IMS and performs the role of P-CSCF. soft switches and “naked” SIP.1 History IMS was originally designed by the wireless standards body 3rd Generation Partnership Project (3GPP).1. CDMA2000 and fixed lines. However in implementation this does not necessarily map into greater reduced cost and complexity. SIP (Session Initiation Protocol). emergency sessions. the interest of IMS is Also added voice call continuity between circuit switching and packet switching domain (VCC). routing group identities. as a part of the vision for evolving mobile networks beyond GSM. as the control layer is a common horizontal layer. fixed broadbeing challenged. 166 CHAPTER 37. IP MULTIMEDIA SUBSYSTEM • 3GPP release 8 added support for LTE / SAE, multimedia session continuity, enhanced emergency sessions and IMS centralized services. • 3GPP release 9 added support for IMS emergency calls over GPRS and EPS, enhancements to multimedia telephony, IMS media plane security, enhancements to services centralization and continuity. • 3GPP release 10 added support for inter device transfer, enhancements to the single radio voice call continuity (SRVCC), enhancements to IMS emergency sessions. • 3GPP release 11 added USSD simulation service, network-provided location information for IMS, 3GPP / TISPAN IMS architectural overview – HSS in IMS layer SMS submit and delivery without MSISDN in IMS, (as by standard) and overload control. 37.2 Architecture roaming in another network or country (the visited network). The only requirement is that they can use IP and run SIP user agents. Fixed access (e.g., Digital Subscriber Line (DSL), cable modems, Ethernet), mobile access (e.g. W-CDMA, CDMA2000, GSM, GPRS) and wireless access (e.g., WLAN, WiMAX) are all supported. Other phone systems like plain old telephone service (POTS—the old analogue telephones), H.323 and non IMS-compatible systems, are supported through gateways. 37.2.2 Core network HSS – Home subscriber server The home subscriber server (HSS), or user profile server function (UPSF), is a master user database that supports 3GPP / TISPAN IMS architectural overview the IMS network entities that actually handle calls. It contains the subscription-related information (subscriber Each of the functions in the diagram is explained below. profiles), performs authentication and authorization of the user, and can provide information about the subscriber’s The IP multimedia core network subsystem is a collection location and IP information. It is similar to the GSM of different functions, linked by standardized interfaces, [4] home location register (HLR) and Authentication centre which grouped form one IMS administrative network. (AuC). A function is not a node (hardware box): An implementer is free to combine two functions in one node, or to split A subscriber location function (SLF) is needed to map a single function into two or more nodes. Each node can user addresses when multiple HSSs are used. also be present multiple times in a single network, for dimensioning, load balancing or organizational issues. User identities Various identities may be associated with IMS: IP multimedia private identity (IMPI), IP mul37.2.1 Access network timedia public identity (IMPU), globally routable user agent URI (GRUU), wildcarded public user identity. The user can connect to IMS in various ways, most of Both IMPI and IMPU are not phone numbers or other which use the standard IP. IMS terminals (such as mobile series of digits, but uniform resource identifier (URIs), phones, personal digital assistants (PDAs) and comput- that can be digits (a Tel URI, such as tel:+1-555-123ers) can register directly on IMS, even when they are 4567'') or alphanumeric identifiers (a SIP URI, such as 37.2. ARCHITECTURE sip:
[email protected]" ). IP Multimedia Private Identity The IP Multimedia Private Identity (IMPI) is a unique permanently allocated global identity assigned by the home network operator, and is used, for example, for Registration, Authorization, Administration, and Accounting purposes. Every IMS user shall have one IMPI. IP Multimedia Public Identity The IP Multimedia Public Identity (IMPU) is used by any user for requesting communications to other users (e.g. this might be included on a business card). There can be multiple IMPU per IMPI. The IMPU can also be shared with another phone, so that both can be reached with the same identity (for example, a single phone-number for an entire family). Globally Routable User Agent URI Globally Routable User Agent URI (GRUU) is an identity that identifies a unique combination of IMPU and UE instance. There are two types of GRUU: Public-GRUU (P-GRUU) and Temporary GRUU (T-GRUU). • P-GRUU reveal the IMPU and are very long lived. • T-GRUU do not reveal the IMPU and are valid until the contact is explicitly de-registered or the current registration expires Wildcarded Public User Identity A wildcarded Public User Identity expresses a set of IMPU grouped together. The HSS subscriber database contains the IMPU, IMPI, IMSI, MSISDN, subscriber service profiles, service triggers, and other information. CSCF – Call Session Control Function Several roles of SIP servers or proxies, collectively called Call Session Control Function (CSCF), are used to process SIP signalling packets in the IMS. • A Proxy-CSCF (P-CSCF) is a SIP proxy that is the first point of contact for the IMS terminal. It can be located either in the visited network (in full IMS networks) or in the home network (when the visited network is not IMS compliant yet). Some networks may use a Session Border Controller (SBC) for this function. The P-CSCF is at its core a specialized SBC for the User–network interface which not only protects the network, but also the IMS terminal. The use of an additional SBC between the IMS terminal and the P-CSCF is unnecessary and infeasible due to the signaling being encrypted on this leg. The 167 terminal discovers its P-CSCF with either DHCP, or it may be configured (e.g. during initial provisioning or via a 3GPP IMS Management Object (MO)) or in the ISIM or assigned in the PDP Context (in General Packet Radio Service (GPRS)). • It is assigned to an IMS terminal before registration, and does not change for the duration of the registration. • It sits on the path of all signalling, and can inspect every signal; the IMS terminal must ignore any other unencrypted signalling. • It provides subscriber authentication and may establish an IPsec or TLS security association with the IMS terminal. This prevents spoofing attacks and replay attacks and protects the privacy of the subscriber. • It inspects the signaling and ensures that the IMS terminals do not misbehave (e.g. change normal signaling routes, do not obey home network’s routing policy). • It can compress and decompress SIP messages using SigComp, which reduces the round-trip over slow radio links. • It may include a Policy Decision Function (PDF), which authorizes media plane resources e.g., quality of service (QoS) over the media plane. It is used for policy control, bandwidth management, etc. The PDF can also be a separate function. • It also generates charging records. • An Interrogating-CSCF (I-CSCF) is another SIP function located at the edge of an administrative domain. Its IP address is published in the Domain Name System (DNS) of the domain (using NAPTR and SRV type of DNS records), so that remote servers can find it, and use it as a forwarding point (e.g., registering) for SIP packets to this domain. • it queries the HSS to retrieve the address of the S-CSCF and assign it to a user performing SIP registration • it also forwards SIP request or response to the S-CSCF • Up to Release 6 it can also be used to hide the internal network from the outside world (encrypting parts of the SIP message), in which case it’s called a Topology Hiding Internetwork Gateway (THIG). From Release 7 onwards this “entry point” function is removed from the I-CSCF and is now part of the Interconnection Border Control Function (IBCF). The IBCF is used as gateway to external networks, and provides NAT and firewall functions (pinholing). The IBCF is practically a 168 CHAPTER 37. IP MULTIMEDIA SUBSYSTEM Session Border Controller specialized for the Functional model The AS-ILCM and AS-OLCM NNI. store transaction state, and may optionally store session state depending on the specific service being executed. • A Serving-CSCF (S-CSCF) is the central node of the The AS-ILCM interfaces to the S-CSCF (ILCM) for an signalling plane. It is a SIP server, but performs ses- incoming leg and the AS-OLCM interfaces to the Ssion control too. It is always located in the home CSCF (OLCM) for an outgoing leg. Application Logic network. It uses Diameter Cx and Dx interfaces provides the service(s) and interacts between the ASto the HSS to download user profiles and upload ILCM and AS-OLCM. user-to-S-CSCF associations (the user profile is only cached locally for processing reasons only and is not changed). All necessary subscriber profile informa- Public Service Identity Public Service Identities (PSI) are identities that identify services, which are hosted by tion is loaded from the HSS. application servers. As user identities, PSI takes the form • it handles SIP registrations, which allows it to of either a SIP or Tel URI. PSIs are stored in the HSS bind the user location (e.g., the IP address of either as a distinct PSI or as a wildcarded PSI: the terminal) and the SIP address • it sits on the path of all signaling messages of the locally registered users, and can inspect every message • a distinct PSI contains the PSI that is used in routing • a wildcarded PSI represents a collection of PSIs. • it decides to which application server(s) the SIP message will be forwarded, in order to Media servers provide their services • it provides routing services, typically using The Media Resource Function (MRF) provides media reElectronic Numbering (ENUM) lookups lated functions such as media manipulation (e.g. voice • it enforces the policy of the network operator stream mixing) and playing of tones and announcements. • there can be multiple S-CSCFs in the net- Each MRF is further divided into a media resource funcwork for load distribution and high availabil- tion controller (MRFC) and a media resource function ity reasons. It’s the HSS that assigns the S- processor (MRFP). CSCF to a user, when it’s queried by the ICSCF. There are multiple options for this pur• The MRFC is a signalling plane node that interprets pose, including a mandatory/optional capabilinformation coming from an AS and S-CSCF to conities to be matched between subscribers and trol the MRFP S-CSCFs. • The MRFP is a media plane node used to mix, source or process media streams. It can also manage Application servers access right to shared resources. See also: Next generation network services The Media Resource Broker (MRB) is a functional entity that is responsible for both collection of appropriate SIP Application servers (AS) host and execute services, published MRF information and supplying of appropriate and interface with the S-CSCF using SIP. An example MRF information to consuming entities such as the AS. of an application server that is being developed in 3GPP MRB can be used in two modes: is the Voice call continuity Function (VCC Server). Depending on the actual service, the AS can operate in SIP • Query mode: AS queries the MRB for media and proxy mode, SIP UA (user agent) mode or SIP B2BUA sets up the call using the response of MRB mode. An AS can be located in the home network or in an external third-party network. If located in the home • In-Line Mode: AS sends a SIP INVITE to the MRB. network, it can query the HSS with the Diameter Sh or The MRB sets up the call Si interfaces (for a SIP-AS). • SIP AS: Host and execute IMS specific services Breakout gateway • IP Multimedia Service Switching Function (IMSSF): Interfaces SIP to CAP to communicate with A Breakout Gateway Control Function (BGCF) is a SIP proxy which processes requests for routing from an SCAMEL Application Servers CSCF when the S-CSCF has determined that the session • OSA service capability server (OSA SCS) : Inter- cannot be routed using DNS or ENUM/DNS. It includes faces SIP to the OSA framework routing functionality based on telephone numbers. 37.2. ARCHITECTURE PSTN gateways A PSTN/CS gateway interfaces with PSTN circuit switched (CS) networks. For signalling, CS networks use ISDN User Part (ISUP) (or BICC) over Message Transfer Part (MTP), while IMS uses SIP over IP. For media, CS networks use Pulse-code modulation (PCM), while IMS uses Real-time Transport Protocol (RTP). 169 of the specific end to end service and, as a consequence, service specific network performance, QoS and security requirements are not necessarily assured. This definition does not exclude that some services may provide a defined level of interoperability. However only SoIx fully satisfies NGN interoperability requirements. An NGN interconnection mode can be direct or indirect. Direct interconnection refers to the interconnection between two network domains without any intermediate network domain. Indirect interconnection at one layer refers to the interconnection between two network domains with one or more intermediate network domain(s) acting as transit networks. The intermediate network domain(s) provide(s) transit functionality to the two other • A media gateway controller function (MGCF) is a network domains. Different interconnection modes may SIP endpoint that does call control protocol con- be used for carrying service layer signalling and media version between SIP and ISUP/BICC and inter- traffic. faces with the SGW over SCTP. It also controls the resources in a Media Gateway (MGW) across an 37.2.4 Charging H.248 interface. • A signalling gateway (SGW) interfaces with the signalling plane of the CS. It transforms lower layer protocols as Stream Control Transmission Protocol (SCTP, an IP protocol) into Message Transfer Part (MTP, an Signalling System 7 (SS7) protocol), to pass ISDN User Part (ISUP) from the MGCF to the CS network. • A media gateway (MGW) interfaces with the media plane of the CS network, by converting between RTP and PCM. It can also transcode when the codecs don't match (e.g., IMS might use AMR, PSTN might use G.711). Offline charging is applied to users who pay for their services periodically (e.g., at the end of the month). Online charging, also known as credit-based charging, is used for prepaid services, or real-time credit control of postpaid services. Both may be applied to the same session. Charging function addresses are addresses distributed to each IMS entities and provide a common location for Media resources each entity to send charging information. charging data Media Resources are those components that operate on function (CDF) addresses are used for offline billing and the media plane and are under the control of IMS core Online Charging Function (OCF) for online billing. functions. Specifically, Media Server (MS) and Media gateway (MGW) • Offline Charging : All the SIP network entities (PCSCF, I-CSCF, S-CSCF, BGCF, MRFC, MGCF, AS) involved in the session use the Diameter Rf in37.2.3 NGN interconnection terface to send accounting information to a CDF located in the same domain. The CDF will collect There are two types of next-generation networking interall this information, and build a call detail record connection: (CDR), which is sent to the billing system (BS) of the domain. • Service-oriented interconnection (SoIx): The physiEach session carries an IMS Charging Identifier cal and logical linking of NGN domains that allows (ICID) as a unique identifier generated by the first carriers and service providers to offer services over IMS entity involved in a SIP transaction and used for NGN (i.e., IMS and PES) platforms with control, the correlation with CDRs. Inter Operator Identifier signalling (i.e., session based), which provides de(IOI) is a globally unique identifier shared between fined levels of interoperability. For instance, this is sending and receiving networks. Each domain has the case of “carrier grade” voice and/or multimedia its own charging network. Billing systems in differservices over IP interconnection. “Defined levels of ent domains will also exchange information, so that interoperability” are dependent upon the service or roaming charges can be applied. the QoS or the Security, etc. • Connectivity-oriented interconnection (CoIx): The physical and logical linking of carriers and service providers based on simple IP connectivity irrespective of the levels of interoperability. For example, an IP interconnection of this type is not aware • Online charging : The S-CSCF talks to a IMS gateway function (IMS-GWF) which looks like a regular SIP application server. The IMS-GWF can signal the S-CSCF to terminate the session when the user runs out of credits during a session. The AS 170 CHAPTER 37. IP MULTIMEDIA SUBSYSTEM and MRFC use the Diameter Ro interface towards Both A-MGW and VGW are unaware of the services. an OCF. They only relay call control signalling to and from the PSTN terminal. Session control and handling is done by • When immediate event charging (IEC) is used, IMS components. a number of credit units is immediately deducted from the user’s account by the ECF and the MRFC or AS is then authorized to provide 37.2.6 Interfaces description the service. The service is not authorized when not enough credit units are available. • When event charging with unit reservation (ECUR) is used, the ECF (event charging function) first reserves a number of credit units in the user’s account and then authorizes the MRFC or the AS. After the service is over, the number of spent credit units is reported and deducted from the account; the reserved credit units are then cleared. 37.2.5 IMS-Based PES Architecture IMS-based PES (PSTN Emulation System) provides IP networks services to analog devices. IMS-based PES alTISPAN IMS architecture with interfaces lows non-IMS devices to appear to IMS as normal SIP users. Analog terminal using standard analog interfaces } can connect to IMS-based PES in two ways • Via A-MGW (Access Media Gateway) that is linked and controlled by AGCF. AGCF is placed within the Operators network and controls multiple A-MGW. A-MGW and AGCF communicate using H.248.1 (Megaco) over the P1 reference point. POTS phone connect to A-MGW over the z interface. The signalling is converted to H.248 in the A-MGW and passed to AGCF. AGCF interprets the H.248 signal and other inputs from the A-MGW to format H.248 messages into appropriate SIP messages. AGCF presents itself as P-CSCF to the S-CSCF and passes generated SIP messages to S-CSCF or to IP border via IBCF (Interconnection Border Control Function). Service presented to S-CSCF in SIP messages trigger PES AS. AGCF has also certain service independent logic, for example on receipt of off-hook event from A-MGW, the AGCF requests the A-MGW to play dial tone. 37.3 Session handling One of the most important features of IMS, that of allowing for a SIP application to be dynamically and differentially (based on the user’s profile) triggered, is implemented as a filter-and-redirect signalling mechanism in the S-CSCF. The S-CSCF might apply filter criteria to determine the need to forward SIP requests to AS. It is important to note that services for the originating party will be applied in the originating network, while the services for the terminating party will be applied in the terminating network, all in the respective S-CSCFs. 37.3.1 Initial filter criteria An initial filter criteria (iFC) is an XML-based format used for describing control logic. iFCs represent a provisioned subscription of a user to an application. They are stored in the HSS as part of the IMS Subscription Profile and are downloaded to the S-CSCF upon user registration (for registered users) or on processing demand (for services, acting as unregistered users). iFCs are valid throughout the registration lifetime or until the User Profile is changed.[5] • Via VGW (VoIP-Gateway) or SIP Gateway/Adapter on customer premises. POTS phones via VOIP Gateway connect to P-CSCF directly. Operators mostly use session border controllers between VoIP gateways and P-CSCFs for security and to hide network topology. VoIP gateway link to IMS using SIP over Gm reference point. The conversion from POTS service over the z interface to SIP occurs in the customer premises The iFC is composed of: VoIP gateway. POTS signaling is converted to SIP • Priority - determines the order of checking the trigand passed on to P-CSCF. VGW acts as SIP user ger. agent and appears to P-CSCF as SIP terminal. 37.6. REFERENCES 171 • Trigger point - logical condition(s) which is verified against initial dialog creating SIP requests or standalone SIP requests. • Softswitch • Application server URI - specifies the application server to be forwarded to when the trigger point matches. • Mobile VoIP There are two types of iFCs: • Shared - When provisioning, only a reference number (the shared iFC number) is assigned to the subscriber. During registration, only the number is sent to the CSCF, not the entire XML description. The complete XML will have previously been stored on the CSCF. • Non-shared - when provisioning, the entire XML description of the iFC is assigned to the subscriber. During registration, the entire XML description is sent to the CSCF. • Voice over IP • SIMPLE • 3GPP Long-Term Evolution, UMB (4G network efforts that will use technologies like IMS) • Mobile broadband • Peer-to-peer video sharing • Video share • Image share • IP connectivity access network • Text over IP • Multimedia telephony (MMTel) 37.4 Security aspects of early IMS and non-3GPP systems It is envisaged that security defined in TS 33.203 may not be available for a while especially because of the lack of USIM/ISIM interfaces and prevalence of devices that support IPv4. For this situation, to provide some protection against the most significant threats, 3GPP defines some security mechanisms, which are informally known as “early IMS security,” in TR33.978. This mechanism relies on the authentication performed during the network attachment procedures, which binds between the user’s profile and its IP address. This mechanism is also weak because the signaling is not protected on the user– network interface. CableLabs in PacketCable 2.0, which adopted also the IMS architecture but has no USIM/ISIM capabilities in their terminals, published deltas to the 3GPP specifications where the Digest-MD5 is a valid authentication option. Later on, TISPAN also did a similar effort given their fixed networks scopes, although the procedures are different. To compensate for the lack of IPsec capabilities, TLS has been added as an option for securing the Gm interface. Later 3GPP Releases have included the Digest-MD5 method, towards a Common-IMS platform, yet in its own and again different approach. Although all 3 variants of Digest-MD5 authentication have the same functionality and are the same from the IMS terminal’s perspective, the implementations on the Cx interface between the S-CSCF and the HSS are different. • Voice call continuity • Push to talk • IMPS • Rich Communication Suite • Service capability interaction manager • Extensions to the SIP for the IP multimedia subsystem 37.6 References [1] Technical Specification Group Services and System Aspects (2006), IP Multimedia Subsystem (IMS), Stage 2, TS 23.228, 3rd Generation Partnership Project [2] Alexander Harrowell, Staff Writer (October 2006), A Pointless Multimedia Subsystem?, Mobile Communications International, archived from the original on September 2010 [3] “3GPP Release Descriptions”. 3GPP. [4] 3GPP, 23.228. “3GPP Stage 2 Specifications”. [5] 3GPP, 29.228. “3GPP Stage 2 Specifications”. 37.7 External links • A decent IMS tutorial 37.5 See also • 4G • IMS multi-page tutorial • IMS Call Flows • Poikselkä. Jerry (2010). Gonzalo.).]: Wiley. Matthew. IP MULTIMEDIA SUBSYSTEM . The IMS : IP multimedia concepts and services (2 ed. ed.8 Books • Camarillo. ISBN 1-4200-6459-2. ISBN 1-4200-92855. Boca Raton: CRC Press. Boca Raton: CRC Press. • Syed A. Mark. García-Martín. IMS : A New Model for Blending Applications. Miikka (2007). Chichester [u. ISBN 0-470-01818-6. Mohammed Ilyas. CHAPTER 37. IP multimedia subsystem (IMS) handbook. (2007). Chichester [u. Stafford.a.]: Wiley. Shih.a. ISBN 0-470-01906-9. (2009).). The 3G IP multimedia subsystem (IMS) : Merging the Internet and the Cellular Worlds (2 ed.172 37. Miguel A. Ahson. • Wuthnow. 95A was developed for Band Class 0 only. It is now being brella. the IS-2000 doc173 . In North America. access. and P_REV=5 is termed Interim Standard 95B (IS-95B) Phase II. with P_REV=5 only seeing minimal uptake in South Korea. 74). all radios can be active all the time. namely P_REV’s one through five. The IS-95B standards track provided for a merging of the TIA and ANSI standards tracks under the TIA. a competing system used in 2G GSM. cies. developed under the Telecommunications Industry Association (TIA) standards process. a TDMA technology). The term IS-95 generically applies to the earlier set of protocol revisions. CDMA-based standards have a significant economic advantage over TDMA-based standards.Chapter 38 IS-95 This article is about the mobile phone technology . P_REV=4 was by far the most popular variant of IS-95. was only defined for the thennew North American PCS band (Band Class 1. 800 MHz) under roughly the same time frame.1 Protocol revisions cdmaOne’s technical history is reflective of both its birth as a Qualcomm internal project. because network capacity does not directly limit the number of active radios. 1900 MHz). ISsend voice. For digital operation. a multiple access scheme for digital radio. IS-95 offered interoperation (including handoff) with the analog cellular network. the technology competed with Digital P_REV=6 and beyond fall under the CDMA2000 umAMPS (IS-136. or the oldest cellular standards that used frequency-division multiplexing. as in incremenphone number) between mobile telephones and cell sites. a later CDMAthe channel access method. and the world of then-unproven competing digital cellular standards under which it was developed. Since larger numbers of phones can be served by smaller numbers of cell-sites. It is a 2G mobile telecommunications standard that uses CDMA. J-STD008. data and signaling data (such as a dialed tele. for the North American cellular band (Band Class 0. see Code division multiple based standard. The term IS-95 properly refers to P_REV=1. For supplanted by IS-2000 (CDMA2000). Unlike TDMA “time division multiple access”. tal improvement over IS-95 in the TIA standards process. and was the first document that provided for interoperation of IS-95 mobile handsets in both band classes (dual-band operation). The proprietary name for IS-95 is cdmaOne. Besides technical improvements. Interim Standard 95 (IS-95) was the first ever 38. It was developed by Qualcomm and later adopted as a standard by the Telecommunications Industry Association in TIA/EIA/IS-95 release published in 1995. The immature style and structure of both documents are highly reflective of the “standardizing” of Qualcomm’s internal project. Samsung cdmaOne mobile phone disassembled CDMA-based digital cellular technology. published in 1995. P_REV=1 was developed under an ANSI standards process with documentation reference J-STD-008.IS-95A in the TIA standards process. TSB-74 was the next incremental improvement over CDMA permits several radios to share the same frequen. P_REV=4 is termed Interim Standard 95B (IS-95B) Phase I. to P_REV=2 is termed Interim Standard 95A (IS-95A). IS-95 and J-STD-008 have most technical details in common. CDMA or “code division multiple access” is a digital P_REV=3 is termed Technical Services Bulletin 74 (TSBradio system that transmits streams of bits (PN codes). They also provide backwards-compatibility to of 64 chips. yielding a rate of 1200 bit/s. 38. The paging channel base stations (BTS’s). The message is transmitted 32 bits per frame. Once a mobile has found a strong pilot channel. head information. and is time aligned to the IS-95 sysa GPS receiver so transmissions are tightly controlled in tem (i. and L3 to the call-processing state machine. 1. Data consists of network signaling and user traffic. Each . carry data from the network to the mobiles. IS-95 uments are much more mature in terms of layout and BTS sector in the network is assigned a PN offset in steps content. Both of these processes are described in more detail below. A set of mesperiod of 80 sages communicate detailed network overhead to the mo3 ms. The paging channel also carries higher-priority in order to operate in the optimal range of the mobile’s messages dedicated to setting up calls to and from the mopower amplifier. Other forward channels. encoded to 128 symbols. lot.174 CHAPTER 38. There is no data carried on the forward piIS-95. a Walsh code of length 64 and a pseudo-random noise The paging channel contains signaling messages transmitcode (PN code) of length 215 . All forward transmissions are QPSK with a chip rates used on the paging channel: 4800 bit/s or 9600 bit/s. A strong correlation peak result indicates the proximity of a BTS. Each signal is spread with Both rates are encoded to 19200 symbols per second. These symbols are then spread with the Walsh and PN sequences and transmitted. it registers with the network.2. At this point the mobile knows whether it is roamforward (network-to-mobile) and reverse (mobile-to. then optionally enters slotted-mode. radio signals are transmitted by channels starting with Walsh code 1. the Sync Channel Message. and performing a cross-correlation across all possible PN phases. L2 refers to the Media Access Control (MAC) and Link-Access Control (LAC) sublayers. which is an unmodulated PN sequence (in other words. the forward pilot allows mobiles to determine system timing and distinguish different BTS’s for handoff. radio signals are transmitted biles. Forward broadcast channels Every BTS dedicates a significant amount of output power to a pilot channel. and as many as seven. Once a mobile has parsed all the network overknown as a Short Code. The sync channel continually transmits a single message. and that it is “in service”. it is attempting to find pilot signals on the network by tuning to particular radio frequencies. When a mobile is “searching”. There are two possible time. the chip rate is biles. which has a length and content dependent on the P_REV.800 per second.800 per second and signals are spread with Walsh When a mobile is idle.1 Physical layer to develop a highly accurate synchronization to system IS-95 defines the transmission of signals in both the time. IS-95 is widely described as a three-layer stack. Generally.2 Protocol details SMSC BSC SCP BSC MSC MSC HLR BSC BSC MSC BSC Inne sieci PSTN i PLMN cdmaOne network structure The IS-95 standards describe an air interface. data to be transmitted is divided into frames of bits. a set of protocols used between mobile units and the network. circulating this information while the paging chanby the mobile. BTSs transmit at least one. BTSs transmit a sync channel spread with Walsh code 32. and its frame boundary is aligned to the pilot. it is mostly listening to a paging codes and the pseudo-random noise code. which is also channel. adding forward error correction redundancy. For the reverse direction.228. generating a frame of symbols. A frame of bits is passed through a convolutional encoder. GPS) 2-second roll-over. The sync channel frame is 80 3 ms long. spread with Walsh code 0). where L1 corresponds to the physical (PHY) layer.ing. With its strong autocorrelation function. Like the forward link. Every BTS is synchronized with frame time is 20 ms. yielding a PN roll-over ted from the network to all idle mobiles.e. Reverse link transmissions are OQPSK nel is free. it listens to the sync channel and decodes a Sync Channel Message 38. network) directions. including the PN offset used by the BTS sector. selected by their Walsh code. The Sync Channel Message contains information about the network. rate of 1.228. paging In the forward direction. the frame is decoded at each possible rate. P_REV=3 and beyond also provided rate set 2. the traffic channel carries frames of vocoder data. Active (slow) power control is also used on the forward traffic channels. SEE ALSO Forward traffic channels The Walsh space not dedicated to broadcast channels on the BTS sector is available for traffic channels. Capacity IS-95 and its use of CDMA techniques. the mobile sends signaling messages to the network indicating the quality of the signal. which could in theory offer 115200 bit/s to a user. 7200.2.3. or 9600 bit/s. 2400. 4800. Block Interleaver After convolution coding and repetition. as determined by the service in use (voice or data). Traffic channels may also carry circuit-switch data calls in IS-95. taking advantage of modern DSPs and rate set 2.5 External links • TR-45 Engineering Committee CDMA Standards Developing Group . 38.3 See also • PN code • Comparison of mobile phone standards • CDMA spectral efficiency 38. Typically. have their throughput limited according to Shannon’s theorem. The network will control the transmitted power of the traffic channel to keep the signal quality just good enough. a mobile is restricted to using the traffic channel. With CDMA. For voice calls. symbols are sent to a 20 ms block interleaver. Accordingly. Since voice and user data are intermittent. capacity improves with SNR and bandwidth. thereby keeping the noise level seen by all other users to a minimum. yielding rates of 1800. signals that are not correlated with the channel of interest (such as other PN offsets from adjacent cellular base stations) appear as noise. Under IS-95B P_REV=5. A frame format is defined in the MAC for the traffic channel that allows the regular voice (vocoder) or data (RLP) bits to be multiplexed with signaling message fragments.4 References 38. 3600. Where voice calls might tolerate the dropping of occasional 20 ms frames.2 Layer 2 Once a call is established. where complete signaling messages are passed on to Layer 3. P_REV=1 and P_REV=2 supported rate set 1. remedied the voice quality situation and are still in wide use in 2005. Every 20 ms frame may be transmitted at a different rate. IS-95 has a fixed bandwidth. the correct result is chosen. The variable-rate nature of traffic channels provide lower-rate frames to be transmitted at lower power causing less noise for other signals still to be correctly received. Like the paging channel. 38. which is a 24 by 16 array. a data call would have unacceptable performance without RLP. The variable-rate traffic frames are generated using the IS-95 Radio Link Protocol (RLP). More sophisticated vocoders. Very few mobiles or networks ever provided this feature. the traffic channels support variable-rate operation. and were responsible for some user complaints of poor voice quality. it was possible for a user to use up to seven supplemental “code” (traffic) channels simultaneously to increase the throughput of a data call. like any other communications system. providing a rate of 1200. and signals carried on other Walsh codes (that are properly time 175 aligned) are essentially removed in the de-spreading process. A number of different vocoders are defined under IS-95. or 14400 bit/s. These factors provide an inherently lower noise level than other cellular technologies allowing the IS-95 network to squeeze more users into the same radio spectrum. These channels carry the individual voice and data calls supported by IS-95. the earlier of which were limited to rate set 1. The signaling message fragments are pieced together in the LAC. where during a call. The mobile receiving a variable-rate traffic frame does not know the rate at which the frame was transmitted. and using the quality metrics of the Viterbi decoder. but fares well in the digital world because it takes active steps to improve SNR. traffic channels have a frame time of 20ms. RLP provides a mechanism to improve the performance of the wireless link for data.38. The receiver also uses the techniques of the rake receiver to improve SNR as well as perform soft handoff. e. 1X Advanced broadband Internet access. and China. In the United States. also known as 1x and 1xRTT. which is developed by 3GPP and used in Europe. a competing set of 3G standards. is the core CDMA2000 wireless air interface standard. It is developed by 3GPP2 as a backwards-compatible successor to second-generation cdmaOne (IS-95) set of standards and used especially in North America and South Korea.1 1X CDMA2000 1X (IS-2000). a voice frame once mobile technology standards for sending voice. Japan. including medium and link access control protocols and QoS.[4] 176 . It uses multiplexing techniques including code division multiple access (CDMA) • Data: CDMA2000 1xEV-DO (Evolution-Data Op. typically for • Voice: CDMA2000 1xRTT. These are: CDMA2000 1xEV-DO (Evolution-Data Optimized). orthogonal to (in quadrature with) the original set of 64.networks.. indicates the same radio frequency (RF) bandwidth as IS-95: a duplex pair of 1. The IS-95 data link CDMA2000 (also known as C2K or IMT [1] layer only provided “best efforts delivery” for data and Multi‑Carrier (IMT‑MC)) is a family of 3G circuit switched channel for voice (i. is a telecommunications standard for the wireless transmission of data through radio signals. evolutionary stages of the under. CDMA2000 compares to UMTS. CDMA2000 is a registered world – particularly those previously employing CDMA trademark of the Telecommunications Industry Associa. 39. meaning 1 times Radio Transmission Technology.25 MHz radio channels. and signaling data between mobile phones and cell sites. It is also used on the Globalstar satellite phone tion (TIA-USA). 1xRTT almost doubles the capacity of IS-95 by adding 64 more traffic channels to the forward link.by many mobile phone service providers around the 2000. Revision B.2 1xEV-DO The name CDMA2000 denotes a family of standards that represent the successive. every 20 ms). The designation “1x”. The 1X standard supports packet data speeds of up to 153 kbit/s with real world data transmission averaging 80–100 kbit/s in most commercial applications. data.as well as time division multiple access (TDMA) to timized): Release 0.[2] network. often abbreviated as EV-DO or EV. Revision A.Chapter 39 CDMA2000 39. Ultra maximize both individual user’s throughput and the Mobile Broadband (UMB) overall system throughput.Main article: Evolution-Data Optimized lying technology.[3] Huawei CDMA2000 EVDO USB wireless modem IMT-2000 also made changes to the data link layer for greater use of data services. It is standardized by 3rd Generation Partnership Project 2 (3GPP2) as part of the CDMA2000 family of standards and has been adopted All are approved radio interfaces for the ITU's IMT. 39.7. EXTERNAL LINKS 177 [3] 1X features/speeds, cdg.org, November 17, 2009 [4] Globalstar GSP 1700 satphone also loaded with EVDO [5] CDMA2000 | 3G Wireless. Qualcomm. Retrieved on September 18, 2013. [6] “CDG : CDMA Statistics”. CDMA Development Group. Retrieved June 13, 2015. [7] Qualcomm halts UMB project, Reuters, November 13, 2008 39.7 External links • TIA TR-45 Engineering Committee for CDMA Standards • 3GPP2 Standards and specifications BlackBerry smartphone displaying '1XEV' as the service status in the upper right corner. 39.3 1X Advanced 1X Advanced is the evolution of CDMA2000 1X. It provides up to four times the capacity and 70% more coverage compared to 1X.[5] 39.4 Networks See also: List of CDMA2000 networks The CDMA Development Group states that, as of April 2014, there are 314 operators in 118 countries offering CDMA2000 1X and/or 1xEV-DO service.[6] 39.5 History The intended 4G successor to CDMA2000 was UMB (Ultra Mobile Broadband); however, in November 2008, Qualcomm announced it was ending development of the technology, favoring LTE instead.[7] 39.6 References [1] “What really is a Third Generation (3G) Mobile Technology” (PDF). International Telecommunications Union. Archived from the original (PDF) on June 7, 2011. Retrieved October 28, 2012. [2] CDMA2000 trademark application, uspto.gov, November 17, 2009 • CDMA2000 Overviews of the CDMA2000 standards - 1X to UMB Chapter 40 Service layer In intelligent networks (IN) and cellular networks, service layer is a conceptual layer within a network service provider architecture. It aims at providing middleware that serves third-party value-added services and applications at a higher application layer. The service layer provides capability servers owned by a telecommunication network service provider, accessed through open and secure Application Programming Interfaces (APIs) by application layer servers owned by third-party content providers. The service layer also provides an interface to core networks at a lower resource layer.[1] The lower layers may also be named control layer and transport layer (the transport layer is also referred to as the access layer in some architectures). • IM-SSF 40.1.2 SIP Application Server The SIP Application Server (AS) performs the same function as a Telephony Application Server in a pre-IMS network, however it is specifically tailored to support the SIP signalling protocol for use in an IMS network. 40.1.3 OSA Service Capability Server An OSA Service Capability Server acts as a secure gateThe concept of service layer is used in contexts such as way between the IMS network and an application which Intelligent networks (IN), WAP, 3G and IP Multimedia runs upon the Open Services Architecture (this is typiSubsystem (IMS). It is defined in the 3GPP Open Ser- cally a SIP to Parlay gateway) vices Architecture (OSA) model, which reused the idea of the Parlay API for third-party servers. 40.1.4 IM-SSF In software design, for example Service-oriented architecture, the concept of service layer has a different mean- The IM-SSF (IP Multimedia Service Switching Funcing. tion) acts as a gateway between the IMS network and application servers using other telecommunication signalling standards such as INAP and CAMEL. 40.1 Service layer in IMS The service layer of an IMS architecture provides mul- 40.2 Service layer in SOA timedia services to the overall IMS network. This layer contains network elements which connect to the ServingIn service-oriented architecture (SOA), the service layer CSCF (Call Session Control Function) using the IP multiis the third layer in a five abstraction layer model. The media Subsystem Service Control Interface (ISC).[2] The model consists of Object layer, Component layer, Service ISC interface uses the SIP signalling protocol. layer, Process layer and Enterprise layer.[3] The service layer can be considered as a bridge between the higher and lower layers, and is characterized by a number of services 40.1.1 Elements of the IMS service layer that are carrying out individual business functions. The network elements contained within the service layer are generically referred to as 'service platforms’ however the 3GPP specification (3GPP TS 23.228 V8.7.0) defines several types of service platforms: 40.3 References [1] Kristofer Kimbler, Service Interaction in Next Generation Networks: Challenges and Opportunities. Feature Interactions in Telecommunications and Software Systems. Papers from the sixths International Workshop on Feature • SIP Application Server • OSA Service Capability Server 178 40.4. SEE ALSO Interactions in Telecommunications and Software Systems May 2000. Edition: illustrated. Published by: IOS Press, 2000. ISBN 1-58603-065-5, ISBN 978-1-58603065-0. [2] http://www.3gpp.org/ftp/Specs/html-info/23228.htm [3] Service-oriented Architecture Compass: Business Value, Planning, and Enterprise Roadmap. Author: Norbert Bieberstein, Sanjay Bose, Marc Fiammante, Keith Jones, Rawn Shah. Edition: illustrated. Published by: FT Press, 2005. ISBN 0-13-187002-5, ISBN 978-0-13-187002-4 40.4 See also • Service layers pattern • IP Multimedia Subsystem (IMS) • Open Services Architecture (OSA) • Hierarchical internetworking model • Multi-tier architecture 179 Chapter 41 Open Mobile Alliance The Open Mobile Alliance (OMA) is a standards body application protocols: WAP Forum (focused on browswhich develops open standards for the mobile phone in- ing and device provisioning protocols), the Wireless Vildustry. lage (focused on instant messaging and presence), The SyncML Initiative (focused on data synchronization), the Location Interoperability Forum, the Mobile Games Interoperability Forum and the Mobile Wireless Internet 41.1 Principles Forum. Each of these forums had its bylaws, its decisiontaking procedures, its release schedules, and in some inMission To provide interoperable service enablers stances there was some overlap in the specifications, causworking across countries, operators and mobile ter- ing duplication of work. The OMA was created to gather minals. these initiatives under a single umbrella. Members include traditional wireless industry players such as equipment and mobile systems manufacturers (Ericsson, Thomson, Huawei, ZTE, Reti Radiotelevisive Digitali, Nokia, Openwave, Sony, Philips, Motorola, Samsung, LG Electronics, Texas Instruments, Qualcomm) and mobile operators (Vodafone, Orange, T-Mobile, LG Telecom), and also software vendors (Microsoft, Sun Microsystems, IBM, Oracle Corporation, Symbian, Celltick, Expway, Mformation, InnoPath, Voluntary adherence adherence to the standards is en- Motive). tirely voluntary; the OMA does not have a mandative role. The OMA is not a formal governmentsponsored standards organization like the ITU, but a 41.3 Relation to other standards forum for industry stakeholders to agree on common bodies specifications for products and services. The goal is that by agreeing on common standards, stakeholders will be able to “share slices from a larger pie”. The OMA liaises with other standards bodies on a regular basis to avoid overlap in specifications: "FRAND" intellectual property licensing OMA members that own intellectual property rights (e.g. • 3GPP patents) on technologies that are essential to the realization of a specification agree in advance • 3GPP2 to provide licenses to their technology on “fair, reasonable and non-discriminatory” terms to other • IETF members. Network-agnostic The OMA only standardises applicative protocols; OMA specifications are meant to work with any cellular network technologies being used to provide networking and data transport. These networking technology are specified by outside parties. In particular, OMA specifications for a given function are the same with either GSM, UMTS or CDMA2000 networks. • W3C Legal status the OMA is a British limited company.[1] 41.2 History 41.4 Standard specifications The OMA was created in June 2002 as an answer to the The OMA maintains a number of specifications, includproliferation of industry forums each dealing with a few ing 180 41.5. SEE ALSO • Browsing specifications, now called “Browser and Content”, previously called WAP browsing. In their current version, these specifications rely essentially on XHTML Mobile Profile. • MMS specifications for multimedia messaging • OMA DRM specifications for Digital Rights Management 181 41.5 See also • OMA PAG • Linux Phone Standards Forum (LiPS) • LiMo Foundation • Open Handset Alliance • OMA Instant Messaging and Presence Service (OMA IMPS) specification, which is a system for instant messaging on mobile phones (formerly known as Wireless Village). • Mobile Platform • OMA SIMPLE IM Instant messaging based on SIPSIMPLE (see Session Initiation Protocol) • European Telecommunications Standards Institute (ETSI) • OMA CAB Converged Address Book, a social address book service standard. • List of wireless router firmware projects • OMA CPM Converged IP Messaging, the underlying enabler for Rich Communication Services. • OMA LAWMO (OMA LAWMO) Specifications for Lock and Wipe functionality LAWMO. • OMA LWM2M (OMA LWM2M) Specifications for Lightweight Machine to Machine functionality. • OMA Client Provisioning (OMA CP) specification for Client Provisioning. • V&D Labs, Mobile App Development • 3GPP 41.6 References [1] [2] dret.net Glossary WAP1 41.7 External links • Open Mobile Alliance • OMA Data Synchronization (OMA DS) specification for Data Synchronization using SyncML. • Open Mobile Alliance Publicly Available Documents • OMA Device Management (OMA DM) specification for Device Management using SyncML. • OMA Browsing V2.4 Release Specification • OMA BCAST specification for Mobile Broadcast Services. • OME RME specification for Rich Media Environment. • OMA PoC specification for Push to talk Over Cellular (called “PoC”). • OMA Presence SIMPLE specification for Presence based on SIP-SIMPLE (see Session Initiation Protocol). • OMA Service Environment • FUMO Firmware update • SUPL, an IP-based service for assisted GPS on handsets • MLP, an IP-based protocol for obtaining the position/location of mobile handset • WAP1, Wireless Application Protocol 1, 5-layer stack of protocols[2] • Google plans 2015 Project Ara launch in Puerto Rico, partnering with Ingram Micro, OpenMobile and Claro. Chapter 42 Telecoms & Internet converged Services & Protocols for Advanced Networks The Telecoms & Internet converged Services & livery Networks (CDN) and is now working on the speciProtocols for Advanced Networks (TISPAN) is a fication of the protocols applicable to the reference points standardization body of ETSI, specializing in fixed net- identified in this architecture (See ETSI TS 182 019) works and Internet convergence. It was formed in 2003 from the amalgamation of the ETSI bodies Telecommunications and Internet Protocol Harmonization Over 42.1 References Networks (TIPHON) and Services and Protocols for Advanced Networks (SPAN). [1] IEEE Wireless Communications, Volume 16, Issue 3 TISPAN’s focus is to define the European view of the Next Generation Networking (NGN), though TISPAN also includes much participation from regions outside Europe. Business Trunking Communications in ETSI 42.2 External links TISPAN NGN Release 1 was published in December 2005 and contained the architectural foundations and basic specifications required in support of PSTN replacement. The TISPAN NGN architecture is based on sharing common components between cooperating subsystems. The TISPAN NGN architecture complies with the general reference model for next generation networks defined in ITU-T Recommendation Y.2011 [1] and is therefore layered with a service stratum and a transport stratum. Each of these layers is further decomposed into subsystems that perform specific roles within the overall architecture. This allows new subsystems to be added over time to cover new demands and service classes. By making network resources, applications, and user equipment common to all subsystems, it ensures mobility of users, terminals and services as much as possible, even across administrative boundaries. A key subsystem is based on the architectures of 3rd Generation Partnership Project (3GPP) IP Multimedia Subsystem (IMS). TISPAN has been working with 3GPP to extend the IMS architecture with capabilities required in support of wire-line access. TISPAN NGN Release 2 was finalized early 2008, and added support for IPTV services and Business Communications[1] over the IMS. Since early 2008, TISPAN has begun work on the third release of its NGN specifications with prime focus on IPTV enhancements, Content Delivery Networks (CDN) and home networking. In 2011, TISPAN published the specification of a functional architecture for Content De- 182 • Official TISPAN web site • An introduction to the TISPAN architecture Chapter 43 GSM services Global System for Mobile Communications (GSM) services + noman are a standard collection of applications and features available to mobile phone subscribers all over the world. The netat the same frequency as the operator. Whenever a phone attaches. and also to pre• A mobile phone that is GSM compliant and operates vent “over the air” snooping of a user’s activity. or where bills are issued and settled after the service Every SIM card contains a secret key. The current cellular location of the phone (i. information about their identity (telephone number) and what services they are allowed to 43. a new area.2 Voice all calls 183 . called the International Mobile is activated by the operator once the billing rela.1 Accessing a GSM network In order to gain access to GSM services.ceive and make calls in any area where coverage is availpacity. it will search for the nearest mobile phone mast (also called a Base Transceiver Station/BTS) with the strongest signal in the operator’s frequency band. This is useful to prevent theft of service. Each geographic area has a database called the Visitor Location Register (VLR). This is generally called roaming from a customer transmitters on mobile devices. After activation the card is *#06#. Once the SIM card is loaded into the phone and the phone is powered on. and accommodate the relatively small battery ca. the Visitor Location Register must contact the Home Location Register to obtain the details for that phone. but also called visiting when describing the 43. which BTS it is at) is entered into the VLR record and will be used during a process called paging when the GSM network wishes to locate the mobile phone. which from the phone number). or visits. • A billing relationship with a mobile phone operator. ber (MSISDN) (the telephone number). Most phone work does this by utilising the Authentication Center and companies sell phones from third-party manufacturis accomplished without transmitting the key directly. access are stored in a “SIM record” in the Home Location Register (HLR). a user needs three things: underlying technical process.e. the phone is said to be attached The design of the service is moderately complex because to the network. its IMEI then programmed with the subscriber’s Mobile Sub. When a phone contacts the network. it must be able to locate a moving phone anywhere in the The key feature of a mobile phone is the ability to reworld.to locate stolen phones and facilitate monitoring. then there is said to be coverage in the area. The common standard makes it possible to use the same phones with different companies’ services. which contains details of all the mobiles currently in that area. After subscribers sign up. GSM is the world’s most dominant mobile phone standard.. This is usually either where services are paid for in advance of them being consumed (prepaid). or even roam into different countries. This can be found by dialing tionship is established. and weak radio able.Equipment Identity (IMEI). The GSM standards are defined by the 3GPP collaboration and implemented in hardware and software by equipment manufacturers and mobile phone operators. is used to provide authentication and encryption services. Personal information such as contact numbers of friends and family can also be stored on the SIM by the subscriber. called the Ki. The phone then identifies itself to the network through the control channel.may be checked against the Equipment Identity Register scriber Integrated Services Digital Network Num. ers. limited input/output capabilities. If a mast can be successfully contacted. Once this is successfully completed. Every GSM phone contains a unique identifier (different • A Subscriber Identity Module (SIM) card. which has been consumed (postpaid). perspective. When someone places a call to a mobile phone. So the first job of the ilarly. If the subscriber answers. including in other countries. If the subscriber does not respond to the paging request. This number is rescriber’s account. as ply (CFNRy) number. mobile. then it will request a temporary is allowed to continue. Once again. Once again. so that callers may leave a message. presses the send or talk key. and the call is forwarded there.a pre-determined Call Forward Not Reachable (CFNRc) mines whether the call should be routed to another num. acts as the “entrance” from exterior portions of the Public Switched It is also possible that the phone call is not answered. either due to being out of coverage. If so.184 43. • If the owner of the phone has previously requested that all incoming calls be diverted to another number. the operator may decide to set this ber (called a divert). calls may be made from the phone to any other phone on the global Public Switched Telephone Network. if any. and a normal telephone call follows. If Telephone Network onto the provider’s network. then the CFU number is returned to the Gateway MSC for immediate routing to that destination. The systems that monitor and route the call to the MSC where the called phone is provide the prepaid services are not part of the GSM stanroaming. the phone is free to roam anywhere in the is not being used) the Visited MSC routes the call to a operator’s network or on the networks of roaming partpre-determined Call Forward Busy (CFB) number. it deter. knows which Visitor Location Register cide to set this value by default to the voice mail of the (VLR) the phone is associated with. If that is the case. if the subscriber does not answer the call after a peGateway MSC is to determine the current location of the riod of time (typically 30 seconds) then the Visited MSC mobile phone in order to connect the call. If not. that is the MSRN maps back to the IMSI of the original phone number dialled. It does this by routes the call to a pre-determined Call Forward No Reconsulting the Home Location Register (HLR). • If the mobile phone is not currently associated with a Visited Location Register (because the phone has been turned off) then the Home Location Register returns a number known as the Call Forward Not Reachable (CFNRc) number to the Gateway MSC. if the Home Location Register knows that tional check is made to see if the subscriber has enough the phone is roaming in a particular Visited Locacredit to proceed.2 Incoming calls Gateway MSC contact When the call arrives at the Visited MSC. which checks the subscriber’s record held in the Visitor Location Register to see if the outgoing call is allowed. they dial the telephone number (also called a MSISDN) associated with the phone user and the call is routed to the mobile phone operator's Gateway Mobile Switching Centre. a speech path is created through the Visiting MSC and Gateway MSC back to the network of the person making the call. the operator may dedescribed above. as the name suggests. then the Visited MSC routes the call to When the HLR receives this query message. then this number is stored in the Home Location Register. the call layed back to the Gateway MSC.2. then it is continually monitored number (called an MSRN) from that VLR (using the and the appropriate amount is decremented from the subIMSI as the reference number. Many operators may set this value automatically to the phone’s voice mail number. If the subscriber is on a prepaid tariff (sometimes known as Pay As You Go (PAYG) or Pay & Go). The mobile phone may sometimes override the default setting. and the mobile phone sends a call setup request message to the mobile phone network via the nearest mobile phone base transceiver station (BTS). Simners. The user dials the telephone number. the MSC then routes the call in the same way that a telephone exchange does in a fixed network. If the call tion Register area. the call is rejected.1 CHAPTER 43. GSM SERVICES All Outgoing Once a mobile phone has successfully attached to a GSM network as described above.number. or their battery has gone flat/removed. which. the MSRN is used to determine which of the phones in this area is being called. then an addi• Finally. dard services. but instead an example of intelligent network services that a mobile phone operator may decide to implement in addition to the standard GSM ones. The call setup request message is handled next by the Mobile Switching Center. Locating and ringing the phone 43. The MSC pages all the mobile phone masts in the area that the IMSI is registered in order to inform the phone that there is an incoming call for it. Routing the call . or if it is to be routed directly to the value by default to the voice mail of the mobile so that callers can leave a message. mobile so that callers can leave a message. known as the Call Forward Unconditional (CFU) Number.2. When the credit reaches zero. and then used to is cut off by the network. The Gateway MSC. the subscriber is busy on another call (and call waiting As noted above. Circuit-switched connections do have the advantage of providing a constant. he or she may actually be charged for two simultaneous international phone calls—the first to get from the GMSC to the VMSC and the second to get from the VMSC to the Call Forward Busy or Call Forward No Reply number (typically the voice mailbox) in the subscriber’s country.3 Voice charges How speech is encoded during mobile phone calls During a GSM call. All codecs except AMR connecting to the Gateway MSC of the subscriber’s phone operate with a fixed data rate and error correction level.3. International roaming calls are often quite expensive. but using one of the GSM data ing calls are popular. iting MSC that completes the connection to the PSTN. Plans that include nationwide long distance and/or nation. Two circuit-switched data protocols are defined in the GSM standard: Circuit Switched Data (CSD) and HighSpeed Circuit-Switched Data (HSCSD).4 vices in the visited network as roaming charges will apply.3. Enhanced FullRate (EFR). DATA TRANSMISSION 185 A roaming user may want to avoid these forwarding ser.less link (using IRDA or Bluetooth). .3 Data transmission phones in a given geographic area. From the caller’s point of view. wide roaming at no additional charge over “local” outgo.receiving data via the Internet Protocol.43. may pay a surcharge for the connection time. These types of connections are typically charged on a per-second basis. speech is converted from analogue sound waves to digital data by the phone itself. or not answered. (Though older parts of the fixed Public Switched Telephone Network may use analog transmission. audio channel or an Ethernet link to transmit data).43. the subscriber. regardless of the amount of data sent over the link. keeping the voice signal entirely within the home country and thus avoiding the double charge. The AT commands ception of receiving a call while the subscriber is roam. and as a result some companies require subscribers to grant explicit permission to receive calls while roaming to certain countries.2. 43. even though it is the vis. 43. some networks’ GMSCs connect unanswered calls directly.2. The speech codecs used in GSM are See also: Mobile telephony § Tariff models called Half-Rate (HR). If a subscriber is roaming on a different company’s network. Australia & Argentina GSM phones can also be controlled by a standardised only charge their subscribers for outgoing calls. be charged a higher rate. Full-Rate (FR). Special prefixes are used to designate mobile numbers so that callers are In addition to general Internet access. just as a traditional phone call allocates an audio channel of a certain quality between two phones for the duration of the call. other special seraware they are calling a mobile phone and therefore will vices may be provided by the mobile phone operator. for use as a network interface (just like a modem or Ethernet card. Asia (except Hong Kong.The mobile may also be connected to a desktop computer. any long distance charges are billed as act like any other computer on the Internet.) The digital algorithm used to encode speech signals is called a codec. However. Mobile subscribers pay for the connection time (typically using in-plan or The GSM standard also provides separate facilities for prepaid minutes) for both incoming and outgoing calls. guaranteed quality of service. sending and if they originate at the GMSC. or PDA. Some Macau (Macao) and Singapore).Hayes AT command set through a serial cable or a wireing calls are free to the mobile subscriber with the ex. This allows a mobile phone to For outgoing calls. it does not matter where the mobile subscriber is. As mobile numbers are given standard geographic numbers according to the North American Numbering Plan. such as SMS. Incom. callers typically pay a algorithms. instead of the caller. and transmitted through the mobile phone network by digital means. callers pay the cost of AMR also known as HD voice. busy. which is useful for real-time applications like video conferencing. This is because a certain amount of bandwidth is dedicated to the connection regardless of whether or not it is needed. such as when his or her phone is off.laptop. regardless of the actual location of the phone. protocols described below instead of a PSTN-compatible Mobile networks in Europe. as the technical process of connecting the call is the same. When a subscriber is roaming internationally and a call is forwarded to his or her voice mail. transmitting digital data.can control anything from ring tones to data compression ing as described below. callers pay the same to reach fixed phones and mobile 43. However.1 Circuit-switched data protocols A circuit-switched data connection reserves a certain amount of bandwidth between two points for the life of a connection. higher rate when calling mobile phones. Adaptive Multirate (AMR) and Wideband In the United States and Canada. company. • Advice of Charge (AoC). • Barring of Incoming Calls. LLC. like instant messaging.[1] This helps users by preventing bill shock[2] and reduces the load on the mobile network operator's customer service department. • Calling Line tion/restriction. • Explicit Call Transfer (ECT). such as at the end of every call. Many mobile service operators use their SMSCs as gateways to external systems. Click on the “How to Add Funds to My Account” tab to see the original quoted text.4 billion people by the end of 2007.3. To help keep you updated. 1 November 2002. Retrieved 23 September 2011. Instead. this service is rarely used because the calculation is more complex than the standard allows. and other mobile operators (often using the de facto SMPP standard for SMS exchange). You also receive balance notifications at the end of each phone call as well as after sending and receiving messages. SMS text messages may be sent by mobile phone users to other mobile users or external services that accept SMS. 43. • Call forwarding. 43.5G technology. or 2. incoming SMS news feeds. [5] “Advice of Charge”. Airvoice Wireless. and is usually a cheaper alternative for applications that only need to send and receive data sporadically. Virgo Publishing. MTN Irancell. Balance notifications: Your balance is also automatically displayed on your handset briefly after every chargeable call you make or message you send. [3] “Plans: Pay as you Go”.3 phone. Short Message Service (SMS) Main article: Short message service Short Message Service (more commonly known as text messaging) has become the most used data application on mobile phones. you will receive an automated recording when your account balance reaches $2. Identification presenta- • Closed User Group (CUG). Multiple GPRS users can share a single unused channel because each of them uses it only for occasional short bursts. Irancell will itself send you the cost of the last call and the balance of your airtime. including the Internet. However. The advantage of packet-switched connections is that bandwidth is only used when there is actually data to transmit. This message will be played on your first outgoing call of the day until you add more airtime or for the last 5 days of service.2 CHAPTER 43. .[3][4][5] • Call Hold. Giffgaff. GPRS is usually described as a 2. see the main article for more information. • Barring of Outgoing Calls.6 External links • GSM Call Flows and Sequence Diagrams Detailed call flow diagrams describing GSM call setup. This service estimates the call cost for display on the user’s mobile 43.3. some operators offer subscribers SMS-based balance and call cost notifications sent at predetermined times. Billing World. Retrieved 27 December 2011. with 74% of all mobile phone users worldwide already as active users of SMS. in practice. GPRS does this by sending packets to the local mobile phone mast (BTS) on channels not being used by circuit-switched voice calls or data connections.186 43. The SMSC is a central routing hubs for Short Messages. which was incorporated into the GSM standard in 1997. see the main article for details. The messages are usually sent from mobile devices via the Short Message Service Centre using the MAP protocol. This type of connection is thus generally billed by the kilobyte instead of by the second.5 References [1] ETSI: Advice of Charge (AoC) Supplementary Services Stage 1 [2] “Advice of Charge: Simplifying Wireless Data Pricing”. and 5 days before your expiration date reminding you to refill your account. • Multiparty service. [4] “How do I check my giffgaff balance?".4 Supplementary Services See also GSM codes for supplementary services. Retrieved 23 September 2011. This service allows a user who has two calls to connect these two calls together and release its connections to both other parties. The SMS standard is also used outside of the GSM system. 43. • Call Waiting. GSM SERVICES General (GPRS) Packet Radio Service The General Packet Radio Service (GPRS) is a packetswitched data transmission protocol. location update and handover. Retrieved 27 December 2011. It is backwardscompatible with systems that use pre-1997 versions of the standard.00 or below. 6.43. EXTERNAL LINKS • GSM Call Flows and Tutorial Detailed call flow diagrams • GSM Gateway Detailed call flow diagrams • IQSIM European leader in mobile communication routers 187 . Chapter 44 Universal Mobile Telecommunications System “3GSM” redirects here. 2 GMSC Nc MSC Iur Uu 4 Gf. been or are in the process of being upgraded with HighSpeed Downlink Packet Access (HSDPA). These speeds are significantly faster than the 9. using a next generation air interface technology based based on the competing cdmaOne technology. Unlike EDGE (IMT Single-Carrier. see Since 2006. Developed ing on improving the uplink transfer speed with the Highand maintained by the 3GPP (3rd Generation Partner. referred to as Freedom of Mobile Multimedia Access (FOMA)[1] or 3GSM. 44. Bluetooth or USB. UMTS upon orthogonal frequency-division multiplexing. The high data speeds of UMTS are now most often utilised for UMTS specifies a complete network system. For the mobile exhibition.Sv IuPS SGSN Gi GPRS PS : Packet Switched Gn Gc Gp GGSN Gd EIR SMS-GMSC PS & CS CN : Core Network Internet UMTS Network Architecture UMTS combines three different air interfaces.2002 with a heavy emphasis on telco-provided mobile apciency and bandwidth to mobile network operators. based on GSM) and CDMA2000 (IMT Multi-Carrier). UMTS networks in many countries have Mobile World Congress. UMTS is a component of the International 3GPP Long Term Evolution (LTE) project plans to move Telecommunications Union IMT-2000 standard set and UMTS to 4G speeds of 100 Mbit/s down and 50 Mbit/s compares with the CDMA2000 standard set for networks up.2 Mbit/s for High-Speed Downlink Packet Access (HSDPA) handsets in the downlink connection. HSDPA enables downlink (UMTS) is a third generation mobile cellular system transfer speeds of up to 21 Mbit/s. Web—either directly on a handset or connected to a comThe technology described in UMTS is sometimes also puter via Wi-Fi. or UTRAN). sometimes The Universal Mobile Telecommunications System known as 3.Speed Uplink Packet Access (HSUPA). Work is also progressfor networks based on the GSM standard. uses wideband code division multiple access (W-CDMA) The first national consumer UMTS networks launched in radio access technology to offer greater spectral effi. multiple 9.6 kbit/s of a single GSM error-corrected circuit switched data channel.[2] Users in deployed networks can expect a transfer rate of up to 384 kbit/s for Release '99 (R99) handsets (the original UMTS release). and Access Network.2 Technology Structure of an UMTS network 1 PSTN 4 2 3 5 6 7 8 # 0 9 * PSTN ME : Mobile Equipment MT/TE 44.1 Features VLR 1 CS : Circuit Switched cell Nb Iub 1 4 2 3 5 6 7 8 9 # 0 * 6 7 8 9 # 0 * G E CS-MGW B 1 4 Node B UE : User Equipment UTRAN : Universal Terrestrial Radio Access Network / RNS : Radio Network System MS : Mobile Station AN : Access Network D HSS 2 3 5 6 7 8 9 # 0 * C MSC server H HLR AuC F RNC Cu USIM UICC 3 5 Mc IuCS UMTS supports maximum theoretical data transfer rates of 42 Mbit/s when Evolved HSPA (HSPA+) is implemented in the network.4 kbit/s for CDMAOne channels.6 kbit/s channels in High-Speed Circuit-Switched Data (HSCSD) and 14. plications such as mobile TV and video calling. which inInternet access: experience in Japan and elsewhere has cludes the radio access network (UMTS Terrestrial Radio shown that user demand for video calls is not high. and 7. or MAP) and the authentication of larity in favour of high-speed access to the World Wide users via SIM (subscriber identity module) cards. Longer term. GSM's Mobile Application Part (MAP) core. the ship Project).5G. 188 . UMTS requires new base stations and new frequency allocations. Currently. and the GSM family of speech codecs. the core network (Mobile telco-provided audio/video content has declined in popuApplication Part. competing CDMA2000 system uses one or more avail. Some carriers such as T-Mobile use band numbers to identify the UMTS frequencies. 189 was already used. and Band V (850 MHz).2.84 Mcps High Chip Rate (HCR)) Main article: W-CDMA (UMTS) W-CDMA uses the DS-CDMA channel access method Main article: TD-CDMA UMTS-TDD's air interfaces that use the TD-CDMA channel access technique are standardized as UTRATDD HCR. Unlike the other air interfaces. Please note that the terms W-CDMA. TD-CDMA is a part of IMT-2000 as IMT CDMA TDD. which uses increments of 5 MHz of spectrum.1 Air interfaces UMTS provides several different terrestrial air interfaces. W-CDMA (IMT Direct Spread) is used.[3] All air interface options are part of ITU's IMT-2000. W-CDMA systems are widely criticized for their Like TD-CDMA. allowing deployment in tight frequency bands. cation.[6] The time slots (TS) are allocated in fixed percentage for downlink and uplink. 1710–1755 MHz and UMTS also specifies the Universal Terrestrial Radio 2110–2155 MHz are used instead. TD-SCDMA (UTRA-TDD 1. allowing deployment in even tighter frequency bands than TDCDMA. In the currently most popular variant for cellular mobile telephones. Unlike W-CDMA. TD-SCDMA is known as IMT large spectrum usage.but has been added in Release 4 of the specification. each slice divided into 10ms frames containing fifteen time slots (1500 per second). meaning uplink and downlink are within the same band). Band IV (1700/2100 MHz). as the 1900 MHz band Access Network (UTRAN). TECHNOLOGY 44.Main article: UTRAN to-base (uplink) and 2110–2200 MHz for the base-tomobile (downlink). countries that acted relatively slowly in allocating new frequencies specifically for 3G services (such as the United States). For example. some countries’ UMTS operators use the 850 MHz and/or 1900 MHz bands (independently. In contrast.28 Mcps Low Chip Rate (LCR)) Main article: TD-SCDMA TD-SCDMA uses the TDMA channel access method combined with an adaptive synchronous CDMA component[7] on 1. the Chinese patent owners.2. the main incentive for development of this Chinese-developed standard was avoiding or UMTS base station on the roof of a building reducing the license fees that have to be paid to nonwith a pair of 5 MHz wide channels. While they suggest covering just a channel access method (namely a variant of CDMA). 44. which is composed of mul- .[4] W-CDMA is a part of IMT-2000 as IMT Direct Spread. Band I (2100 MHz).and downstream.2. TD-CDMA is used to multiplex streams from or to multiple transceivers.2 Radio access network The specific frequency bands originally defined by the UMTS standard are 1885–2025 MHz for the mobile. TD-CDMA and TD-SCDMA are misleading. New Zealand by Telecom New Zealand on the XT Mobile Network and in Australia by Telstra on the Next G network. notably in the US by AT&T Mobility. However.TD-SCDMA was not part of UMTS from the beginning able 1.6 MHz slices of spectrum. they are actually the common names for the whole air interface standards. called UMTS Terrestrial Radio Access (UTRA).44. W-CDMA (UTRA-FDD) TD-CDMA (UTRA-TDD 3. In the US. which has delayed deployment in CDMA TDD within IMT-2000.[5] While UMTS2100 is the most widely deployed UMTS band.25 MHz channels for each direction of communi. it does not need separate frequency bands for up. possibly using different terrestrial air The CN can be connected to various backbone networks. In Europe. the high prices paid put some European telecom operators close to bankruptcy (most notably KPN).UMTS network at 1900 MHz and now offers subscribers ple migration for existing GSM operators. Acknowledge Mode (AM). freed up some of the 2100 MHz range for 3G services. Cingular renamed itself AT&T Mobility and is rolling out some cities with With Mobile Application Part.8 billion for six licenses. The netto GERAN (GSM/EDGE RAN). work (ISDN) telephone network. measurements. radio bearer services. RRC protocol handles connection establishment. The functionality of AM entity resembles TCP operation whereas UM operation resembles UDP operation. security and handover decisions. the latter of which is also a part of IMT-2000. Because of that. and allowing (mostly) work layer (OSI 3) includes the Radio Resource Managetransparent switching between the RANs according to ment protocol (RRM) that manages the bearer channels available coverage and service needs. UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM tiple base stations. In TM mode. the cost of T-Mobile's rollout of UMTS in the US focused on the obtaining new spectrum licenses and overlaying UMTS 1700 MHz band. such as the Internet or an Integrated Services Digital NetUMTS and GSM/EDGE can share a Core Network (CN). Over the last few years some operators have written off some or all of the license costs. interface standards and frequency bands. MAC handles the scheduling of data on air interface depending on higher layer (RRC) configured parameters. In Canada. The 2100 MHz band (downlink around 2100 MHz and uplink around 1900 MHz) allocated for UMTS in Europe and most of Asia is already used in North America. Signaling messages are sent on Signaling Radio Bearers (SRBs) and data packets (either CS or PS) are sent on data RBs. sometimes collectively referred to as UTRAN/GERAN.3 Spectrum allocation The UE (User Equipment) interface of the RAN (Radio Access Network) primarily consists of RRC (Radio Resource Control). the a number of dual-band UMTS 850/1900 phones. Main article: UMTS frequency bands The set of properties related to data transmission is called Radio Bearer (RB). This allows a sim. Ciphering ensures that no one listens to your data on the air interface. RB includes RLC information and RB mapping. Unacknowledge Mode (UM). In any event. and the auction mechanisms for allocation set up in some countries resulted in some extremely high prices being paid for the original 2100 MHz licenses. a trend that is expected to expand over Europe in the next 1–3 years. The 1900 MHz range is used for 2G (PCS) services. Both integrity and ciphering are applied for SRBs whereas only ciphering is applied for data RBs. two of which were subsequently abandoned and written off by their purchasers (Mobilcom and the Sonera/Telefonica consortium). This set of properties decides the maximum allowed data in a TTI (Transmission Time Interval). RRC and NAS messages go on SRBs. Cingular acquired AT&T Wireless in 2004 and has since then Main article: Mobile Application Part launched UMTS in select US cities. RLC (Radio Link Control) and MAC (Media Access Control) protocols. Over 130 licenses have already been awarded to operators worldwide (as of December 2004). Integrity validates the resource of messages and also makes sure that no one (third/unknown party) on the radio interface has modified the messages. RLC protocol primarily divides into three Modes— Transparent Mode (TM). UMTS uses the same a UMTS network at 850 MHz to enhance its existing core network standard as GSM/EDGE. data will be sent to lower layers without adding any header to SDU of higher layers. However. 44.2. Security includes two procedures: integrity and ciphering. In Germany. migration path to UMTS is still costly: while much of the core infrastructure is shared with GSM. Regulators have. bidders paid a total €50.190 CHAPTER 44. between the mobile terminals and the fixed network. however. and 2100 MHz range is used for satellite communications. inUMTS’s and GSM/EDGE’s radio access networks are cluding the handovers. together with a different range around 1700 MHz for the uplink. 44. notably in the UK and Germany. all three Finnish carriers began to use 900 MHz UMTS in a shared arrangement with its surrounding 2G GSM base stations for rural area coverage. It has been suggested that these huge license fees have the character of a very large tax paid on future income expected many years down the road. Between 2007 and 2009. UMTS networks are often combined with GSM/EDGE. AT&T Wireless launched UMTS services in the United States by the end of 2004 strictly using the existing 1900 MHz spectrum allocated for 2G PCS services. UMTS coverage is being provided on the 850 at existing towers is high. RB mapping decides the mapping between RB<>logical channel<->transport channel. UMTS (and GERAN) making UTRAN an alternative radio access network include the three lowest layers of OSI model. specifying WCDMA radio access technology that builds on GSM. the license process occurred at the tail end of the technology bubble.3 Core network . UMTS phones can use a Universal Subscriber Identity Module. meaning USIM card based roaming was possible (transferring the USIM card into a UMTS roaming or GSM phone when travelling). T-Mobile has launched a network in the US operating at 1700 MHz (uplink) /2100 MHz (downlink). and the phone will take on the user details of the (U)SIM. almost all UMTS phones are UMTS/GSM dual-mode devices. A UMTS phone and network must support a common frequency to work together. Most UMTS licensees consider ubiquitous.1 in place). and enables a network to identify and authenticate the (U)SIM in the phone. The early 3G handsets and modems were specific to the frequen- . new providers Wind Mobile. Telstra currently provides UMTS service on this network. branded as NextG. Vodafone is also building a 3G network using the 900 MHz band. and these bands also have been adopted elsewhere in the US and in Canada and Latin America. In 2002. Bell and Telus share the network. In India. regional areas where greater distances separate base sta. the (U)SIM provides storage space for phone book contact. Roaming charges are usually significantly higher than regular usage charges. Because of the frequencies used. To enable a high degree of interoperability. so if a UMTS phone travels outside of UMTS coverage during a call the call may be transparently handed off to available GSM coverage. and also on the 2100 MHz UMTS network. and are best suited to Japan was the first country to adopt 3G technologies. Mobilicity and Videotron have begun operations in the 1700 MHz band. Australian telco Telstra replaced its existing CDMA network with a national UMTS-based 3G network. beginning with the larger cities and then expanding over to smaller cities. A (U)SIM can be moved to another UMTS or GSM phone. Different countries support different UMTS frequency bands – Europe initially used 2100 MHz while the most carriers in the USA use 850 MHz and 1900 MHz. INTEROPERABILITY AND GLOBAL ROAMING MHz and 1900 MHz bands on the Rogers and Bell-Telus networks. This is a global standard of identification. through a co-ownership of the owning and administrating company 3GIS. USIM (based on GSM’s SIM) and also work (including UMTS services) with GSM SIM cards. an early (2003) UMTS handset All of the major 2G phone manufacturers (that are still in business) are now manufacturers of 3G phones. have been designed to roam easily onto other UMTS networks (if the providers have roaming agreements 44. meaning it is the (U)SIM (not the phone) which determines the phone number of the phone and the billing for calls made from the phone. 191 are now 11 different frequency combinations used around the world—including frequencies formerly used solely for 2G services. transparent global roaming an important issue. UMTS phones usually support several different frequencies in addition to their GSM fallback.4.and since they had not used GSM previously they had tion and subscriber. Both NTT DoCoMo and SoftBank Mobile (which launched 3G in December UMTS phones (and data cards) are highly portable—they 2002) now use standard UMTS. Recently. operating in the 850 MHz band. and the 900 MHz band in regional areas. no need to build GSM compatibility into their handsets Carriers in South America are now also rolling out 850 and their 3G handsets were smaller than those available elsewhere. In addition. work was the first commercial UMTS network—using a pre-release specification.[8] it was initially incompatible with the UMTS standard at the radio level but used stan44. early models of UMTS phones designated for the United States will likely not be operable elsewhere and vice versa. Roaming agreements between networks allow for calls to a customer to be redirected to them while roaming and determine the services (and prices) available to the user. There Handsets and modems The Nokia 6650. BSNL has started its 3G services since October 2009.4 Interoperability and global dard USIM cards. Handsets can store their data on their own memory or on the (U)SIM card (which is usually more limited in its phone book contact information).4. In 2008. NTT DoCoMo's FOMA 3G netMHz networks. This company is also co-owned by Hutchison 3G Australia. The 850 MHz and 900 MHz bands provide greater coverage compared to equivalent 1700/1900/2100 MHz networks. In addition to user subscriber information and authentication information. Optus is currently rolling out a 3G network operating on the 2100 MHz band in cities and most large towns.44. and this is the primary network used by their customers. phones can also act as a mobile WLAN access point. Canada and USA have a common share of frequencies. Apple’s iPhone 4 contains a quadband chipset operating on 850/900/1900/2100 MHz.UMTS and other cellular networks in densely populated. in the US D. WiMAX and Flash-OFDM. being developed by 3GPP just as UMTS. including the N8 and E7. along with has recently released a range of phones that have UMTS-FDD. as a complement for rural areas. In many markets however. it has only been deployed for domestic cordThere are very few 3G phones or modems less phones and private in-house networks. the amount of • Serving GPRS Support Node (SGSN) (vendor despectrum available is 5 MHz in each direction. but not all. it usually co-exists with UMTS.5 Other competing standards From a GSM/GPRS network. Many other phones are offering more than one band On the Internet access side. Unlike TD-CDMA (UTRA-TDD 3. This and CDMA2000’s narrower bandwidth requirements make it easier to deploy • Mobile Switching Center (MSC) (vendor depenin existing spectra. not both. Another competitor to UMTS is EDGE (IMT-SC). as legislative hurdles exist to co-deploying From a GSM/GPRS communication radio network. available supporting all 3G frequencies All of these competitors have been accepted by ITU as (UMTS850/900/1700/1900/2100 MHz). regardless of their choice of computer (such as a tablet PC or a PDA). it is used as a temporary solution preceding UMTS roll-out or • Base station controller (BSC) • Base transceiver station (BTS) They can remain in the network and be used in dual network operation where 2G and 3G networks co-exist while network migration and new 3G terminals become available for use in the network. Using a cellular router. Instead. China’s TD-SCDMA standard is often seen as a competitor.84 Mcps High Chip Rate. PCMCIA or USB card.0. allowing usage in the majority of countries where UMTS-FDD is deployed. UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM cies required in their country. For example. In some. so that in some cases absolutely no knowledge of technology is required to get online in moments. • Visitor Location Register (VLR) CDMA2000 is an evolutionary upgrade to an existing 2G standard. as do most European countries. the lack of vendors’ support is preventing it from being a real competitor. which is developed by the 3GPP2. 44. cdmaOne. Using a phone that supports 3G and Bluetooth 2. This is facilitated by the fact that GSM/EDGE and UMTS specification are jointly developed and rely on the same core network. Some software installs itself from the modem. TD-SCDMA has been added to UMTS' Release 4 as UTRA-TDD 1. A stanpendent) dard UMTS system would saturate that spectrum. quicker. the co-existence issue is of little relevance. customers are able to access 3G broadband services. the following network elements can be reused: The main competitor to UMTS is CDMA2000 (IMT• Home Location Register (HLR) MC). The UMTS network introduces new network elements that function as specified by 3GPP: . However.6 Migrating from GSM/GPRS to UMTS 44. leveraging existing GSM spectrums. Where • Gateway GPRS Support Node (GGSN) CDMA2000 is deployed. It is also much easier. For example. it is suitable for both micro and macro cells. E. which is an evolutionary upgrade to the 2G GSM system. Nokia part of the IMT-2000 family of 3G standards. cases. and is able to operate within the • Equipment Identity Register (EIR) same frequency allocations. Pentaband 3G coverage. However. The article UMTS frequency bands is an overview of UMTS network frequencies around the world.192 CHAPTER 44. EDGE is not a true competitor. and considerably cheaper for wireless carriers to “bolt-on” EDGE functionality by upgrading their existing GSM transmission hardware to support EDGE rather than having to install almost all brand-new equipment to deliver UMTS. the following elements cannot be reused: two standards in the same licensed slice of spectrum. and F PCS spectrum blocks. existdent) ing GSM operators only have enough spectrum to imple• Authentication Center (AUC) ment either UMTS or GSM. Some smart. Unlike UMTS. competing systems include which still enables extensive roaming. too. which meant they could only roam to other countries on the same 3G frequency (though they can fall back to the older GSM standard). UTRA-TDD HCR) which complements W-CDMA (UTRA-FDD). multiple Bluetooth-capable While DECT is technically capable of competing with laptops can be connected to the Internet. urban areas. allowing dual-mode operation including vertical handovers.28 Mcps Low Chip Rate (UTRA-TDD LCR). UMTS had problems in many countries: tures and improve upon existing ones. In a GSM system the MSC handles all the circuit switched operations like connecting A.1 Security issues works. defraud users and cellular carriers. In lax security. telephony and data over UMTS requires more power than on comparable GSM networks. and 2100 The evolution of UMTS progresses according to planned MHz bands) handsets are becoming more commonplace.7 Problems and issues ported on widespread marketing of surveillance systems using Signalling System No. RELEASES • Node B (base transceiver station) • Radio Network Controller (RNC) • Media Gateway (MGW) 193 Even with current technologies and low-band UMTS.callers anywhere in the world. Other manufacturers indicate different battery lifetime for UMTS mode compared to GSM mode as well. As is the case The German Telekom and Vodafone declared the same with GSM900 today.5 km (0. with the • Location services handset only changing back to UMTS after hanging up. for Mobile Communications (GSM).1 Release '99 3 network. and 1900 44. . news broke that SS7’s very own functions.or to the interoperability of existing UMTS-2100 equipment. As battery and network technology improve. In UMTS the Media gateway (MGW) take care of all data transfer in both circuit and packet switched net44. the Washington Post re44.7. However. 1800. UMTS networks initially required a higher base station density. 1700 / 2100. Their release of the iPhone 3G quotes talk time on UMTS as half that available when the handset is set to use GSM. Customers found their connections being dropped as handovers were • 384 kbit/s packet switched possible only in one direction (UMTS → GSM).2 Release 4 used. SGSN handles all the packet switched operations and transfers all the data in the network.8. alternative bands are used.and Bsubscriber through the network. The nodes are renamed to MSC-server and GSN-server. including the United States. however with the growing use of lower-frequency bands (such as 850 and 900 MHz) this is no longer so.[10] cated spectrum differently from the ITU recommendaIn December 2014.problem is global and can only be fixed with a telecompears as though UMTS is not suffering as much from munication system-wide solution. Apple Inc. 900. preventing record encrypted calls and texts for later decryption. as many UMTS handsets are multi-band in both UMTS and GSM modes.day that they had fixed gaps in their networks.[12] handset band compatibility issues as GSM did. In most networks around the world this is no longer an • Call service: compatible with Global System issue. have allo. quad-band GSM (850. related to • 64 kbit/s circuit switch problems with handover from UMTS to GSM. The functionality of MSC and SGSN changes when going to UMTS. Each release is designed to introduce new feaIn its early days. so that the standard bands most commonly used tions can be repurposed for surveillance. in order to listen to calls in real time or to those countries. cited[9] UMTS power consumption as the reason that the first generation iPhone only supported EDGE. 7 (SS7) protocols to locate Some countries. Penta-band (850. standard UMTS 2100 MHz equip. this issue is diminishing. Another significant issue involved call reliability. because of its for UMTS (UMTS-2100) have not been available.8 Releases MHz bands). 900. one base station needed to be set up every 1–1. a debut handset on Hutchison’s 44. releases. For fully-fledged UMTS in• Voice quality features – Tandem Free Operation corporating video on demand features. it ap. MSC and SGSN control MGW operations.93 mi).8.8. This was the case when only the 2100 MHz band was being 44. As early as 2008 it was known that carrier networks can be used to surreptitiously gather user location information.44.[11] and requiring the design and manufacture of different equipment for the use in these markets. weighed more than 200 grams and even fea• Bearer services tured a detachable camera to reduce handset weight. Overweight handsets with poor battery life were first to arrive on a market highly sensitive to weight and form factor. based on Universal Subscriber Identity Module (USIM) Compared to GSM.62–0. and 1900 MHz bands) and tri-band UMTS (850.[10] In August 2014. 1900. but that the ment will not work in those markets. The Motorola A830. • Edge radio This has led to increasing rollout of the lower-band net• Multimedia messaging works by operators since 2006. 3 Release 5 • 3GPP: the body that manages the UMTS standard. UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM • MExE (Mobile Execution Environment) 44. • HSDPA • PDCP • IP Multimedia Subsystem (IMS) • Subscriber Identity Module 44.194 CHAPTER 44.9 See also • Improved location services • List of Deployed UMTS networks • IP Multimedia Services (IMS) • 3G • TD-SCDMA (UTRA-TDD 1. etc.5 Release 7 • W-CDMA 2100 • TD-SCDMA Other. • IPv6. non-UMTS.8. • UMTS frequency bands • Multimedia broadcast and multicast • UMTS channels • Improvements in IMS • W-CDMA: the primary air interface standard used by UMTS.8. ODMA: a UMTS TDD mode communications relaying protocol • Improvements in GERAN. managed by the 3GPP2 • 64 QAM. MIMO • FOMA • Voice over HSPA • WiMAX: a newly emerging wide area wireless technology. • HSDPA. the 3GPP project to evolve UMTS towards 4G capabilities. • GAN/UMA: A standard for running GSM and UMTS over wireless LANs. HSUPA: updates to the W-CDMA air interface. MExE.28 Mcps low chip rate) 44.8.8. IP transport in UTRAN • Opportunity Driven Multiple Access.6 Release 8 • Dual-Cell HSDPA • ETSI Other information • Mobile modem 44.8. • 3GPP Long Term Evolution.7 Release 9 • Dual-Cell HSUPA • Spectral efficiency comparison table • Code Division Multiple Access (CDMA) . • HSUPA • Fractional DPCH 44. 3G and 4G standards • Enhanced L2 • CDMA2000: evolved from cdmaOne (also known as IS-95 or “CDMA”). • CPC – continuous packet connectivity • GSM • FRLC – Flexible RLC • GPRS • EDGE 44.4 Release 6 • WLAN integration • UMTS-TDD: a variant of UMTS largely used to provide wireless Internet service. Retrieved 2009-02-16.Washington Post (Washington Post). TD Forum. The Switch. 2002) first book on radio network planning for 3G. UTRA”. a simple synchro. pp. decisions and actions from 3GPP Organizational Partners Meeting#6. “German researchers discover a flaw that could let anyone listen to nisation channel in WCDMA. Services for UMTS (Wiley. ISBN 978-0-470-02294-8 [9] iPhone 'Surfing' On AT&T Network Isn't Fast. up to Release 8 [5] The FCC’s Advanced Wireless Services bandplan • UMTS FAQ on UMTS World [6] Forkel et al. WCDMA for UMTS. “Telstra boosts Next G to 21Mbps”. “For sale: Systems that can secretly track where cellphone users go around the globe”.de). 3GPP. “Performance Comparison Between UTRA-TDD High Chip Rate And Low Chip Rate Operation”. pp. ISBN 9780-470-06533-4 44. John Wiley and Sons. (2002). [3] 3GNewsroom. • Multiple-input multiple-output (MIMO) is the major issue of multiple antenna research. 7. 2002) first book on the services for 3G. • Vocabulary for 3GPP Specifications. Retrieved 20 December 2014. Message Flows and Procedures Analyzed and Explained (Wiley 2007). Retrieved 2009-03-16.12 External links “3G Glossary – • 3GPP Specifications Numbering Schemes [4] ITU-D Study Group 2.11. September 2006. EXTERNAL LINKS 195 • Common pilot channel or CPICH.2 Bibliography • Operations and Maintenance Centre 44. Wacker and Novosad. Retrieved 20 December 2014. 105–106. 2000) first book dedicated to 3G technology. • Laiho. 9 October 2001” (PDF).[11] Craig Timberg (18 December 2014). (Wiley.1 your cell calls.10 Notes • Martin Sauter: Communication Systems for the Mobile Information Society. • List of device bandwidths • Radio Network Controller • UMTS security • Huawei SingleRAN: a RAN technology allowing migration from GSM to UMTS or simultaneous use of both. The Next Generation CDMA Technologies. ISBN 9780-470-01575-9 44.”. 4. Suzanne (8 December 2008). • UMTS LTE Link Budget Comparison • UMTS TDD Alliance The Global UMTS TDD Alliance • 3GSM World Congress • UMTS Provider Chart • LTE Encyclopedia . • Wi-Fi: a local area wireless technology that is complementary to UMTS. Report on Question 18/2” (PDF). 44. ISBN 0-470-02676-6 • Ahonen and Barrett (editors).11 References Citations [1] “Draft summary minutes. p. 6–9. Retrieved 2009-02-16. 25–28. [8] Hsiao-Hwa Chen (2007). Retrieved 2009-06-15. pp. • Worldwide W-CDMA frequency allocations on UMTS World [7] Siemens (2004-06-10).11. ZDNet Australia. Washington Post. John Wiley. [12] Peter Onneken (18 December 2014).44. “Sicherheitslücken im UMTS-Netz”. Tagesschau (in German) (ARD-aktuell / tagesschau. Tokyo. [2] Tindal. ISBN 978-0-471-48550-6 • Holma and Toskala (editors). “TD-SCDMA Whitepaper: the Solution for TDD bands” (pdf). “Guidelines on the smooth transition of existing mobile networks to IMT-2000 for developing countries (GST). Radio Network Planning and Optimization for UMTS (Wiley. ISBN 978-0-471-72051-5 • Kreher and Ruedebusch. Retrieved 20 December 2014. Jobs Concedes [10] Craig Timberg (24 August 2014).12. 44.com (2003-11-29). Retrieved 2009-06-15. Protocols. UMTS Signaling: UMTS Interfaces. “Condor” SIMs are used with the two-digit models (i95cl. requiring the data to be downloaded and transferred should the subscriber want to switch handsets.'Mobis’. “Endeavor” SIMs are used only with the i2000 without data. see Iden (disambiguation). which is frequencies that may not be contiguous. but each emission occupies signalling for call set-up and mobility management. but some advanced features such as extra contact information is not supported by the older iDEN is designed and licensed to operate on individual SIM cards. similar to. MHz. There is also the “Falcon 128” SIM. By comparison. was used as a logo for its earlier handsets.3 Hardware The iDEN project originally began as MIRS (Motorola Integrated Radio System) in early 1991. a young engineering program manager leading the product development effort who also gave the handsets their distinctive industrial design. “Falcon” SIMs are used in the three-digit phones. since time-division duplexing of RF section usage can be performed. Newer handsets using SIM technology make upgrading or changing handsets as easy as swapping the SIM card.[1] iDEN places more users in a given spectral space. Early iDEN models such as the i1000plus stored all subscriber information inside the handset itself. iDEN operates the same as the original “Falcon”. iDEN uses frequency.[2] Integrated Digital Enhanced Network (iDEN) is a mobile telecommunications technology.1 History 45. which provides its users the benefits of a trunked radio and a cellular telephone. for example) using a SIM with less memory than the three-digit models (i730. or 48 MHz depending on the frequency band being used. using time division multiple access. 45 MHz. Four different sized SIM cards exist. which is used on new 3 digit phones (i560. The first commercial iDEN handset was Motorola’s L3000.2 Operating frequencies backward compatibility. which was released in 1994. but only occupies 20 kHz in order size. Lingo. TDMA Cellular (Digital AMPS) is licensed The interconnect-side of the iDEN network uses GSM in blocks of 30 kHz channels. i710) and will read the smaller SIM for 45. and is capable of serving the same number of the Abis protocol stack modified to support iDEN’s addisubscribers per channel as iDEN. iDEN supports either three or six interconnect users (phone users) per channel. This eliminates the need for a duplexer at the mobile end. developed by Motorola. Motorola has named this modified stack division duplexing to transmit and receive signals sepa. with transmit and receive bands separated by 39 Each base site requires precise timing and location infor196 . rately. but incompatible with GSM handsets’ SIM cards. 45. by using speech compression and time division multiple access (TDMA). to provide interference protection via guard bands. The transmit and receive time slots assigned to each user are deliberately offset in time so that a single user never needs to transmit and receive at the same time.tional features. i860). which stands for Link People on the Go. and “chirp” audio. (i530. and six dispatch users (pushto-talk users) per channel. GSM systems typically require 24 contiguous voice channels. Most modern iDEN handsets use SIM cards. with 40 kHz. compared to analog cellular and two-way radio systems. but the original MIRS software platform dynamically selected fragmented channels in the radio frequency (RF) spectrum in such a way that a GSM telecom switch could commence a phone call the same as it would in the contiguous channel scenario. i930). It has been called the first mobile social network by technology industry analysts. The original MIRS System was renamed IDEN in 1994 by Roger Cameron Wood. group software features.Chapter 45 iDEN For other uses. but doubled in memory on 25 kHz channels. The project was a software lab experiment focused on the utilization of discontiguous spectrum for GSM wireless. Stephen (December 7. Israel. Numerous private systems exist. 2010). but its iDEN network was decommissioned on June 30. EXTERNAL LINKS 197 45. [2] Motorola iDEN Technical Overview . Singapore.7 External links • Motorola iDEN phones • List of iDEN providers globally • List of Urban ID codes iDEN base radio at a cell site mation to synchronize data across the network. Mexico. Argentina. Jordan. Brazil. including one run by ARINC.4. 45. To obtain and maintain this information each base site uses global positioning system satellites to receive a precise timing reference . 2013. Countries which have operating iDEN networks include Canada. Peru. Computerworld. Sprint Nextel provided iDEN service across the United States.5 See also • Motorola iDEN phone models • Push to Talk over Cellular • Radio Service Software • WiDEN 45. Chile.7. 45. Japan. SouthernLINC Wireless and several small public and private iDEN service providers.com. Philippines. Saudi Arabia. El Salvador.45. China and most recently India and Guatemala. covering all major airports. “Sprint’s iDEN finally headed for sign-off”.4 Operators In the United States of America there are a few iDEN service providers.6 References [1] Lawson.1 iDEN network operators 45. Retrieved 5 September 2012. rack-mounted electronics. also known as a terminal. More recent satellite phones are similar in size grees south of the equator.1 Geosynchronous satellites Satellite phone (Inmarsat) A satellite telephone. Depending on the architecture of a particular system. Smaller installations using VoIP over a two-way satellite broadband service such as BGAN or VSAT bring the costs within the reach of leisure vessel owners. The amount of bandwidth available on these systems is substantially higher than that of the Low Earth Orbit (LEO) systems.Geostationary satellites have a limitation of use in lati1990s mobile phone. They provide similar functionality to terrestrial mobile telephones. Internet service satellite phones have notoriously poor reception indoors. reducing the launch costs. Some satellite phones use satellites in geostationary orbit.[1][2] Satphones are popular on expeditions into remote areas where terrestrial cellular service is unavailable. The satellites sit at an altitude of 35. or satphone is a type of mobile phone that connects to orbiting satellites instead of terrestrial cell sites. generally 70 degrees north of the equator to 70 deantenna.Chapter 46 Satellite phone to a regular mobile phone while some prototype satellite phones have no distinguishable difference from an ordinary smartphone. Early satellite phone handsets had a size and weight comparable to that of a late-1980s or early. varies widely. voice.786 kilometres (22. The systems also allow for the use of repeaters. though it may be possible to get a consistent signal near a window or in the top floor of a building if the roof is sufficiently thin. A fixed installation. These systems can maintain near-continuous global coverage with only three or four satellites (with six satellites for redundancy). The satellites used for these systems are very heavy (approx. 5000 kg) and expensive to build and launch. The mobile equipment. rugged. may include large. satellite phone. and a steerable microwave antenna on the mast that automatically tracks the overhead satellites.236 mi). 46. coverage may include the entire Earth. The phones have connectors for external antennas that can be installed in vehicles and buildings. This is a result of look an198 . much like terrestrial mobile phone systems. which are meant to remain in a fixed position in the sky. short messaging service and low-bandwidth internet access are supported through most systems.1. a noticeable delay is present while making a phone call or using data services due to the large distance from users. or only specific regions. but usually with a large retractable tude. such as one used aboard a ship. all three active systems provide portable satellite Internet using laptop-sized terminals with speeds ranging from 60 to 512 kbit per second (kbps).1 Satellite phone network 46. Making the geostationary satellites more suitable for a fixed location than a mobile location. • Globalstar: A network covering most of the world’s landmass using 44 active satellites.[3] thus. COUNTRIES WITH BANS OR RESTRICTIONS ON USE OF SATELLITE PHONES gles being so low on the horizon increasing the chances of terrestrial and other interference from sources in the same frequency bands.2. • ACeS: This regional operator provides voice and data services in East Asia. Coverage is available on most of the Earth. Since the satellites are not geostationary. The network went into limited commercial service at the end of 1999 . The company operates eleven satellites. and others). so polar regions cannot be covered. meters. The user will need to find an area with line-of-sight before using the phone. Africa. It originally provided large fixed installations for ships. many areas are left without coverage since a satellite must be in range of an earth station.46. this method can be inaccurate by tens of kiloin the Americas similar to Thuraya’s.2 Low Earth orbit LEO telephones utilize LEO (low Earth orbit) satellite technology. founded in 1979. On some Iridium hardware the coordinates can • Terrestar: Satellite phone system for North America be extracted using AT commands.[11][12][13][14] Import and operation of all other satellite services. • Thuraya: Established in 1997. and Southeast Asia using a single satellite. • Iridium: A network operating 66 satellites in a polar orbit that claims coverage everywhere on Earth. and provide coverage cells of about (at a 100-minute orbital period) 2800 km in radius (about 1740 mi). a constellation of satellites is required to maintain coverage (as is done with Iridium. is illegal. Satellites fly in an inclined orbit of 52 degrees. but has recently entered the market of hand-held phones in a joint venture with ACeS. The advantages include providing worldwide wireless coverage with no gaps. and are now both planning to launch replacement constellations supporting higher bandwidth. 46. At least one satellite must have line-of-sight to every coverage area at all times to guarantee coverage. company which has launched a single geosynchronous satellite which is not yet active.Only Inmarsat service permitted. a usable pass of an individual LEO satellite will typically last 4–15 minutes on average. LEO systems have the ability to track a mobile unit’s locabut plans to launch a service using hand-held devices tion using doppler shift calculations from the satellite.1. Commercial service started in November 1998 and fell into Chapter 11 bankruptcy in August 1999. Also in many areas—even where a large amount of open sky is present—the line-of-sight between the phone and the satellite is broken by obstacles such as steep hills and forest. International Long Distance(ILD) licence and No Objection Certificate (NOC) issued by Indian Department of Telecommunications (DOT) is mandatory for satellite communication services on Indian territory.[7] Their signals will usually bypass local telecoms systems. an altitude of 640 to 1120 kilometers (400 to 700 miles). Some of these countries are: • Burma[8] • Cuba[9][10] • India . the Middle East. including Thuraya & Iridium. both based in the United States started in the late 1990s but soon went into bankruptcy after failing to gain enough subscribers to fund launch costs. Asia and Australia. except polar regions. Globalstar. they move with respect to the ground.2 Countries with bans or restrictions on use of satellite phones In some countries. therefore avoiding both local telecommunication companies and authorities.[4] In 2001. • Inmarsat: The oldest satellite phone operator. Tracking • MSAT / SkyTerra: An American satellite phone company that uses equipment similar to Inmarsat. Radio cross-links are used between satellites to relay data to the nearest satellite with a connection to an earth station. Depending on the positions of both the satellite and terminal. service was re-established by Iridium Satellite LLC. Data speeds for current networks are between 2200 bit/s and 9600 bit/s using a satellite handset. while recent Global[6] • ICO Global Communications: A satellite phone star handsets will display them on the screen. possession of a satellite phone is illegal.[5] However. Two such systems. South Asia. They are now operated by new owners who bought the assets 46. low altitude orbits with an orbital time of 70–100 minutes. Thuraya’s satellites provide coverage across Europe. 199 for a fraction of their original cost.[15] • North Korea . LEO satellites orbit the earth in high speed. However. 3 Security concerns Satphones on display All modern satellite phone networks encrypt voice traffic to prevent eavesdropping.200 CHAPTER 46.S. regardless [22] minal is registered with. additional country codes were allocated to different satellites. new regulations governing the use of satellite phones inside Russia or its territories were developed to fight crime by enabling the Russian government to intercept calls. Since most satellite phones are built under license or the manufacturing of handsets is contracted out to OEMs.[19] Satellite phones are purpose-built for one particular network and cannot be switched to other networks. the price of handsets varies with network performance. operators have a large influence over the selling price.[18] One algorithm (used in GMR-1 phones) is a variant of the A5/2 algorithm used in GSM (used in common mobile phones).In 2012. 46.same country code. See also: Global Mobile Satellite System and International Networks (country code) Globalstar provides a one-way data uplink service. Low earth orbit systems including some of the defunct ones have been allocated number ranges in the International Telecommunications Union's Global Mobile Satellite System virtual country code +881. Thus satellite phones are not recommended for high-security applications. SATELLITE PHONE • Russia . Inmarsat satellite phones are issued with codes +870. The GMR-2 standard introduced a new encryption algorithm which the same research team also cryptanalysed successfully. residents of remote areas may apply for a government subsidy for a satellite phone. the newest handsets are quite expensive. sold in March 2010 for over US$1. Globalstar. Satellite phones are legal in most countries. handset prices will increase when calling rates are reduced. The Iridium 9505A. In Australia. making it difficult for manufacturers to independently make handsets. Satellite phones are sometimes subsidised by the provider if one signs a post-paid contract but subsidies are usually only a few hundred US dollars or less. telephone numbers except for service resellers located in Brazil which use the +881 range.6 Virtual country codes doors) of the incoming call.[17] 46. typically used for asset tracking.[16] These regulations allow non-Russian visitors to register their SIM cards for use within Russian territory for up to 6 months.000. Satellite networks operate under proprietary protocols. Some satellite phone networks provide a one-way paging channel to alert users in poor coverage areas (such as in46. often costing several thousand which is not used exclusively for satellite phone networks. Similarly. a team of academic security researchers reverse-engineered the two major proprietary encryption algorithms in use. In the past. although allocated +881 8 and +881 9 use U. then increase once new satellites are launched. call alert feature.5 Cost of a satellite phone out at the end of 2008 leaving Inmarsat users with the of which satellite their terWhile it is possible to obtain used handsets for the Thu. and both are vulnerable to cipher-text only attacks. Iridium. raya. Regional satellite phone networks are allocated numbers Among the most expensive satellite phones are in the +882 code designated for "international networks" BGAN terminals. handset prices will fall. but the codes +871 to +874 were phased 46.[20][21] These phones provide broadband Internet and voice communications. Iridium operates a one-way pager service as well as the Satellite phones are usually issued with numbers in a special country calling code. Iridium satellite phones are issued with codes +881 6 and +881 7. . released in 2001.4 One-way services US dollars. In 2012. and Globalstar networks for approximately US$200. If a satellite phone provider encounters trouble with its network. When the alert is received on the satellite phone it must be taken to an area with better coverage before the call can be accepted. gov.in/Content/ReDis/526_83. ity during normal times. Making calls between different satellite phone networks is often similarly expensive. the content&view=article&id=15&Itemid=61&lang=en 2006 Hawaii earthquake.10. with calling rates of up to $15 per minute. Retrieved August 1.cbec. [3] “Delay/Disruption-Tolerant Network Testing Using a LEO Satellite” (PDF). “Bangladesh Most mobile telephone networks operate close to capacjails Indian rebel chief”.in/carrier-services/ in war zones such as Iraq. Michael (September 28. 2011. BBC. [4] Jaejoo Lim. [2] “CTIA 2008: MSV Makes “Lost” Satellite Phone Real”. 2002). NASA. 2010. Retrieved January 4.gov.gov. with vouchers ranging from $100 to $5. Rates from landlines and mobile phones range from $3 to $14 per minute with Iridium.aspx Earthquake.in/carrier-services/inmarsat natural disasters. Satellite telephony can avoid this problem and be useful during natural disasters. “Good technology.in/customs/cs-circulars/ channels. REFERENCES 46. Jason Thatcher (2005). Carsten Willems.9 See also • Broadband Global Area Network (BGAN) • Satellite internet • Telecommunications • Leaf Consulting [16] http://www.com/blog/inmarsat-bgan/ satellite-phones-russia-iridium.dot.000.au. Reporters and journalists have also been using satellite phones to communicate and report on events [12] http://www. BBC.html [17] “The Satellite Phone Subsidy Scheme”.15 to $2 per minute.[10] Alan Gross lapse. bad management: A case study of the satellite phone industry” (PDF). [1] “New Satellite Phone Runs Windows Mobile”.htm 46. unless they are being called via Notes a special reverse-charge service. Examples reported in the media where this has occurred include [9] http://www. Such promotions are usually bound to a particular geographic area where traffic is low.co. Hurricane Katrina. Richard Klein. Gearlog. 2010.intmsearch.cu/index.10 References some of the most expensive networks to call. ISSN 1042-1319.dot. .50 per minute unless special offers are used. 2012 IEEE Symposium on Security and Privacy.gov. and the 2010 Haiti [11] http://www.pdf networks themselves are prone to congestion as satellites and spot beams cover a large area with relatively few voice [15] http://www. cs-circulars10/circ37-2k10-cus.gov. Journal of Information Technology Management (Association of Management) XVI (2). the systems when they are needed most. Dbcde. Thorsten Holz (2012).8 Use in disaster response [5] See also: Cascading failure [6] “Globalstar GSP-1700 manual” (PDF). Ralf Hund. 46. the 2003 Northeast blackouts.[24] the 2007 Minnesota bridge col.trai. [7] Hossain. “Junta tightens media screw”. Costs for data transmissions (particularly broadband data) can be much higher. Retrieved January 4.80 to $1. restrictions-use-satellite-phone Terrestrial cell antennas and networks can be damaged by [13] http://www. Gearlog. [18] Benedikt Driessen. Christof Paar. 2007). Satellite phone [14] http://www. the September 11 event.in/bimonthly/2015/01% 20of%202015.46. 2009.aduana.7 Calling cost 201 • Globalstar • Thuraya The cost of making voice calls from a satellite phone varies from around $0. the 2010 Chile earthquake. Moazzem (September 24.outfittersatellite. Retrieved 2013-04-28.gov. while call• Inmarsat ing them from landlines and regular mobile phones is • Iridium Communications more expensive. The receiver of the call pays nothing. Retrieved April 7. Calls from satellite phones to landlines are usually around $0. and large spikes in call volumes caused by widespread emergencies often overload [8] Dobie. Thuraya[23] and INMARSAT being 46.php?option=com_ the 1999 İzmit earthquake. “Don’t Trust Satellite Phones: A Security Analysis of Two Satphone Standards” (PDF). Most satellite phone networks have pre-paid plans. Bluecosmo.com. Retrieved April 7. 2011. Allroadcommunications. 2011. [22] “Dialling codes .202 CHAPTER 46. Re- [21] “TS2 BGAN Pricing”.11 External links • University of Surrey pages with information on some satellite systems. non-commercial) • Satellite mobile system architecture(technical) . 2011. SATELLITE PHONE [19] “Satellite Phone Rentals and Sales”.com. including currently planned. (noncommercial) • NASA’s Teledesic quicklook • Satellite Phone FAQ (satellite phone services and equipment reviews. [20] “BlueCosmo BGAN Pricing”. trieved April 7. [23] Thuraya .“Thuraya Satellite Phones” [24] Prepare for the Hurricane Season with Satellite Phones “Preparing for Hurricane Season with Satellite Phones” 46. Inmarsat. and defunct proposals such as Teledesic. Retrieved April 7.customer support”. music players and are camera phones. Most Smartphones produced from 2012 onwards also have high-speed mobile broadband 4G LTE internet.[1][2][3] They typically combine the features of a cell phone with those of other popular mobile devices.2 billion.[4] 47. motion sensors.1.1 Early years An Asus ZenFone 6 running Android an advanced mobile operating system which combines features of a personal computer operating system with other features useful for mobile or handheld use. such as personal digital assistant (PDA). sales of smartphones worldwide topped 1. have The first caller identification receiver (1971) 203 . which was up 28% from 2013. For the song by Trey Songz.1 History 47. In 2014. Most smartphones can access the Internet. media player and GPS navigation unit.Chapter 47 Smartphone “Smartphones” redirects here. and mobile payment mechanisms. A smartphone (or smart phone) is a mobile phone with iPhone 5s running iOS a touchscreen user interface. see SmartPhones (song). can run third-party apps. although it was not called that in 1994. many mobile phone users carried a separate dedicated PDA device. The personal organizer provided e-mail. In March 1996. Paraskevakos.” In 1971. Alabama and were demonstrated to several telephone companies.204 CHAPTER 47. address book. the display was on the inside top surface and with a physical QWERTY keyboard on the bottom.[14] It combined the an IBM prototype developed in 1992 and demonstrated functions of a mobile phone and a PDA.1.[10] 47. working with Boeing in Huntsville. allowing it to run thousands of existing software titles including early versions of Windows. which was a modified 200LX PDA that supported a Nokia 2110-compatible phone and had integrated software built in ROM to support it. world time clock. They were installed at Peoples’ Telephone Company in Leesburg. Simon was able to send and receive faxes and emails and included several other apps like address book.[12] IBM Simon and charging base (1994)[6] In early 2000. Alabama. and were offered for sale beginning in 1993. emails and faxes.[7][8][9] In addition to its ability to make and receive cellular phone calls. Simon is the first smartphone to be incorporated with the features of a PDA. supported limthat year at the COMDEX computer industry trade show. running early versions of operating systems such as Palm OS. and note pad through its touch screen display. BlackBerry OS or Windows CE/Pocket PC. Hewlett-Packard released the OmniGo 700LX. calendar. SMARTPHONE Devices that combined telephony and computing were first conceptualized by Theodore Paraskevakos in 1971 and patented in 1974. ited web browsing with a resistive touchscreen utilizing a . calculator and notebook with text-based web browsing. In August 1996. When the personal organizer was closed.[13] and was the first The first mobile phone to incorporate PDA features was device marketed as a “smartphone”. The Simon was the first cellular device that can be properly referred to as a “smartphone”. Nokia released the Nokia 9000 Communicator which combined a PDA based on the GEOS V3. The two devices were fixed together via a hinge in what became known as a clamshell design. the Ericsson R380 was released by Ericsson Mobile Communications. however it did not yet have general purpose PDA applications in a wireless device typical of smartphones.1. known as the “pdQ Smartphone”. calendar. data processing and visual display screens into telephones which gave rise to the “smartphone.[1] These operating systems would later evolve into mobile operating systems. Qualcomm released a “CDMA Digital PCS Smartphone” with integrated Palm PDA and Internet connectivity.[5] A refined version of the product was marketed to consumers in 1994 by BellSouth under the name Simon Personal Communicator.0 compatible. appointment scheduler. and the ability to send and receive faxes. it could be used as a digital cellular phone. The device featured a 640x200 resolution CGA compatible 4-shade gray-scale LCD screen and could be used to make and receive calls. for describing AT&T’s “PhoneWriter Communicator” as a “smart phone”.2 47.[11] Main article: Personal digital assistant In the late 1990s. In June 1999. text messages. calculator. demonstrated a transmitter and receiver that provided additional ways to communicate with remote equipment. It was also 100% DOS 5. The original and historic working models are still in the possession of Paraskevakos.3 PDAs Forerunner The term “smart phone” first appeared in print in 1995. When opened. He was the first to introduce the concepts of intelligence.0 operating system from Geoworks with a digital cellular phone based on the Nokia 2110. which was originally developed by Psion. Limited functionality. introduced the iPhone. it started to gain widespread popularity in 2010. It was the world’s most widely used smartphone These new platforms led to the decline of earlier ones. by 2010.6 Recent technological developments was also ranked first in market capitalization in Japan and second globally. credit cards and mobile payments are integrated into smartphones where users . one of the first smartphones to use a multi-touch interface. Windows Phone then became the third47. speeds available. Smartphones before Android. However. the Fairphone company launched its first the rise of 3G and new phones with advanced wireless “socially ethical” smartphone at the London Design network capabilities.ical QWERTY keyboard in either a candybar or sliding ited bandwidth allowed for phones to use the slower data form factor. Nokia started producing entertainmentfocused smartphones.S. Nokia abandoned Symbian and partnered with MS to use Windows Phone on its smartphones.[15] In early 2001. Initially. As Wi-Fi becomes more prevalent and easier to connect to. It 47. small screens and lim.[24][25] Android is an open-source platform founded by Andy Rubin and now owned by Google.1. Wi-Fi networks were much used for smartphones. the trend was similar to that of Europe.6 kbit/s.1. The BlackBerry later gained mass cryption and identity protection. Palm’s webOS was bought by HewlettPackard and later sold to LG Electronics for use on LG In 1999. Quad HD is used in advanced televisions and computer monitors. or keypad typical for smartphones at the time.[33][34][35] • Smartphones are increasingly integrated with everyday uses.[31] • In early 2014. and BlackBerry 6230 detail market with the sale of the Samsung Galaxy vices in 2003.[19] The rise of i-mode helped NTT DoCoMo accumulate an estimated 40 million subscribers by the end of 2001. the world’s first curved-OLED nature. popularized by the Nseries. also made a new platform from scratch. BlackBerry Limited. For instance. operating system until the last quarter of 2010. which combined a PDA with a mobile phone and operated on Verizon. there were no top-selling smartphones with physical keypads.[18] Unlike future generations of wireless services. try. which provided data BlackBerry 10.1.[32] • As of 2014.search In Motion. although throughout the mid-2000s. Apple Inc.[20] Festival to address concerns regarding the sourcing of materials in the manufacturing.. 47.S. In Asia. but with 110 ppi or less on such larger displays.47. Before 2007 it was common of traditional HTML in favor of increasing data speed for for devices to have a physical numeric keypad or physthe devices.[29] adoption in the U. NTT DoCoMo’s i-mode The capacitive touchscreen also had a knock-on effect on used cHTML. with the exception of Japan. started a new OS from scratch. BlackBerry 6220. a language which restricted some aspects smartphone form factors.5 Android and iOS In 2007. Wi-Fi phones service will start to take off. It also supported limited web browsing. typically ran on Symbian. introduced the Kyocera 6035.[22] Round and LG G Flex models. This power would wane in the face of • In 2013. keyboard. The iPhone was notable for its use of a large touchscreen for direct finger input as its main means of interaction.[28] Outside of Japan smartphones were still rare. devices based on Microsoft’s • In late 2013. These phones ran on i-mode. Inc.[30] Samsung phones Symbian was the most popular smartphone OS in Europe during the middle to late 2000s. HISTORY stylus. enness users in the U. smartphones were beginning to use Quad HD (2K) 2560x1440 on 5. From 2006 onwards. for instance. iOS and BlackBerry. Palm. transmission speeds up to 9.[21] The company first released its GSM Blacktechnology smartphones were introduced to the reBerry 6210.4 Mass adoption most-popular OS.[16][17] 205 2008 saw the release of the first phone to use Android called the HTC Dream (also known as the T-Mobile G1). formerly known as Refirst smartphones to achieve mass adoption within a coun. the Japanese firm NTT DoCoMo released the smart TVs. Nokia’s Symbian devices were focused on business.1. called Windows Phone. and American users popularized the term “CrackBerry” in 2006 due to its addictive • In December 2013. and now dominates the market. Microsoft.5” screens with up to 534 ppi on devices such as the LG G3 which is a significant improvement over Apple’s Retina Display.[26][27] Although Android’s adoption was relatively slow at first.[23] with more bends and folds in the screens were expected in 2014. QSAlpha commenced production of Windows Mobile started to gain popularity among busia smartphone designed entirely around security. instead of a stylus. similar to Windows Mobile and BlackBerry devices at the time. It is 47. cellular or 47.1 Android cations and SaaS platforms. By can remove and replace parts. Smartphones could gain 15% more battery life during a typical day. ARM. Instead. water and dustproofing have made their way into mainstream high end smartphones instead of specialty models with the Sony Xperia Z continuing through the Sony Xperia Z3 and with the Samsung Galaxy S5.2 Mobile operating systems the operating system that powers the company’s iDevices. but the Android (operating system) 5. they may pull energy from radio. HTC released the HTC Dream. and distributed exclusively for Apple hardware. where merchants are Android is an open-source platform founded in October rapidly adopting it. Motorola and Samsung) that form the Open Handset Alliance.47. recent technological innovations are causing keys to be fused into the smartphones. Apple Pay has picked up 34 new banks to the roster supporting Main article: Android (operating system) their mobile payment platform.[44] • Foldable OLED smartphones could be as much as a decade away because of the cost of producing them.0 “Lollipop” home screen (2014) 2003 by Andy Rubin and backed by Google. Apple introduced the iPhone.0 lollipop serves open source RAW images.206 CHAPTER 47. In 2007. Android became the best-selling smartphone platform. Some can store their pictures in proprietary raw image format.[45] Android 5. The iPhone was notable for its .7 Future possible developments • A clear thin layer of crystal glass can be added to small screens like watches and smartphones that make them solar powered. where the smartphone act as a digital key and access badge for its users.2 iOS Wi-Fi signals. but LG G3 has lasers to help focus. the first device Main article: Mobile operating system to use iOS and one of the first smartphones to use a multi-touch interface. Q4 2010.[37] Additionally. in which users which launched in October 2008 as Android Market. As little as a speck of dust can ruin a screen during production. along with major hardware and software developers (such as Intel.2.[46] Main article: iOS iOS is a mobile operating system developed by Apple Inc.[36] Recently. HTC. There is a relatively high failure rate when producing these screens. much cheaper than most new technology.[39] • One problem with smartphone cameras is focusing on subject.[47] • Near future smartphones might not have a traditional battery as their sole source of power. television.2. The first smartphones using this technology should arrive in 2015. Creating a battery that can be folded is another hurdle.1.[43] The cost of these screens per smartphone is between $2 and $3.[41][42] 47.[38] • Since 2013. SMARTPHONE can send cash payments through smartphone appli. This screen can also work to receive Li-Fi signals and so can the smartphone camera.[26][27] In October 2008. the e execution of native applications and third-party apps which are available via Google Play.[40] • Some smartphones can be categorized as high-end point-and-shoot cameras with large sensor up to 1” with 20 megapixels and 4K video. • Modular smartphones are projected. allowing applications to be ported between the two platforms.47. As of September 2014.[52][53][54] In 2012. replacing its previously Windows CE-based architecture with one based on the Windows NT kernel with many components shared with Windows 8. MOBILE OPERATING SYSTEMS iOS 8. Apple introduced the App Store.2.2. and has received some positive reception from the technology press and been 207 Windows Phone 8. In September 2012.[49][50] In January 2015.1 home screen (2014) praised for its uniqueness and differentiation. to replace Windows Mobile. Apple announced that they have now sold one billion iOS devices.4 BlackBerry Main article: BlackBerry In 1999. Xbox and Bing.”[56] . or keypad as typical for smartphones at the time.[51] 47. Microsoft unveiled Windows Phone 7 with a User Interface inspired by Microsoft’s "Metro Design Language". RIM has undergone a platform transition. RIM announced that the 200 millionth BlackBerry smartphone was shipped. as well as non-Microsoft services such as Facebook. which allowed any iPhone to install third-party native applications. Microsoft released Windows Phone 8.3 home screen (2015) use of a large touchscreen for direct finger input as its main means of interaction. Services such as BlackBerry Messenger provide the integration of all communications into a single inbox.[48] the App Store eventually achieved 1 billion downloads in the first year. changing its name to BlackBerry and making new devices on a new platform named “BlackBerry 10. and 75 billion by mid-2014. Windows Phone 7 integrates with Microsoft services such as Microsoft SkyDrive. This software platform runs the Microsoft Mobile smartphones. Featuring over 500 applications at launch. there are around 46 million active BlackBerry service subscribers.[55] Most recently. Office. 47.[23] In 2008. providing secure real-time push-email communications on wireless devices. instead of a stylus.3 Windows Phone Main article: Windows Phone In 2010. Twitter and Google accounts. RIM released its first BlackBerry devices.2. keyboard. running Tizen.Main article: Windows Mobile gram which helps establish and support start-up companies formed by ex-Nokia employees. in-vehicle infotainment velop software for Windows Mobile with no restrictions . with the The Sailfish OS is based on the Linux kernel and Mer.[58] platform getting abandoned throughout the following few Additionally Sailfish OS includes a partially or completely years. As of 2014 more companies have partnered with Mozilla including Panasonic (which is making a smart TV with Firefox OS) and Sony.[59] Sailfish OS is intended to be a system 47.2 Windows Mobile made by many of the MeeGo team.[65] It is designed primarily for touchscreen mobile devices such as smartphones and tablet computers. This user interface differentiate Jolla smartphones from others.3. was released in 2000.8 Ubuntu Touch Main article: Ubuntu Touch BlackBerry Z10 (2013) 47. Nokia announced that it Main article: Sailfish OS would replace Symbian with Windows Phone as the operating system on all of its future smartphones. Samsung released the Samsung Gear 2 and the Gear 2 Neo. The first Symbian phone. laptops and smart cameras.2.2. It was the world’s most widely used smartphone operating system until Q4 2010.2.3 Discontinued mobile operating systems 47. Third parties could deincluding smartphones.[69] In February 2011. Throughout its lifespan. SMARTPHONE (IVI) devices..S. Tizen is a project within the Linux Foundation and is governed by a Technical Steering Group (TSG) composed of Samsung and Intel among others.1 Symbian Main article: Symbian Symbian was originally developed by Psion as EPOC32. smart TVs. tablets.[70] proprietary multi-tasking user interface programmed by Jolla.[63] The Samsung Z1 is the first smartphone produced by Samsung. The first commercially available Firefox OS phones were ZTE Open and Alcatel One Touch Fire.[60][61][62] Windows Mobile was based on the Windows CE kernel and first appeared as the Pocket PC 2000 operating system.2. It was supplied with a suite of applications deMain article: Tizen veloped with the Microsoft Windows API and was designed to have features and appearance somewhat similar Tizen is a Linux-based operating system for devices.[68] It combined a PDA with a mobile phone.5 Firefox OS Main article: Firefox OS Firefox OS (originally called the boot to gecko project) was demonstrated by Mozilla in February 2012.7 Tizen available in both touchscreen and non-touchscreen formats. to desktop versions of Windows.[64] 47.[57] Ubuntu Touch (also known as Ubuntu Phone) is a mobile version of the Ubuntu operating system developed by Canonical UK Ltd and Ubuntu Community. though the platform never gained popularity or widespread awareness in the U. In April 2014.[66][67] and was the first device marketed as a 47. It was designed to have a complete community based alternative system for mobile devices.3.208 CHAPTER 47. as it did in Europe and Asia. it was released in the Indian market on 14 January 2015. which left Nokia to form Jolla. 47. utilizing funding from Nokia’s “Bridge” pro. the operating system was 47. using open standards and HTML5 applications.6 Sailfish OS “smartphone”. the touchscreen Ericsson R380 Smartphone. [71][72] The first Handmark. Types of screen include LCD. other smartleased in June 2010. two phones (the Veer and the Pre 3) and a tablet (the TouchPad) running webOS were introduced in 2011. 47.[81] On February 25. Bada-based phone was the Samsung Wave S8500.[80] HP released webOS as open source under the name Open webOS. 27% of all photographs were taken with camera-equipped smartphones. OLED. and PocketGear.1 Smartphone usage In the third quarter of 2012. IPS and others.[90] A study conducted in September 2012 concluded that 4 out of 5 .3. calendar.[85] As of 2013.[87] In China. a contact organizer and mobile thirdparty applications that could be downloaded or synced with a computer. mobile devices The introduction of Apple’s App Store for the iPhone and iPod Touch in July 2008 popularized manufacturer47. as Google’s Android Market in October 2008 and RIM’s Bada merged with a similar platform called Tizen.6. smartphones represented more than half of all handset shipments in the second quarter of 2012[88] and in 2014 there were 519.[76] In 2013. The Treo had wireless web browsing. which launched with the Palm Pre. 2013 HP announced the sale of WebOS to LG Electronics. smartphone application distribution depended on third-party sources providing appliThe Bada operating system for smartphones was an. and plans to update it with additional features.[86] The European mobile device market as of 2013 is 860 million.45 inches. BlackBerry App World in April 2009. HP announced that webOS hardware was to be discontinued[79] but would continue to support and update webOS software and develop the webOS ecosystem. 2011.[78] 47. with the number estimated to grow to 700 million by 2018.4.5 milphone manufacturers launched application stores. with both a touchscreen and a full keyboard. Windows mobile Main article: List of digital distribution platforms for was phased out in favor of Windows Phone.5 inches commonly are moved around in the hand or used with both hands. Smartphones with screens over 4.S. Handango. although some parts are open source. After buying Palm in 2011. Usually have aspect ratio 4:3 or 16:9. such as GetJar. Inc which released the Treo 600 and continued releasing Treo devices with a few Treo devices using Windows Mobile.47.[77] Handspring was purchased by Palm. HewlettPackard (HP) discontinued its webOS smartphone and tablet production. After being acquired by HP. They are measured in diagonal inches. APPLICATION STORES 209 imposed by Microsoft. AMOLED. Handspring launched the Springboard GSM phone module with limIn.4 Palm OS Main article: Palm OS In late 2001. computer programs) focused on a single platMain article: Bada form. mobile consumers own smartphones. initially developed by Palm. LED. 65 percent of U.4 Application stores tually purchasable from Windows Marketplace for Mobile during the service’s brief lifespan. In May 2002. reFollowing the success of the App Store.7 million smartphone users. Up until that point.[82] 47. who planned to use the operating system for its “smart” or Internet-connected TVs. since the average thumb cannot reach the entire screen surface.[84] Global smartphone sales surpassed the sales figures for features phones in early 2013.5 Display Main article: Display device One of the main characteristics of smartphones is their screen.6 Market share 47.47. email.3. webOS is a proprietary mobile operating system running on the Linux kernel. screen size usually defines the size of a smartphone. Software applications were even.[73][74][75] Samsung shipped 4. On August 18. 47.[89] As of November 2011. Handspring released the Palm OS Treo 270 smartphone.3. that did not support Springboard.cations for multiple platforms. such lion phones running Bada in Q2 of 2011.5 webOS webOS was from LG. It usually fills virtually almost the entire phone surface (about 70%).3 Bada hosted online distribution for third-party applications (software. nounced by Samsung in November 2009. one billion smartphones were in use worldwide. In February 2014.2 inches are called "phablets".[83] Phones with screens larger than 5. starting from 2. 93% of mobile developers were targeting smartphones first for mobile app development. the rest had significant increases in shipment volumes of 36 to 92 percent.A 2012 University of Southern California study found that unprotected adolescent sexual activity was more droid smartphones had 29. a decrease from 18.[97] common amongst owners of smartphones. Apple’s iPhone had a 41.5% and all others with 0. although their shipment volume still increased by 12.210 CHAPTER 47.3% in 2012.2 By manufacturer Smartphones have issues besides those affecting other mobile telephones.7%.3 By operating system phones.4% share and Samsung had 19.6.9%. or any backlit devices. Apple had a 20.3%. Windows Phone with 2.7. smartphone battery life has generally been poor and a significant drain on customer satisfaction. Android market share was 53. Android’s market share (measured by units shipment) rose from 33. can seriously affect sleep cycles. LG and Lenovo were at about 5% each. Android was the most popular operating system. 47.[113] A study conducted by the Rensselaer Polytechnic Institute's (RPI) Lighting Research Center (LRC) concluded that smart47. In 2013. Samsung had a 31% share and Apple had 16%.3 Legal system since 2010.3% in Q4 2011 to 0.[93] 47.3%.6.[103] units in 2013 (up 38% from 2012’s 725 million) while comprising a 55% share of the mobile phone market in Historical sales figures. Higher income adults and those under age 35 lead the way when it comes to smartphone ownership.3% share and Samsung’s An. Windows Mobile market share rose from 1. BlackBerry’s market share fell from 14.9 percent. the same as the previous years figure. significantly better than 2012 figures.4% market share.9%. Samsung had 31.[101] In Q4 2014.[4] A high-capacity portable battery charger Compared to earlier non-smartphones.9% during the same period.1% of Main article: Smartphone wars the market in Q4 2013.[114] Main article: Mobile operating system The market has been dominated by the Android operating 47.7.[92] between 15% to 20.6% in Q4 2013. Apple’s market share oscillated .5% to 3% during the same time frame.2 Social Main article: Smartphone addiction In Q1 2015 in the US. Android and iPhone owners account for half of the cell phone user population.[91] Another study conducted in June 2013 concluded that 56% of American adults now owned a smartphone of some kind.7.7 Issues 47.6%.3% market share. BlackBerry Worldwide shipments of smartphones topped 1 billion with 0. while others had about 40%.[102] As of the end of Q3 2014. a slight increase from 30.2% in Q4 2011 to 78.1 Battery life Samsung Galaxy Note smartphones running Android In 2011.[110][111][112] 47.[100] In Q1 2014. in millions 2013 (up from 42% in 2012). while Apple was at 15. followed by iOS with 11.2%. Only Apple lost market share. with a 84.7% in 2012. SMARTPHONE smartphone owners use the device to shop. Huawei. Apple had the highest shipment market share worldwide. which did you buy?". Retrieved 2012-06-30. . U.3. Mobile virus and Media Transfer Protocol Smartphone malware is easily distributed through an insecure app store. This list is incomplete. concerns on the safety of the use of such applications. Malware. Twenty years ago. Wonder How To. These concerns were transformed into regulation initiatives world wide with the aim of safeguarding users from 47.[131][132] “Superphone” is also used by some companies to market With the rise in number of mobile medical apps in phones with unusually large screens and other expensive [133][134] the market place. Patent #3. Retrieved 2011-12-15. Phone Scoop. squeezing the features of a cell phone. fax machine. “Before IPhone and Android Came Simon. Patent #3. Apple’s “Find my iPhone” and Google’s “Android Device Manager” can disable phones that have been lost/stolen.[116][117] Often malware is hidden in pirated versions of legitimate apps. Retrieved 2011-12-15. [2] “Feature Phone”.S. Google.10 See also untrusted medical advice.11 References [1] “Smartphone”. a portmanteau of the words phone and tablet.9.6 Sleep • List of mobile software distribution platforms • Videophone • Dumbphone • Media Transfer Protocol • Mobile broadband connectivity • Mobile Internet device (MID) • Second screen • Screen protector 47. The following table compares the screen sizes of all Apple smartphones and a selected number of Samsung. the First Smartphones”.[123][124][125][126] [5] U.S.[121] In 2014. describes smartphones with larger screens. feature phone arms race heats up. USA TODAY. An online petition has urged smartphone makers to install kill switches in their devices. Bloomberg Businessweek. With BlackBerry Protect in OS version 10. Ira (2012-06-29). Patent #3. Phone Scoop. you can help by expanding it. pager.842.5 Security Main articles: Mobile security.812. [3] Andrew Nusca (20 August 2009). Simon was the first smartphone.8 Devices [6] “Watch The Incredible 70-Year Evolution Of The Cell Phone”.2. Retrieved 5 March 2015. [7] Sager.7.[115] • Comparison of smartphones 47.7.7. “Apple beats Samsung in Q4 smartphone sales”. USA TODAY (3 March 2015).208/1015-1974 (Sensor Monitoring Device) 47. which users then install when they are notified that the app has been updated. “Smartphone vs. it envisioned our app-happy mobile lives.296/5-21-1974 (Apparatus for Generating and Transmitting Digital Information). phone copied the interface—and possibly the hardware— of Apple’s iOS for the iPhone 3GS.003/4-10-1973 (Decoding and Display Apparatus for Groups of Pulse Trains).[118][119] Malware risk also comes from what’s known as an “update attack”. ZDNet. Retrieved 2011-12-15. 47. which are then distributed through third-party app stores. HTC. due to the brightly lit screen affecting melatonin levels and sleep cycles.727. Bloomberg L. OTHER TERMS 211 A “patent war” between Samsung and Apple started when Microsoft. Using smartphones late at night can disturb sleep. where a legitimate application is later changed to include a malware component.47. Asus and Motorola smartphones that the latter claimed that the original Galaxy S Android were available worldwide.4 Medical Main article: Mobile app "Phablet". government regulatory agencies raised features. devices can be rendered unrecoverable to even BlackBerry’s own Operating System recovery tools if incorrectly authenticated or dissociated from their account.P.S.9 Other terms 47. [4] Brett Molina and Marco della Cava. and computer into an 18ounce black brick.[122] 47.[120] One out of three robberies in 2012 in the United States involved the theft of a mobile phone. U. 16 October 2013. Stephanie Mlot [36] Fiegerman. 9 January 2007. [22] Halevy. SMARTPHONE [27] The Android Atlas Cnet. 16 December 2013 [25] “T-Mobile G1 Event Round-up” (Press release). Ron. “Quasar IV Encrypted Ninja Smartphone Goes Into Production. USA Today. LightReading. [20] Anwar. (1 November 2003). 2014).. Part 3: The Evolution Of Color”. [29] Darrell Etherington (10 October 2013). NY Times.0 Camera Tests Show Update Instantly Improves Every Smartphone”. 79–84. CHEN and NICK BILTON [26] “Alliance Members”. Frank (Sep 2001). Retrieved 11 July 2010. Wired 9 (9). 1. LAPTOP. [47] “Android sales overtake iPhone in the US”. 2014. US. Retrieved 16 August 2014. . Retrieved 27 April 2011.com. BBC News. Shanaz. . Mashable. Retrieved 19 May 2015. PC Mag. “Sony Xperia Z2 Ready to Compete With Samsung Galaxy S5”. “Digital doorkeys and more: Meet New York’s latest start-ups”. Mashable. T-Mobile UK. Sascha (2010-03-23). [30] Ian King (16 December 2013). [19] Barnes. BBC News. Talk Media Inc. 46.com. Gigaom. [15] “Ericsson R380 World Review & Rating”. 8 January 2014. Retrieved December 27.. [17] Segan. Retrieved 2011-09-07. PR Newswire.com. Retrieved 10 October 2013. The American Graduate School of International Management. “NTT DoCoMo and M-Commerce: A Case Study in Market Expansion and Global Strategy” (PDF). “Android 5. The Sydney Morning Herald. clickable payments for businesses”.212 [8] Schneidawind. 2014. PCMag. Retrieved 26 December 2013. Retrieved 24 January 2014.com. Retrieved 24 September 2013. [43] An Internet of Light: Going Online with LEDs and the First Li-Fi Smartphone.. [33] . Lisa Eadicicco [12] “Qualcomm s pdQ Smartphone”. 19 January 2014. The Sydney Morning Herald. [45] Bendable smartphones aren't coming anytime soon.. 2B. Retrieved 27 April 2011. TechCrunch. No. November 25. [41] Paul Monckton. Sid L. [46] Building a Better Battery.com. Retrieved 19 May 2015. Retrieved 19 May 2015. Open Handset Alliance. 2 February 2014. BBC News. AT&T’s PhoneWriter was demonstrated at the 1993 Comdex Computer Show. [16] “Kyocera QCP 6035 Smartphone Review”. “Apple Pay Still Growing While Icahn Professes Love For Apple Inc. “Poindexter putting finger on PC bugs. The Guardian.and turned Japan into the first post-PC nation”. Digital Trends. PCmag. Retrieved 24 January 2014. Engadget. BRIAN X. Charlotte. Retrieved 2014-09-13. Big Blue unveiling”. “World’s first 'smartphone' celebrates 20 years”. AOL Inc. “Panasonic announces Lumix DMC-CM1 smartphone with 1-inch sensor”. [9] Connelly. CHAPTER 47.”. [44] Your next phone may charge and receive data through this incredible screen. Pamela (January 1995).. “The History of RIM & the BlackBerry Smartphone. [37] Jones. Rising Sun: iMode and the Wireless Internet. Motherboard Beta. BBC News.It is at this point that early usability test participants met impasse. [21] “Info Addicts Are All Thumbs: Crackberry Is the 2006 Word of the Year”. Brian Merchant [23] “The iPhone is not a smartphone”. [38] Musafer. Ian King. Sarah Reddy [35] . Michelle. Mobile Magazine. pp. [39] Rindu P Hestya (March 1. ValueWalk. Association of Computing Machinery. Retrieved 16 February 2014. “Pocket Monster: How DoCoMo’s wireless Internet service went from fad to phenom . 2001-03-16. Stuart J. [31] Samsung Phone With Bended Display May Come This Year. Vol. Retrieved 21 August 2013.. “Why is Apple so shifty about how it makes the iPhone?". [13] “PDA Review: Ericsson R380 Smartphone”. Sayid Tariq. Retrieved 27 April 2011. Nov 1. [42] Lars Rehm. [10] History of first touchscreen smartphone Spinfold. Geek. Jeffrey Van Camp [24] “T-Mobile G1 Hits the UK” (Press release). 2014. Retrieved 2011-09-07. Palminfocenter. Wired. Alan Berrey [14] “Ericsson Introduces The New R380e”. Despite Indiegogo Failure”. [28] George Monbiot (23 September 2013). “Designing a GUI for Business Telephone users”. 22 October 2008. “Kyocera Launches First Smartphone In Years | News & Opinion”. 11 February 2014.com. John (1992-11-23). 2014). [18] Rose. p. [34] . Retrieved December 27. “Square introduces $Cashtags.com [11] Savage. qualcomm. “Do you really need a 4K smartphone screen?". 2 August 2010. Retrieved 16 February 2014. Seth. 2006. Retrieved 16 January 2011. [32] Steve Dent (February 18.com. “Bendable smartphones aren't coming anytime soon”. Huff. [40] “Kamera LG G3 Beat Dibekali Delapan Titik Fokus”. 30 October 2008. The switch connected to our “smart phone” is expecting the typical “dumb end-point”. Communications of the ACM. 30 December 2013. Retrieved April 15. [86] Jon Fingas (February 11. and Microsoft is playing to win”. ubuntu. Retrieved 2011-09-13. 13 July 2010.com. Retrieved 26 July 2013. Retrieved 2012-10-24. Makes Other Announcements”. 2009. Mozilla Philippines. [72] “Samsung to Discard Windows Phone”. “Ten things to know about BlackBerry -. [62] Tung. April 29. [67] “Symbian Device – The OS Evolution” (PDF). InformationWeek. 2014). [77] Stephen H. 18 February 2014. [73] “Samsung Wave. 2010-08-19. CNet. Retrieved 3 February 2011. 2010-08-18. Press Release. [55] Arthur.5 Billion in First Year”. 2011. “Sony Mobile Plans to Release Firefox OS Devices by 2014”. [82] W3C Interview: Vision Mobile on the App Developer Economy with Matos Kapetanakis and Dimitris Michalakos. “iTunes App Store Now Has 1. “Nokia Bridge: Nokia’s Incubator Gives Departing Employees €25k And More To Pursue Ideas That Nokia Has Not”. The Inquirer. HP. Wildstrom (November “Handspring’s Breakthrough Hybrid”. 2009). Retrieved November 26. Retrieved 2014-06-17. [61] Lunden. [80] “The next chapter for webOS”. Might License the OS to Others”. BadaWave. Helsingin Sanomat 30. [81] “Open webOS::Roadmap”. © 2013 CBS Interactive. Retrieved 2011-12-15.ca. Retrieved 2011-12-15. [53] Matt Buchanan (2010-02-15). Pocket Gamer. Independent Symbian Blog.45 " IPS Touch Screen the World’s Smallest Android Smartphone Dual Sim Quadband . Bruce. Associated Press. The Sailfish OS Wiki. In India For $92”. [56] Kevin McLaughlin (December 17.com. Telecoms Korea.com. USA Store. [70] “Nokia. Retrieved 7 June 2013.com. [57] Feb 26 2013 (2013-02-25). 2015. [59] “Jolla OS Will Run Android Apps Says CEO Jussi Hurmola”.com. 9 November 2009. company claims”. Google – Technology & Science”. Bada. CRN. September 2012. Computerworld. July 14. Retrieved 24 February 2015. Gizmodo.Biz”. [76] “Samsung Bada shipments up 355% to 4. [50] Sarah Perez (June 2. Retrieved 2011-12-15. [49] “Apple’s App Store Downloads Top 1.com. Press Release. Retrieved 14 March 2013. 2008-07-10. Has Seen 75 Billion Downloads To Date”. Retrieved 201402-23. first Bada smartphone hits the market”. [87] “European Mobile Market”. Ingrid. Geek. Business- [79] “HP Confirms Discussions with Autonomy Corporation plc Regarding Possible Business Combination. zdnet. Retrieved 2009-01-17. Crunchgear.5 million units in Q2 2011 | asymco news | PG. Techradar. [52] “Windows Phone 7 Series is official. Retrieved 2011-09-13. TechCrunch. Microsoft in pact to rival Apple. Retrieved 2011-12-15. 3 News NZ. Review & Rating”. The Guardian. “Samsung Launches Its First Tizen-Powered Phone. “Samsung’s wrist reboot: Gear 2 and Gear 2 Neo unveiled”. Retrieved 2011-09-07. [78] “HP To Stop Making webOS Smartphones. [83] “Save Big 2. Apple Inc.11. Engadget. Retrieved 2011-12-15.47. Retrieved 2011-12-15.Ubuntu”. Liam.com. Retrieved 2011-12-15. [64] Jon Russell.USA Store”. [84] Don Reisinger (17 October 2012). Charles (29 September 2014). “BlackBerry Users Call For RIM To Rethink Service”. [60] “Many former Nokia employees start businesses of their own”. “Inside Nokia Bridge: How Nokia funds exemployees’ new start-ups”. “Two-thirds of Americans now have smartphones”. REFERENCES 213 [48] “iPhone 3G on Sale Tomorrow”. [68] “Ericsson Introduces The New R380e”. Retrieved 2012-01-05.2 Million Apps. Retrieved 27 June 2013. Retrieved 2015-04-19. 2014). techcrunch. Retrieved 2011-09-07. [51] “Apple has sold one billion iOS devices. “Ericsson R380 World. Retrieved 2011-09-07. Retrieved 2011-12-15. Open webOS Project. 2013. [66] “PDA Review: Ericsson R380 Smartphone”.and how much trouble it is (or isn't) in”.com. [65] Canonical. [69] Brown. 2001). Retrieved 201109-07. Mobile Magazine. techcrunch. [85] “Smartphones now outsell 'dumb' phones”. HP webOS Developer Blog. “Windows Phone 7 Series: Our Take | TechCrunch”. Retrieved 7 June 2013. telecoms market research. 2013. “Ubuntu on phones . 2010-02-15. [74] “BadaWave”. [75] “Samsung Waves away a million”. 24 May 2010. week. Retrieved 2015-04-09. [54] Devin Coldewey (2010-02-15). 2011-0211. [58] “The Sailfish OS Wiki”. “Samsung Bailing on Windows Mobile”. CBS Interactive. Retrieved 15 January 2015.com. [71] Ed Hansberry (11 November 2009). CBC. The Z1. CMSinfo. “Windows Phone 7 Series: Everything Is Different Now”. . Apple Inc. TheGuardian.com. “Worldwide smartphone user base hits 1 billion”.com. PCMag. Inc. [63] Techradar (2014-02-23). 214 CHAPTER 47. [104] Gartner Says Worldwide Smartphone Sales Reached Its [123] Kalsbeek. 2015. 382. GIGAOM. Dritsas Stelios. will top 700M by 2018”. Retrieved 22 January 2014. Lab on [96] “Worldwide Smartphone Sales to End Users by Vendor in a Chip 14 (5): 833–840.com. Privacy & Security in Digital Business (TRUSTBUS-2011). phone Could Be Ruining Your Sleep”. [103] “Smartphone OS Market Share. [89] Steven Millward (2014-12-22). Grew 8 Per Cent in Fourth Quarter 2009. .pdf [111] “The secret behind poor smartphone battery life”. Retrieved on 2012-08-09.[113] “SMARTPHONES make TEENS have SEX with uary 2014. The Guardian. STRANGERS”. Mobile Statistics. Gartner. Mobile as before”.. Tsoumas Bill. Retrieved September 9. droid Police.prisadigital. “Android Vulnerability So Dangerous. K. mained Flat in 2009. Power and Associates Reports: Smartphone Battery Life has Become a Significant Drain on Customer SatisThe Most Popular Mobile Retailer”.[109] “Gartner Says Smartphone Sales Surpassed One Billion Units in 2014”. “Your Tablet and SmartThird Quarter of 2014”. pp. “Smartphones killing point-and-shoots. Seth (27 August 2012). 8th International Conference on Trust. Quarter of 2008. Readwriteweb. GartRetrieved 2014-12-22. comScore.co. ft. “Should I keep my smartphone and tablet [105] Gartner Says Worldwide Mobile Phone Sales to End Users out of my bedroom? | Life and style”. 2014. comScore. Tech In Asia.D.com.com. Inc. Retrieved makes you more productive”. Retrevo warn of growing Android malware epidemic. Smartphone Subdroid Leads The Way. “Xiaomi breaks into global top 10 for smartphone shipments. 2014-06-17. [119] Perez. L. Sarah (2009-02-12). [101] Steven Millward (May 13. “comScore: 4 Out Of 5 Smartphone Owners Use Device To Shop. AOL faction and Loyalty”. Retrieved on 2012-08-09. Retrieved 27 June 2013. scriber Market Share”. comScore. 2011. pp. Retrieved 2014-06-17. Gritzalis [98] “comScore Reports March 2014 U. [91] Leena Rao (19 September 2012). [116] Mobile Malware Development Continues To Rise. depending on who you ask”.com. “Apple in China: not as cool [107] “Quarterly Device Sales In 2011” (Infographic). Springer Berlin / Heidelberg. Retrieved March [121] Template:Cite p 26. ner.S. Retrieved 27 June 2013. According to IDC”. [92] http://boletines. Retrieved 2014-01-27. 2014). [125] “Are smartphones disrupting your sleep?". Gartner. Q3 2014”. Smartphone Sub[118] “The Mother Of All Android Malware Has Arrived”.com. The Neurobiology of Circadian Lowest Growth Rate With 3. berry. 49–61.au. Andries (2012). TIME. Appleinsider. Retrieved 2012-08-30. blackcember 21. Smh. [120] “Lookout.com. SMARTPHONE [88] beyondbrics (2012-08-24). Browser”.uk. ZDNet. [115] Yetisen. scriber Market Share”.com.1039/C3LC51235E. and Will for Years”. [100] Jon Fingas (January 28. note Apple’s iOS is far safer”. J. [124] Luisa Dillner. 2014). Retrieved 2012-01-05. Martinez-Hurtado. Gartner. 2014. GI. 2014. 2015. kicks out HTC”. Retrieved June GAOM. Gartner. Jan. Smartphone [126] Mahesh Sharma. Smartphone SubDimitris (2011). theregister. Market ReRetrieved 2014-06-17.S. ScienceDaily.Inside BlackBerry Help Blog”. “China now has 520M smartphone users. TechCrunch. An[97] “comScore Reports January 2015 U. March 6. [102] “IDC: Smartphone OS Market Share”. (2014). et al. now take almost 1/3 of photos”. “Switching off your smartphone at night Sales Grew 72 Percent in 2010. IDC. Anscriber Market Share”. 2013. “The regulation of mobile medical applications”. Retrieved on 201208-09. Retrieved De. [117] Mylonas Alexios. . [94] “Gartner Says Sales of Smartphones Grew 20 Percent in [114] Colaner. doi:10. [112] “Peak Battery: Why Smartphone Battery Life Still Stinks. [95] “Smartphone Vendor Market Share. Statistics. Retrieved 2011-08-08. Retrieved 11 September 2014. Owners Warned Not to Use Phone’s Web Engadget.com. Tech in Asia.S. 28. 2011-08-03. “Smartphone sales may have topped 1 billion in 2013. Retrieved 25 July 2013. A. Retrieved on 2014-07-24. [99] “comScore Reports March 2013 U.com/PIP_Smartphone_ adoption_2013. Amazon Is [110] “J.6 Billion Units in 2010. 4Q13 (Thousands of Units)". [108] Gartner Says Annual Smartphone Sales Surpassed Sales of Feature Phones for the First Time in 2013. [106] Gartner Says Worldwide Mobile Device Sales to End Users Reached 1.7 Per Cent Increase in Fourth Timing Elsevier.[122] “Getting started with Anti-Theft Protection in BlackBerry 10 OS version 10. International Data Corporation.com. Gartner. March 3. [90] Erica Ogg (22 December 2011). Gartner.com. Q3 2014”. [93] “Worldwide Smartphone Shipments Top One Billion Units for the First Time. iPhone 5c .iPhone 6 . Forbes. Sasha Segan. [131] “Is the Market Ready for a Phablet?". ap- [129] “Apple . 7 February 2012. February 13.47.12. ple.Technical Specifications”. EXTERNAL LINKS 215 [127] “Apple .com what’s the difference? 47.com.com. [128] “Apple .com [134] Superphone vs smartphone: Techradar.Technical Specifications”. pcmag. Apple. ple.iPhone 5 .12 External links • Media related to Smartphones at Wikimedia Commons . retrieved 2012-08-15 [132] Enter the Phablet: A History of Phone-Tablet Hybrids.Technical Specifications”.iPhone 5s . ap- [130] “Apple .Technical Specifications”. Apple. 2012 [133] What Makes a Smartphone a Superphone? Mashable.com. Chapter 48 Subscriber identity module “Simcard” redirects here. security authentication and ciphering information. A subscriber identity module or subscriber iden- A typical SIM card (mini-SIM) A TracFone Wireless SIM card has no distinctive carrier markings and is only marked as a “SIM CARD” capable handsets. international mobile subscriber identity (IMSI) number. temporary information related to the local network. which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers). A SIM card contains its unique serial number (ICCID). for CDMA phones. A mini-SIM card next to its electrical contacts in a Nokia 6233 tification module (SIM) is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key. where the size of the plastic carrier is reduced while keeping electrical contacts the same. SIM cards are always used on GSM phones. which is usually made of PVC with embedded contacts and semiconductors. the development of physically smaller mobile devices has prompted the development of smaller SIM cards. “SIM cards” are designed to be transferable between different mobile devices. For the brand-name medication. a list of 216 . they are only needed for newer LTE- The SIM circuit is part of the function of a Universal Integrated Circuit Card (UICC) physical smart card. see Simvastatin. SIM cards can also be used in satellite phones. It is also possible to store contacts on many SIM cards. The first UICC smart cards were the size of credit and bank cards. DATA 217 the services the user has access to. including a single check digit calculated using the Luhn algorithm.8 V (ISO/IEC 7816−3 classes A.14 (there is an identical ETSI specification with different numbering). The operating voltage of the majority of SIM cards launched before 1998 was 5 V.011) and USIM (TS 31. The ICCID is defined by the ITU-T recommendation E. The network operator 300 SIM cards to the Finnish wireless network operator that issued the SIM card can use this to have a phone con[1][2] Radiolinja. Service Provider Name (SPN). ther development of the physical card UICC. which was initially specified by 3GPP in TS 11. mostly used when the SIM is not in card maker Giesecke & Devrient.102) and ETSI for the fur.[3] Its layout is based on ISO/IEC 7812. The number is composed of the following subparts: Issuer identification number (IIN) Maximum of seven digits: • Major industry identifier (MII).118.11. nect to a preferred network. With the development of UMTS the specification work SIM cards can come in various data capacities.1 History carrier-specific data such as the SMSC (Short Message Service Center) number. the 64 KB version has room for 80 MNCs. 3GPP is now respon. thenticate and identify subscribers on the network. and a personal unblocking code (PUK) for PIN unlock. IMSI. This is used by network operators to store information on The first SIM card was made in 1991 by Munich smartpreferred networks. and ETSI TS 131 111. but while the 32 KB has (TS 51. However. in order to make use of the best commercial agreement for the original network company instead of having to pay the network operator that 48. All allow a maximum of 250 consible for the further development of applications like SIM tacts to be stored on the SIM. This specification de(Refer to GSM 11. 89 for telecommunication purposes. Modern SIM cards allow applications to be loaded when the SIM is in use by the subscriber. SIM cards produced subsequently are compatible with 3 V and 5 V. Individual account identification .2 Design the phone 'saw' first. SIM toolkit applications were initially written in native code using proprietary APIs. ETSI TS 102 588.1 ICCID Encapsulation Hotmelt Substrate Card Body Bond Wire SIM chip structure and packaging There are three operating voltages for SIM cards: 5 V. the GSM Phase 1[4] defined the ICCID length as 10 octets (20 digits) with operator-specific structure. This does not mean that a phone containing this SIM card can connect to a maximum of only 33 or 80 networks. 48. In order to allow interoperability of the applications. Advice-Of-Charge paTelecommunications Standards Institute in the specificarameters and Value Added Service (VAS) applications. 1–3 digits.KB to at least 128 KB.8 V. These applications communicate with the handset or a server using SIM application toolkit. • Issuer identifier. the main specifications are: ETSI TS 102 223. The SIM was initially specified by the European Service Dialing Numbers (SDN). respectively). The SIM also stores other 48. who sold the first its home network but is roaming. 3 V and 1. but it means that the SIM card Chip Adhesive issuer can specify only up to that number of preferred netMetal Contacts Active Chip Side works. if a SIM is outside these preferred networks it will Chip use the first or best available network. ETSI TS 102 241.3 Data a personal identification number (PIN) for ordinary use. • Country code. Authentication Key (Ki). Additional standards and specifications of interest are maintained by Global Platform. According to E.3. tion with the number TS 11. the number is up to 22 digits long. 3 V and 1.room for 33 Mobile Network Codes (MNCs) or “network identifiers”.48.SIM cards store network-specific information used to auing. as defined by ITU-T recommendation E. Modern cards support 5 V. B and C. and two passwords: 48.) scribes the physical and logical behaviour of the SIM.3. from 32 was partially transferred to 3GPP. Java Card was taken as the solution of choice by ETSI. 2 fixed digits. Each SIM is internationally identified by its integrated circuit card identifier (ICCID).164. ETSI and 3GPP maintain the SIM specifications. ICCIDs are stored in the SIM cards and are also engraved or printed on the SIM card body during a process called personalisation.11. Local Area Identity (LAI) and OperatorSpecific Emergency Number.118 as the Primary Account Number. The most important of these are the ICCID. 1–4 digits. which is received from the Location Area Identity (LAI). The SIM card signs it with its Kᵢ. but every number under one IIN will tion process. others are with the digit. SUBSCRIBER IDENTITY MODULE • Individual account identification number. and search for SIMs on the mobile network. producing SRES_2. depending upon the issuer. Check digit • Single digit calculated from the other digits using the Luhn algorithm. which passes it to the SIM card. In practice. computing another number known as Signed Response 1 (SRES_1). it obtains uses the same size for its ICCIDs. which it gives to the Mobile Equipment along with encryption key K . and passes this to the mobile varying ways of delivering electronic copies of SIM peroperator requesting access and authentication.212 but are mainly used in the United States and Canada. • The next two or three digits represent the Mobile Network Code (MNC). If the device is The Knᵢ is a 128-bit value used in authenticating the power cycled. the SIM card provides a function. The operator network then sends the RAND to the Mobile Equipment. below) from the Kᵢ has certain vulnerabilities[5] that can allow the extraction of the Kᵢ from a SIM card and the making of a duplicate SIM card. The SIM card is designed not to allow the Kᵢ to be obtained using the smart-card interface. With the GSM Phase 1 specification using 10 octets into which ICCID is stored as packed BCD. a single issuer always 1. it will take data off the SIM. If the two numbers match. The ITU regularly publishes a list of all internationally assigned IIN codes in its Operational 2. in Operational Bulletin No. The operator network then compares its computed SRES_1 with the computed SRES_2 that the Mobile Equipment returned. Some datasets are without the ICMobile Equipment may have to pass a PIN to the CID checksum digit.2 International mobile identity (IMSI) subscriber SIM cards are identified on their individual operator networks by a unique International Mobile Subscriber Identity (IMSI). 3. When the device changes locations. authentication center or AuC) on the carrier’s network. makes usage of the SIM card mandatory unless the Kᵢ can be extracted from the SIM card. The Mobile Equipment passes SRES_2 on to the operator network. Each SIM holds a unique the prior LAI. .3 Authentication key (Kᵢ) operator network with its new location. which is a nonce) and signs it with the Kᵢ associated with the IMSI (and stored on the SIM card). The most recent list. The sonalization datasets. As required by E. • The next digits represent the Mobile Subscriber Identification Number (MSIN). or the carrier is willing to reveal the Kᵢ. In practice. each having a unique LAI number.3. 48. that allows the phone to pass data to the SIM card to be signed with the Kᵢ.4 Location area identity total length of the IMSI should be less than 15 digits. Operator • Digits are different from country to country. The operator network then generates a Random Number (RAND. as of November 2013. The format is: • The first three digits represent the Mobile Country Code (MCC). Mobile network operators connect mobile phone calls and communicate with their market SIM cards using their IMSIs. it stores the new LAI to the SIM and sends it back to the 48. 1040. This. 5.3. the International Mobile Subscriber Identity (IMSI) To confuse matters more. Its length Kᵢ assigned to it by the operator during the personalizais variable. However. Three-digit MNC codes are allowed by E. is incoming IMSI and its associated Kᵢ. The SIM stores network state information. networks are divided into Location Areas.3. the GSM cryptographic algorithm for computing SRES_2 (see step 4.218 CHAPTER 48. The operator network searches its database for the Bulletins.118. When the Mobile Equipment starts up. the data field has room for 20 digits with hexadecimal digit “F” being used as filler when necessary. Run GSM Algorithm. by design. SIM card before the SIM card will reveal this information. The Kᵢ is also stored in a database (termed have the same length. the SIM is authenticated and the Mobile Equipment is granted access to the operator’s network. Instead. Normally there will be 10 digits but would be fewer in the case of a 3digit MNC or if national regulations indicate that the 48. K is used to encrypt all further communications between the Mobile Equipment and the network. SIM factories seem to have from the SIM card. 4. this means that on GSM SIM cards there are Authentication process: 20-digit (19+1) and 19-digit (18+1) ICCIDs in use. 4 Formats Full-size SIM (1FF). 48. This arrangement (defined in ISO/IEC Micro-SIM (from bottom) with mini-SIM and full SIM brackets 7810 as ID-1/000) allows such a card to be used in a defrom Telia in Sweden vice requiring a full-size card. The number of contacts and messages stored depends on the SIM. It has the size of a credit card (85.that some suppliers. and nano-SIMs. 48. FORMATS 48. 18 mm in diameter. refer to this form tionality is independent of format. func. or in a device requiring a mini-SIM card after breaking the linking pieces.4.1 Full-size SIM The full-size SIM (or 1FF. . micro-SIMs. micro-SIM (3FF) and nano-SIM (4FF) Embedded SIM from M2M supplier Eseye with an adapter board for evaluation in a Mini-SIM socket followed by mini-SIMs. The contacts are stored in simple “name and number” pairs: entries containing multiple phone numbers and additional phone numbers will usually not be stored on the SIM card. such as AT&T.48. 12345A 6789 12345A 6789 48. next to a US dime. Full-size SIMs were factor as a Standard SIM. SIMs are also made to be embedded in devices. attached by a number of linking pieces.4.98 mm × 0.4. early models would store as few as five messages and 20 contacts while modern SIM cards can usually store over 250 contacts. Note SIM cards have been made smaller over the years.60 mm × 53.3.76 mm). which is approx.5 219 SMS messages and contacts Most SIM cards will orthogonally store a number of SMS messages and phone book contacts. discarding any information that is not a phone number. When a user tries to copy such entries to a SIM the handset’s software will break them up into multiple entries. The memory film from a micro SIM card without the plastic backing plate. mini-SIM (2FF). 1st form factor) was the first form factor to appear.2 Mini-SIM The mini-SIM (or 2FF) card has the same contact arrangement as the full-size SIM card and is normally supplied within a full-size card carrier. from April 2010. which is the standards-setting body for GSM SIM cards. nor reduce the performance of the satellite positioning system and in Brazil with the SIMcards.” 48. The nano-SIM measures 12.[16][17] had discovered vulnerabilities in some SIM cards that enabled them to be hacked to provide root access. released in September 2012. The same size and quirement for a connector.8 × 0. EP SCP expect to finalise the technical RAV anti-theft system. The SIM was also designed to run at the same requirement to change the SIM card. this avoids the respeed (5 MHz) as the prior version.[14] The European Commission has selected the Embedded UICC format for its in-vehicle emergency call “With this decision.220 48.4. overnight.In response. In Russia sire not to invalidate.4 Nano-SIM In July 2013. The micro-SIM was developed by the European Telecommunications Standards Institute (ETSI) along with SCP. the existing there is a similar plan with the ERA-GLONASS regional interface. ARIB.[18] The cards affected use the Data Encryption Standard (DES) which.[7][8] Embedded-SIM / Embedded Universal Integrated Circuit Card (eUICC) The form factor was mentioned in the December 1998 3GPP SMG9 UMTS Working Party. 2FF and 3FF SIM cards. is still used by some operators. 48. 3GPP2 (CDMA2000). and the Open Mobile Alliance (OMA) for the purpose of 48. but reduced length and width as shown in the table above. Apple “disagreed that there is any statement forbidding scissors.76 mm of its predecessor. The major issue for backward compatibility was the The surface mount format provides the same electrical contact area of the chip. the hack could lead to the phone being remotely cloned or allow payment credentials from the SIM to be stolen. a cryptographer and security researcher from SRLabs. the Nokia N9.[18] Cards using the more recent Advanced Encryption Standard (AES) or Triple DES standards are not affected.4. GSMA has been discussing the possibilities of [13] While Moand YouTube video with detailed instructions how to cut a software based SIM card since 2010.[18] Among other risks.[9] and the SIMs for M2M applications are available in a surface mount SON-8 package which may be soldered directly form factor was agreed upon in late 2003.[20] . 2013.5 Security Micro-sim cards were introduced by various mobile service providers for the launch of the original iPad. SUBSCRIBER IDENTITY MODULE Micro-SIM The micro-SIM (or 3FF) card has the same thickness and contact arrangements. Retaining the same contact area interface as the full size.[10] onto a circuit board. the Nexus 5 and the Sony Xperia followed. GSM Association (GSMA SCaG and GSMNA). scheduled for February 2004. All new car models in the EU will responded to a market need from ETSI cusneed to have one by 2015 to instantly connect the car to tomers.4. that it would be contacting its members. but allows the micro-SIM to be compatible with the prior. a mini-SIM card to micro-SIM size with a sharp knife or torola noted that eUICC is geared at industrial devices.[11] the use of an embedded UICC in a consumer product. GlobalPlatform. is soldered to the circuit board as part of the manufaclarger SIM readers through the use of plastic cutout sur.5 fitting into devices too small for a mini-SIM card.” The chairman of EP SCP.[12] The iPhone 5. The iPhone 4 was the first smartphone to use a micro-SIM card in June 2010.[18] Further details of the research were to be given at BlackHat on July 31. was the first device to use a nano-SIM card followed by other handsets including the Nexus 6 and Samsung Galaxy Alpha. we can see that ETSI has service known as eCall.[6] The 0. A small rim of isolating material is left around said that the development was “hugely significant” and the contact area to avoid short circuits with the socket. it was revealed that Karsten Nohl. Liberty Alliance. 3GPP (UTRAN/GERAN). many phone companies however do not recommend using these adapters. Later the Samsung Galaxy S3/S4. In M2M applications where there is no rounds. improving reliability and sepositions of pins resulted in numerous “How-to” tutorials curity. despite its age.[15] realisation for the third form factor at the next SCP plenary meeting. 4FF can be put into adapters for use with devices taking 2FF or 3FF SIMs. and later for smartphones. The micro-SIM was designed for backward compatibility. Klaus Vedder.3 CHAPTER 48.67 mm thickness of the nano-SIM is about 12% less than the 0.[18][19] The nano-SIM (or 4FF) card was introduced on 11 October 2012. various Nokia Lumia handsets.turing process.67 mm and reduces the previous format to the contact area while maintaining the existing contact arrange. said[10] in 2012.3 × 8. the International Telecommunication Union ments. but additionally there is a strong dethe emergency services in case of an accident. Dr. when mobile service providers began selling it in various countries. and the service for these phones bound to a unique identifier contained in the handset itself. but says the number of possibly stolen keys would not have been massive. Japan’s 2G PDC system (which was shut down in 2012. but this has never been implemented commercially. it would be in Gemalto’s financial interest to make such a claim even if they discovered the encryption keys were in fact stolen. This is most prevalent in operators in the Americas. 2015 it was reported by The Intercept that the NSA and GCHQ had stolen the encryption keys (Ki’s) used by Gemalto (the manufacturer of 2 billion SIM cards annually). the SIM consisted of the hardware and the software. The UICC is still colloquially called a SIM card.7 Usage in mobile phone standards • H2O Wireless prepaid SIM card The use of SIM cards is mandatory in GSM devices.[21] Having finished its investigation. • Dual SIM slots as shown on a Lenovo A369i.[22] However. Sometimes. In GSMonly times. • SIM card for Thuraya satellite phone • KDDI's au IC-Card • NTT DoCoMo's FOMA Card • UMTS modem with SIM card • SIM card and the mobile phone • Three UK SIM Card with Packaging • Chunghwa Telecom's LTE Card • China Mobile's LTE SIM card 48. The first publication of the TIA-820 standard (also known as 3GPP2 C. • Hotlink (Maxis) Nano SIM card .S0023) in 2000 defined the Removable User Identity Module (R-UIM). The equivalent of a SIM in UMTS is called the Universal Integrated Circuit Card (UICC). A virtual SIM is a mobile phone number provided by a mobile network operator that does not require a SIM card to connect phone calls to a user’s mobile phone. enabling these intelligence agencies to monitor voice and data communications without the knowledge or approval of cellular network providers or judicial oversight. Japan’s current and next generation cellular systems are based on W-CDMA (UMTS) and CDMA2000 and all use SIM cards. the specifications were further developed and enhanced with functionality like SMS. The reference phone was capable of downloading multiple virtual SIM cards overthe-air. Gemalto claimed that it has “reasonable grounds” to believe that the NSA and GCHQ carried out an operation to hack its network in 2010 and 2011. With the advent of UMTS this naming was split: the SIM was now an application and hence only software.11) for interfacing between smart cards and mobile telephones. which runs a USIM application.6 Developments When GSM was already in use. The specification of the interface between the Mobile Equipment and the SIM is given in the RCR STD-27 annex 4.48. The Subscriber Identity Module Expert Group was a committee of specialists assembled by the European Telecommunications Standards Institute (ETSI) to draw up the specifications (GSM 11. This configuration is necessary because older GSM only handsets are solely compatible with the SIM [application] and some UMTS security enhancements do rely on the USIM [application]. Japanese CDMA2000-based phones are locked to the R-UIM they are associated with and thus. the SIM specification was enhanced as well: new voltage classes. In 1994. 2010) also specifies a SIM. These development steps are referred as releases by ETSI. the Universal Subscriber Identity Module (USIM). The hardware part was called UICC.. Within these development cycles. CDMA-based devices originally did not use a removable card. SoftBank Mobile has already shut down PDC from March 31. USAGE IN MOBILE PHONE STANDARDS In February. formats and files were introduced. GPRS. The USIM brought. The equivalent of SIM on CDMA networks is the R-UIM (and the equivalent of USIM is CSIM). Simless. 48. At the 2015 Mobile World Congress in Barcelona. “SIM cards” in developed countries are today usually UICCs containing at least a SIM and a USIM application. etc. Thuraya and Inmarsat's BGAN also use SIM cards. [23] 221 The satellite phone networks Iridium. Card-based CDMA devices are most prevalent in Asia. This split was necessary because UMTS introduced a new application. these SIM cards work in regular GSM phones and also allow GSM customers to roam in satellite networks by using their own SIM card in a satellite phone. Inc. the cards are not interchangeable with other Japanese CDMA2000 handsets (though they may be inserted into GSM/WCDMA handsets for roaming purposes outside Japan). However. security improvements like the mutual authentication and longer encryption keys and an improved address book. the name SIMEG was changed to SMG9. a US-based startup unveiled world’s first GSM phone without a SIM card slot. among other things.7. . This is typical. Version 3. Specifications of the SIM-ME Interface. including most of Europe. Sascha (27 January 2010).co.g. where billing rates and variable network coverage make it desirable for consumers to use multiple SIMs from competing networks. bbc. the Indian subcontinent and South East Asia. e.11. “The Smart Card Platform”. ISBN 1119995817. Canada. East Asia. the UK and Poland. 18 or 24 months). 48. Today they exist in over 50 countries. Saad Z. Revision history. Finland and the UK. United States. or on the side of the phone if the device does not have a removable battery. but are commonplace in developing markets such as in Africa. for example. [7] Gaby Lenhart (1 April 2006). Retrieved 14 October 2012. SCP is cooperating on both technical and service aspects with a number of other committees both within and outside the telecommunications sector. though in some devices both slots can be found on the battery tray. [2] History of Giesecke & Devrient [3] ITU-T.9 Multiple-SIM devices Main article: Dual SIM Devices with two SIM slots are known as dual SIMs. India. 20 April 2011. This is more common in markets where mobile phones are heavily subsidised by the carriers.16. John Wiley & Sons. In the Western world dual-SIM devices are less common. GSM and 3G mobile handsets can easily be unlocked and used on any suitable network with any SIM card. and even less so with multiple-SIM phones. Mexico. among users who may want to optimise their carrier’s traffic by different tariffs to different friends on different networks. SIM cards that are issued by providers with an associated contract are called SIM only deals. • GSM 03. Where the phone is not locked to its SIM card. The international telecommunication charge card. one behind the battery and another on the side of the phone. Common examples are the GSM networks in the United States. 306. the mobile phone is locked to its carrier SIM card. • VMAC In countries where the phones are not subsidised.nl. Retrieved 13 August 2011. effectively making it possible to then use the phone on any network by inserting a different SIM card. Next Generation Mobile Communications Ecosystem.10 See also The SIM card introduced a new and significant business opportunity for MVNOs — mobile virtual network operators — who lease capacity from one of the network operators rather than owning or operating a cellular telecoms network. Dual-SIM mobile phones usually come with two slots for SIMs. ETSI Technical Committee Smart Card Platform (TB SCP). meaning that the phone only works with SIM cards from the specific carrier.uk. Retrieved 30 January 2010.48 • SIM cloning • SIM connector • IP Multimedia Services Identity Module (ISIM) • W-SIM (Willcom-SIM) • Mobile equipment identifier (MEID) • Mobile signature • Single Wire Protocol (SWP) • SIM Application Toolkit (STK) • Mobile broadband • Tethering • Smart card • SIM only Deals • Regional lockout 48. Australia.222 48. and the business model depends on the customer staying with the service provider for a minimum term (typically 12. p. [8] Segan.8 SIM and carriers CHAPTER 48. “Inside the iPad Lurks the 'Micro SIM'". Australia and parts of Asia. Retrieved 30 January 2010. PC Magazine. • International Mobile Equipment Identity (IMEI) On some networks. SimOnlyPro. Israel and Belgium.118. and account for approximately 10% of all mobile phone subscribers around the world. MVNOs first appeared in Denmark. Hong Kong. Mostly. SUBSCRIBER IDENTITY MODULE 48. the users can easily switch networks by simply replacing the SIM card of one network with that of another while using only one phone.0 [5] “Hackers crack open mobile network”. (2011). ETSI Recommendation GSM 11. ITU-T Recommendation E. all phones are unlocked. [6] “What is a microsim card?". Many businesses offer the ability to remove the SIM lock from a phone.. Revision “05/2006” [4] ETSI.11 References [1] Asif. and only provide a SIM card to their customers. Canada. or when traveling internationally. prlog. EXTERNAL LINKS 223 [9] “DRAFT Report of the SMG9 UMTS Working Party. 12. 15–16 December 1998” (PDF). Retrieved April 2. Vox Media. 2015. SmartCard Trends. 2012). COSWITCHED. ETSI. accessed 201307-22 [18] Rooting SIM cards. Bloomberg. at the SCP meeting held last week in London. The Intercept. The Verge. • GSM 11. [13] Diana ben-Aaron (18 November 2010).12. Sophia (8 December 2003). html 48. 2015.11 – Specification of the Subscriber Identity Module – Mobile Equipment (SIM-ME) interface. [23] http://www. The Intercept (First Look Media). 1. 25 January 1999. “GSMA Explores Software-Based Replacement for Mobile SIM Cards”.48 – Specification of the security mechanisms for SIM application toolkit • ITU-T E.com. Retrieved 30 January 2010. 3GPP. [15] Bruno. Inc. Retrieved February 19.48 in Java • GSM 03. was agreed. One manufacturer stated that it may be difficult to meeting ISO mechanical standards for a combined ID-1/micro-SIM card. February 25. Duarte (September 27.12 External links • ETSI Smart Card standards (102 221) • GSM 11. Reuters. Retrieved October 25. “3FF”. p. Retrieved 27 January 2010. accessed 2013-07-21 [21] “The Great SIM Heist . accessed 2013-07-22 [19] BlackHat. Klaus Vedder (18 January 2012). accessed 2013-07-21 [20] UPDATE 1-UN warns on mobile cybersecurity bugs in bid to prevent attacks. techcrunch. Retrieved October 25. • GSM 03.COM. [14] Ziegler. The work item for the so-called Third Form Factor.14 – Specification of the SIM Application Toolkit for the Subscriber Identity Module – Mobile Equipment (SIM-ME) interface [10] Antipolis. p. published 2013-07-21. accessed 201307-22 [17] Encryption Bug in SIM Card Can be Used to Hack Millions of Phones.48 Java API – API and realization of GSM 03. 2015. 2013-07-21. “Embedded SIMs: they're happening. February 19. 2014. meeting #7 hosted by Nokia in Copenhagen. [22] “Gemalto: NSA/GCHQ Hack ‘Probably Happened’ But Didn’t Include Mass SIM Key Theft”. [16] Hacker sollen Kreditkarten freirubbeln. “New form factor for smart cards introduced”. 2015. “eUICC – embedded Universal Integrated Circuit Card”. Retrieved 22 July 2012.How Spies Stole the Keys to the Encryption Castle”. 2014).org/ 12429409-simless-unveils-worlds-first-gsm-phone-without-sim-card-slot.48. after intensive discussions. 2014. “The UICC – Recent Work of ETSI TC Smart Card Platform” (PDF). Chris (June 1. SR Labs. Retrieved 17 October 2014. and Apple thinks they could be in consumer products”.118 – The International Telecommunication Charge Card 2006 ITU-T [11] How to make MicroSIM on YouTube [12] Dr. . 18: 1 + 8 = 9). Assume an example of an account number “7992739871” that will have a check digit added. 49. is a simple rithm form: checksum formula used to validate a variety of identification numbers. Take the sum of all the digits. The result (3) is the check digit. Note that 3 is the only valid digit that produces a sum (70) that is a multiple of 10. moving left. It is specified in ISO/IEC 7812−1. 1954... bers. 79927398711. ber to generate the full account number. 2. If the total modulo 10 is equal to 0 (if the total ends are the products from Step 1): x (the check digit) + in zero) then the number is valid according to the (2) + 7 + (1+6) + 9 + (6) + 7 + (4) + 9 + (1+8) + 7 Luhn formula. 3. such as credit card numbers. 10 − 7 = check tended to be a cryptographically secure hash function. filed on January 6. In case the sum of digits ends in 0. Compute the sum of the digits (67). From the rightmost digit. if the product of this doubling operation is greater than 9 (e. 8 × 2 = 16). Most credit cards and many govern1. Thus these account numbers are all invalid except possibly 79927398713 which has the correct check digit.950. from the rightmost: products (e. = x + 67.Chapter 49 Luhn algorithm The Luhn algorithm or Luhn formula. which is the check digit. In algothe "modulus 10” or “mod 10” algorithm. (3×2) = 6. If the sum is a multiple of 10. Thus. The sum of all the digits in the third row is 67+x. Canadian Social Insurance Numbers. (1×2) = 2. not malicious attacks. 2. 4.1 Description The formula verifies a number against its included check digit. Patent No. 79927398719 can be validated as 1. 79927398716. making it of the form 7992739871x: 3. Multiply by 9 (603). 79927398715.S. else it is not valid. and 2. This number Each of the numbers 79927398710. otherwise incorrect numbers. The last digit. Subtract the units digit from 10.This. Double every second digit. the account number is possibly valid. then sum the digits of the 1. 1960. In algorithm form: it was designed to protect against accidental errors. Compute the sum of the non-check digits (67). 79927398717. makes the full account number read 79927398713. digit 3). ment identification numbers use the algorithm as a simple method of distinguishing valid numbers from mistyped or 2. which is usually appended to a partial account num. 16: 1 + 6 = 7. 79927398714. x=3. follows. (9×2) = 18 2. 79927398718.g. (8×2) = 16. IMEI num1. It was created by IBM scientist Hans Peter Luhn and described in U. also known as modulo 10 (in equation form. National Provider Identifier numbers in the US. double the value of every second digit. is the check digit. 3.[1] It is not inunits digit from 10 (67 => Units digit 7. (67 × 9 mod 10)). 4.048. (2×2) = 4. Take the units digit (7). The check digit (x) is obtained by computing the sum of the non-check digits then computing 9 times that value 224 . must pass the following test: 79927398712.g. (Alternative method) The check digit (x) is obtained by The algorithm is in the public domain and is in wide use computing the sum of the other digits then subtracting the today. Sum all the individual digits (digits in parentheses 3. 0 is the check digit. 79927398713. and granted on August 23. 3. Therefore. Prepending a 0 to odd-length numbers enables you to process the number from left to right rather than right to left. If the (sum mod 10) == 0. and now you were calculating it for the first time. It will not.6 External links • Implementation in 88 languages on the Rosetta Code project • Open Source implementation in PowerShell 49. that is. Luhn generation .3. The Luhn mod N algorithm is = luhn_checksum(int(partial_card_number) * 10) return check_digit if check_digit == 0 else 10 . If the included checksum matches the calculated checksum. as if it had not yet been calculated. The device took the mod 10 sum by mechanical means.1 Verification of the check digit def luhn_checksum(card_number): def digits_of(n): return [int(d) for d in str(n)] digits = digits_of(card_number) odd_digits = digits[−1::−2] even_digits = digits[−2::−2] checksum = sum(odd_digits) for d in even_digits: checksum += sum(digits_of(d*2)) return checksum % 10 def is_luhn_valid(card_number): return luhn_checksum(card_number) == 0 49. more complex check-digit algorithms (such as the Verhoeff algorithm and the Damm algorithm) can detect def calculate_luhn(partial_card_number): check_digit more transcription errors. mechanical device for computing the checksum. the check digit = 10 . the results of the double and reduce procedure.2 Strengths and weaknesses The Luhn algorithm will detect any single-digit error. August 23. The substitution digits. doubling the odd-place digits. were not produced mechanically. detect transposition of the two-digit sequence 09 to 90 (or vice versa). the digits were marked in their permuted order on the body of the machine. however. Calculating the check digit requires only a slight adaptation of the algorithm—namely: 1. 33 ↔ 66 or 44 ↔ 77). It was therefore required to be rather simple.Identification of issuers -. 49. • Ruby: Luhn validation.4 See also • Bank card number 49. SEE ALSO 225 Alternately (if you don't want to confuse yourself by performing an algorithm on the whole number including the checksum digit). Because the algorithm operates on the digits in a right-toleft manner and zero digits affect the result only if they cause shift in position. Append a zero check digit to the partial number and calculate checksum 2.048 . as well as almost all transpositions of adjacent digits.3 Implementation of standard Mod 10 • Luhn implementations in JavaScript • Validation of Luhn in PHP • Implementation in C The implementations below are in Python.Computer for Verifying Numbers. The algorithm above checks the validity of an input with a check digit. you can use the same checksum creation algorithm (mentioned a couple paragraphs up).Part 1: Numbering system [2] US Patent 2.2 Calculation of the check digit 49. Else. ignoring the checksum already in place. then the number is valid. [2] The algorithm appeared in a US Patent for a hand-held. 49. Rather. It will detect 7 of the 10 possible twin errors (it will not detect 22 ↔ 55.950. zero-padding the beginning of a string of numbers does not affect the calculation.3. Hans P Luhn.4.(sum mod 10) Other. 1960 49. Then calculate the checksum and compare this calculated checksum to the original checksum included with the credit card number.check_digit an extension that supports non-numerical strings. then the check digit is 0 3.49. systems that pad to a specific number of digits (by converting 1234 to 0001234 for instance) can perform Luhn validation before or after the padding and achieve the same result.5 References [1] ISO/IEC 7812-1:2006 Identification cards -. LUHN ALGORITHM .226 • Luhn validation class in C# • Luhn validation implementation in Java • Luhn validation in SQL • Luhn algorythms for non-numeric characters CHAPTER 49. For details.212 number with no modification of its value. It is stored as a 64 bit field and is sent by the phone to the network. this requires a roaming agreement). first determine the MCC and convert to E.214 numbering plan.212 numbering stan. If the subscriber is not from the provider’s network. dard. the 227 • prepend 35988 (Bulgaria E.164 country calling code then determine MNC and convert to national network code for the carrier’s network. UMTS and LTE network. which can then be used for accessing the subscriber’s data in the remote HLR.164 number (more or less a telephone number).214 can be interpreted as implying that there are two separate stages of conversion. which is similar to but different from E. see Global Title Translation. • route message on Global Title across SCCP network . SCCP is used to send the message to its final destination. and whether subscribers from that network may use a given network (if they are not local subscribers.214.2. this number is provisioned in the SIM card and for CDMA2000 in the phone directly or in the R-UIM card (the CDMA2000 analogue to a SIM card for GSM). the IMSI is directly converted to an E. After this conversion. It is also used for acquiring other details of the mobile in the home location register (HLR) or as locally copied in the visitor location register. IMSI must be converted to a Global Title. An IMSI is usually presented as a 15 digit long number. E. For GSM.214 provides a method to convert the IMSI into a number that can be used for routing to international SS7 switches. E. The IMSI is used in any mobile network that interconnects with other networks.1 Example of outside World Area 1 The IMSI conforms to the ITU E. but can be shorter.This example shows the actual practice which is not clearly described in the standards. The length of the MNC depends on the value of the MCC.[1] The remaining digits are the mobile subscription identification number (MSIN) within the network’s customer base. standard E. But this process is not used in practice and the GSM numbering authority has clearly stated that a onestage process is used . In North America. either 2 digits (European standard) or 3 digits (North American standard). Outside North America the IMSI is converted to the Mobile Global Title (MGT) format. the IMSI is sent as rarely as possible and a randomly generated TMSI is sent instead.Chapter 50 International mobile subscriber identity The International Mobile Subscriber Identity or IMSI /ˈɪmziː/ is used to identify the user of a cellular network and is a unique identification associated with all cellular networks. To prevent eavesdroppers identifying and tracking the subscriber on the radio interface.2 IMSI analysis • remove first five digits (length of MCC+MNC) IMSI analysis is the process of examining a subscriber’s IMSI to identify the network the IMSI belongs to. For example MTN South Africa's old IMSIs that are still being used in the market are shown as 14 digits. which are followed by the mobile network code (MNC). This is mainly important for international mobile roaming.164 country code + a Bulgarian local prefix reaching MobilTel’s network) • mark the number as having E. 50. This can be routed directly on American SS7 networks.1 Examples of IMSI numeric presentation • match numbers starting 28401 (Bulgaria mobile country code + MobilTel MNC) • identify this as belonging to MobilTel-Bulgaria network 50. Translation rule: 50. The first 3 digits are the mobile country code (MCC). 4 See also • IMEI • MEID • Electronic Serial Number • MSISDN • IMSI-catcher 50. For more details please see Global Title Translation.212 numbering plan. 50.214 numbering plan.3 Home Network Identity The Home Network Identity (HNI) is the combination of the MCC and the MNC. This number has to be converted on the ANSI to ITU boundary. This is the number which fully identifies a subscriber’s home network. 284011234567890 becomes 359881234567890 under the E. This combination is also known as the PLMN.003 50. 50. 284011234567890 becomes 284011234567890 under the E.214 numbering plan.2 Example inside World Area 1 (North America) Translation rule: • match number starting 28401 (Bulgaria MCC + MobilTel MNC) • identify this as belonging to MobilTel-Bulgaria network • do not alter the digits of the number • mark the number as having E. • route message on Global Title across SCCP network Therefore. • route message on Global Title across SCCP network Therefore. 310150123456789 becomes 14054123456789 under the E.6 External links • “Cellular Networking Perspectives” article in Wireless Telecom Magazine • IMSI oversight council responsible for allocating IMSI ranges in the USA • IMSI Lookup Utility 50. INTERNATIONAL MOBILE SUBSCRIBER IDENTITY Therefore.228 CHAPTER 50.5 References [1] 3GPP specification 23. This number can now be sent to Global Title Analysis.212 numbering plan.214 compliant Global Title. The result is an E. Translation rule: • match numbers starting 310150 (America first MCC + Cingular MNC) • remove first six digits (length of MCC+MNC) • prepend 14054 (North America E. (Numbering Plan Indicator is set to 7 in the SCCP message).214 numbering plan.164 country code + Network Code for Cingular) • mark the number as having E. • Explanation of GSM numbering plans .2. Chapter 51 Mobile equipment identifier For the town in Somalia.of the Public Long Code Mask (PLCM) used for comlocate any IMEI for use in dual-technology phones. a 24-bit manufacturer code.[2] ufacturer code portion (32 bits) to decimal and padding on the left with '0' digits to 10 digits and separately converting the serial number portion to decimal and padding 51. and a 24-bit manufacturerassigned serial number.munication with the base-station. The number format is defined by the 3GPP2 report S. Consequently.[3] Roughly. tors: the global decimal administrator (GDA) for IMEIs and the global hexadecimal administrator (GHA). whose virgin form was exhausted in November 2008. A check-digit can be calculated from the 18 digit result using the standard base 10 Luhn The separation between international mobile equipment algorithm and appended to the end. This is defined by 3GPP2 standard X. The check-digit is never transmitted or stored.[1] As of TIA/EIA/IS-41 Revision D and TIA/EIA/IS-2000 Rev C. but if at least one digit is in the range 'A'-'F' this check digit algorithm uses base 16 arithmetic. devices with an MEID can use a pseudo ESN (pESN). There are two administra. see Maydh.1 Administration on the left to 8 digits.babt. the TIA acts as the GHA to assign 51. specifically destined extremely rare condition known as a 'collision' on a pure for dual-technology phones. contain hexadecimal digits and this class of MEID codes The probability of a collision has been carefully cannot be used as an IMEI.R0048 but in practical terms. it may be printed on phones or their packaging in case of manual entry of an MEID (e. and both can include an optional check-digit. and the GSM Association acts as the global decimal administrator. the check-digit is calculated using the normal base 10 Luhn algorithm.g. it is estimated that even on a heav229 . out of the RR=99 range. Ev.3 pESN conflicts MEID code prefixes (0xA0 and up). An MEID is 56 bits long (14 hex digits). The hexadecimal form is specified to be 14 digits grouped together and applies whether all digits are in the decimal range or whether some are in the range 'A'-'F'. Two mobiles using the ery IMEI can also be used as an MEID in CDMA2000 same pESN within the same base-station area (operating devices (as well as in single-mode devices designed with on the same frequency) can result in call setup and page GSM or other 3GPP protocols) but MEID codes may also failures. There are two standard formats for MEIDs. because there is no bar code or the bar code is unreadable). it can be seen as an IMEI but with hexadecimal digits.2 Display formats A mobile equipment identifier (MEID) is a globally unique number identifying a physical piece of CDMA mobile station equipment. As of August 2006. examined. Note that to produce identifiers (IMEIs) used by GSM/UMTS and MEIDs is this form the MEID digits are treated as base 16 numbers based on the number ranges.even if all of them are in the range '0'-'9'. all digits are in the range '0'-'9'. In the first case. The check digit (CD) is not considered part of the MEID. which is a manufacturer code of 0x80 (formerly reserved) followed by the least significant 24 bits The decimal form is specified to be 18 digits grouped in a 5 5 4 4 pattern and is calculated by converting the manof the SHA-1 hash of the MEID.asp is the potential for hash collisions. ESN-only network as the ESN is used for the calculation Other administrators working under GSMA may also al. http: Because the pESN is formed by a hash on the MEID there //www. it is not intended to be a checksum or CRC to detect transmission errors. the ESN is still a required field in many messages— for compatibility. These will cause an The TIA also allocates IMEI codes. It is intended to detect most (but not all) input errors. It consists of three fields. The MEID was created to replace ESNs.com/gsm-imei-number-allocation. 51.S0008. including an 8-bit regional code (RR). MOBILE EQUIPMENT IDENTIFIER .decode('hex')) #decode the hex MEID (convert it to binary!) pesn = “80” + s. A different problem occurs when ESN codes are stored in a database (such as for OTASP). Quick F.hexdigest()[−6:]. import hashlib meid = raw_input(“Enter an MEID: ").S0072 provides a solution to this problem by allowing the PLCM to be established by the base station. 3GPP2 specifications C. This specification also allows the PLCM to be based on the MEID or IMSI.230 ily loaded network the frequency of this situation is closer to 1 out of 1 million calls than to 1 out of 100 000.S0066 have been modified to allow the replacement MEID identifier to be transmitted. Another problem is that messages delivered on the forward paging channel using the pESN as an address could be delivered to multiple mobiles seemingly randomly.6 External links • Official TIA Resource Page for MEID • PhoneScoop MEID article • CDMA Development Group MEID resource page CHAPTER 51.4 Code to convert This short Python script will convert an MEID to a pESN.upper() s = hashlib. 51. The Telecommunications Industry Association (TIA). resolving this problem.sha1(meid. TIA. This problem can be avoided by using mobile identification number (MIN) or IMSI based addressing instead. 3GPP2 specification C. 2011 [2] CDG Resources on MEID and EUIMID [3] Pellegrino G.5 References [1] “ESN Migration to MEID .800 pseudo-ESN entries. 51.Milestones & Timeline”. the risk of at least two phones having the same pseudoESN can be calculated using the birthday paradox and works out to about a 50 per cent probability in a database with 4. In this situation.S0016 (Revision C or higher) and C.upper() #put the last 6 digits of the hash after 80 print “pESN: " + pesn The CDG also provides a javascript calculator with more conversion options. 26 May 2005. 51. November 30. It is easy for the base station to ensure that all PLCM codes are unique when this is done. White Paper on Pseudo-ESN Collisions. or multilock code. Such discounts are worth up to several hundred U. e. a locked handset will display a message if a reone and three years. network code key. however. simlock. including China.[2] SIM locking curbs this by prohibiting change of network (using a new SIM). hardware devices that connect to the handset or over-the-air by the carrier. Bell Mobility etc. e. phones may also have firmware installed on them which is specific to the network provider. Network providers use this capability to restrict the use of these phones to specific countries and network providers. varying by region. it is often legal for carriers to force SIM locks for certain amounts of time.. Likewise. where carriers often offer deeply discounted cell phones in exchange for an exclusive agreement with a carrier. or oblige the consumer to pay a fee. some phones. contract.[4] Additionally. then stop paying the monthly bill (thus breaking the contract) and start using the phone on another network or even sell the phone for a profit. dollars. Israel. Generally. will only work with SIM issued in one country) • Mobile network code (MNC. that phone will often be locked so it will not work with another carrier. IMSIs may be restricted by: • Mobile country code (MCC.g. phones can be locked to accept only SIM cards with certain International Mobile Subscriber Identities (IMSIs).[1] Most mobile phones can be unlocked to work with any GSM network provider. Despite this. T-Mobile. especially Nokia phones. SIM locking is very common if subsidized phones are sold with prepaid contracts. i. The code required to remove all locks from a phone is referred to as the master code. Vodafone.S. In the United States and other areas. but the phone may still display the original branding and may not support features of the new carrier. a CDMA cell phone will only work with a CDMA carrier and will not work on a GSM network provider. usually between Typically.ing unlock codes. SIM locking is illegal . can lock group IDs which are used in voice group call service.g. network lock or subsidy lock is a capability built into GSM mobile phones by mobile phone manufacturers. Alternative mechanisms include software running on the handset or a computer attached to the handset. There can also be multiple levels of locks placed on the phone by networks. Most phones can be unbranded by reflashing a different firmware version.1 Unlocking technology A handset can be unlocked by entering a code provided by the network operator. which block the use of other networks’ SIM cards.[3] In some jurisdictions. This business model allows the com. a procedure recommended for advanced users only. unlocking a phone without carrier consent may be legal in some jurisdictions. A phone sold without a SIM lock is called a SIM-free or unlocked phone and the purchaser can insert a SIM card of their choice. AT&T Mobility. For example. the phone 231 . only one SIM can be used with the phone) Additionally. These are usually referred to as “Network” (NCK) or “Service Provider” The reason many network providers SIM lock their (SPCK) locks and can be removed using the correspondare unique to each phone dephones is that they offer phones at a discount to cus.[5] 52.Chapter 52 SIM lock A SIM lock. users might sign a contract with one company. that the technology associated with the phone must be compatible with the technology being used by the network carrier.) • Mobile subscriber identification number (MSIN. On repany to recoup the cost of the phone over the life of the cent phone models running Android software. a Vodafone or Telstra branded phone in Australia will display the relevant logo and may only support features provided by that network (e. which [6] pending on its IMEI. Usually the unlock process is permanent. besides the locking.stricted SIM is used. and Singapore.. tomers in exchange for a contract to pay for the use of the network for a specified time period.. A GSM cell phone will only work with a GSM carrier and will not work on a CDMA network provider.e. If the phones were not locked. but in other countries. This firmware is installed by the service provider and is separate from the locking mechanism. requesting the unlock code. get the discounted phone.g. Vodafone Live!). It is important to note. carriers do not provide unlocking codes. Depending on the brand this “frozen state” can sometimes be resolved both by a special unfreeze code (Samsung) and cable solution and other brands need special cable solutions. Once a valid code is entered.” or in some cases the handset will simply display a message stating that it is locked.2 Box breaking often needed when there is more damage to the software. the handset will display “Network unlocked” or “Network unlock successful”. even more so if they are debranded. Most phones sold in the UK are network locked and single SIM but SIM-free phones are available. or they need to be connected to the computer with a cable where specific software will bypass the security and SIM-unlock the phone.1. In the worst situations one would need a special socalled “JTAG” hardware solution to fix the phone. Network operators in industrialized countries are not bound by law to give the phone unlocking code to subscribers even after the expiry of the contract period. Older phones could not be used at all anymore at this point. This is a state where the phone will display a security message that the phone needs service. Sometimes big telecom providers change the original factory unlock codes as an extra layer of security against unlocking services. a combination of phone and the subscriber identity (SIM). Consumers may wish to continue using their previous provider with a new handset or when traveling abroad they may wish to connect to a foreign network with a prepaid subscription. This is 52. The only solution to SIM-unlock such a phone is to change the firmware to a firmware which has not been modified by any telecom provider. Locking the phone to a network is not much different from having the SIM built into the mobile phone. SIM locks are employed on cheaper (pay-as-you-go) handsets. is open interfaces which encourage competition among multiple vendors. “This SIM card can only be used on specific networks. In some cases. however most smart-phones can be debranded and unlocked solely with use of special software. Unlocked handsets have a higher market value. in fact. For various big brands such as Samsung and Motorola there is no algorithm but just a random code generator where the unlock codes are programmed in the phone itself and then saved in a big database managed by the manufacturer. Contact your customer service center for the unlock code”. Some handsets can be unlocked using software that generates an unlock code from an IMEI number and country and operator details using the algorithm specific to the handset. This is the reason a mobile phone is. a SIM-locked handset is sold at a substantially lower price than an unlocked one.1 Economics Handset manufacturers have economic incentives both to strengthen SIM lock security (which placates network providers and enables exclusivity deals) and to weaken it (broadening a handset’s appeal to customers who are not interested in the service provider that offers it). Nevertheless.[7] Most handsets have security measures built into their firmware that protects them from repeated attempts to guess the unlock code. Also. making it too difficult to unlock a handset might make it less appealing to network service providers who have a legal obligation to provide unlock codes for certain handsets or in certain countries. The unlock code is verified by the handset and is generated by the manufacturer. typically by an algorithm such as a one way hash or trapdoor function. Other manufacturers have taken a more cautious approach. Mobile phones with multiple SIM cards are quite common in India. because the service provider expects income through its service. For the other brands where the unlock codes are still based on algorithms those are based on the IMEI number and the MCC code and have been reverseengineered.232 will display a message saying “SIM network unlock PIN” or “Enter Network Lock Control Key” if network locked. CHAPTER 52.1. Sometimes this is done by advanced calculations to bypass the security the official way and other times using exploits or overwriting parts of the firmware where the lock status is kept. These handsets can still be unlocked by online services that have access to either inside people with the manufacturer or with the telecom networks. 52. and often even recover a phone that is bricked or completely damaged in the software sense. and embed a random number in the handset’s firmware that is retained by the network on whose behalf the lock was applied and the manufacturer. while discounts on more expensive handsets require a subscription that provides guaranteed income. and is usually accomplished with software designed for a particular handset model. but modern smartphones often keep on working with the original SIM but need extra work to then unlock them the right way. Main article: Box breaker often including software damage to the “bootloader”. a so-called “unbranded firmware”. The main reason to unlock a handset is to be able to use it with a different SIM card. Other handsets may display different messages such as “Enter special code” or “Enter unlocking code. . SIM LOCK A hardlocked phone is one in which a telecom provider has modified the firmware on the phone to make it impossible to manually enter the unlock codes in any way. After entering more than a certain number of incorrect codes the phone becomes frozen. Debranding involves reflashing or replacing the firmware to remove the operator logo or any limitations or customisations that have been imposed on the handset by the operator. stolen or leaked. Windows phones will display the message. the fundamental principle of GSM and its successors. After five codes have been inputted. only some codes will work with the mobile phone.[14] However. consumers usually buy standard mobile phones that are not locked to any specific carrier. On average it typically costs around 15 USD depending on model and make. The pricing for unlocking a device will vary depending on the network it is locked to and the model itself.[12] T-Mobile Austria charges 150 euro to unlock the iPhone for prepaid subscribers and in contract subscribers.2. "+". This practice is legal in the UK and provides a de facto limit to the extent to which networks are willing to subsidize payas-you-go handsets. The unlock codes retrieved must be entered into the mobile phone using the keypad. and then selling them (often abroad) for a higher price than the subsidised retail price.1. some businesses are also engaging in illegal activities such as exporting the box-broken phones to other countries. The following is an example of a DCT4/DCT3 unlock code: # pw+931882753035021+7# DCT4 and DCT3 Nokia will only allow a maximum of five unlock attempts using the unlock code method.2 Austria In Austria. There does not appear to be any regulation or law on SIM locking in Australia.2 Laws and practices Many countries listed below have some form of SIMlocking laws specifying the period of SIM locking and the cost of obtaining unlocking codes. and violating the Trade Practices Act.2. Generally. Unlock code generators There are online services that will provide an IMEI unlocking service for DCT4 and DCT3 Nokia mobile phones. the phone will not allow the user to try any more codes (even if it is correct) and will require the owner to try other unlock methods. Such companies may email the unlocking code or software which will remotely unlock the device.2. As there is no competition. 233 finally ends with a "#". Some service providers offer unlocking services for their subscribers worldwide. unlocking the phones. gave a talk stating "#" key. For subscribers who have finished their 2-year iPhone contract. 52. For some brands such as Nokia and Samsung various services also offer special remote unlock software with instructions where a cable is needed to remove the SIM lock at home. There are many free services available online. The company will then provide the unlock code for the handset. This involves purchasing subsidized handsets (usually pay-as-you-go) from retail stores. unlock codes consist of a One law professor.2. older model Nokia unlock codes are free and instantly retrievable by these services. unlocking is allowed at any time by the owner of the device. While the act of box breaking is legal. The SIM card that came with the handset is then either thrown away. LAWS AND PRACTICES A practice known as box breaking is common [8] in the United Kingdom and other markets.3 Australia In Australia. 10 (DCT3) or 15 (DCT4) that bundling iPhone and mobile phone service could be digits. Depending on the carrier which the phone is locked to.[11] 52. no other . however some phones are configured to allow only one of the seven codes to work. sold or used elsewhere. to sell as grey market goods without paying import duties (known as Carousel Fraud) or substituting counterfeit batteries and chargers. Other companies sell unlocking hardware. the unlocking of older handsets becomes much more available. and another number ranging from 1-7. A lawsuit was decided in favor of a mobile operator who encouraged the unlocking of phones by providing links to free/cheap unlocking services.[9][10] 52. Dale Clapperton. either via email or a web site. but for newer phones the price can go as high as 50 USD (for Apple unlocking even as high as 150 USD). including devices which fit between the SIM card and the phone to spoof the original network id during registration and devices to read and edit the handset’s firmware.52.[13] 52. Most phones respond to the unlock codes ending in +1# or +7#. This service requires that individuals who wish to unlock a handset provide their IMEI number and sometimes also country and operator details to the company. For DCT4 and DCT3 Nokia. followed by “pw+". and also needs to provide an IMEI. As smartphones become more advanced. carriers can choose whether to SIM/Network Lock handsets or not and usually tend to only SIM/Network lock prepaid handsets.3 Unlocking services Some companies offer an online unlocking service. T-Mobile Austria charges 50 euro to unlock the iPhone. This method of unlock requires the user to know which carrier the mobile phone is locked to. as each unlock code is unique to the handset. 52.1 Andorra In Andorra. Some companies also offer unlocking services that require sending IMEI number. the state-owned communications mobile company Mobiland does not sell SIM-locked phones. carriers started to ask phone manufacturers to disable support for network technologies not used by such carrier even if the phone has been The carrier can choose to bind contracts up to 6 months from the contract’s start. the carrier can charge DKK 500 (~ €67)[24] for the unlock. originally designed to be capable of supporting those network technologies. locking phones to a specific carrier is prohibited if other carriers are also using the same type of network technology.9 Chile Chile requires that carriers unlock any device for free starting 1 January 2012. Many of the carriers choose not to lock the phones. WCDMA.8 mission would commence proceedings against Belgium. 52. since all three Chinese carriers each uses a different network technology after the adoption of 3G.2. Any company providing mobile telephone services must unlock any device for free.2. 2012. Singapore and Israel as the only countries in the world that forbid SIM locking and contract/phone bundling outright. 2013. After six months. the mobile carrier must inform the consumer of the existence of a SIM lock. Such a move does not result in violation of the ban on phone locking.2. Therefore. 2009. But the consumer needs to contact the original supplier. For devices bought on a prepaid plan.4 Belgium Until 2007 Belgium had laws prohibiting bundling. only as applied to subsidised iPhone purchases.[17] Chile initiated a ban as of January 1. 2011.[16] The Belgian government was given until May 2009 to change the law. the carrier is obliged by law to unlock the phone free of charge.[23] China 52.10 Croatia On June 3.7 In Croatia.[15] This also doesn't address SIM locking per se.[22] Canada 52. On April 23. CDMA.2. the operator must provide the unlock code on the user’s request after 12 months free of charge. an iPhone 6 was designed to be capable of supporting LTE FDD. Anatel. For example. Brazil’s telecom regulator. . the operator must provide the unlock code on the user’s request free of charge. must sell to all users unlocked devices and provide free of charge support to unlock previously sold devices. This regulation was ordered to enable mobile number portability and to facilitate the reduction on costs ordered simultaneously. 52.2. the European Court of Justice ruled against Belgium and struck down Belgium’s anti-bundling law. LTE TD. including the right of consumers to “have their cellphones unlocked after 90 days. but they were challenged as violating European Directive 2005/29/EC The Unfair Commercial Practices Directive.2. the mobile operator is allowed to SIM lock the device only if it’s bought on contract and only for the duration of the contract. and WCDMA technologies but China Mobile reached a deal with Apple to create a special model for China Mobile in addition to the off-contract retail model sold by Apple and third party vendors with the capability to support LTE FDD. requires the carrier to unlock free of charge the mobile phone if required by the user. which are the technologies not used by China Mobile.2. However. and provide the IMEI and original phone number for which the phone was sold. Newly sold phones must be unlocked or be labeled with information about how to get them unlocked.5 Brazil In Brazil.234 CHAPTER 52. and persistence of the lock beyond the contractual period. After this regulation most telecom operators started voluntarily unlocking the devices as soon as it was purchased so one could leave the store with an unlocked phone. SIM locks are not prohibited. failing which the European Com52. 52. CDMA. The regulation was put in place in order to implement mobile number portability.[21] 52. The code is effective 2013-12-02. the Canadian Radio-television and Telecommunications Commission announced[19] a new wireless code [20] which encompasses a variety of consumer benefits. However. After the contract’s expiration or termination.[24] If the phone needs to be unlocked within the first six months.2.[18] 52. or immediately if they paid for the device in full”. effectively making such special contract model incompatible with the 3G and 4G networks of other carriers even though such phones are never locked. This leaves China. disabled.11 Denmark Under a regulation enacted by the Ministry of Industry and Information Technology.6 Colombia Starting October 1. all phones approved to be sold in China are never locked to begin with regardless of whether the consumer purchased the phone under a contract or not. Only Hi3G (“3”) lock their phones. but can only do so for six months. SIM LOCK legal professional or academic has come out in support of this viewpoint. all the mobile telephone services providers. . .". but must comply with the EU Unfair Commercial Practices Directive (Directive 2005/29/EC of 2005). But Hong Kong carriers can SIM-lock a phone to protect the handset subsidy. Countries in the European Union (EU) each have their own legislation on SIM locking. carriers are not allowed to SIM-lock a phone for the sole purpose of tying customers to their netsix-month to the three-month deadline. As of 2012. tie-in sales were permitted with 3G handsets. LAWS AND PRACTICES 52. the carrier must provide a detailed procedure tially offered for sale in Germany exclusively through T. a tie-in sale is defined as selling the equipment for a discounted price contingent on the consumer also acquiring a new service contract from the seller. Article 20 of this law states the prohibitions that sellers are obliged to abide when selling a good or providing a service to people.agreement. Phones sold with a contract stipulating monthly payments are not typically locked (as the monthly payments are due no matter what network the phone is used on).2.52. However. or the full cost of the In Germany. Under the terms of a provisional exception. this directive has been successfully applied in Belgium to overturn that country’s previous ban on bundling phones with contracts. The SIM lock must be removed free of charge at the conclusion of the tie-in contract. unlock phones previously sold junction was later overturned.[25] available exclusively locked to T-Mobile. As noted above. Porta and Movistar.was issued requiring T-Mobile to do so.14 Finland In Finland. 52. duct tapes or analogous mechanisms.18 Hong Kong SIM lock. there does not appear to be any effective law equipment has been paid up under a rental or installment regulating SIM locking. For example.[28] work. most providers will unlock the phone on demand. and it was locked to T-Mobile’s network.for unlocking the equipment free of charge upon request. Paragraph 7 of this article states that it is prohibited to a provider to “place seals. and the subscriber has the right to request that the lock be removed at any time.16 Germany chase subsidy has been recovered. Under Finnish law. as of December 2009 Ecuador's two biggest carri. and it regulates the activities of any goods and services providers stating the principles that they must follow in order to operate in this country. there is a general law applicable to all consumer relations engaged in the national territory and provided by natural or legal persons.24-2008. carriers in many countries in the EU do not necessarily associate a phone’s SIM lock status to the customer’s tie-in contract status. except those mechanisms used by the manufacturer for warranty purposes. the iPhone is sold by Claro in Honduras and is SIM-locked.2. Also. within a maximum duration of 2 years. However.12 235 Ecuador Mobile. the iPhone was ini.they were sued by Vodafone and a temporary injunction ing. For example. usually only prepaid mobile phones are sold with a SIM lock.[31] which suggests that this general consumer protection law does not prohibit SIM locking of cell phones In France. No later than three months after the subscription of the contract. the Finnish government was preparing to extend the exception. SIM locks are not prohibited. valid from 2006 until 2009. they were doing it volun52. the mobile operator must inform the consumer of the existence of a SIM lock.[29] While TMobile Germany told the court that they would unlock the iPhone after the contract. This law is called “Ley de Proteccion al Consumidor”[30] or “Consumer Protection Act of Honduras”. They began to provide unlocking codes for that phone after Although there is no specific law preventing SIM lock.2. Usually a fee is charged during the first two years after purchase.[32] After the initial pur52.[26] In 2008. adhesives. public or private. to enforce mobile plan contracts or to protect from theft. and the iPhone is again by them. was considering reducing the duration of tie-in contracts to one year. nor are they allowed to offer tie-in sales on GSM equipment.2. Proposal to shorten the time that operators may charge a fee for removing the SIM lock prior from In Hong Kong.2.2. and at the same time. afterwards the unlocking is free.[27] 52. Vodafone’s iners.2. and 3G equipment which is purchased under such tie-in sales may be SIM-locked. carriers are not allowed to sell SIM-locked GSM phones.13 European Union tarily. without charge.2.15 France In Honduras. local carriers continue to apply SIM restrictions to the phones they sell. Even though the existence of this law. which prevent the consumer to make free use of the product.17 Honduras 52. the mobile operator must “systematically and free of charge” provide the subscriber with a procedure to deactivate the 52. approved by Legislative Decree No. 2.23 New Zealand Locking had occurred in New Zealand only to a limited degree[42] before May 2008 when Vodafone New Zealand announced they would begin locking handsets and charge $50 to unlock them.[43][44][45] Following speculation of a new lower cost. MNVO of Telecom XT details were leaked regarding the Skinny Mobile Network. to establish a pays the remaining cost. It is speculated that locking began due to the fact Telecom New Zealand were building their new XT Mobile Network based on UMTS technology. OSIPTEL specifically. Mobile phone manufacturers sell phones directly to customers rather than through network operators.[41] 52.2. You can pay to have it unlocked prior to this. at which point the customer can code of conduct [37] with respect to SIM locking — request the device be unlocked at any time. ANACOM.005 approx. 2010. and allow subscribers to obtain unlocking codes after nine months by paying half According to OSIPTEL Peru’s telecom regulator. U5 comes SIM locked to Ufone only.21 Italy Italy has SIM locking laws requiring that carriers must 52. with users choosing to make calls using a cheaper operator suitable for the particular call and time of the day from a Dual SIM phone without even switching it off. no matter if the contract is still in place. It was cheaper to change the SIM card than pay high roaming charges.24 Pakistan ber 29. According to the Arrangements Law passed on Decem. The number of inter-state travelers demanded unlocked phones.[35] locked for a lower price for 12. on handset subsidies and SIM locking concluded that there are no special regulatory concerns on offering subsidized SIM-locked equipment in exchange .2.[38] In a 2002 letter to the Dutch Secretary of State of Economic Affairs.75) in 1996 to ₹0. The sole exception Dutch mobile carriers have an agreement [36] with the is if the customer cancels the contract before its end and Netherlands’ telecom regulator. encouraged competition among network operators and brought down the mobile phone call charges in from the initial ₹32 (US$0.20 Israel tary code of conduct into legislation is not needed.) in 2011. a 2006 report written by the Dutch Ministry of Economic Affairs.25 Peru specify the amount of subsidies. This along with other factors. unlocking fees can be charged within the plans to reduce the time customers must wait to remove first 12 months and SIM lock cannot last longer than 12 their sim locks to 6 months.19 CHAPTER 52. mobile carriers can sell phones must be removed. OPTA.236 52.2.[33] established to check call rates and resolve all communication related issues and holds the upper hand in fixing call rates.26 Portugal A 2006 study sponsored by the Portugal regulator.50 (US$0. Telecom Regulatory Authority of India (TRAI) is the independent regulator of the telecommunications business in India. 52.2. which would SIM lock handsets. Usually. Vodafone relented on its locking policy and will unlock any locked phones for free once they have been owned for nine months. As of 2015. Vodafone.[40] stated that competition in the Dutch mobile market is sufficient and the formalization of the volun- 52. 2Degrees and Skinny all charge a $30 unlock fee for phones owned for less than 9 months.2. After 18 months. After pressure from the Commerce Commission. Thus there are no SIM locking laws in the Netherlands. months. allowing handsets to change networks for the first time as Telecom’s existing network (the only other network at that time) was based on CDMA technology. SIM LOCK India SIM locking is not common in India. UAE. 2degrees were also building their mobile network at this time.22 Netherlands code for free after 12 months from the purchase date. Israeli carriers are banned from locking handsets sold by them. Initially.2. article of the listed subsidies. the SIM lock 23 of the Terms of use.[34] smartphone named Smart U5 developed by Emitac Services. each state in India had a different mobile network operator and roaming across states was prohibitive. 18 or 24-month contracts. but also must sell unlocked devices for the full price. The rates still differ from one service provider to another and across different tariff schemes provided by the same operator. phones and SIM cards are sold separately.[39] However.2. 52. No other SIM can be used on the U5. The same article dictates the customer can request the unlock 52. and are obligated to unlock any Ufone has started SIM Locking with the release of its new handset previously sold at no charge. OPTA stated that the telecom regulator has decided to start working on the formalization of the voluntary code of conduct into legislation. Dual SIM phones are quite common in use.52. even if they're still in contract. no phones are sold in the market are subsidized by carriers. to unlock the handset.2.32 United Kingdom the regulator from actually imposing regulations on them.27 Romania 52.29 Spain In 1998.of the contract and the model of phone. Singapore’s Carphone Warehouse. One of the two United States GSM carriers. and has warned at least one operator for selling SIM-locked phones [49] 52. vided in the contract for communications services con. with the exception of handsets Singapore is the first country that forbids outright made exclusively for them.[48] several months.2.2. after 15 days. and they may voluntarily remove them if they choose to do so.. Network providers are allowed to apply SIM locks as they see fit.the regulator wants only “consumer awareness”. carriers are required to unlock handsets after 12 months since purchase.2.[55] Prior to the settlement. Some Blackberry handsets supplied by Vodafone (e. If the handset is not purchased together with other elec. Comisión del Mercado de las Telecomunicaciones. It also establishes limits to the fees that operators may charge to unlock a device while it is still under contract.31 Thailand Thailand is also another country that forbids outright SIM locking and as a result. All carriers will charge a fee of 300 SEK (approximately $45) or 350 SEK (approximately $50). therefore there are no SIM-locking laws in Spain. such as their Palm devices. In the paper. the customer will have to pay amples within the position paper are just “examples” of both the unlocking fee and the penalty for the anticipated current carrier practices for illustration purposes.2. 237 52. T-Mobile. LAWS AND PRACTICES for signing a contract tying a customer to a particular network.30 Sweden In Sweden.g. but do unlocking of the handset. Ofcom. for prepaid handsets.[52] The main nethandsets will not exceed the costs of this operation and works often agree to unlock handsets for a charge. and in some other situations. the author stated that the average unlocking fee charged by Portuguese carriers is 90-100 euros. but usually for age or at a preferential price and the customer requires the a charge. The full Oftel 2002 SIM-lock position paper unlocking before the expiry of the minimum period pro. The excluded with the operator.33 United States 52. This applies both to oncontract and pay as you go phones. Up until recently mobile Romanian telecom regulator ANCOM signed a code of phone manufacturers have their own store fronts and moconduct with several Romanian carriers providing that as bile carriers are only the service providers. The price charged to unlock not reflect any official Oftel regulation. either operators are obliged to meet unlocking requests within at the end of a contract or. UK’s telecom regulator. Storm)[53] are examples of a UK carrier not offering unlocking codes. Most operators offer services or by the payment of other fees.[50] CMT has not revisited this decision since then.In the United Kingdom. It is “self-regulation” by the carriers to prevent 52. offers unlocked phones with most PAYG deals.specifies that there is no SIM-locking law in the UK.[54] will unlock handsets for those with active account in good standing for at least 40 days and no unlock code request in the last 90 days.2. of September 1. AT&T Mobility. 52. saw that Spanish mobile carriers already provided unlocking codes voluntarily for a fee within the first 12 months and for free after 12 months. AT&T would [56] usually do so once one has concluded their contract. The other. the mobile telephony are not obliged to provide unlocking. SIM locking and contract/phone bundling. As of April 2011 O2 will 52.[46] A recently approved law [47] requires network operators to unlock a device free of charge if the respective contract has already expired (But they refuse to do so charging at least 10 euros). petition clause in mobile carriers’ licenses means SIMlocking is not allowed. some form of unlocking service. is required to do so upon request (with some exceptions and requirements after ninety days of active service) under the terms of a class action settlement negotiated by Scott A Bursor’s class action law firm.depending on carrier. the Spanish telecom regulator. allowed the SIM card permanot bind the terminal unlocking by the purchase of other 3 UK to sell a mobile phone with [51] nently superglued to the phone. 2009 mobile operators selling handsets locked within their own network have to inform clients whether the handset is locked and provide unlocking upon request. depending on the state If the handset is purchased as part of a promotional pack.2. mobile phone network providers tronic communications services.2. even after the end operator that sells it will bear the unlocking costs and will of the contract.52. one of the largest UK phone retelecommunications regulator has ruled that the comtailers.28 Singapore unlock any of their pay-monthly phones for free. AT&T had in the past . so CMT decided not to put any legal framework in Spain. 2013.S. Copyright Office to allow an exemption to the general prohibition on circumvention of copyright protection systems under the Digital Millennium Copyright Act of 1998 for unlocking of phones through user self-help (sometimes referred to as “hacking”). [8] “Box breaking investigation exposes retail staff breaches”.S. 2010-05-14. Mobile News Online. “Unlocking Codes: legal or illegal?". Some [18] “Bloqueio” (in Portuguese). with the carrier’s permission. [7] “SIM Free Phones”. Retrieved 7 October 2014.gc. [22] Chilean regulator statement (Spanish) http: //www. Great Domain Names for Your Online Presence from Buzzolo. Retrieved 2013-06-21. Retrieved 2013-06-21. Retrieved 201306-21. it will begin unlocking off-contract iPhones.gov. [13] “Entsperrung des iPhone”. Retrieved 23 September 2012. 17 August 2012. Retrieved 2013-06-03.A Resource for IT Professionals”.[62][63] The bill passed in the United [15] “TechRepublic .au.”. 2005-06-29 should also be able to switch carriers and keep their actual [61] phones. 2014. 2014. President Obama signed into law the Unlocking Consumer Choice and Wireless Competition [14] “Latest Reviews”. the Obama administration and the [12] „YESSS! gegen T-Mobile Klage erfolgreich“. Telekompresse-Bericht über das Urteil zugunsten Federal Communications Commission said consumers von YESSS!. even after customers are out of contract.com. 113th Congress). It is possible to buy unlocked phones in the US. SIM LOCK 52.ca. users can already unlock phones they already [10] own. crtc. that is. [21] “Desde el 1 de octubre los colombianos podrán comprar los celulares con las bandas abiertas. According to a ruling effective October 28.cl/prontus_subtel/site/artic/20111228/ pags/20111228200541. Act (S. provided that the customer’s account is in good standing. 517. Retrieved 7 October 2014.gob. 2008. 2014. Mintic. they were never locked in the first place. States Senate on July 15. SimonlymetInternet. In March 2013. Anatel. 2012. [2] “What is a Locked Phone and Why do Carriers Lock Them?". 52. MobileUnlocked. Retrieved 23 September 2012. Retrieved 7 Ocwill be illegal to unlock phones purchased 90 days after tober 2014. a bill legalizing unlocking cellphones in the U. CHAPTER 52. Retrieved 7 October 2014. in 2010 the Electronic Frontier Foundation (EFF) successfully convinced the U. [16] “Belgium law was struck down. [6] “Different Types of Unlock Code for Changing Network”.ca.my.subtel. Faq.gc. crtc.at. Retrieved 7 October 2014. manufacturer.t-mobile.238 stated that it would not unlock iPhones under any circumstances. However.[57] AT&T also has an unannounced policy of unlocking iPhones for United States service members who are deployed overseas— even if they are still under contract. AT&T has since announced that starting April 8.com.co. financial losses down”. and in the United States House of Representatives on July 25. Recently.html . a few carriers such as Sprint have agreed to allow domestic unlocking on all mobile devices launched [17] “High iPhone Price Blamed on Subsidy Ban”. but phones purchased after this point can only be unlocked [11] “Blackberry Unlocking”. Retrieved 2013-06-03.3 See also • Regional lockout • Android rooting • Hardware restrictions • International Mobile Equipment Identity (IMEI) • iOS jailbreaking • Vendor lock-in [20] “Information about the Wireless Code”. In other words. Unlock. Builderau. [3] “10 Most Frequently Asked Questions Answered Pertaining the FCC Guidelines on Mobile Device Unlocking”. it [9] “Fraud cases up. regardless of the legality of doing so.[59] This exemption has become less important now that most carriers are voluntarily providing unlock codes. and phones purchased before January 29. February 25. Retrieved and after February 15. On August 1. [19] “Canadians can cancel their wireless contracts after two years under new CRTC wireless code”.[58] Before carriers began voluntarily providing unlock codes for all phone models. 2015. una medida del gobierno que fortalece los derechos de los usuarios de telecomunicaciones en el país”. [4] “Is iPhone unlocking illegal?". Retrieved 25 Octoonline retailers sell phones that come unlocked from the ber 2012. Kerry (26 March 2012). 2012. [60] this date or later without the carrier’s permission.4 References [1] “Wholesale unlocked cell phones”.[64] 7 October 2014. [5] Butters. Retrieved 2013-06-21. The Washington Post. telefoanele codate in reteaua proprie” (in Romanian). [25] “Claro . Copyright Office Final 2010 Anti-Circumvention Rulemaking” (PDF).webcitation. Office of the Telecommunications Authority. Retrieved 7 October 2014. August 2. 2007. Infocomm Development Authority of Singapore. [52] “OFCOM Review of SIM-locking policy”. [53] “Vodafone UK’s position on not offering unlocking codes to Blackberry Storm”. [24] “Teleselskaber dropper simlås”.Help . 2010-07-13. Retrieved 7 October 2014. “AT&T Will Unlock Off-Contract iPhones Starting Sunday. [38] OPTA website on sim-locking [39] “OPTA letter to EZ” (PDF). “Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies” (PDF). Jordan (April 6.24-2008 : El Congreso Nacional” (PDF). Retrieved 7 October 2014. 1997-09-08. [58] Golson.nz. [64] “Legal / Regulatory & Consumer Resources”. Support. 2013 NYT [62] Hattem. 29 September 2009. Ancom. [37] “Establishment of Conduct of Conduct”.Desbloqueamento de telemóveis . April 8”. Retrieved 7 October 2014.vodafone. Bloomberg. [31] “iPhone: Wireless carrier support and features”. [30] “Decreto No. 2008. Peter (May 2. [44] “Vodafone relents on mobile lock”.nz.fr.com. May 27. Federal Register.)"TheMarker. Porta. “It’s Not The Money. Jordan (April 9.C. Retrieved 2013-06-21. [60] U. HAKOM.com/pdf/meolinot. Anacom. Can You Hear Me?". 2014. [46] Handset Subsidies – an Empirical Investigation [47] “ANACOM . Federal Register. Retrieved 2013-06-21.Vodafone NZ [63] “President signs cell phone unlocking bill into law”. The Hill. 2012).pt.S. Retrieved 7 October 2014. Retrieved 7 October 2014. Stuff. 2011.attlockinglawsuits. [57] Golson. Retrieved 2014-05-19. Retrieved 25 July 2014. MacRumors.gob.Vodafone NZ”. cnet. Sic.S. [49] “TAS Fines M1 For Unauthorised Frequency Transmission And Issues Warning Over Sale Of SIM-Locked Cellular Phones” (Press release). [54] “SIM Unlock your phone | Support”. Retrieved November 11. .t- [56] Pegoraro. Retrieved August 21.4. Julian (25 July 2014). 2012).Ecuador”. [26] Communications Market Act [27] Finland to keep 3G exception in tie-in sales ban [50] Spanish telecom regulator decided not to legislate SIM locking in 1998. Help. 2008). [59] U. “House votes to allow cellphone 'unlocking'".C.”.com. Retrieved 201005-23. [29] “Deutsche Telekom Wins Ruling in IPhone Sales Dispute (Update3)".com. Support. [40] “EZ 2006 Report”. 2012. Retrieved 2013-06-21. a Dutch Macintosh website asked a lawyer to provide a simple summary of the SIM-locking situation in the Netherlands. [51] “3 UK superglued SIM card into the cell phone. Retrieved 2013-06-21.hn. MacRumors.52. mobile. [32] OFTA.co. 2012. Hong Kong [55] http://www. Retrieved April 11. Rob (2008-05-29). Copyright Office (October 22. [42] “unlock . Retrieved 2013-08-24. “Vodafone’s mobile phone lock-down”.org/ 67XpFxapm) [33] “TRAI website”. [61] F. Senat. [45] Griffin. Retrieved 2013-06-21. [43] How to unlock your mobile phone .com. “U. Retrieved 7 October 2014.S. [41] In the runup of the European launch of the iPhone.novas regras”. [28] “Proposition de loi relative aux télécommunications”. 2012). 2011. [35] Consumer friendlier SIM-lock mechanism [36] “Dutch Ministry of Economic Affair paper stating OPTA agreement with Dutch mobile carriers”. 2010). Copyright Office (July 27.pdf (Archived by WebCite® at http://www. Retrieved November 11. [34] "אושרו עוד שלוש מהפכות צרכניות בתחום הסלולר (hebrew .co. [48] “Operatorii de telefonie mobila vor debloca.net. Retrieved 7 October 2014. December 4. “AT&T Unlocking In-Contract iPhones for Deployed Service Members”. REFERENCES 239 [23] “Pravilnik o načinu i uvjetima obavljanja djelatnosti elektroničkih komunikacijskih mreža i usluga” (PDF). Retrieved 2008-08-19. Backs Consumers in Unlocking of Cellphones March 4. The New Zealand Herald.apple. 2013-06-17. la cerere. 2012. Retrieved April 11. Mitchell[1][2] and Martin Cooper of Motorola in 1973. so small and compact that every man carries one.4 pounds (2 kg). the DynaTAC 8000x was the first to be commercially available. From 1983 to 2014. In 1917. Before leaving for earth orbit. hand phone. Mobile phones that offer these and more general computing capabilities are referred to as smartphones. using a handset weighing around 4. Apple. he decides to ship the telephone home “since it was limited by its short range to the neighborhood of an earth-side [i. the top cell phone manufacturers were Samsung. modern mobile phones also sup. gaming. worldwide mobile phone subscriptions grew from zero to over 7 billion. in Clarke’s vision. The first hand-held cell phone was demonstrated by John F. an essay by Arthur C.Early predecessors of cellular phones included analog ra240 . see Cell Phone (film).[4] In 2014. email. Finnish inventor Eric Tigerstedt filed a patent for what he described as a “pocket-size folding telephone with a very thin carbon microphone”. Bluetooth). It does so by connecting to a cellular network provided by a mobile phone operator.” Such a device would also. Clarke envisioned a “personal transceiver. “Handphone” redirects here.” In his 1962 Profiles of the Future.Chapter 53 Mobile phone “Cell Phone” redirects here. For the film.[5] 53. The protagonist. Nokia.[3] In 1983. short-range wireless communications (infrared. terrestrial] relay office. allowing access to the public telephone network. and LG.” Ten years later. include means for global positioning so that “no one need ever again be lost. Main article: History of mobile phones A hand-held mobile radiotelephone is an old dream of radio engineering. or simply a phone) is a phone that can make and receive telephone calls over a radio link while moving around a wide geographic area.e. penetrating 100% of the global population and reaching the bottom of the economic pyramid. private base station. cell phone.” Clarke wrote: “the time will come when we will be able to call a person anywhere on Earth merely by dialing a number. By contrast. through early smartphone A mobile phone (also known as a cellular phone. business applications.[6] In addition to telephony. receives a call from his father on a telephone in his pocket. Internet access. MMS. a cordless telephone is used only within the short range of a single.1 History Evolution of mobile phones. see Handphone (film). For the film. Among other early descriptions is one found in the 1948 science fiction novel Space Cadet by Robert Heinlein. who has just traveled to Colorado from his home in Iowa. and photography. he predicted the advent of such a device taking place in the mid-1980s. port a wide variety of other services such as text messaging. [9] work operators. with the promise of speed improvements up to 10-fold over existing 3G technologies.1. These first generation (“1G”) systems could support far more simultaneous calls.data transfer speeds and capacity.53. Improved Mobile Telephone Service. This sparked competition in the sector 3G networks would be overwhelmed by the growth of as the new operators challenged the incumbent 1G net. The first handheld mobile cell phone was demonstrated by Motorola in 1973. The advances in mobile telephony have been traced in successive generations from the early “0G” (zeroth generation) services like the Bell System's Mobile Telephone Service and its successor. dio communications from ships and trains. and were very expensive. in 2001. Finland. the third generation (3G) was launched in Japan by NTT DoCoMo on the WCDMA standard. This is a reenactment in 2007. Norway and The Motorola DynaTAC 8000X. it had become clear that. The first two commercially available technologies billed as 4G were the WiMAX standard (of- .[7] Several other countries then followed in the hand-held cellular mobile phone. 1973. 3G+ or turbo 3G enhancements based on the high-speed packet access optimized fourth generation technologies. but still used analog technology. The race to create truly portable telephone devices began after World War II. Consequently.bandwidth-intensive applications like streaming media. at some point. GSM standard. The first commercial automated cellular network was launched in Japan by Nippon Telegraph and Telephone in 1979. nology was launched in Finland by Radiolinja on the By 2009. These “0G” systems were not cellular. 1984 early to mid-1980s. the second generation (2G) digital cellular tech.[8] This was followed by 3.5G. In 1981. (HSPA) family. supported few simultaneous calls. the industry began looking to dataTen years later. HISTORY 241 Martin Cooper of Motorola made the first publicized handheld mobile phone call on a prototype DynaTAC model on April 4. allowing UMTS networks to have higher In 1991. First commercially available. Sweden. with developments taking place in many countries. this was followed by the simultaneous launch of the Nordic Mobile Telephone (NMT) system in Denmark. as on the quality of the network. not so much on the phone itself.1 Sound quality The first SIM card was made in 1991 by Munich smart card maker Giesecke & Devrient for the Finnish wireless In sound quality. little. to function. displays Multimedia Messaging Service (MMS) was introduced in text messages. An input mechanism to allow the user to interact with the phone. The common components found on all phones are: • • • • The most commonly used data application on mobile phones is SMS text messaging.2 Features Main article: Mobile phone features See also: Smartphone Several phone series have been introduced to address specific market segments. with someone else’s WiFi/internet first offered in Scandinavia by TeliaSonera. services by SMS. Some audio-quality enhancing features like Voice over LTE and HD Voice have appeared and are often available on newer smartphones.2. All mobile phones have a number of features in common. This has led to great innovation in mobile phone Main article: SMS development over the past 20 years. and offer basic telephony. Removable User Identity Module GSM feature phones require a small microchip called • Individual GSM.From 2010 onwards they became popular in India and prove audio quality even on long-distance calls. was nism is a keypad. providing the power source for the phone sage was sent from a computer to a mobile phone in 1992 functions.[12] 53. and in case of long distance calls.2. 2001. In some cases smartphones can im. iDEN and some a Subscriber Identity Module or SIM card.[15] attributed to . satellite phone devices are uniquely identified by The SIM card is approximately the size of a small an International Mobile Equipment Identity (IMEI) postage stamp and is usually placed underneath the number. battery in the rear of the unit. the Nokia Nseries of multimedia phones. but touch screens are also found launched in Finland in 2000. The first SMS text mesA battery. The SIM securely stores the service-subscriber key (IMSI) and the Kᵢ used to Low-end mobile phones are often referred to as feature identify and authenticate the user of the mobile phone. VoIP phone service. 53. in the UK. WCDMA. provided that this is not prevented by a SIM lock. Some CDMA de.2 Text messaging by adding functions to make them more attractive to consumers. even features such as Voice over LTE. A screen which echoes the user’s typing. inserting it into another mobile phone or broadband telephony device. as this depends. the bottlenecks/choke points A hybrid mobile phone can hold up to four SIM cards. The most common input mecha. 53. Basic mobile phone services to allow users to make calls and send text messages. the Palm Pre the HTC Dream and the Apple iPhone.Main articles: Subscriber Identity Module and vices also have a similar card called a R-UIM. connection. allow met along the way.[10][11] As such. Handsets with more The SIM card allows users to change phones by simply advanced computing ability through the use of native removing the SIM card from one mobile phone and software applications became known as smartphones.3 SIM card • All GSM phones use a SIM card to allow an account to be swapped among devices. MOBILE PHONE fered in North America by Sprint) and the LTE standard. contacts and more. on long-distance calls SIM and RUIM cards may be mixed together to [13][14] both GSM and CDMA networks to be accessed.2. phones. while the first person-to-person SMS from phone to phone was sent in Finland in 1993.242 CHAPTER 53.The first mobile news service. and subsequently many organizations provided “on-demand” and “instant” news in most smartphones.4 Multi-card hybrid phones main a problem with both. the Sony-Ericsson 'Walkman' series of music/phones and 'Cyber-shot' series of camera/phones. such as the RIM BlackBerry focusing on enterprise/corporate customer email needs. HD voice may not improve things. but manufacturers also seek product differentiation 53.2. by using Indonesia and other emerging markets. Sound quality can re53. smartphones and feature phones vary network operator Radiolinja. delivered via SMS. since then competition emerged in the Asia Pacific region with brands such as Micromax. Apple Inc. Motorola. Huawei (3. Nokia was the market leader. based on Strategy Analytics.4. (8. Android powered smartphones also gained momentum across the region at the expense of Nokia. the top 10 manufacturers were Samsung (20.4%).[23] • Note: Vendor shipments are branded shipments and exclude OEM sales for all vendors Other manufacturers outside the top five include TCL Communication. ZTE (3.2%).53. Smaller current and past players inscribers is China Mobile with over 500 million mobile clude Karbonn Mobile. BlackBerry.5%).0%) and Micromax (2. even though use of any electrical device is generally prohibited. In Q3 2011.5).[18] 53. Their share was displaced by Chinese and Indian vendors of low-end mobile phones.[17] These restricted phones are known as kosher phones and have rabbinical approval for use in Israel and elsewhere by observant Orthodox Jews.7 million units.6%). 53.[21] In Q1 2012. and i-Mobile and chipped away at Nokia’s market share.[22] In Q3 2014.5 million units and 82. . and over 150 mobile operators had at least one million subscribers by the end of 2009. their market share also dropped significantly to around 31 percent from 56 percent in the same period. Nokia (9. Nexian. Standard & Poor’s has also downgraded Nokia to 'junk' status at BB+/B with negative outlook due to high loss and still declined with growth of Lumia smartphones was not sufficient to offset a rapid decline in revenue from Symbian-based smartphones over the next few quarters. In India. TCL Communication (3. Audiovox (now UTStarcom). Xiaomi (3.tions.4 Manufacturers See also: List of best-selling mobile phones and List of mobile phone makers by country Typical mobile phone SIM card the desire to obtain the lowest on-net calling rate. Lenovo (3. Some phones are even approved for use by essential workers (such as health.[16] 53. Sony Mobile CommunicaThe world’s largest individual mobile operator by sub. phone subscribers. there were more than seven billion mobile phone subscribers worldwide. selling 93.3%).[19] Over 50 mobile operators have BenQ-Siemens. Although these phones are intended to prevent immodesty.5%). Samsung surpassed Nokia.6%). respectively. a number that is expected to keep growing. CECT. security and public services) on the sabbath. some rabbinical organizations have recommended that phones with text messaging capability not be used by children.5 Kosher phones There are Jewish orthodox religious restrictions which. Casio.[20] In 2014. However. To solve this issue. Lenovo.2.2%). MANUFACTURERS 243 Growth in mobile phone subscribers per country from 1980 to 2009. some vendors report good sales to adults who prefer the simplicity of the devices. over 10 million subscribers each. Coolpad. LG (4. standard mobile telephones do not meet. by some interpretations.3 Mobile phone operators Main article: Mobile phone operator Prior to 2010. Nokia shipped 18 million of its low cost dual SIM phone range in an attempt to make up lost ground in the higher end smartphone market. .[30] • In Mali and other African countries. 53. Use of mobile phones also spawns a wealth of micro-enterprises.[26] • Some organizations assist victims of domestic violence by providing mobile phones for use in emergencies. Mitsubishi Electric. Some people carry more than one cell phone for different purposes. perhaps owned by a teacher or missionary.5. as families and groups of friends often share one or more mobiles among their members.5 Use of mobile phones 53.[33] Mobile phones are used for a variety of purposes. Sierra Wireless. Kyocera. MOBILE PHONE Fujitsu. but often familial customs and traditional gender roles play a part. the first literary genre to emerge from the cellular age via text messaging Smartphones have a number of distinguishing features to a website that collects the novels as a whole. for example: Smartphones Active mobile broadband subscriptions per 100 inhabitants 90 • A study by Motorola found that one in ten cell phone subscribers have a second phone that is often kept secret from other family members. Micromax Mobile. There are obvious economic benefits. and mobile TV. Trium. conducting business. Toshiba. It is prevalent in urban India. Philips.[32] It is common for a village to have access to only one mobile phone. 2014 figure is estimated.2 distance calls. • The TV industry has recently started using mobile phones to drive live TV viewing through mobile apps. which is now avoided within mobile phone coverage areas. Palm. Qualcomm Inc. SK Teletech. These phones may be used to engage in activities including extramarital affairs or clandestine business dealings. . including keeping in touch with family members.244 CHAPTER 53. advertising. from ITU sulted in the cell phone novel.[31] 86% of Americans use their mobile phone while watching TV.) In the developed world these Yahoo![29] and small independent news companies have now overtaken the usage of earlier mobile systems such as Jasmine News in Sri Lanka. Neonode.5.Active mobile broadband subscriptions per 100 inhabitants. Sagem.[27] 80 Developed 70 Developing World 60 50 40 30 20 10 0 2007 2008 2009 2010 2011 2012 2013 2014* • The advent of widespread text messaging has re. They are often refurbished phones. births and other events. but in the developing world account for only 20%. HTC.1 In general Mobile phone subscribers per 100 inhabitants 1997-2014 140 Developed 120 Developing World • The United Nations reported that mobile phones have spread faster than any other technology and can improve the livelihood of the poorest people in developing countries by providing access to information in places where landlines or the Internet are not available. Modu. social tv. • In parts of the world. Sharp. which are usually more extensive than land line penetration. especially in the least developed countries. such as selling airtime on the streets and repairing or refurbishing handsets.53. Multiple SIM cards may also be used to take advantage of the benefits of different calling plans— a particular plan might provide cheaper local calls.which it calls Active Mobile-Broadband subscriptions lic journalism being explored by Reuters and (which includes tablets etc. international calls. Pantech Wireless Inc. 100 80 60 40 20 0 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014* Mobile phone subscribers per 100 inhabitants. long.. by providing work. and Vidalco. NEC. Panasonic. but available to all members of the village for necessary calls. Lumigon. Soutec. Openmoko. Just5. Sanyo. mobile phone sharing is common. people used to travel from village to village to let friends and relatives know about weddings. and having access to a telephone in the event of an emergency.[28] but the ITU measures those with internet connection • Mobile telephony also facilitates activism and pub. such as for business and personal use. or roaming. The mobile phone has also been used in a variety of diverse contexts in society. as officials cannot easily tell which been produced exclusively for mobile phones.5 Mobile phone use while driving is common but contro- Mobile banking and payments Mobile payment system Main articles: Mobile banking and Mobile payment See also: Branchless banking and Contactless payment In many countries. allows customers of the mobile phone operator Safaricom to hold cash balances which are recorded on their SIM cards. for example. This has introduced additional difficulties for law early content for mobile tended to be copies of legacy enforcement officials in distinguishing one usage from media. TV content and advertising. Texas from M-PESA accounts at Safaricom retail outlets lo(Greater Houston) states that using mobile phones while driving cated throughout the country. versial. allowing media content through the mobile phone was the sale ing hands-free use.many U. Recently. are often more like mobile computers in their available jokes. Japan. mobile phones are used to provide mobile banking services. Egypt. they were using the device for a legal purpose such as the phone’s incorporated controls for car stereo or satnav.5. in fact. This can lead to drivers being stopped for using their device illegally on a phone call when. the total value of mobile-phone-paid media content exceeded Internet-paid media content and was worth 31 billion dollars. Portugal Branchless banking has also been successful in South Africa and the Philippines. A 2010 study reviewed the incidence of mobile phone use while cycling and its effects on behaviour and safety. which may include the ability to transfer cash payments by secure SMS text message.3 245 For distributing content and Singapore ban both handheld and hands-free use of a mobile phone. of ringtones by Radiolinja in Finland.[34] The value of music on phones was worth 9. video games. many jurisdictions prohibit the use of mobile phones while driving. function of the mobile phone is being used simply by In 2006. Israel. they other media content appeared such as news. A pilot project in Bali was launched in 2011 by the International Finance Corporation and an Indonesian bank Bank Mandiri.5. France.5.[37] . Due to the increasing complexity of mobile phones. and In 1998. horoscopes.3 billion dollars in 2007 and gaming was worth over 5 billion dollars in 2007. states—ban handheld phone use only. This is more aphighlight video clip.[36] Main article: Mobile phones and driving safety 53. Cash may be deposited or withdrawn A sign along Bellaire Boulevard in Southside Place. from the ringing tones and ringback hands-free usage. Because of this. USE OF MOBILE PHONES 53. one of the first examples of distributing and sell. Soon afterwards. Most uses.5. such as the banner advertisement or the TV news another as drivers use their devices.[35] 53.53.4 While driving looking at the driver. and may be transferred is prohibited from 7:30 AM to 9:30 AM and from 2:00 PM to electronically from person to person as well as used to 4:15 PM pay bills to companies. rather than those who have banned tones in music to “mobisodes”. Being distracted while operating a motor vehicle has been shown to increase the risk of accidents. others —including the UK. unique content for mobile parent in those countries which ban both handheld and has been emerging.S. Kenya’s M-PESA mobile banking service. video content that has handheld use only. 5. transferring funds from lenders in the United States to the borrowers in rural Africa using the Internet and mobile phones. MOBILE PHONE Another application of mobile banking technology is Zidisha.[51][57] Certain countries. The petition is part of a joint effort by New York Attorney General Eric Schneiderman and San Francisco District Attorney George Gascón and was directed to the CEOs of the major smartphone manufacturers and telecommunication carriers.[43][44] “possibly carcinogenic to humans” after a team of sciThe movements of a mobile phone user can be tracked by entists reviewed studies on cell phone safety.7 Thefts According to the Federal Communications Commission.[46][47] head as that preferred for cell phone use. which ranks it alongside coffee agencies and their government. This requires the co-operation of manenormous increase in mobile phone usage throughout the ufacturers. including France. if desired. Police data in San Francisco showed that one-half of all robberies in 2012 were thefts of cellular phones. in non-human animals and in humans.”[55] 53. Eventually. 10 June 2013. the World Health Organization stated a signal to travel from the cell phone to each of several that mobile phone use may possibly represent a long-term health risk. A large body of research exists. Further information: Mobile phones on aircraft Some mobile phone can make mobile payments via direct mobile billing schemes or through contactless payments The effect mobile phone radiation has on human health is if the phone and point of sale support near field communithe subject of recent interest and study. the idea 53.journals concluded that cell phone usage for at least ten ogy to activate the microphones in cell phones remotely years “approximately doubles the risk of being diagnosed in order to listen to conversations that take place near the with a brain tumor on the same ('ipsilateral') side of the phone. due to debut in October 2013.[43] At least some recent studies have found an association China has proposed using this technology to track com. network operators and retail merchants to enworld. as a result of the [39] cation (NFC). Apple announced it would install a kill switch on its next iPhone operating system. which some believe may be harm[40][41][42] phones. using a technique known as multilateration to calculate the differences in time for On 31 May 2011. law enforcement and intelligence services use of a 2009 meta-analysis of 11 studies from peer-reviewed mobiles to perform surveillance. They possess technol. of which the majority shows no definite 53.246 CHAPTER 53. Other digital wireless tion data.[45] In the UK salivary gland tumors. the geographi.6 Health effects spread and in 1999 the Philippines launched the country’s first commercial mobile payments systems on the mobile Main article: Mobile phone radiation and health operators Globe and Smart.6 Tracking and privacy causative relationship between exposure to mobile phones See also: Cellphone surveillance and Mobile phone and harmful biological effects in humans. (whether it is being used or not).relationship. Lennart Hardell and other authors and US. both epidemiological and experimental. This is often paraphrased simply as the balance of evidence showing tracking no harm to humans from mobile phones.[53][54] the handset can be tracked. ful to human health. by law enforcement phones are in category 2B. or are inconclusive.[48] On Monday. have warned against the use of cell phones especially by minors due to health risk uncertainties.between cell phone use and certain kinds of brain and muting patterns of Beijing city residents. produce cal location of a mobile phone can be determined easily similar radiation.[49] Mobile payments were first trialled in Finland in 1998 when two Coca-Cola vending machines in Espoo were enabled to work with SMS payments. one out of three robberies involved the theft of a cellular phone.[38] in case of theft.”[56] This is a reversal from their prior position that cancer was unlikely to be caused by cellular phones or their base stations and that reviews had found no convincing evidence for other health effects.[50][51] classifying mobile phone radiation as cell towers near the owner of the phone. a US-based nonprofit micro-lending platform that allows residents of developing countries to raise small business loans from Web users worldwide. While the phone is turned on. Mobile phones use electromagnetic radiation in able contactless payments through NFC-equipped mobile the microwave range. such as data communication networks. Zidisha uses mobile banking for loan disbursements and repayments. although a significant number of individual studies do suggest such a Mobile phones are also commonly used to collect loca.systems. An online petition on Change.org called Secure our Smartphones urged smartphone manufacturers to install kill switches in their devices to make them unusable One study of past cell phone use cited in the report showed a “40% increased risk for gliomas (brain cancer) in the highest category of heavy users (reported average: 30 minutes per day over a 10‐year period).5. Both the SIM card and and other possibly carcinogenic substances.[58] .[52] Mobile their service provider and. com”.2008. BBC 41 (6): 26–33.7 Future evolution Main article: 5G Demand for metals found in mobile phones and other electroncs fuelled the Second Congo War. . The Guardian reported. . 5G is not officially used for any specification or official document yet made public by telecommunication companies or standardization bodies such as 3GPP. “Capacity Limit Problem in 3G Networks”. 53.[60] 53. Tekniskamuseet. The profits from the minerals finance the bloodiest conflict since the second world war. the Democratic Republic of the Congo has been a major source of natural resources for the mobile phone industry. [4] “Mobile penetration”.se. Purdue School of Engineering. hacker. trisimphones. the war has lasted nearly 20 years and has recently flared up again. as more devices using more and more services compete for limited bandwidth.”[65] 5G is a technology used in research papers and projects to denote the next major phase of mobile telecommunication standards beyond the 4G/IMT-Advanced standards. Gawker Media. ieee.com.com. “Meet Marty Cooper – the inventor of the mobile phone”. The discarded phones then [12] Alan Henry.8 Environmental impact [2] Who invented the cell phone? [3] Heeks. because the increase in brain cancers has not paralleled the increase See also: Conflict minerals in mobile phone use.[63] [13] “trisimphones. [8] UMTS World.. a study published 24 March 2012 in the British 53. Retrieved 29 July 2009. Richard (2008). 9 July 2010. “Why Mobile Voice Quality Still Stinks—and Studies have shown that around 40-50% of the environHow to Fix It”. trisimphones.[59] 53. eds. “In unsafe mines deep underground in eastern Congo. doi:10. “Why Is Cell Phone Call Quality So Terrible?".9. The war claimed almost 5. 1983. Millennium edition with a new preface) [7] “Swedish National Museum of Science and Technology”. A mobile phone repair kiosk in Hong Kong See also: Mobile phone recycling [9] Fahd Ahmad Saeed. mental impact of a mobile phone occurs during the manufacturing of the printed wiring boards and integrated [11] Elena Malykhina. “Top 10 Best-selling Mobile Phone Brands in the World 2014”. or ITU-R.192.9 Conflict minerals Medical Journal questioned these estimates. “History of UMTS and 3G development”. Retrieved 23 April 2010. Umtsworld. [5] Sara Nagi. [10] Jeff Hecht. New standard releases beyond 4G are does not contain conflict minerals. Australia introduced a mobile phone recycling scheme. in progress by standardization bodies. Clarke: Profiles of the Future (1962. Retrieved 29 July 2009. and 1999.10 See also Deloitte is predicting a collapse in wireless performance to come as soon as 2016. children are working to extract minerals essential for the electronics industry. CONFLICT MINERALS 247 However.org.5 million lives.[61] The average user replaces their mobile phone [62] every 11 to 18 months. For the last 15 years.11 References [1] John F.1109/MC..53. scientificamerican.com. Lifecontribute to electronic waste.com. [6] Arthur C. Mobile phone manufacturers within Europe are subject to the WEEE directive.[64] In a 2012 news story. “What’s the Best Mobile VoIP App?". circuits. 1973. but are at this time not considered as new mobile generations but under the 4G umbrella. rev.com”. [14] “trisimphones. TopTeny 2015. Mitchell Biography 53. WiMAX FairPhone is an attempt to develop a mobile phone which Forum. Retrieved 28 April 2012. BBC News. [52] “WHO: Cell phone use can increase possible cancer risk”. The Press-Enterprise. BBC News. [51] “What are the health risks associated with mobile phones and their base stations?".com. [28] Goodyear. 7 February 2010. Tvgenius. Dana (7 January 2009). [48] Adams. [33] Hahn. “Cell Phone Tracking Can Locate Terrorists — But Only Where It’s Legal”. Retrieved 19 January 2008. [46] McCullagh. [34] source Informa 2007 [50] “IARC CLASSIFIES RADIOFREQUENCY ELECTROMAGNETIC FIELDS AS POSSIBLY CARCINOGENIC TO HUMANS” (PDF). (20 August 2010). Retrieved 31 May 2011. Netsize. 2010. “Mobile phones help lift poor out of poverty: U. Schepers. Anne Broache (1 December 2006). Jonathan.net. Retrieved 4 February 2014. Ludovic. [20] Source: wireless intelligence [21] [22] “Samsung May Have Just Become The King Of Mobile Handsets. “China plans to track cellphone users. [45] Cecilia Kang (3 March 2011). “The Domestication of the Mobile Phone: Oral Society and New ICT in Burkina Faso”. Vol 53. . 26 January 2009. Retrieved 4 November 2009.com. [49] “Apple to add kill switches to help combat iPhone theft” by Jaxon Van Derbeken San Francisco Chronicle Tuesday. and Steenson. Mark (1 August 2005). Financial Times. Microfinance Focus. “Mobile Payments: Look to Korea”. Online Q&A.com | Southern California News | News for Inland Southern California”. [16] “Nokia boosted by sales of cheap handsets”. Journal of Modern African Studes 46 (2008): 87– 109.” In The Reconstruction of Space and Time: Mobile Communication Practices. connectedplanetonline. [29] “You Witness News”. [19] Tania Branigan (11 January 2010). 31 May 2011. Retrieved 29 July 2009.uk. 7 June 2013 Page 5 [31] “4 Ways Smartphones Can Save Live TV”. CNN. Molly Wright. [41] Ready. Retrieved 14 March 2009. [39] Feig. [43] “Tracking a suspect by mobile phone”. No. Declan. “Beyond the Personal and Private: Modes of Mobile Phone Sharing in Urban India. “NFC mobile phone set to explode”. January 2010. banktech. [17] “Kosher Phones For Britain’s Orthodox Jews”. Retrieved 27 January 2014. study”. [27] Brooks. W. Feb 2010”. Retrieved 2013-12-03. Mike “Plea Urges Anti-Theft Phone Tech” San Francisco Examiner Friday. Retrieved 29 January 2011. pp 30–42. World Health Organization. 13 April 2012. “State owned China Mobile is world’s biggest mobile phone operator”. The Washington Post. Joshua (14 March 2009). Kevin C. Sean (27 January 2011).N. Retrieved 14 March 2009. [42] Tofel. Arutz Sheva. Retrieved 29 July 2009. Jonathan. Retrieved 14 March 2009. [44] Miller. NJ: Transaction Publishers. Hans and Kibora.. [40] Poulter. News. “Use of mobile helped police keep tabs on suspect”. Retrieved 29 July 2009. Public Radio International. [37] “Branchless banking to start in Bali”. Retrieved 13 February 2014.com. Retrieved 4 June 2012. “End of the credit card? With one swipe of an iPhone you'll be able to pay for your shopping”.. Retrieved 4 June 2012. World Health Organization. [23] “Gartner Says Sales of Smartphones Grew 20 Percent in Third Quarter of 2014”. “FBI taps cell phone mic as eavesdropping tool”. D. 16 October 2001. Ergonomics. [24] “Annual Smartphone Sales Surpassed Sales of Feature Phones for the First Time in 2013”. 5 December 2005. [36] de Waard. 1. Microfinancefocus. “VISA Testing NFC Memory Cards for Wireless Payments”. Retrieved 29 January 2011. “Letter from Japan: I ♥ Novels”. While S&P Downgrades Nokia To Junk”. 3 August 2005. The New Yorker. [38] ""Zidisha Set to “Expand” in Peer-to-Peer Microfinance”. sparking human rights concerns”. MOBILE PHONE [15] [35] “Downloads_Guide”. 2008.com. Piscataway. Retrieved 17 December 2011. CNet News. 20 October 2011. Gartner. Guardian News and Media Limited. Sarah (10 November 2009). Retrieved 4 November 2009.co. [25] “Worldwide Smartphone Shipments Top One Billion Units for the First Time”. “Donated cell phones help battered women | San Bernardino County | PE.248 CHAPTER 53. 231–250. and Brookhuis. [47] Odell.com. gigaom. London: dailymail. K. [26] “UK | Millions keep secret mobile”. Retrieved 4 June 2012. The Jakarta Post. 11 June 2013 Page 1 [32] Donner. edited by Scott Campbell and Rich Ling. Ormel. FOX News.. P. Richard (13 August 2007). Nancy (25 June 2007). [18] “Introducing: A 'Kosher Phone' Permitted on Shabbat”. Retrieved 29 January 2011. Retrieved 21 January 2011.yahoo. Mobile phone use while cycling: Incidence and effects on behaviour and safety. Reuters. [30] Lynn. Mobile Understanding: The Epistemology of Ubiquitous Communication.01. Cellphone: The Story of the World’s Most Mobile Medium. Teo C. Who Made That Cellphone?. Retrieved 3 December 2011.fr. Self and Politics. Surgical Neurology 72 (3): 205–214. Business Insider. ed. Kristóf.2009. on the mobile – the effects of mobile telephones on social and individual life.1136/bmj. Mobile phones for development and profit: a win-win scenario (PDF).1016/j. Curtis RE et al.uk. 2002. Inform. Kristóf. 2011). BMJ 344: e1147. The Cell Phone Reader: Essays in Social Transformation. Thumb Culture: The Meaning of Mobile Phones for Society. [64] “Is your mobile phone helping fund war in Congo?". doi:10. Mobile Communications: Re-negotiation of the Social Sphere. Mark. Rajaraman P.iarc. • Jain. 27 September 2011. “Cell phones and brain tumors: A review including the long term epidemiologic data”. Lochlann. “France warns against excessive mobile phone use”. Howard. “Mobile phone use and glioma risk: comparison of epidemiological study results with incidence trends in the United States”. [57] “Electromagnetic fields and public health: mobile telephones and their base stations”.83044. The Mobile Connection: the Cell Phone’s Impact on Society. (2012). ed. Dr. Kristóf. 2003 [65] “Children of the Congo who risk their lives to supply our mobile phones”. Retrieved 4 February 2014. Jon. 3G Marketing 2004. 2. Retrieved 3 December 2011. • Ling. Gopala (1 January 2011). [62] “E-waste research group. • Levinson. • Nyíri. Reuters. Griffith University. Hardell L. 2005 • Ahonen. Anandam & Arceneaux. Retrieved 7 August 2009.e1147. A Sense of Place: The Global and the Local in Mobile Communication. doi:10. • Goggin. Tomi. VG. R. • Kopomaa. Kundi M. MM19 [58] Brian Rohan (2 January 2008). Kristóf. Sadie. Journal of Carcinogenesis 10 (1): 18. Fact sheet N°193. monographs. Retrieved 19 January 2008. ISBN 0-470-85100-7 • Plant. 2006 • Ahonen.co. 15 March 2013. doi:10. Mobile Learning: Essays on Philosophy. Rich. A. The Daily Telegraph. Constant Touch: A Global History of the Mobile Phone. p. The New York Times. theregister. 7 December 2012. Gerard. Paul. [55] Khurana. 2006 • Kennedy. eds. Mobile Democracy: Essays on Society. World Health Organization. ed. eds. The City in Your Pocket. FURTHER READING 249 [53] “Agents Classified by the IARC Monographs. Per. ISBN 978-0415469180 [54] Kovvali. Noah. “Urban Errands: The Means of Mobility”. June 2000. 2001 • Fessenden. 2005 ISBN 1-85233-931-4 • Home page of Rich Ling • Nyíri. Timo. • Ling. Peter & Bertsch. 2004 ISBN 1-84046-541-7 • Nyíri. Pagan. m-Profits: Making Money with 3G Services. • Katz. Global Mobile Media (New York: Routledge. eds. ed. Inc. • Rheingold. doi:10. [63] “Mobile Phone Waste and The Environment”. 2003 • Agar. 2004 ISBN 1-4039-6041-0 [60] “Wireless performance will collapse. 2002 • Kavoori. Aussie Recycling Program. p. 2003 53. Psychology and Education. The Guardian. PMID 19328536. p.12. Overseas Development Institute. 2004 ISBN 1-55860-936-9 [61] “The Secret Life Series . Kasper and Melkko. ISBN 0-470-84775-1 • Nyíri. Carlberg M (2009). Private Talk. Journal of Consumer Culture 2:3 (November 2002) 385–404. eds. Mobile Communication: Essays on Cognition and Community. . Public Performance. Kristóf. Facts and figures”. Stefan. & Aakhus. 176. Perpetual Contact: Mobile Communication. Volumes 1– 107” (PDF). Gaudeamus 2000 [59] Little MP.Environmental Impacts of Cell Phones”. Smart Mobs: The Next Social Revolution. “Cell phones are as carcinogenic as coffee”.019. prices rise: Deloitte”. S. Annual Report of the Board of Regents of the Smithsonian Institution: 161–196. Retrieved 31 May 2011.12 Further reading • Nyíri. and How It Has Transformed Everything!.53. Rich and Pedersen. [56] “World Health Organization: Cell Phones May Cause Cancer”.4103/1477-3163. Retrieved 10 May 2010. Rohit (April 2009). James E. 2002 ISBN 0-7382-0861-2 • Glotz. “Wireless Telephony”. 2005 • Singh.1177/146954050200200305.surneu. ed. (1908). MOBILE PHONE . the ring heard around the world—a video documentary by the Canadian Broadcasting Corporation CHAPTER 53.250 53.13 External links • Media related to Mobile phones at Wikimedia Commons • How Cell Phones Work at HowStuffWorks • “The Long Odyssey of the Cell Phone”. 15 photos with captions from Time magazine • Cell Phone. for the transmission and reception of their signals.800/1. 1. often based on other frequencies. AMPS. As demand grew.1 United States And.110–2. Moreover. (Generally speaking. the analog AMPS standard that used the cellular band (800 MHz) was replaced by a number of digital systems. Africa and Asia. and are usually referred to as tri-band and quad-band phones. mobile providers encountered a problem because they couldn't provide service to the increasing number of customers. In the U. All cellular phone networks worldwide use a portion of the radio frequency spectrum designated as ultra high frequency.800/1. Wi-Fi and Bluetooth transmission.Chapter 54 Cellular frequencies The cellular frequencies are the sets of frequency ranges within the ultra high frequency band that have been allocated for cellular phone use. The GSM standard.500–2. for example.1 Frequency bands recommended by ITU (UMTS) Main article: UMTS frequency bands ITU-R approved in June 2003 the following bands to the terrestrial Mobile telecommunication IMT-2000: 806– 960 MHz. which appeared in Europe to replace NMT-450 and other standards. initially used the 900 MHz band too. some NMT-450 analog networks have been replaced with digital networks using the same frequency. lower frequencies allow carriers to provide coverage over a larger area.800/1.900 MHz).900 MHz) or four bands (850/900/1. the air interface technology it uses). depending on the settings of the carrier’s base station. which was in the 450 MHz band. or world phones. however. Many GSM phones support three bands (900/1.3. with 3G and 4G technologies. 2. They had to develop their existing networks and eventually introduce new standards.200 MHz and 2. D-AMPS. with such a phone one can travel internationally and use the same handset. which was in the 800 MHz frequency band. radio frequencies used for cellular networks differ in the Americas. 54. Some European countries (and Japan) adopted TACS operating in 900 MHz.900 MHz or 850/1. Initially.690 MHz. systems based upon the AMPS mobile phone model were popular. carriers acquired licenses in the 1. or “UHF”. IS-136 on these frequencies was replaced by most 54. as IS-95 networks do not exist in most of Europe.3 Frequency bands by region operators with GSM. The actual frequency used by a particular phone can vary from place to place.900 MHz) frequencies. including IS-95 (often 54. 54.S.2 United States Carrier Freknown as "CDMA". the first widespread automatic mobile network was based on the NMT-450 standard. The first commercial standard for mobile connection in the United States was AMPS. In • Professional wireless microphones used the 700 Russia and some other countries. The ultra high frequency band is also shared with television. In Nordic countries of Europe.. the air interface technology it uses) quency Use and IS-136 (often known as D-AMPS.025 MHz. [1] 251 . N-AMPS and IS-95 all use the 800 MHz frequency band. licenses for 450 MHz frequency to provide CDMA mobut equipment still exists in use that may interfere bile coverage area. Eventually.800 MHz band. or "TDMA".) Mobile networks based on different standards may use the same frequency range. Digital AMPS. As mobile phones became more popular and affordable. For historical reasons. local carriers received MHz band until 2010 when they were made illegal. while higher frequencies allow carriers to provide service to more customers in a smaller area. GSM had already been running for some time on US PCS (1. one can find both AMPS and IS-95 networks in use on the same frequency in the same area that do not interfere with each other.710–2. Europe. This portability is not as extensive with IS-95 phones. This is achieved by the use of different channels to carry data. however. A bidder can use the frequency spectrum for whatever purpose they want. with Verizon Wireless and AT&T Mobility • Comparison of mobile phone standards winning the majority of available spectrum. and were 2 × 10 MHz. License (A or B) is granted for Major Trading Areas (MTAs). is granted for Economic Areas • Bands by technology: (EAs). The spectrum was divided into blocks: A blocks were for Cellular Market Areas. based on existing cellular (1G) licenses.755 MHz. As of 2 September 2011. and technology for each operator in each country The 700 MHz band was auctioned in early 2008 using Other articles: spectrum previously used by television stations’ analog broadcasts. 2010. Li. 493 BTAs and 175 EAs in the United States. Cellular and PCS bands are also used in other countries The 869–894 MHz cellular band is divided into 2 fre. and F blocks covered huge areas of the country. • Dual-band The SMR 800 MHz band was used exclusively for iDEN technology. Sprint Corporation is deploying • Tri-band . More bands are under consideration for auction by the FCC. Each block is between 54. larger than CMAs. 15 MHz or 10 MHz) • List of HSDPA networks • D: 1865–1870 MHz and 1945–1950 MHz (10 MHz) • List of UMTS networks • E: 1885–1890 MHz and 1965–1970 MHz • F: 1890–1895 MHz and 1970–1975 MHz • G: 1910–1915 MHz and 1990–1995 MHz[2] The Advanced Wireless Services (AWS) bands. The US is then divided geographically into a number of Trading Areas.2 Other Regions The 1850–1990 MHz PCS band is divided into six frequency blocks (A through F). B and C blocks (2 × 10 MHz and 2 × 5 MHz respectively) were for Basic Economic Areas. where issued.252 The usage of frequencies within the United States is regulated by the Federal Communications Commission (FCC). CHAPTER 54.710–1. quency blocks (A and B). • GSM frequency bands • A: 1850–1865 MHz and 1930–1945 MHz (30 MHz) • B: 1870–1885 MHz and 1950–1965 MHz (30 MHz) • UMTS frequency bands • E-UTRA#Frequency bands and channel bandwidths (LTE frequency bands) • Deployed networks by technology • C: 1895–1910 MHz and 1975–1990 MHz (30 MHz. D. usually comprising large portions of single states.110–2. E. 54. License (C to F) is granted for Basic Trading Areas (BTAs).4 See also 10 MHz and 30 MHz bandwidth. auctioned in the summer of 2006. These are currently used by DoD. and covered 2 × 5 MHz for D and E blocks.3.in the Americas. and other government agencies.code. Verizon Wireless will use the upper band of the 700 MHz spectrum to deploy their • Roaming LTE network starting on Dec 5.155 MHz. and 2. typically several states at a time. frequency. Each trading area consists of one or more counties.[3] • List of LTE networks • List of deployed WiMAX networks • Deployed networks by country (including technology and frequencies) • List of mobile network operators of Europe • List of mobile network operators of the Americas • List of mobile network operators of the Asia Pacific region • List of mobile network operators of the Middle East and Africa • List of mobile network operators (summary) • Mobile country code . 2 × 10 MHz for F. Qualcomm and Echostar were winners of a significant amount of • 3GPP broadcast-oriented spectrum. were for 1. CELLULAR FREQUENCIES CDMA and LTE technology on this band. There are 306 Metropolitan Service Areas and 428 rural service areas. There are 51 MTAs. NASA.Detailed lists: cense (G). A mobile operator (or other interested parties) must bid on each trading area individually. the FCC has approved several CDMA devices for use on the SMR band. most common forward link (base station to mobile) frequencies and channelization • Frequencies by Provider 253 .gov/encyclopedia/ wireless-microphones [2] http://www.fcc.54.6.fcc.5 References [1] https://www.6 External links • Wireless Advisor • FCC • New bands considered by FCC • Spectrum Frequency Chart . EXTERNAL LINKS • Quad-band • 700 MHz wireless spectrum auction • Microwave • 4G • 3GPP Long Term Evolution (LTE) • Title 47 of the Code of Federal Regulations 54.gov/encyclopedia/ broadband-personal-communications-service-pcs [3] AWS References 54. 5. Android (starting from version 2. over Bluetooth or by physical con. for example through USB.Chapter 55 Tethering For other uses. Tethering is connecting one device to another. however.1 Mobile device’s OS support There are. Tethering over Wi-Fi. Windows Phone 7. a password protection to it easily so that no one without the password can connect to your smartphone’s. and certain Android phones (varies widely depending on carrier. manufacturer. asked Google or any mobile producer using Android to If tethering is done over Wi-Fi. without a network provider subsidy. One can setup hindered with regards to tethering.5 (or later) on iPhone 4.0 (or later) offer tethering over a Bluetooth PAN or a USB connection. Windows Phone 7. is available on iOS starting with iOS 254 .subscriber pays an additional fee. This is done primarily because with a computer sharing the network connection. Handsets purchased SIMpresent in smartphones nowadays which lets you convert free. 4.2). the tethering normally works via NAT on the handset’s existing data connection.5 devices like the HTC HD2. Windows Mobile 6. or only enable it if the wireless LAN (Wi-Fi). though it is technically possible to attempt to identify multiple machines. there is just one device with a single IPv4 network address. In the certain Windows Mobile 6.[1] The Internet-connected mobile device can act as a portable wireless access point and router for devices connected to it. see Tether (disambiguation). several ways to enable tethering on restriced devices without paying the carrier for it. Mobile hotspot is a feature system on certain handsets.ing structures. 8 and 8.1 devices (varies by manufacturer and model). iPad (3rd generation). also known as Personal Hotspot. and iOS 3. are often unyour smartphone into a portable router. so from the network point of view. tether. ing allows sharing the Internet connection of the phone Some network-provided handsets have carrier-specific or tablet with other devices such as laptops. this feature is only contractually available by paying to add a tethering package to a data plan or choosing a data plan that includes tethering. Some operators have nection using a cable.2. there may well be a substantial increase in the customer’s mobile data use. On some networks. and software version). Connection software that may deny the inbuilt tethering ability norof the phone or tablet with other devices can be done over mally available on the handset. 4S.5. for which the network A phone tethered to a laptop may not have budgeted in their network design and priccontext of mobile phones and tablet computers.[7] Many mobile phones are equipped with software to offer tethered Internet access.[2] For IPv4 networks. including 3rd party USB Tethering apps such as PDAnet. 55.[4] Tethering is also available as a downloadable third-party application on most Symbian mobile phones[5] as well as on the MeeGo platform[6] and on WebOS mobiles phones. the feature may be completely remove tethering[3]support from the operating branded as a mobile hotspot. rooting Android devices or jailbreaking iOS devices and installing a tethering application on the device. or pay a tethering fee.3. decreeing Verizon Wireless must pay US$1. without paying an additional fee. His data shows that AT&T had been throttling his connection after approximately 2GB of data was used. not T-Mobile.[15] SpacExcept with Phone-as-Modem plans. usIn the UK.3.2 United Kingdom "(Verizon) recently revised its service offerings such that consumers on usage-based pricing plans may tether. Let’s just hope it chooses ditions": to go the way of Sprint. some carriers impose a one-time charge to enable tethering and others forbid tethering or impose added data charges. tel offers a Wi-Fi connected “mobile hotspot” tethering feature at an added charge. PDA. found at http://www.plans they were grandfathered under (such as the UnlimMobile dropped tethering on its unlimited data plans in ited Data plans) and switch. and that devices uses Linux. 3G.3 United States of America service by jailbreaking his iPhone in order to fully utilize his iPhone’s hardware. or changed at any time.[12] Hopefully with all this concrete data and the courts on our side..3. including for example. Judge Russell Nadel awarded Matt Spaccarelli US$850 via the Ventura Superior Court.25 milwithout exception. IN CARRIERS’ CONTRACTS 55. AT&T will be forced to T-Mobile USA has a similar clause in its “Terms & Conchange something.3 In carriers’ contracts 255 Unless explicitly permitted by your Data Plan. independent of whether they continue service with them.) via USB.1 New Zealand ier for consumers to tether. However. the amount of data available for tethering can be increased markedly. while Sprint Nexusage policy. are not permitted. or any other connection method than ethernet. We reserve the right to deny or terminate service without notice for any misuse or any use that adversely affects network performance. 1000 MB/month is free in the USA with cellular service. however users must drop old feature until early 2012. Contracts that advertise “unAs of 2013 Verizon Wireless and AT&T Mobility offer limited” data usage often have limits detailed in a Fair wired tethering to their plans for a fee.[16] .[11] In another instance. a user’s phone may have restricted functionality. or similar device. commenting : puter..e. late 2012.2 Operating system support for tethering by the receiving devices If the receiving device (for example a laptop) connects to the mobile device sharing the internet connection (i. receiving the internet connection/setting it up may not be straightforward. Since 2014-03-27. despite the fact that Spaccarelli had violated his terms of 55. using your Device as a modem or tethering your Device to a personal computer or other hardware. retaining it on selected plans.taporc. and all month while roaming in 100 countries. the FCC released an unofficial announcement of Commission acIn New Zealand.com. two tethering-permitted mobile plans offered ing any application. you carelli responded by creating a personal web page in order may not use a phone (including a Bluetooth to provide information that allows others to file a similar phone) as a modem in connection with a comlawsuit. The host device has unlimited slow internet for the rest of the month. other uses. 4G. Depending on the wireless carrier. lion to resolve the investigation regarding compliance of the C Block Spectrum (see US Wireless Spectrum Auction of 2008).” unlimited data: The Full Monty[10] on T-Mobile. actions by the FCC and a small claims court in California may make it eas55. Spaccarelli demonstrated that As cited in Sprint Nextel's “Terms of Service": AT&T had unfairly throttled his data connection. The host device cellular services can be canceled. On July 31. data tethering levels can be changed month-tomonth.55. A lot will depend on the exact Linux distribution used and the exact model of device sharing the internet connection used. While tethering may be allowed at no extra cost. 2012.[13] T-Mobile’s Simple Family or Simple Business plans offer “Hotspot” from devices that offer that function (such as Apple iPhone) to up to 5 devices. allowing users to bring their own devices or buy devices from them. For $10 or $20/month more per host device. added.3. pro-rated. . and The After that judgement Verizon release “Share Everything” One Plan on Three. Three offered tethering as a standard plans that enable tethering. tethering is permitted on all carriers tion.[14] The announcement also stated that 55. T. and T-Mobile no longer requires any long-term service contracts. but with no tethering.[8][9] 55. “T-Mobile quietly removes tethering for its unlimited data plans”.US”.webos-internals.androidcentral. Slash Gear. [16] Hugo. Chris.com [6] http://www. “Matt Spaccarelli’s Personal Web Page”. tethering”.com. Retrieved 8 July 2012. t-mobile. Retrieved 22 August 2012. [15] Spaccarella.4 See also • Internet Connection Sharing • Smartphone • Mobile broadband • Mobile Modem • Mobile Internet device (MID) • Smartbook • Open Garden 55. [12] “Sprint Terms & Conditions .25MM for Blocking Mobile Broadband Applications” (PDF). “AT&T’s throttling is nothing more than a ploy according to study. Retrieved 22 August 2012.2.com. Matt.com/ [7] http://www. Brendan.5 References [1] GoingTechy. Retrieved 2010-10-13.US”. Retrieved 22 August 2012.joikusoft. shtml [4] http://www. Retrieved 8 July 2012.techdirt. Slash Gear.org/wiki/Application: FreeTether [8] Setting up wireless 3G modem on Linux [9] 3G modem in Linux [10] Davies.com: What is WiFi Hotspot? [2] Geek. TETHERING .com/blog/wireless/ articles/20110711/17464515050/ you-dont-own-what-you-thought-you-bought-verizon-breaks-phones-turns-off-feature. to support tethering [3] http://www. Ben. California judge Page”. calls.com: Android 2.com/android-internet-tether [5] http://www. data. [13] “T-Mobile Terms & Conditions .joiku. [14] “Verizon Pays $1. CHAPTER 55. Retrieved 2011-03-14. sprint.256 55. “T-Mobile UK “Full Monty” plan offers true unlimited voice. [11] Woods. where the metal and glass components of the device are exposed and vulnerable to damage. 257 .Chapter 56 Mobile phone accessories • Shells Mobile phone accessories include any hardware or software that is not integral to the operation of a mobile phone as designed by the manufacturer. They are made of hard plastic. rubber. being specially recommended for multimedia. and may include a keyboard (USB for OTG smartphones or bluetooth keyboard). • Skins • Bumpers 56. but costs up to 250% more (which still is not high). 5 these problems. in allowing use of the device while in the case. Calendared vinyl is expected to only be used for short durations while cast vinyl is used on a more long term basis. or otherwise hold a mobile phone. are popular accessories for many phones. There are different types:[1] they call “Controltac”. Skins and design covers can serve for protection and personalization. 3M has manufactured a cast vinyl product that inch display).1 Cases • Flip cases and wallets[2] Cases. This vinyl cover maintains a more glossy look and provides an air release channel that pre• Pouches and sleeves vents bubbles during placement. They are distinct from holsters. and fade. The more popular is the • Holsters cast vinyl because of the range of designs. A Standing case improves user experience. which are designed to attach to. but in many instances include a belt clip or other device giving it the functionality of a holster. with the latter being more expensive. Vinyl material may be calendared or cast. Folio case is a combination case and stand. Vinyl skins can be ordered on many websites and come pre-cut to fit your cell phone or another electronic device. Cast vinyl avoids Case measures are based on the display inches (e. Calendered vinyl Pouch case made to dangle also tends to shrink in the heat. Heavy duty cases are designed to protect from drops and scratches. videos and audio.g. or in the newer market adhesive-backed vinyl pieces. • Screen protection and body films • Drop and shock protection Holsters are commonly used alone for devices that include rubberized padding. or are made of plastic and without exposed rigid corners. particularly mainstream smartphones. support. These are the result of the relatively “naked” Combination case and stand designs produced by manufacturers such as Apple. case). Also external batteries can include rubber suction. plug-in cords and obscure connec.[3] A release button on the cover lets it pop off to be replaced with the new cell cover. Functional cases can integrate an external battery. Some phones have a replaceable cover.2 Anti-lost and selfies wireless companions Antilost keychain can easily locate the cellphone through the GPS and Bluetooth low energy features of the smartphone.258 CHAPTER 56. both phone and companion will alert him / her. They can move pictures to a local computer or an online photo sharing service. Qi logo 56. in combination with a compatible SD card. vinyl. MOBILE PHONE ACCESSORIES Customized phone cases use custom printing. can be used to transfer files from one device to another. Additionally. . Wi-Fi SDs are Wi-Fi communication devices on a special SD card inserted into the SD card slot. Such adapters can also be used with various other USB devices. Different companies have different methods of printing on cases. such as hardware mice and keyboards. some utilize sublimation for printing on mobile phone cases. It also can be used to take selfie. though the form-factor of their 30-pin plug used on older devices Cell phone chargers have gone through a diverse evolution has shown up elsewhere. Micro-B USB plug 56. (Apple devices still use proprietary cables. or hard plastic. Phones that lack a replaceable cover can accept a slip on or snap on cover.[4] These come in leather. a USB / Bluetooth / WiFi keyboard and touchpad mouse in a similar way to tablets. many devices have USB On-The-Go and support USB storage. These. 56. more recent devices generally use micro. silicone.4 Chargers and external batteries See also: Solar cell phone charger USB. Once the user is out of range. in most cases using either a special usb micro-B flash drive or an adapter for a standard usb port.External batteries can be included in the case (power tors.3 Mass storage See also: Bluetooth Some smartphones feature SD card slots (Usually the smaller Micro-SD variant). However. other methods include inkjet printed skins and Dye-Sublimation 3D printing methods. or simply to increase the storage capacity of the phone.) that included cradles. com/nokia/nokia-x [3] Designer iPhone 6 Plus case [4] Designer Snap on iPhone 6 case [5] Olympus Air is a lens camera that pairs with your smartphone [6] Smart lens Sony.56.[5] They are compatible with most smartphones.6 HDMI and Projector Micro USB to HDMI cables are used in smartphones with MHL.com 259 .coverscart. REFERENCES 56.[6] Smart flash can be used also for selfies. 56.8. having optical zoom and other features.7 See also • Modular smartphone • Near field communication • Screen protector • Smart camera • Smart band 56.8 References [1] Buying Guide: iPhone 5 cases [2] http://www. They connect to the smartphone by Wi-Fi and an app. 56.5 Photo accessories Smart lenses are larger and more capable than the phone’s camera. RockMFR. The Evil IP address. Information Habitat. Cherlin.9 Text and image sources. Slimey. Wehelpwiki. Ohconfucius. BertK. Rajwhite. WhisperToMe. Hydrox. TjBot. Woohookitty. Tomlzz1. Hashar. Tuxa. January2009. ForensicRanger. Josep1c. Skt12345. Hyjwei. Julien Houle. Addshore. Streltzer. David n m bond.vakilian. Rogerbrent. Daif. Pgan002. Rcptech1. Coemgenus. Anchor Link Bot. Alinor.tithi. Lugevas. LilHelpa. Trackimei. SimoM. DinosaursLoveExistence. Chemagato~enwiki. Varlaam. YellowMonkey. Luckas-bot. Tide rolls. Hairy Dude. ITU. Elkman. Pigdog234. Eyreland. RockOfVictory. Xtifr. Carleeto. Hmainsbot1. Cydebot. Carre. Shii. TonyW. ChrisGualtieri. El C. Dweiss. Luckas-bot. Brandmeister. Kwamikagami. VoABot II. Wavelength. Denelson83. TheAMmollusc. Rjwilmsi. Topbanana. Sjorford. KyraVixen. Gogy82. Behnam. Salix alba. Dewritech. Addbot. Bdelisle. Lear’s Fool. Guy Harris. StephenWeber. Glenn. VVVBot. Mean as custard. Artrmindia. Rp8083. Mandarax. Jon Harald Søby. GBuilder. Rjwilmsi. TomPhil. Josephf. Phantomsteve. Witan. Elektron. WideArc. Funnyhat. Jahoe. Mdann52. Mauls. Furrykef. Dtemp. Nicd. Youlia~enwiki. . SmackBot. YurikBot. Tim Starling. Vonvon. Deepakkumarpooja. Harvester. Xaliqen. Jale86. محبوب عالم. Water Bottle. Robbot. Kristine. Peter Ellis. Kjd. Cydebot. Download. Icairns.wikipedia. Abdull. Instantnood. Arcaist. Kurt Jansson. Adam Grenberg. Idyls.tak. Blakegripling ph. Robbot. Piotrus.wikipedia. Thijs!bot. XMog. Danigro456. Ossguy. Christopher Belanger. ZZ9. Brianga. Erebus555. Mange01. Chevypowell. DreamGuy. Zygmunt lozinski. Insanity Incarnate. ChrisMilton. Liftarn. Squiggleslash. Ashishbhatnagar72. Mattg82. Mindmatrix. Cat5nap. DMacks. Jpbowen. L. DiddyWolf. Sniper1xp. FlaBot. Utuado. SmackBot. Wikignome0530. Lightbot. Hendrick 99. Gökhan. Tobias. BOT-Superzerocool. Wireless friend. Joanjoc~enwiki. Pigsonthewing.wikipedia. W163. Scelestus. Jrdharma. Adrian dakota. Versageek. Greg searle. JVz. Wikiklrsc. Colonies Chris. Polimerek.331 Source: https://en. David e cooper. Otisjimmy1.kumar3.org/wiki/International_Telecommunication_Union?oldid= 669114974 Contributors: Stephen Gilbert. Cybercobra. MarshBot. Alvestrand. Monassist. Dmountain. DumZiBoT. FieldMarine. Allan Javier Aguilar Castillo. Shadowjams. Usgnus. M7. Davidmathiraj. Lquilter. Nurg. Firsfron.org/wiki/H. JohnAlbertRigali. Lquilter. Naudefjbot~enwiki. CesarB. Full-date unlinking bot. Tregoweth. Ssd. 10metreh. Lemnaminor. Ictlogist. Radiojon. Glenn. Bluezy. Itai. Tonyfaull. Svick. TXiKiBoT. Lmatt. Harryzilber. Helpful Pixie Bot. A4bot. and licenses 56. Jordancpeterson. Bovineone. Umapathy. Mushroom. Daniel Barlow. Ordishj. YUL89YYZ.Net. Describeit. Chris81w. Download. Bevo. Compfreak7. Adammw.L. Weltall~enwiki. Vegaswikian. Voidxor. Deflective. MattieTK. Dandv. SieBot. Towel401. JoshCheeseNelson. Jmoz2989. Polmandc. Julijaelberg and Anonymous: 320 • 3GPP Source: https://en. Tomekpe. Wikiborg. Thijs!bot. LMB. Mlewis000. Armando. GerardM. JaconaFrere. Borgx. EncMstr.clara. Yen hung. Piersletcher. Suketu. Jusjih. Howcheng.org/wiki/ICANN?oldid=674429296 Contributors: Zundark. Charmi99. Ugur Basak Bot~enwiki. Jumbuck. Whym. Compfreak7. Chancheelam. Rrburke.org/wiki/International_Mobile_Station_Equipment_ Identity?oldid=674637568 Contributors: Egil. Tyagi. Yk Yk Yk. Newyorkadam. Bensons. Wiki-Ed. Jonkerz. Davshul. Arthur Rubin. TakuyaMurata. Greebowarrior. Japinderum. Cuongnq01. Tvol. Fyyer. A412. Maggu. Itinerant1. Johnwest1999. Alansohn. Mentmic. Byassine. Inchka. Lugia2453. MGodwin. Leopheard. MOBILE PHONE ACCESSORIES 56. Rubinbot. Lotje. Nukeless. Tim!. Kingdelrosario. Diberri. Spellbinder.Fred. René. Karlstar. ShaeErisson~enwiki. FlaBot. EmausBot. Ffirmin. David Haslam. Philippe Batreau. Taximes. Gobonobo. Joy. Karthik MTIL. Pb30. Chobot. Gary. AnomieBOT. Tomlzz1. Potor111. AvocatoBot. Coleemma. Marcus Cyron. JhsBot. Gdr. Stephan Leeds. D'ohBot. Flyer22. McSly. Avicennasis. Conquerist. Mendor. Donama. KeithTyler. Jak123. Surdovski. RedWolf. Fontles. Erianna. AnomieBOT. GraemeL. Derek R Bullamore. XLinkBot. Jerome Charles Potts. Melchoir. Counsell. Baloo rch. DidiWeidmann. DRE. Luk. Dafocus. Verement. Alan Liefting. OlEnglish. SmackBot. Admrboltz. Jschnur. Ronz. VoABot II. Parutakupiu. Nightbraker. Alvestrand. Umni2. DoctorKubla and Anonymous: 3 • ICANN Source: https://en. Kozuch. Tahmina. JaconaFrere. MalafayaBot. Crazysim. Addbot. YuMaNuMa. Frappyjohn. Pmsyyz. Ianmacm. Cdc. Sukee3. Tosek. Bluebot. Grafen. Arkrishna. Rsrikanth05. Peaceray. Luckas-bot.limey. Bioran23. Gogo Dodo. Armando. Yonghokim. Wempain. Stevietheman. පසිඳු කාවින්ද. Sa. Alexbrn. Jahoe. SmackBot. Malepheasant. Jog1973. Magioladitis. BenoniBot~enwiki. ChrisUK. Isnow. SmileyLlama. Gadfium. R9tgokunks. Alejo2083. Muhandes. Omegatron. AlleborgoBot. DumZiBoT. Wrs1864. Splash. Sdxu. Guy Harris. Materialscientist. Daveduv. DenisHowe. Ahoerstemeier. John. Eteru. Closedmouth. Bevo. Isheden. SamH. Drizzd~enwiki. Cstdomains. Unionhawk. YurikBot. Mama0101~enwiki. M7. Ligulem. MicruBot. ChuispastonBot. YurikBot. SefBau. Tipiac. Nic Doye. Ronhjones. Cydebot. RobertG. ABlockedUser. OgreBot. Takayoshi3. PhoneGuy86. Asterion. Bota47. Bender235. Babitaarora. Radagast83. Jrlevine. Foxhound66. D'Ranged 1. Kbdankbot. ClueBot. Omnipaedista. Yobot. J. Voidz. Knuckles. Denisarona. Thomas Blomberg. Twredfish. Stdjmax. Galoubet. Karghazini. Kmarinas86. Plustgarten. Legobot. Wo. 9258fahsflkh917fas. Yjk83. Jpatokal. DJ Rubbie. Kennethmac2000. MaGa. TimothyPilgrim. Mulligatawny. NjardarBot. ViperSnake151. Particle. Ninly.luren. Qoushik. Danlaycock. Postdlf. Slawekb. Easter r0x. AnomieBOT.delanoy. VolkovBot. STBot. SmackBot. Bwfrank. Gettingtoit. Vagobot. MusicTree3. Eskimbot. LaaknorBot. Sasuke Sarutobi. Stevellco. Lightbot. Brouhaha. Numbo3bot. Darin-0. Tachs. Pmsyyz. Mirsm. EAi. Preisler. Al Silonov. GrooveDog. Ohconfucius. RingtailedFox. Duckbeaver. AKA MBG.h. Pogoman. Fabrictramp. Widr. Mobius. Graham87. Jfdwolff. Benoni. Hucklebur. DeepersD. CarsracBot. Iandiver. Siddhant. Filedelinkerbot. Rich Farmbrough. 83000bastian. PaulHanson. WikiWikiPhil. Dataphile. Mguidetti. Iandiver. RexNL. Arkrishna. RockOfVictory. Scheinwerfermann. Bovineone. MystBot.wikipedia. Poccil. Taimurijaz97. Nimakha. Elvey. Quistnix.9. Swid. 3gppman. Armando. Mykkerin. DHN-bot~enwiki. Mkehrt. NellieBly. Yann. Maurice Carbonaro. Rkrater. Interfase. Dgies. King Willan Bot~enwiki. Woodshed. CmdrObot. Nobbipunktcom. Yintan. John of Reading. Zzuuzz. Acalamari. MacPrince. Thebossman123. GrouchoBot. Calton.wikipedia. आशीष भटनागर. Good Olfactory. Coolcaesar. Zarcadia. Arseny1992. Thg. BillyPreset. Curriegrad2004. Elomis. Fyyer. Geraldshields11.1 Text • International Mobile Station Equipment Identity Source: https://en. Matt Crypto.Ideation. Vegaswikian. Dcirovic. Vegaswikian.331?oldid=626479823 Contributors: Tzf. Theoretical. Bolo1729. M. Brianjd. Larsie. Kwamikagami. Xqbot. Ahoerstemeier. CommonsDelinker. TheBlueCanoe. Saper. DulcetTone. Schneelocke. Chobot. ThePassengerOfFreedom. CasualVisitor. Mschweigert. Paul1337. Madjar. David H. FlaBot. Huntster. Altermike. Danski14. Daculas. Violetriga. Josie62. PigFlu Oink. Crunkcar. Graham87. Ainsleyf. Smyth. SieBot. Liaor. Plop. Jhendry24. Enceladus. Toby Bartels. Jojalozzo. Bearcat. Greg~enwiki. ClueBot NG. AndersBot. BG19bot. Bhawani Gautam. Rogper~enwiki. Hm2k. Amcl. Shirik. Phe-bot. MarkPos. Addbot. Nealmcb. Dismas. Gunnar Guðvarðarson. ClueBot NG. Ixfd64. Bellerophon. Phoenixforgotten. Mojodaddy. Sockatume. Jamelan. John of Reading. Lars Washington. Ozhiker. Mormegil. Dl2000.org/wiki/3GPP?oldid=674274084 Contributors: The Anome. Bornae. Arancaytar. DocWatson42. Thijs!bot. Hrimhariw. Flowerparty. Mamamobile. Drmagic. HappyApple. Rjwilmsi. Dcollard. Eplack. ✄. Bwooce. Mindmatrix. Kirils. Eperotao. Yobot. LeilaniLad. Uusitunnus. Wwwhatsup. Intgr. China Dialogue News.260 CHAPTER 56. Jiang. El C. Jim. Dwashingtonc and Anonymous: 87 • International Telecommunication Union Source: https://en. contributors.henderson. Larroney. Jumbuck. TheAMmollusc. FlaBot. Chris the speller. C. Fitoschido. Futhark. Antti29. Smithbrenon. Lightmouse. Dawnseeker2000. Targaryen. DavidRCrowe. WikiAnthony. Rjm656s. Ben-Zin~enwiki. Andyabides. MelbourneStar. Paul~enwiki. DaveBurstein. FinFihlman. Jiang. Jawed. Violetriga. Shii. Anonym1ty. Zorrobot. Unyoyega. Dthomsen8. BandwidthSeek. Gnomeza. Rich Farmbrough. Pmajor48 and Anonymous: 120 • H. Frozen4322. YurikBot. Algont. Bijee~enwiki. Ginsengbomb. Secretlondon. Gurchzilla. Pizzadeliveryboy. BOTarate. Mackeriv. Timewatcher. Omnipaedista. Sam Francis.org/wiki/American_Registry_for_Internet_Numbers?oldid= 674004641 Contributors: Bryan Derksen.wikipedia. Gerbon689. At. Magioladitis. Rsrikanth05. Widefox. Jokestress. Grafen. Joseph Dwayne. Amcconachie. JusticeForICANNsVictims. EmxBot. Matdrodes. DumZiBoT. Wikiliki. Andattaca2010. Bentogoa. Stepshep. Yamla. Ardenn. Bobet. Mysid. Raindeer. SpBot. Pahari Sahib. VoABot II. Snori. ShaneKerr. Funandtrvl. 16@r. Wbm1058. Seaphoto. Dr Zimbu. Arastcp. Tobixen. Laargo. Joes8888. Prateekchanda. SieBot. WouterBot. Boothy443. Iwaszkiewicz. Rjwilmsi. Mat-C. Utcursch. Santacruzette. Luckas-bot.lin. TcomptonMA. Morton. Cabazap. Ckatz. Wjfox2005. Saimhe. Julesd. Louise666. Gh5046. Earth. Allens. SmartyBoots. Kgfleischmann. TottyBot. IntrigueBlue. Closedmouth. Erianna. Kozuch. DerHexer. Mortense. Gnowxilef. RedSoxFan274. Vina. Kbrose. Merovingian. BrownHairedGirl. Euchiasmus. H3llbringer. Mksword. Jab843. Aminul. Whym. Lightmouse. Blanchardb. Kbh3rd. AvicAWB. Dancroak. Marcod'Itri. Namecritic. Ricky81682. Certes. Fleetflame. Krymson. WeggeBot. Pinkadelica. LucienBOT. Rjwilmsi. Joal ban Kluane. Ugur Basak. James. Epbr123. Denisarona. Grye. Klimov. Marnues. Fanatix. Wwallacee.C. . Radiojon. Mets501. Lynnalipinski. Krashlandon. DuncanBCS. Lawtechgeek. Tpbradbury. COBot. Abdullais4u. Cjkporter. Abrech. Falcon8765. Padgeman. Cuppa. Colonies Chris. Hugo999. HMSSolent. Ohnoitsjamie. Reconfirmer. Evil Monkey. Minesweeper. Dantis~enwiki. BenFrantzDale. Jeepday. Skr15081997. Loti. ABF. MantisEars. Wdwd. Rjm656s. Numbo3. Verdatum. J. Prashanthns. VolkovBot. Nisselua. WriterHound. Emarsee. Compfreak7. WATP. Article editor. Costaroussos. Evdo.delanoy.. Microchip08. Piano non troppo. Slammer111. Ziggyseventh. Ahoerstemeier. Viriditas. M4gnum0n. Eche13. Can't sleep. Wolface. Nodove. Dan100. Nurg. Danielcohn. HasharBot~enwiki. Tillmo. Lefty. TYelliot. Everton1984. Muhandes. DumbBOT. Moshe Constantine Hassan Al-Silverburg. Enochlau. AngryBear. FooCow. ZimZalaBim. Freakofnurture. Dancter. Chuck Marean. Andres. Robert K S. ClueBot NG. JAnDbot. Rei-bot. DO'Neil. ArmbrustBot. MER-C. Cenarium. Dpareit. Davewho2. AVM. Nelson50. Mojo Hand. Bovineone. Huggi. IReceivedDeathThreats. DennyColt. Rex the first. Pretzels. ISPman. ArmbrustBot and Anonymous: 37 • Latin America and Caribbean Network Information Centre Source: https://en. Tracer9999. Wikizen. SmackBot. Hanacy. Dthomsen8. Dikteren. TJJFV. Qexigator. WhiteTimberwolf. Elassint. Closedmouth. Erunestian. Idioma-bot. Jean15paul. RuM. Cihan. Ohnoitsjamie. Squallwc. Shrips. SusanLesch. MartinBot.. Funandtrvl. Cattus. Jeffq. WhisperToMe. P. SANJAYBAFNA. Darth Panda. JAnDbot. ARIN Staff. Shaktiyadav. Radagast83. Wikiwikiwho. The Anomebot2. NHRHS2010. Kalanziut. BokicaK. Detailtiger. SasiSasi. MystBot. Voomoo. Martarius. Debroglie. Chaojoker. Jagged 85. JHunterJ. Jcw69. Jamessungjin. Yintan. Pdcook. Prkwiki. EmausBot. HaeB. Shaunak. Wikitumnus. RoySmith. Vec. Rich Farmbrough.wikipedia. Dicklyon. Wimpole. Cydebot. James086. Serenewaffles. SporkBot. Unyoyega. JonHarder. Metalaw. Tothwolf. Alphachimpbot. Purefusion. Almabot. Courtarro. Silvestre Zabala. Pharaoh of the Wizards. Mercury McKinnon. Kaaa. Cloudbound. Jesant13. Phooto.sg. Jesant13. JVz. Stephan Leeds. TellWeb. Beefyt. Mr. CommonsDelinker. 121a0012. Nitika. Phoenix-forgotten. CocuBot. SF007. Jim. Sun Creator. SaltySeas and Anonymous: 17 • 3G Source: https://en. RaptureBot. Japinderum.. Darkwind. NawlinWiki. KnowledgeOfSelf. OKBot. Ardric47. Odie5533. Dfarrell07. Shirulashem. Doublex120. Pantosys. TXiKiBoT. Sole Soul. Nakon. Stradivarius. Mikeo. SiobhanHansa. Togo~enwiki. TexasDawg. Rrburke. Lightbot. Jeff G. Nextafrican. LAX. Jasongolod. Insanity Incarnate. Ethridgela. CmdrObot. Andreworkney. Chmarkine. BotKung. Zigger. Dewritech. Wine Guy. Jatra. Excirial. TobeBot. John of Reading. Animum.s. Glenn. Feezo. Dr Zimbu. Aquarius Rising. DanielDeibler. Minipc101. SchmuckyTheCat. Aenesidemos. Mowgli~enwiki. Naerii. Qxz. Huggi. Horkana. FrummerThanThou. Leafyplant. Vanished user 34958. Newone. GoLLoMboje. Camitommy. Hairy Dude. Georgeonoh. Synchrite. Gogo Dodo.bot. MMuzammils. Vegaswikian. Thatbox.nakul. Havardk. W163. Pgan002. FlaBot. Sir Vicious. Allanrod. TruthPraiser. Ferdinand Pienaar. Ary29. NorthernThunder. Mindmatrix. TXiKiBoT. Sciurinæ. Csurguine. Bobblewik. Addbot. Sexyman48. Jmiah. KirrVlad. MikeLynch. Bonadea. Kamath. TrumpetPlayer. Bsoft. CONTRIBUTORS. Bluezy. Chancheelam. Shenme. Jortheo. OwenVersteeg. Mange01. S. Hervegirod. Oshwah. Beland. Donlibes. Bernardwoodpecker. Saddy Dumpington. Arpingstone. ClueBot. Towel401. EdgarMCMLXXXI.thehotcorner. Eskimbot. Vbs. Dethme0w. DocWatson42. Hu12. FrescoBot. Paracel63. Violetriga. Stryik. Thijs!bot. Courcelles. SJP. Worldedixor. Adpenaranda~enwiki. Marcod'Itri. Crakkpot. Cybercobra. Lotje. Hmains. Tzartzam. Conquerist. Le Fou. LOL. 1tephania. Giraffedata.kim. Hairouna. Ctrow. Whereisjim. Dmendell. Kumioko (renamed). Ajabbiz. Pmicel. Rat144. Rjayres. Shamesspwns. VolkovBot. Thijs!bot. Mfactor. Noodlenut. Kdriver. Dawnseeker2000. Gilliam. Drizzd~enwiki. Melab-1. Fadesga. Mindeye. Greenshed. Orobles. N0YKG. Danlev. Bobblewik. Andreaskem. Erotml. Thijs!bot. Joe18. DonBronson. Broadbot. Danrok. Hmainsbot1. Falconsgladiator. Mesquita. Merovingian. Bluebot. JohnI. Reedy. Supertouch. SHCarter. 5 albert square. Genium. Sharp11.Liu. Granhil. Hadal. Zorxd. Jiang. Mcfar54. JohnTechnologist.pole. Magioladitis. Richigi. Curpsbot-unicodify. SmackBot. Shocking Blue.wormer. Bpangti. Rei-bot. Edknol. ChamithN. Mac. ESkog. Hurmata. Flashywordz. Mojodaddy. Oneilius. Orange Suede Sofa. Joseph Dwayne. Rwalters. IceKarma. Jeff G. Ixfd64. Hoosteen5. Cst17. Trevyn. Nibuod. Everton1984. Wernher. Snigbrook. Cacophony. Xqbot. WhisperToMe. CaribDigita. BenjaminZClifford. Morwen. Zaki4. J. LookingGlass. Nirala nagar. Jasper Deng. Binksternet. Cdman882. MacedonianBoy. Blake-. ShelfSkewed. LeaveSleaves. Chmarkine. Dhuberma. Locobot. Lqferreira. Drphilharmonic. Dac93. Euloiix. Jigen III. The Thing That Should Not Be. Gbruen. Kurumban. Toytoy. Golbez. Lekrecteurmasque. Bobandersen. Salamurai. DeadEyeArrow. Heman. Jpatokal. TheNewPhobia. Mr. TheBlueCanoe. Darren Olivier. Vipinhari.delanoy. Solipsist. Bongwarrior. TXiKiBoT. Megan at ARIN. Fyddlestix. Fanatix. Jonpaulusa. Serte. LiDaobing. Obiwankenobi. Drmies. Hadiyana. Fudoreaper. SmilingBoy. Radiosband. Thayts.t. AND LICENSES 261 Hux. Rich Farmbrough. Cncxbox. Graymornings. FabioMr. Rockysmile11. Christopher Mann McKay. ImageRemovalBot. Mathiastck. Strandist. Another Believer. Luckas-bot. RegistrarHistorian. Achromatic. Velocitas. Monkbot. Digfarenough. Alsandro. Vbertola. Headbomb. KnowledgeOfSelf. Stephenw32768. Macduff. Shiro jdn. Joseph Solis in Australia. BG19bot. 16@r. Yobot. 478jjjz. Calliopejen1. AnomieBOT. Zora. Вени Марковски.56. Securawiki. Ben kenobi 00. Noliver. Raymond King. LawEditor2010. Aitias. Lars Washington. Deflective. Panscient. BD2412. Sceptre.9. Harryzilber. ChigoZ. WebHamster. SmilingBoy. Raymondwinn. CmdrObot. EagerToddler39. Marudubshinki. Miracle Pen. Lightbot. Ida Shaw. The Thing That Should Not Be. Daniel. Edcolins. Chmarkine. KGasso. T0ky0. Chobot. SmackBot. Ygasuasu. SpLoT. MarkPDF. Owendelong.org/wiki/3G?oldid=673553668 Contributors: Mswake. Addbot. Heartnseoul. CaribDigita. Chrisbolt. Callinus. SandStone. Tregoweth. Nono64. Jack99999. EmirA~enwiki. RuED~enwiki. Mafmafmaf. GoingBatty. Baloo rch. Grant65. Lilac Soul. Adamdiament. Orayzio. Midway. Philip Trueman. Cctan-daphanelg. Laager. N419BH. Master of Puppets. Meiskam. LeContexte. Epbr123. Chmod007. STBot. TcomptonMA. A bit iffy. Danski14. Ceros. Tomi T Ahonen. ChenzwBot. AlnoktaBOT. DuffDudeX1. DrilBot. Telecomwave. YurikBot.org/wiki/Latin_America_and_Caribbean_ Network_Information_Centre?oldid=666071980 Contributors: Havardk. Bwoodcock. Avicennasis. Audrius u. JavierMC. Behind The Wall Of Sleep. Risssa. Petiatil. Chmod007. TcomptonMA. AlephGamma. Knowledge lover1123. 1-555-confide. clown will eat me. GregA. Stephenb. Cfaerber. Xqbot. Don4of4. Jimurphy. Kkm010. Dustin V. Bunnyhop11. Nubiatech. Piledhigheranddeeper. Allkindsofthings. Legobot. Jprg1966. The Anome. Lucy1981. Sgb22. Oldiesmann. Ryuch. Adotrde. Samdlaw. EliasAlucard. Wickethewok. Jcurranz. Brianski. Lotje. Ron2you. Tommy Kronkvist. Fuzheado. Ohconfucius. Smalljim. Bbx. Bluebot. RainbowOfLight. Qasdfdsaq. J Crow. BattyBot. Andros 1337. JoshHendo. Yobot. Kimchi. Thingg. Nsk92. Digisus. CambridgeBayWeather. Mifter. Triona. TEXT AND IMAGE SOURCES. Wavelength. Zarcadia.wikipedia. Jarsyl. AntiVandalBot. CmdrObot. Tawkerbot2. Yolittle and Anonymous: 197 • American Registry for Internet Numbers Source: https://en. Gadget850. Will Beback. Nixeagle. Sanmele. ToePeu. Yuckfoo. Gja822. AgarwalSumeet. Webshared. Freddiem. Blaisorblade. Probell. GreenJoe. Lmq2401. Closedmouth. ClueBot. Siddhant. Oli Filth. Kai-Hendrik. FrYGuY. AndrewHowse. VolkovBot. Tjtenor4. Esurnir. Chriswiki. Peter. IvanLanin. MB1972. Zzuuzz. Simone. Freddy011. Baloo rch. Asaliyev. Akshay2212. Altenmann. Frazzydee. Calabe1992. Oli Filth. KenBentubo. Mpesce. H3llBot. Okliolki. Davidgothberg. InternetMeme. Morwen. Dave. Angela. Pmsyyz. Mortense. Pvasudev. Robaston. IMSoP. Isnow. Bunnyhop11. Kenb215. Eiffel. JohnTechnologist. Zefcan. Sjö. Lovighzi~enwiki. Pigsonthewing.chiu~enwiki. Edcolins. FlaBot. HasharBot~enwiki. Derat. Itusg15q4user. JohnOwens. Termininja. Ppchailley. Ktims. Sceptre. Puckly. WibblyLeMoende. Cape ryano. Minsbot. RodC. N. Danielh32. DumZiBoT. Mark Arsten. Sswsonic. JaGa. BG19bot. Polarscribe. Misza13. Lotje. BOTarate. Splash. Ksn. TPK. Gorman. Tooki. Eyreland. Modster. Daviddavid. Ch Th Jo. Galoubet. Adnroid. PEZ. VictorianMutant. Hahnchen. CQJ. Davebaty. 28bot. Muhandes.barie. Wo. Wikitürkçe. Vc-wp. Dystopos. Yyy. OnionBlanc. Wireless Keyboard. Ausinha. Flcelloguy. Dwaipayanc. Hydrargyrum. Graham87. Wikiborg. Przemyslaw Pawelczak. Mr pand. Vkem~enwiki. Paddad64. Joconnor. Ksnow. Barras.v. Les-cheques. Ulmer. DylanW. Jmail. Cfaerber. Auric. Salientraven. Bk0. Jennypei. Harryzilber. Canterbury Tail. Adashiel. Shaddack. Hellisp. Ixfd64. Ghildiyalsumit. RobyWayne. Jesse Viviano. Kronf. Jeffq. FRHD. Carsrac. IvanLanin. Wdwd. Melaen. GrouchoBot. Sunnyamirr. Zanlok. Xenium. Dhhssausb. Ssd. Amarhindustani.luren. VolkovBot. David Parker. Deskana. Rei-bot. Starionwolf. Faisalabadian. ElBenevolente. Ke6alv. Munawarmuniruae. Mythril. DKBG. DARTH SIDIOUS 2. Bucket- . Lavenderbunny. Omnipaedista. SmackBot. Joey7643. WadeSimMiser. Addbot. HJ Mitchell. Wikiknol. Natalya. ZooFari. ClueBot NG. Sfoskett. Abesford. Ed Poor. Sunray. KamasamaK. Piz d'Es-Cha. Jfinlayson. ElBenevolente. VoteITP. Arkid77. Eplondke. Chris the speller. Binyamin Goldstein. Mange01. Ffirmin.bouvin. Gwernol. Sharkface217. Drano. Tony1. Amaury. Pratikshit. NuShrike. Jelsova. Epengfei~enwiki. Suruena. Nfearnley. Noctibus. Utcursch.wikipedia. Neutrality. RedWolf. Gggh. Tolly4bolly. Biker Biker. Khalid hassani. SpBot. Skaterdan323. Dan Koehl. KuduIO. Loop 9. Dwo. Rsrikanth05. Tommy2010. Sajalkdas. Ab1. Foobar. Jdlh. Hz. ValC. Ksarawar. CarsracBot. Turian. Fui in terra aliena. Teksosyete. Avalyn. EwaDuan. Yobot. Tobias Bergemann. Orphan Wiki. Wtmitchell. Robert K S. Pinethicket. Everyking. Pavel Vozenilek.Company. Alexius08. CanisRufus. Seajay. Shinra. Tpbradbury. Senjuto. Jasonataylor. Beland. John2kx. Photobiker. Bugnot. Grunt. CosineKitty. Tokachu. Daveswagon. MelbourneStar. Ravenperch. Droob. Mojodaddy. Alvord12.tiang. Squiggleslash. Eisnel. Fortythree. Guy Harris. Julesd. Windchaser. AndrewRH. Ghen. Ancheta Wis. NawlinWiki. Gurch. FT2. William M. Cannolis. Sanjay250. Mogism. Zaffirsadman. Strike Eagle. Nylex. John of Reading. Middayexpress. Jon Awbrey. H3llBot. Ixfd64. Mani1. El C. Addbot. Darren Olivier. Fransko~enwiki. TechPaper. Vegaswikian. Vegaswikian. Phoenix-forgotten. Widr. Goofrider. Andros 1337. Vadmium. Colonies Chris. Jmlinden7. Maxis ftw. Casimir~enwiki. Mendel. Mange01. Elavendran. Galaxiaad. Jebba. Ziggypowe. Darguz Parsilvan. WouterBot. Loren. Zvika. Bobo192. Ahunt. Woohookitty. HappyCamper. Shipitin. Retired username. Thijs!bot. Markus Kuhn. MartinBot. Bruns. Mac. Freitasm. Youssefsan. Ravishyam Bangalore. Band B. Jantangring. MusikAnimal. Wkdewey.Dunford. Jiing. Dinamik-bot. Peter M Gerdes. Jim1138. Kyle Barbour. Straub. Josh3580. Zhernovoi. Musabbir Islam. Khalid. Dajhorn. MOBILE PHONE ACCESSORIES Versus22. MerlIwBot. Wehe. Aapo Laitinen. Boosi. Xfact.Power. KnowledgeOfSelf. Zztzed. Bdoserror. Matthew Stannard. FlaBot. Svick. Amigadave. Sciurinæ. Infrogmation. Ehn. 802geek. Weetoddid. John Quincy Adding Machine. Harvester. Xqbot. Tawker. Jpatokal. Dysprosia. Jakro64. Graham87. Ben Ben. Hornlitz.262 CHAPTER 56. Gobeirne. Adeliine. Nil Einne. Alex Bakharev. Iam. Maximaximax. Sonicyouth86. Ww. CmdrObot.k. Armando. Towel401. Jncraton. DV8 2XL. Obersachsebot. Fæ. Squiggleslash. Liftarn. SmackBot. Sjakkalle. I dream of horses. WikHead. Full-date unlinking bot. Brian Gunderson. Dai Pritchard. Mushroom. Rich Farmbrough. Lupo. Hdante. Bluebot. Hellisp. Mauri96. Chobot. DoubleBlue. Lexor. Szumyk. Allseen.wikipedia. Oliver webley. Lzur. Gringer. Mipadi.wikipedia. Harryzilber. DmitryKo. Sleske. Chobot. Mozzerati. Live Forever. Isidore. JKofoed. Hadiyana. Alex. Joycloete. Bsadowski1. Zamiulcse. ArthurBot. DeFre. Jupix. Femto. Spaceman85. BG19bot. YurikBot. Ironfrost. Lrreiche. Mowgli~enwiki. Wtshymanski. DragonBot. Rubinbot. MastiBot. Varnav. Robaston. Golbez. DavidConrad. Horkana. CopperSquare. Dewritech. LA2. Lihui912. THEN WHO WAS PHONE?. Ahruman. Daften. Nath1991. Ettrig. Aliceokello. Mschlindwein. YurikBot. Robbot. Utuado. Waveletrules. Btornado. Tom. FrescoBot. PrologFan. Anna Frodesiak. Husseinjh. Apyule. YurikBot. Ed g2s. RexNL. Dmytro. Materialscientist. 6birc. Gail. Matt Crypto. PhnomPencil. DiiCinta. Denilsen. Squirrelist. Breakeydown.gmail. Igiveinfo. DylanW. Eshiv.g. Tide rolls. Weihao. Carradee. Neøn. Gadfium. Dasprem. Conquerist. Arabani. Luckas-bot. Romanm. Philip Trueman. Monaarora84. Salty-horse. Mivens. Talkie tim. SheldonYoung. Maximaximax. Wtmitchell. Scott Wilson. KamikazeBot. Kowloonese. ZooFari. MondalorBot.0hlic. Alphachimp. PleaseStand. Nasa-verve. WriterHound. Towel401. Zigger. Lord of the Pit. Siddhant. BonzoESC. Drbreznjev.org/wiki/TD-CDMA?oldid=639936767 Contributors: Cfaerber. Omegatron. IRP. Guy Harris. Mojodaddy. Wimt. Flatline. Netesq. Ezra Wax. Tony1. Cmdrjameson.chiu~enwiki. Todd Vierling. Nightwalker-87 and Anonymous: 5 • Time division multiple access Source: https://en. Mean as custard. Sedathut. Imroy. Jsharpminor. Dyfrgi. Killdevil. MarkS. Ocaasi. Mosh1111. Demian12358. Alexf. Goodvac. EmausBot. Anijatsu. SunflowerZZZ. Antandrus. Gaius Cornelius. Cydebot. Seidenstud. The Epopt. Guy Harris. Pogo747. Debpratim. Cathcart~enwiki. Digitalcrowd. Greensalad. A5b. Whosyourjudas. Trevor MacInnis. Thijs!bot. Jao. 2D. Docboat. Grafen. Jasonauk. Nigel XX. Bobblewik. OnePt618. Guanaco. Mike Rosoft. TastyPoutine. Pennyrawalker and Anonymous: 1132 • TD-SCDMA Source: https://en. Materialscientist. Wahooker. Harshthegreat89. DavidCary. Arunprabu. THA-Zp~enwiki. Pbamma. Heron. John Anderson. Yobot. Wildrider99. Thaiber123z. RHaworth. Edward. Jackol.Electric. Roybadami. Solarra. Jpatokal. Crissov. Pikiwyn. Skarebo. Curps. Willkn. Abce2. Addbot. Nightwalker-87 and Anonymous: 50 • TD-CDMA Source: https://en. Trappist the monk. Sars~enwiki. Hariboneagle927. Dat789. RussBot. HenkvD. Guanabot. Saebvn. זרם-טבעת. Haresh06. Santhosh29. Danfuzz. Rubinbot. Chuckwits. Pol098. Dinomite. Fluffernutter. Tabletop. Hadal. Fuzheado. Quenhitran. Sebras. FrescoBot. Sladen. Cerabot~enwiki. Yahia. DavisLee. Yobot. Leibniz. Super48paul. Sietse Snel. Alexhch. Srleffler. IanGM. Jaizanuar. Connolley. MZMcBride. Morki. Tsange. Bloodofox. AlistairMcMillan. The Phoenix. R6144. Nixdorf. Yoenit. Juxo. Donner60. Delirium. Gscshoyru. Peruvianllama. Antiqueight. Tushargkwd. Boothy443. Nichalp. Uncle G. Squiggleslash.org/wiki/Time_division_multiple_access?oldid=672733293 Contributors: The Anome. AnomieBOT. Fuzheado. Intgr. Tompagenet. Efthimios. Duffman~enwiki. Riick. RetiredWikipedian789. Avoided. Haukurth.wikipedia. Conquerist. Giraffedata. Patcat88. Leif. DASHBot. InternetMeme. Mwanner. Dpotter. Kimiko. Robertyhn. Acprisip. Robofish. RibotBOT. AnomieBOT. WikitanvirBot. Weihao. Rjwilmsi. Sagale. Optimist on the run. Nikai. Jusjih. Wisq. David Martland. Phantomsteve. Sannse. Doridrovirus. Adlerbot. ComCat. GJDR. Andros 1337. Rufous. My name7. TriMesh. Friviere. Awesomepothi. Felidofractals. Jumbuck. Kralizec!.org/wiki/TD-SCDMA?oldid=669226443 Contributors: Pnm. Glenn. Sheki nitk. WikitanvirBot. NQ. Rbarpar. J. Charles Gaudette. Jmg56558. DopefishJustin. Mcsee. Morriswa. Rfc1394. Steve03Mills. Jerec. Wik. Kvng.o. Mehdiakhondi and Anonymous: 103 • Bluetooth Source: https://en. Adnan bogi. Michael Hardy. Twisterplus. Shadowlink1014. LeviathinXII. Pw201. Giftlite. Beland. Omnipaedista. Mooquackwooftweetmeow. R'n'B. Thinkmike. Suruena. Aezram. Wayne Slam. Jossi. Pmetzger. David Haslam. Kowloonese. CoolFox. Rivo~enwiki. Paul Richter.org/wiki/Bluetooth?oldid=674375218 Contributors: AxelBoldt. Amjadk. Heman. Nikhildandekar. Blethering Scot. Rovasscript. Mandi bhalwal. Aeonx. Alansohn. Discospinster. Stephenb. Mahjongg. Sillybilly. Nile. TXiKiBoT. Ericg. MonoAV. Erianna.ghosh. Cburnett. Elvey. Timo Honkasalo. Wiki. Vina. Stephenwanjau. Sappe. Numbermaniac. Hassocks5489. SoxBot III. TigerShark. RussBot. Zpetro. Phil Boswell. ChicXulub.wilton. Download. RjwilmsiBot. U235. Addbot. Chronulator. Fipblizip. John Cline. Gzli888. Brockert. Immunize. Eptalon. EdwinHJ. Satellizer. Chrisbolt. Yamamoto Ichiro. Zidane2k1. Nirvana2013. Amorymeltzer. Velella. MauritsBot. Mojodaddy. Springclean. Rocastelo. Techhead7890. Ronz. Prari. Stephan Leeds. The Rambling Man. Sega381. BradBeattie. LaaknorBot. Wk muriithi. Rjhanson54. Sonĝanto. Mrand. LordAnubisBOT. Will Beback Auto. Freakofnurture. Kanthamohan. TimR. Shahad. Muhandes. MAlvis. Haakon. SLi. Mirror Vax. Pavel Vozenilek. Zblumz. AEMoreira042281. Eptin. InternetMeme. Tecnova. Jonverve. Myscrnnm. Bfigura’s puppy. Ears04. Agency SEA. Jj137. ClueBot. Nialsh. Sdream93. O mores. Ceoil. Jóna Þórunn. Catgut. ProbablyDrew. Ajbrowe. Rob Blanco~enwiki. V 2e. Hersfold. L. Jusdafax. Merlion444. MartinBot. Kiwi128. Lordkazan. LokiClock. R'n'B. Petrb. Sperril. Cambrant. Mortense. Thingg. BingoDingo. Avaldesm. JamesBWatson. Xqbot. FakeTango. Mikaey. Gadgetmonster. HonestIntelligence. Laspalmas. Jmrowland. Tresiden. Twillisjr. Wonderfl. Wnt. Yobot. DireWolf~enwiki. MrOllie. Capricorn42. Butter Bandit. EmausBot. Tharos. Timtempleton. Random Nonsense. Blehfu. Rack1600. Enviroboy.akeel. Psicho1963. Yidisheryid. Jotterbot. Obiwankenobi. Genia4. AKMask. Tkgd2007. AntiVandalBot. Materialscientist. Gmoose1. HarisM. Kurykh. Energetic is francine@yahoo. Tabledhote. Melnorme. Nburden. Bovineboy2008. Klensed. Meckleys. VoABot II. Philip Trueman. Cowpriest2. Dzero-net. Hitchcockc. AubreyEllenShomo. Padishar. Compellingelegance. Imz. NickW557. Xpclient.harmata. Åkebråke. Cmichael. Cydebot. Euquiq. DSRH. Toolnut. Fdlj~enwiki. Ss power hacker. Wikieditor06. Lwc. Niceguyedc. QrK FIN. Nicolas Love. Lilboogie. Justallofthem. Engineerism. Zebov. Bollyjeff. Pfaff9. Electron9. Davidbspalding. Jim1138. JorisvS. Mrbluetooth. Ready. Fartacus46. Kenguest. Zsinj. AfrowJoww. Jw-wiki. Faisal. Hk1992. Depaul27. Widr. PuerExMachina. Fatespeaks. Jhumbo. Avijaikumar. Thedjatclubrock. Amaury. Ryan8374. Mountainlogic. OekelWm.R. Myanw. Nisanthks. WickedInk. Shirulashem. Skamecrazy123. 28421u2232nfenfcenc. Estirabot. Dewritech. Coolbho3000. ST47. Sonic3KMaster. Nubi78. DHN-bot~enwiki. BRUTE. Canadiantire122. LilHelpa. Lipatden. Eskalin. Tanvir Ahmmed. Cootiequits. Brianski. Darz Mol~enwiki. Seaphoto. Mtodorov 69. CWii. Donner60. Abmmhasan. Servel333. Philip123ison. Martinp23. Caltas. Glarrg. Retroneo. Stuffed cat. Landon1980. Morte. PhoenixofMT. ToothTeam. Ryan032. EVula. Virexix. Yahia. Superluser. Granpire Viking Man. Kirrages. Warreed. Hu12. Huddsy09. Fraggle81. Davrukin. CosminManole. Andrewmc123. Marcelbutucea. Andreasbecker.N. WikHead.barie. KelleyCook. Queenmomcat. Headsetuser. Lightbot. Dilane. Allens. IddoGenuth. TheOtherSiguy. Blob00. Sjjupadhyay~enwiki. SoxBot III. Rediahs. Supuhstar. Mimarx. Poterxu. BillyPreset. Darin-0. John Cline. Olorin28. NXTguru. BlueMint. SMC89. Hyst. Apterygial. Senator Palpatine. Altermike. Falcon8765. Mild Bill Hiccup.Cardenas. Peyre. Kristen Eriksen. Davegsun. Egwyn3. Dannydream9999. Iammasud. StaticGull. VegaDark.keeping. Someone else 90. William Wang. Loren.wilton. Markareal. Froid. WarddrBOT. Lworbey. Adrianfleming. Polo200. Aphid360. Travelbird. 1wolfblake. Lt Master1. Blu3tooth. OlEnglish. Winesouvenir. Darth Panda. Vigyani. Uhai. Gophi. Tweisbach. Jas203. YhnMzw. Acather96. MichaelKirche. Parsecboy. Alexey V. Morten. Maine12329. Crf150r rider. Steven Zhang. 5 albert square. Dimosvki. Winchelsea. Andy Dingley. Sthow. Newtruie. Novasource. ZéroBot. EJF.com. Qxz. Plasticbadge. Fieldday-sunday. Xelgen. SieBot. Excirial. OlavN. Kungfuadam. WikiLaurent. CarsracBot. Hoseabrown. Pikemaster18. Lakers. DumbBOT. Elopezar. Lotje. Minna Sora no Shita. Impasse. Wireless friend. 4I7. Luccas. DerHexer. Nlu. Incnis Mrsi. WesleyDodds. Greenshed. Arthur Rubin. MG lUkE xX. JKofoed. Alexbot. Dirkbb. DragonBot. Aitias. The Flying Spaghetti Monster. JAnDbot. Little Mountain 5. Danrok. Nachoman-au. Bogey97. NetRolller 3D. Bitbit. . Mhrlive. RedBot. Gilliam. Mntlnrg. Vinod58. Vanished user kijsdion3i4jf. Piano non troppo. Alexius08. Ramu50. Somearemoreequal. SampsonSimpson. Jfromcanada. Zoltan. RibotBOT. Tinton5. Abomasnow. Garion96. Captzucchini. MER-C. Steven. JLaTondre. Repetition. Nakon. Just plain Bill. Persian Poet Gal. Masgatotkaca. Malik Shabazz. Sbmeirow. Landroo. Gracenotes. SoCalSuperEagle. Conquerist. Nobunaga24. Retiono Virginian. Aeluwas. Slakr. Tide rolls. Proximitia. Jblbt.H. PolarYukon. ADNewsom. Notmicro. Ste m t1988. Gogo Dodo. Noctibus. Recognizance. Cheeseguypie. Digitallyinspired. Sionus. Djg2006. Gary63. Adavidb. Tarret. Natgoo. Jench. Anon lynx. Anthonyramos1. Jonkerz. Palopt. Deli nk. Doggkruse. BrockF5. Dave Messina. Teratornis. JackieBot. Vojamisic. GFellows. Angrymuth. Makecat. FrescoBot. ChrisHodgesUK. Kelaiel. Ndenison. PleaseStand. TXiKiBoT. Mossig. Holdenmcrutch. JFreeman. Fæ. Jaysbro. Dtt. Coretheapple. Dave4400. Lisa 4 envyme@yahoo. Magioladitis. Navinkhemka. Bardia52. Harryzilber. MichaelStanford. Suffusion of Yellow. Th1rt3en. Katimawan2005. I already forgot. LeaveSleaves. P3net. Droll. Mckinleyma. N2e. Ex nihil. Sophus Bie. Rei-bot. CONTRIBUTORS. Luk. WikitanvirBot. Whpq. Dorvaq. 10metreh. Alyssa3467. Lightmouse. Ronnymexico. KamikazeBot. Masatran. B. 84user. Fireblaster lyz. Mushu118. Ebrahim. WinBot. Onel5969. Rhallanger. Fxhomie. Avoided. PhilKnight. Kerr avon. J. Felyza. Burchseymour. Geoman888. JustToHelp. Boomshadow. Phooto. CrazyTerabyte. Brianonn. Tmopkisn. CasperGhosty. Ifroggie. Mackwho. Pedess. CosineKitty. Millionbaker. Michkalas. Oli Filth.56. Sfan00 IMG. AnomieBOT. Jtmoon. DumZiBoT. PedanticChristian. Warpedshadow. Qwavel. Awl. Jlou us. Plagana. Andy120. Omnilord. Lexischemen~enwiki. Frvwfr2. Psmonu. RenamedUser01302013. Vid2vid. JSimmonz. Dusti. Versus22. DemocraticLuntz. The undertow. Dave Andrew. Irstu. Teles. NMHartman. SmackBot. Dacbook.ackermann. Abidh786. Karl2620. Colfer2. PiCo. Aeon1006. Chillum. Spab 007. Plexos. Shajure. Dtgriscom. Jsmaye. Nagy. Melsaran. Brahmanknight. Narendra Sisodiya. Wdrdoctor. PRRfan. SammyJames. Danno uk. H3llBot. DimeCadmium. Canadian-Bacon. Iridescent. Pstanton. Winner 42. AdjustShift. Sonu27. Apteva. Howie1989. Legobot. Freedomlinux. Nikpapag. Neon white. MrRedwood. Anonymi. Jericbryledy. Martarius. N5iln. Adovid-Mila. Bjorn Elenfors. Jgrahn. Skyezx. Marek69. Nettlehead. Icarus4586. Frap. Heimstern. Andrea105. clown will eat me. Olejarde. Funkendub. Alella. Maxamegalon2000. Village Idiort. Escarbot. Nentuaby. Pmaas. Skyskraper. Andypandy. Kozuch. Spellcast. La Pianista. AND LICENSES 263 sofg. Brent01. Cpl Syx. Rakeshlashkari. Jhsounds. OrphanBot. DougsTech. Luckas-bot. Gerixau. Suid-Afrikaanse. Color probe. Schwarzes Nacht. Mdwyer. Epbr123. G-W. RenniePet. THEN WHO WAS PHONE?. TEXT AND IMAGE SOURCES. Wjejskenewr. Uker. Chris55. Kyng. Nagle. RyanCross. Mltinus. Quartz25. Nigholith. Oo7565. ARUNKUMAR P. TaBOT-zerem. WeggeBot. Ramprasadb. Ohnoitsjamie. Muaddeeb. JSpung. Tauheedrameez. Mabahj. Pedrose. OnePt618. Steveobd. Ouishoebean. Supernovaess. Flntobi~enwiki.hatchi. Pharaoh of the Wizards. Porqin. Dwlocks. Farosdaughter. The Thing That Should Not Be. Aymatth2. SchfiftyThree. D1991jb. Pngolla. RJaguar3. Ain't love grand. Macy. Ohconfucius. WMC. Raistolo.9. HalfShadow. GraemeL. Kaini. Werdan7. Gloriamarie. Aprilstarr. Arda Xi. FoxBot. Menon. Synchronism.delanoy. Learnportuguese. Laurusnobilis. Topazg. Alias Flood. Dj4u. Lohith92. Devin. Wvbailey. Daniel. Zzsignup. Adpete. Maurice45. Shadowlynk. NHRHS2010. Opn800. BobKawanaka. Roman. Kierenj. SQB. Tomvanbraeckel. Bongwarrior.4I7. Austin Spafford. JRaue. James086. Chrylis. Tris121. Opelio. Ebrambot. DoorsAjar. Holt. Tgeairn. Klaus100. KylieTastic. Shyhshinlee. Favonian. Oliverlyc. Koman90. JoeMarfice. NAHID. Aaronsharpe. LeadSongDog. HDCase. Yamaguchi . Haseo9999. Sudsak. Shoeofdeath. Ahmadr. Daemonic Kangaroo. Dawnseeker2000. Theflyer. Nageh. Barek. Cntras. NjardarBot. Leujohn. MikeLynch. Gustavopaz21. Kuru. DigitHead. LogAntiLog. Manifestation. Kevin chen2003. Demonte Morton. Mercury~enwiki. Harleyosborne1234. Bpantalone. Uncle Dick. Herbythyme. SandyGeorgia. Bigjimr. Dsimic. Addea.Koslowski. Theups. Todeswalzer.UK. Jvanthou. 28bot. JerryDeSanto. Mithaca. DRAGON BOOSTER. Aquinex. Animum. Snoopy8765. Skarebo. Leuko. Edgukated. TestEditBot. Boffob. Ssri1983. Dlohcierekim. Crakkpot. Aguwhite. TobeBot. Flyer22. Happysailor. Squeakypaul. Airplaneman. MobileMistress. Zzsql. Gromreaper. Mojtaba fouladi. Cransdell. Felixgomez18~enwiki. SJP. Keilana. Manticore. JonHarder. Westleyd.Prasad. ArthurBot. Katieh5584. Nux. Trent Arms. Surya Adinata. Notbyworks. Karichisholm. SashatoBot. Shadowjams. Davidoff. John Reaves. Dennis mathews. Igoldste. Wikipelli. Reedy Bot. Someguy1221. Siliconbeat. TheBilly. 777sms. John254. Anderssjosvard.com. Agurcu. Scott14. Nopetro. RoboServien. Grungen. WikiNickM. SleepyHappyDoc. Jonathan Karlsson. Y2kcrazyjoker4. ClueBot NG. Lucid00. JeroenvW. Mike V. Funnyfarmofdoom. ArglebargleIV. Acer65. Chalo phenomenon. Arjun G. Runmcp. Hrudaya. Brougham96. Littleworld73. I dream of horses. Satellizer. Lcabanel. Canthusus. Tawkerbot4. JoanneB. Yakudza. Zlatan8621. MrPaul84. GerbilSoft. Oden. Jonathan Hall. Binksternet. Kazu89. EncMstr. Stephen B Streater. W Nowicki. Apparition11. CharlieGalik. Masamage. Doniago. TutterMouse. Enap007. Victor falk. Lds. O. Sapphic. WikiMarcus. HannesP. Omicronpersei8. TiCPU. Dumelow. Del Merritt. Molchanov. Can't sleep. Mwilso24. Dpwkbw. Skyy Train. XLinkBot. Mjmarcus. Disavian. Ryanbrannonrulez. Danielsage98. Unschool. Dicklyon. Jlarkin. Auntof6. DorganBot. Kravdraa Ulb. Jmnbatista. Misterdan. LittleOldMe. Nasnema. Xp54321. Addbot. Oxymoron83. S3000. WookieInHeat. Wikitumnus. Dracony. Jwissick. Chzz. Tim1357. Mrmason. Averisk. Jnavas. Aka042. Mholland. Glenn4pr. SpK. DragonLord. TheDoctor10. Squid tamer. PS2pcGAMER. AndersBot. Ginettos. Hfkids. Makeemlighter. Jesse Viviano. DHN-bot~enwiki. Phatom87. Zanetu. . AnomieBOT. Gilliam.henderson. Mlc. Vanished user 1234567890. Scutigeramorpha. Orthogonal1. TJJFV. Mange01. X746e. Dorftrottel. Steveklein. O. Yobot. Freelancer2013. DHN-bot~enwiki. RussBot. TakuyaMurata. Yourmummm. W Nowicki. Astralnaut. 2ndjpeg. AnomieBOT. Lindsaypeattie. Rigger151. Widefox. Xqbot. LilHelpa. Ot. Dinamik-bot. Nijuabraham. Wapcaplet. Auntof6. Wassini. Masssly. ErikHaugen. Jakec. Justinhornberger. KelleyCook. Frees. Jim. Pol098. KingReaperXD. Kku. Punkpop ladd. Itsmyline. Hebrides. SmackBot. Editore99. DHN-bot~enwiki. Karthick. Offeiriad. Pnm. CommonsDelinker.org/wiki/Logical_link_control?oldid=636647847 Contributors: The Anome. Kvng. Tawkerbot2.wikipedia. Phatom87. Dicklyon. Treekids. Vchimpanzee. Nathan thorpe.org/wiki/HiperLAN?oldid=634582439 Contributors: The Anome. BG19bot. A. AntiAbuseBot. Materialscientist. Cyanoa Crylate. Tsystems. EagleOne. Xqbot. Dawnseeker2000. Rutja76. Pateldivakar. Riley Huntley. Djonesx. Pwesolek.16?oldid=669827864 Contributors: Ansible. AnthonyJ Lock. FoxBot. Genovif. LindsayH. Rupl. Freedomlinux. Hellisp. Frap. Sysiphe. KasparBot. Wrs1864. Yobot. Itai. Highway 231. Rick Sidwell. Thijs!bot. Indil. Goodvac. Timl. FDD. ClueBot. Lumag Lumag. Alishir58. Casey Abell. A4bot. Widefox. A1. Tawkerbot2. XLinkBot. Bassmstr9. Lihui912. DmitryKo. HMSSolent. Rick Sidwell.stohr. Loosecannon93. . Mongoliaian. Sligocki. Nageh. Kopf1988. KelleyCook. Matt Britt. Armando. SpaceFlight89. Xxiehero. Dobie80. Jafxi. Caedwa. Extraordinary. Addbot. Versageek. Discospinster. FlaBot. Blink89x. FlaBot. Ál. Kozuch. Wayfarer. PaulTanenbaum. Palopt. Hu12. XLinkBot. Pierpao. Nuno Tavares. JAnDbot. DenesVadasz. Reatlas. Wingman4l7. ZéroBot. Roux-HG.anacondabot.264 CHAPTER 56. Joy. Mikele venditt. JackMurph. Enjoi4586. Ds82ro. LeonardoRob0t. Pnm. RyanQuinlan. Sravanadire. Luís Felipe Braga. Timwi. PipepBot. Ianmacm. Rwwww. Itusg15q4user. I am One of Many. Flashpoint145. Ppooya99. Kbrose. Ghez. Epiklyfail77 and Anonymous: 2080 • IEEE 802. Δ. YiFeiBot and Anonymous: 106 • Logical link control Source: https://en.wikipedia. BG19bot. Johnuniq. Semsi Paco Virchow. Krimuk90. KnightRider~enwiki. Nathan8225. Soulbot. Palopt. Monkeyman. JThywiss.org/wiki/Media_access_control?oldid=666508560 Contributors: Youssefsan. Leon Hunt. Jeffreh172.wikipedia. Nsaa. Jtk. Steven Hepting. Gwalker nz. SilvonenBot. Nubiatech. FunPika. Guy Harris. Angela.junior. Very Input. JeromeJerome. Mlaffs. Sarajb53. DVdm. Evdo. B. Babomb. Klaus5512. Steven Hepting. Zalkida. Widefox. Cydebot. Bentogoa. Pieoncar. Cryptos2k. Ysangkok. Knuckle007. Petri Krohn. Intgr. Johno3300. Phatom87. Mange01. Anuja Ray. Mo ainm. DenesVadasz. Chowbok. Sstrycker. Borgx. Hz. Doulos Christos. Jweaver120. Djg2006. Debresser. Qinghao. Rei-bot. HelicopterLlama. Whizrayon. Qoqnous. Diagraph01~enwiki. LA2. Denisarona. Gbluecathy. Arosa. KnightRider~enwiki. Rich Farmbrough. JFSM~enwiki. Nixdorf. Water Bottle. Tentinator. Per1234. Psbsub. Chester Markel. Krmboya.higley. Stephan Leeds. Calicat. Wakelamp. Nurg.org/wiki/Evolved_HSPA?oldid=674385717 Contributors: Roybadami. Logan. Dewritech. Grubber. Sardanaphalus. Faizan. AsceticRose. GBL. Kinettisaizah. Vkusske. Mellery. Brianhe. ChicXulub. Nelson50. Filedelinkerbot. Elch Yenn. BattyBot. Yourmummmm. Snowdog. SomeFreakOnTheInternet and Anonymous: 76 • Wireless broadband Source: https://en. James. Krishnatomar1986oct. Helpful Pixie Bot. Fatih431. Firsfron. EmausBot. Chaitanya. Ljvillanueva. WikitanvirBot. Itai. Sucwingse. Dicklyon. Freakoutwithme. FrescoBot. W Nowicki. ErikHaugen. BenFrantzDale.jose. JonHarder.wikipedia. Thumperward. Chrisxue815. HMSLavender. Arathald. Notmicro. Tagishsimon. Scruff323. Tony Tan.s5. AnomieBOT. Reenu rajbir. PCock. Trynitagain2c. KnightRider~enwiki. The RedBurn. Rapsar. Snori. Neøn. Helpful Pixie Bot. Philip Trueman. Sɛvɪnti faɪv. KelleyCook. Julien~enwiki. Nelson50. Ugur Basak. Djg2006. Widr. AlexeyV. Babitaarora and Anonymous: 93 • Media access control Source: https://en. Kbdankbot. Cyclonius. Closedmouth. Legobot. Nurg. Wrs1864. Oli Filth. Irnavash. 7Sidz. Materialscientist. Numbo3-bot. Notheruser. CanadianLinuxUser. Yobot. Techmesho. Srleffler. Jamesx12345. Ottawahitech. Caesura. Jrleighton. Graham87. SieBot. CaseyMillerWiki. Djg2006. SmackBot. AlleborgoBot. Khazar2. Le Pied-bot~enwiki. Tonyprasanna05. Reedy. Timwi. ChrisGualtieri.org/wiki/Wireless_broadband?oldid=666696292 Contributors: CesarB. Ahen1020. Trinity. Brad Dyer. SonicTheHedgehog. GoShow. Ssofrigid. Samuel. Mulad. OS2Warp. Nicholsr. Etienne. Don4of4. Osayi. Addbot. Crazy Murdoc. Arado. පසිඳු කාවින්ද. @modi. Beno1000. Tawkerbot4. Rmurias. Johnleftylee. Bobblewik. Compfreak7. AlexPlank. Helpful Pixie Bot. Terra Xin. Svoboman. Lightbot. Gilliam. MystBot. Nallimbot. Addbot. Vitz-RS. Adavidb. Pgallert. Pit7~enwiki. Dicklyon. Download. MrBill3. ZéroBot. Fsiler. Pgallert. Intgr. Dominio~enwiki. Sarr Cat and Anonymous: 25 • Evolved HSPA Source: https://en. Titoncio. Dawnseeker2000. Rjwilmsi. Hakware. Jovianeye. Avitesh. Calltech. Deryck Chan. Yintan. Mo ainm. Anon lynx. Robbot. Joconnor. Stickee. Cydebot.d. Evercat. DanDoughty. OrangeDog. Escarbot.org/wiki/Ubiquiti_Networks?oldid=674443536 Contributors: Bearcat. Maxwell Rain~enwiki. JAnDbot. Alcmaeonid. Khazar. Woohookitty. Gowr. Sssemil. Betty Jeong. DumZiBoT. Mojodaddy.lala. 7. UNOwenNYC. Snow Blizzard. Diffference. Timtempleton.org/wiki/IEEE_802. M414. Cmdrjameson. Thijs!bot. Tabledhote. Dthomsen8. Cparry. HarisM. HappyCamper. Zachlipton. Iapetus.wikipedia. Mange01. Adventures9. Newportm. GermanX. Hydrogen Iodide. Titodutta and Anonymous: 55 • HiperLAN Source: https://en. Yyy. Haseo9999. Nicceg. BaomoVW. Imnotminkus. Borgx. Fifthman. Mange01. Football1502. Chobot. StaticGull. BattyBot. Addbot. Dawnseeker2000. MusikAnimal. Knight91B and Anonymous: 83 • IEEE 802 Source: https://en. ProductBox. Senabluetooth. Wyn. Raveeshworldwide. Notmicro. Buxtehude. Anrie Nord. Laser brain. DariuszT. Rezonansowy. Dawnseeker2000. Plodder81. Vinko. The Illusive Man. Tyler. Sridharnaidu.wikipedia. Nubiatech. Giftlite.dellit. Robertvan1. JAnDbot.Koslowski. Jmlk17. Bpmullins. Xqbot. DumZiBoT. Muhandes. Kozuch. Rbwiki. Kauczuk. Esrogs. Tony1. Johnuniq. Causa sui. Crissov. Inwind. Mistertheman. Sonia. EoRdE6. Cybercobra. Dgtsyb.16 Source: https://en. Nasa-verve.wikipedia. Stassats. Pmcray. Vsevastos. Guy Harris. ClueBot NG. Frap. Arkrishna. Versus22. Kbrose. Dysprosia. Alexander. MerlIwBot. Shortride. Vishnava. Willcannings. Mindmatrix. Darylgolden. Ebrahim. W Nowicki. Nandeda narayan. Mindmatrix. Dgtsyb. Tringy. Anggraeni. Phil Holmes. Ianb888. GliderMaven. DBigXray. Alansohn. Happenstancial. Webclient101. Guy Harris. Materialscientist. Brianhe. NawlinWiki. Patparks. Daanyaal4Sirran. BD2412. Andros 1337. A purple wikiuser. Casey Abell. Corpx. Glacialfox. Ppchailley. Tomhak. BrightStarSky. Luckas-bot. Jusdafax.. Bearcat. Porttikivi. Thijs!bot. Jiraffe. Int21h. Alinja. Jacob. Beno1000. AllyUnion. GPHemsley. YurikBot. Yonir. Laurusnobilis. EditorE. Armando. AnomieBOT. DaniRoisman. MystBot. Edric Chandra. MOBILE PHONE ACCESSORIES Slasherman77. Nil0lab. Mlewis000. Flyguy649. Electriccatfish2.Ralphie. Metricopolus. Danielcohn. BradBeattie. Hede2000. Aarktica. DRosenbach. Discospinster. Ekroeter. Suruena. Rchandra. Surie woods. Mlaffs. Davodd. Lcabanel. Nasa-verve. Zoicon5. Luckas-bot. Kirils. Mr Stephen. Od Mishehu. BG19bot. Lerdsuwa. Dave Braunschweig. Woohookitty. Dehumanizer. Figureskatingfan.tiang. Abackus~enwiki. Erik9bot. Headbomb. Achowat. PrologFan. Ground Zero. Adlerbot. Jondel. Booyabazooka. Nisselua. Modster. LittleWink. Tsystems. Patrick. Rockydallas. Luckasbot. Caso80. Dsurapol. Ruprecht~enwiki. Dawnseeker2000. Kvng. Revolver4u. Thijs!bot. George Rodney Maruri Game. TaBOT-zerem. GoingBatty. Khag94 and Anonymous: 47 • Ubiquiti Networks Source: https://en. JeffreyN. PaulTanenbaum. SmackBot.navarro. Aka. Hair.wikipedia. Jimw338. Ottawahitech.org/wiki/IEEE_802?oldid=673498860 Contributors: The Anome. John of Reading. Mypslim. Thomasw90. Tartantroosers. Nakon. 069952497a. WikHead. Asbestos. Cburnett. Sardanaphalus. ProveIt. ClueBot. JamesBWatson. Breno. J G Campbell. GliderMaven. Cooljohnpan. BattyBot. FlaBot. R'n'B. Alro. Editore99. LordAnubisBOT. Spraints. Bslavin~enwiki. C-M. Willy on Wheels over Ethernet. Ritajefferson. W Nowicki. MerlIwBot. Clouviere4440. Tolly4bolly. Digitalinspiration. Addbot. Ginsuloft. Kvng. EmausBot. Xqbot. Nono64. Mesayre. Good Olfactory. Hgfernan. Materialscientist. Ringbang. Jhd. Good Olfactory. Invadinado. Asksatan42. Rjwilmsi. Magioladitis. Laoris. Jishnua. Villarinho. Joaopaulo1511. Anthony Ivanoff. JohnTechnologist. RjwilmsiBot. Calvinbasti. Dale Arnett. Condem.5G Source: https://en. Kinema. Ollihokkanen. Flamejob. Anarchyson. king. Tedder. SieBot. Maury Markowitz. Hadiyana.h. Dennisthe2. Mithent. Pan Camel.henderson. Vanished user lkjsdkf34ij48fjhk4. Wordbuilder. GiacomoV. FlaBot. Kbdankbot. Andros 1337. Ntg sf. Xqbot. Egil. DHN-bot~enwiki. Eikoseidel. MystBot. Zct823. Elfguy. AndersBot. Mmansoor. Siddhant. Wangjia. . Ketiltrout. ChuispastonBot. James. JanneW. Rjwilmsi.. Jonsg.pole. Armando. Tony1. Sfan00 IMG. BG19bot. Timc. Elisabeth Hillman. Alex43223. Rbrewer42. AliDabbirKhan and Anonymous: 141 • Enhanced Data Rates for GSM Evolution Source: https://en.56. Sirkbulio. BattyBot. TEXT AND IMAGE SOURCES. Nicholas1520. FrescoBot. Ch604. Steve Max. AvicBot. Dan100. NotMuchToSay. Dwattttt. Magioladitis.UT. AnomieBOT. Bartolo5. DooMMeeR. TJ Dimacali. Flurry. SLi. SpBot. A. Hgb asicwizard. HMSSolent. Mike Babic. Editorpl. Andros 1337. Jusjih. Drizzd~enwiki. Omegatron. Discospinster. Rsocol. Hhielscher. Stoinov. Nukeless. Yonpari. Sublite. Pol098. Squiggleslash. MonMan. Sparky2004. LordAnubisBOT. Mardus.wikipedia.delanoy. Khatru2. Mac. Editore99. Terrien. Steve03Mills. Baloo rch. Ledba. FrescoBot. AntiVandalBot. Jra. Dariel 01. Addbot. Markalex. . AnomieBOT. Idioma-bot. Ὁ οἶστρος. John Lucas. Saimhe. Sprog. Epiovesan. VoABot II. Dragonbeast. Jhdaly. EmausBot. Kyousuke. Oswaldo~enwiki. Attacking. Cros79. Dr rdb. Julesd. Boci. 7free. Scope creep. Sovereigns. Palica. LapTop006. Digisus. Porttikivi. Thijs!bot. Cyzor. The RedBurn. Bobblewik. Piet Delport. Evdo. SmackBot. TelecomsTim. Xqbot. Morton. Mojodaddy. Sapte.k. TheAMmollusc. WikiWikiPhil. Retroneo. KevinBullock. Davecrosby uk. Flora~enwiki. Kvng. Klaus100. Mange01. IndulgentReader. Ncrashb.durrani. Nasula. Man vyi. Stevenrasnick. Kdevin. Seikku Kaita. Mange01. Anthraxbrz. DragonBot. Chockyboy. Arch dude. RyanGerbil10. Jonkerz. Unomano.org/wiki/3. Jim1138. Sabb0ur. SmackBot. Mange01. Robbot. EmausBot. Johantheghost. Wifuk. आशीष भटनागर. Goofrider. LeviathinXII. Voidxor. Ripchip Bot. Oli Filth. Bigglescat. ClueBot NG. Harryzilber. Robert Brockway. Full-date unlinking bot. Auteny. BG19bot. MobileIP. RibotBOT. Botbck. Jpors. Iridescent. Bobo192. Mange01. Yadavjpr. Dawynn. Peter S. Nightwalker-87. 99DBSIMLR. DrMoslehi. Oxymoron83. Tvdijk. Chrisedwards. Chaerani. Jeshan. DylanW. Signalhead. Wikipelli. Darkov. Piano non troppo. Vegaswikian. Bco2003. CONTRIBUTORS. Zobh. Djpalmer93. Lightbot. Borgx. Harryzilber. Xqbot. WikHead.wikipedia. Wikiliki. Shattered. Svk sadgat. Jondel. Timtempleton. SpillingBot. Rezabot. Fl. EdC~enwiki. Ronz. Kalleboo. SilvonenBot. WikitanvirBot. Nightwalker-87. Arifulnr. Jerome Charles Potts. Qst. Spinningspark. DocWatson42. AdamRoach. Shiro jdn. That Guy. SmackBot. Ghost. Adnan bogi. JAnDbot. FT2. Hamoodi. DHR. Ketiltrout. Ejay. Johnleemk. 00tony. BattyBot. Golffies. Mateus RM. KJRehberg. Lightbot. Jumbuck. Tabletop. THeCodeGuY. Porttikivi. H3llBot. Frajerji007. Andareed. Nmalon. Khflottorp. Bovineone. Reacocard. Snotbot. TJJFV. R'n'B.org. Vinko. Gdn. Duke7553 and Anonymous: 147 • 3. ClueBot. Aboutmovies. S3000. GJDR. Mark alec. Saivenkat961921992.fullback.com. Dima1. Guy Harris. Alaibot. Bota47. Alvarez. FileAnt. Alphathon. Edcolins. K6ka.org/wiki/High_Speed_Packet_Access?oldid=671498519 Contributors: Ambrosen. Wirelessman. Sanoj1234. Jid~enwiki. Everyking. Imroy. InternetMeme. Chathurangawav. SieBot. Ehn. Hairy Dude. Comp. Darkov.9. Tex23. Skarkkai. Mkusk~enwiki. TheAMmollusc. Luckas-bot. Hadiyana. ChuispastonBot.R. Addbot. Krano. Rasho. Addbot. Peturrunar. Osarius. Joconnor. Kgizdov. Joycloete. Ammar Al Sarraj. GregorB. NortuRE. Semiwiki. Baloo rch. Ale jrb. Chobot. Download. Bearcat. LeaveSleaves. M0rphzone. RussBot. Jackerhack. Wvereeck. Weihao. Jmoz2989. Habbie. Fedandr. Davidlimcg23. Rcsheets. Karghazini. MMuzammils. GoLLoMboje. Viriditas. Nightwalker-87. TechBot. Derek R Bullamore. Nthep. Yobot. Darin-0. David Levy. Bigmantonyd. Eurolite x3. Noq. יונה בנדלאק. Michael Hardy. Bseker. Lisa Andersson. Stephenb. Jonth. Grspider. Mark Arsten. David Levy. Titodutta. Lightmouse. Alwin1403. Abdull. Xiphosurus. Hebrides. Pwairjae. Mogism. Mathiastck. Ffirmin. Bobblewik. AnomieBOT. Hadal. Anthony E. Mm11. Willking1979. Jmoz2989. Beej. InternetMeme. Pharaoh of the Wizards. Oli Filth.wikipedia. JulesH. LittleBenW. SuBWaReZ. Btilm. Jonaboff. robot. Rdschwarz. CecilWard. Jeremy Visser. Ceresta~enwiki. Tuankiet65. Boren. LukeFrmUttley. Dureo. Lightmouse. Profoss. Yyy. Comp.arch. Bovineone. Octahedron80. Kyng. Fuzheado. Echuck215. Frazzydee. Egil. Mandarax. Cydebot. Speer320. Magioladitis. Robbot. Alohawolf. Baqu11. Cody Cooper. Apecat. Lensovet. Liturahman. Jim. Jdperkins. Nibor. Drizzd~enwiki. Khazar. Mikelevin. Widr. AndreyKovalevsky. Yigitbilgin. Dawnseeker2000. Servel333. Lizmm. Happysailor. Slowking Man. FrenchChris. Lachatdelarue. TuxyQ. LeCire~enwiki. Ryu Kojiro. Jmeyer83. Ranjan shab. Shawnrouse. Lallolu. Nealmcb. Richmeister. Nishantchoudhary. Elimerl. Steve03Mills. Yobot. Narender2727. JimpsEd. PixelBot. Wutzofant. Bluebot. Fogelmania. Discospinster. Sitush. Goofrider. Topspin~enwiki. Nasula. Lotje. Wlodzimierz. Epicgenius. Tobenvontoben. Lonaowna. BOTarate. Cydebot. David Edgar. Eikoseidel. Raanoo. Sauralf. Smshaner. Pavelbd. Sprog. Gurch. Swya. PixelBot.:Ajvol:. Mathiastck. Ronark. Ruchira88. Doug Weller. Darkman007e. Zayani. Devourer09. Spyglasses. MoraSique. Dexbot. AvocatoBot. ShelfSkewed.arch. RedBot. Hymek. Cydebot. Danrha.. ChrisGualtieri. Atlant. Vegaswikian. Tannline. Snickerdo. DouglasCalvert. Materialscientist. Electron9. Tslocum. Kukabura. ReluctantPhilosopher. Lisa Andersson. EmausBot. Oli Filth.5G?oldid=672041425 Contributors: Radiojon. Intgr. Igiveinfo. Chris Caven. Msasi~enwiki. Blaisorblade. Supergloom. GregA. Luckas-bot. Rees11. E. Bsoft. Imcdnzl. Richard Kervin. Theopolisme. Kyng.org/wiki/W-CDMA_(UMTS)?oldid=668961311 Contributors: Jakub~enwiki. Sudeeprg. W8TVI. Helpful Pixie Bot. Aspects. J. 4th-otaku. TashTish. Versus22. Peppery9. Nasula. Matt Britt. Behzad. Get It. RibotBOT. Helix84. Bestcallumuk. Enzzot. Digitalimager. MystBot. Mediaba. Numbo3-bot. Echo R314. Pkruger. From That Show!. Crimson Vs Purple.chiu~enwiki. Shell Kinney. Ecwpa. Adnan bogi. Probell. Hypermax~enwiki. Termininja. Eleassar. ItchyDE~enwiki. Altaïr. Thelittlemouse. Shizhao.wikipedia. Adnan bogi. The Thing That Should Not Be. Σ. Antonypranata. Larre~enwiki. Robertyhn. Bbb2007. Alpha Quadrant. Dennis Valeev. Jupix.nassau. Jiing. Nisselua. Supaklailert. Marek69.lin. Klingoncowboy4. Mrschimpf. ZéroBot. Glloq. DumZiBoT. Sanmele. Bobo192. Ken Gallager. Friend4u. Mojodaddy. RedWolf. Lightmouse. Mojodaddy. MrCellular. Maurice Carbonaro. Ffirmin. Ejdzej. BroadBandAC. Mikel Ward. Ossguy. Espoo. Greg L. LaaknorBot. Austin. Addbot. Jawsper. Jpjust~enwiki. Indon. Lonniev. Mojodaddy. Phil websurfer@yahoo. JAnDbot. TXiKiBoT. TJRC. Djeradsofiane. Ademkader. Xoneca. ClueBot NG.anacondabot. Siddhant. Vfbp-geyf. Sosaited. Jorgeren. Mathiastck. Harryzilber. Kbrose. Fudoreaper. AND LICENSES 265 Zippo. Corsista1 and Anonymous: 7 • High Speed Packet Access Source: https://en. O mores. Cydebot. Tabletop. Alistair1978.org/wiki/Enhanced_Data_Rates_for_GSM_Evolution?oldid= 674419093 Contributors: Nate Silva. Saper. Mozzerati. Lzur. Armando. Seashorewiki. Pipeinformatico~enwiki. Phooto. Jpatokal. MystBot. BotKung. Unforgettableid. Bhamv. Ro2000. Spyglasses. Rdummarf. Alvin Seville. Kyng. Estoy Aquí. Froggey. Cfaerber. Cnwilliams. Timl. 6ii9. Deathtrap3000. Asix. Rohan Jayasekera. Adavidb. Agoode. Cfaerber. Chancheelam. Diamondland. Eskimbot. MartinBot. Nopetro. Akhilkrishna03. Cacophony. Zaian. David e cooper. Quadell. Uriber. Mcornelius. Bluebot. Fuzheado. Retroneo. Pmeth. Luckas-bot. Yobot. Shanmuga cit. Landroo. MrCellular. Youkseo. Robertojl. Saga City. Rjransijn. . Sqush101. SmackBot. Mukeshkamaliya. DumZiBoT. Dmoss. EmausBot. Helpful Pixie Bot. Omnipaedista. Sladen. Retroneo. Anthonywong. YurikBot. Mikefoo. Yakman66. Debresser. Acfrazier. KJPurscell. Mild Bill Hiccup. Danhash. NickShaforostoff. Rbaal. Nabber00. Kau mad. Brianski. Fortythree. Darin-0. Yonir. Charles Gaudette. Economist-83. Dawnseeker2000. Marudubshinki. Harbinary. Darkov. Jfinlayson. Addbot. Severo.farmand. Tooki. Engineerism. LilHelpa. SieBot. Yobot. LaaknorBot. Stephan Leeds. JohnTechnologist. Saad. Adnan bogi. Cmichael. Marek265. Bodosom. The RedBurn. Conquerist. Mac. Hampton11235 and Anonymous: 169 • W-CDMA (UMTS) Source: https://en.scream. Danda Panda. Creek23. Irwangatot. KL5it. EmausBot. ClueBot NG. MMuzammils. Nachoman-au. SQL. Chrisahn. FlaBot. Yasget. Jdthood. MacGod. LeviathinXII. Hukkinen. Loompyloompy313. Srl. Anna Frodesiak. EnTheMohammad. Ottawahitech. Abunet. Drh104. Atomsf. Chipaca. Addihockey10. Yuanyelele. MERC. Tuankiet65. Lvazquez. Wavelength. Khflottorp. Ecozeppelin. Slashme. Polpo. EdoDodo. A5b. Captain-n00dle. Sam8. Lyondif02. Omnipaedista. I dream of horses. Dicklyon. VoABot II. Bender235. Oli Filth. Jackerhack. Ramjar. Davidisom. Cvgs 0007. CarsracBot. Shinpah1. Norm. Sesu Prime. Enzo78~enwiki. Kmbsww. YurikBot. Dovid. MitchRandall and Anonymous: 46 • Constellation diagram Source: https://en. Ltwiki-bot. Hhan. Siddhant. Chrumps. Jim. Fratrep. Bobblewik. Bjankuloski06en~enwiki. Banej. Isidore. Berean Hunter. SpBot. Gail. SieBot. Scls19fr. Jasonauk. Wavelength. Dennis Bratland. JoshuaZ. Silvermane. Alejo2083. Roberts83. Splash. Ssd. Piels. Astronautics~enwiki. Тиверополник. Snori. MerlIwBot. Danh. Euryalus. SpikeJones. Tombomp. Jacooks. Spel-Punc-Gram. TutterMouse. VincentV.org/wiki/Digital_Enhanced_Cordless_ Telecommunications?oldid=671438227 Contributors: Bryan Derksen. VolkovBot. Traroth. Kb1koi. Learns visits aw. Pt. Brandon. RedBot. LoopZilla. Bobblewik. Seancdaug. Inkling. Phatom87. Eptin. Palopt. Roo72. MaxDel. Bot-Schafter. Qasdfdsaq. Mange01. Rjwilmsi. Andareed. ClueBot NG. Dff1~enwiki. Hephaestos. SimonEast. Abduljalil859. Addbot. Neøn. Shangri-l. Mange01.henderson. Cantalamessa. Radiojon. Alastairgbrown. Synchrite. Dexbot. Jd185152. ChenZhangYan and Anonymous: 396 • Spectral efficiency Source: https://en. Thumperward. Swhitehead. Yury Tarasievich. Plasmaroo. Wikiliki. TheKMan. RBBrittain. Stuffyvoid. BD2412. Wo. Skor. Djodjo~enwiki. Simard. BetacommandBot. Inzy. Video99. Dentalplanlisa. Beland. RHaworth. YurikBot. RussBot. Jamelan. Palmpilot900. The Anome. Whosasking. Moggie2002. Materialscientist. Rchandra. Robbot. Mandarax. Neale Monks. Rsrikanth05. Raohammad. Rich257. Darin-0. BlkMtn. Cerireid. Pmuschi. Andre Engels. Rspanton. Nil Einne. Rod57. Andypdavis. Nmnogueira. Thunderbird2. Stephan Leeds. Tshb. AlistairMcMillan. Warddr.henderson. ZéroBot. TheAMmollusc. Tyz. Doojsdad. MC10. EWikist. Armando. GoShow. Max613. ClueBot. Thijs!bot. DavidCary. Edcolins. BirdbrainedPhoenix. Legobot. Ww. Jemuel~enwiki. YurikBot. YurikBot. Wpjonathan. Wikiklrsc. Adamantios. Vanished user 8ij3r8jwefi. Barneca. Shadowjams. BD2412. Starszz. Ixfd64. Pb30. Maximus Rex. Woohookitty. Gaius Cornelius. Harryzilber.luren. AndersBot. KingOfSofa. ClueBot. Roboto de Ajvol. Tabletop.wikipedia. SLi. Karn. AntiVandalBot. YFdyh-bot. Mnmngb. KelleyCook. Imroy. Mathiastck. Pol098. DaHeik. Ligulem. Youssefsan. Email4mobile. Anand Karia. Rettetast. SNIyer12. Mikepenn. Esromneb. Radiojon. ChrisUK. MOBILE PHONE ACCESSORIES Mianusman39 and Anonymous: 502 • Phase-shift keying Source: https://en.anacondabot. Fleminra. W-sky. MER-C. Serrano24. Lironl. Esnible. Cfaerber. Wapxana. ClueBot NG. BigRiz.wikipedia. Ben-Zin~enwiki. Dgtsyb. King of Hearts. Alistair1978. FlaBot. Glrx. Anarchyson. Rwendland. Oli Filth. PeteVerdon. Joshgu. Wtmitchell. Living001. Ginsuloft. Mac. Hemanshu. CecilWard. Edward. Vegaswikian. Unforgettableid. BG19bot. Extraordinary. Braithwa.org/wiki/Phase-shift_keying?oldid=665308237 Contributors: CYD. Shinigami@wiki~enwiki. Ergosteur. Europrobe. Dawnseeker2000. John Broughton. Ericcc65. Shaw. That Guy. One-dimensional Tangent. Hadal. Anttipng. ClueBot. Requestion. Djg2006. Omegatron. Jeltz. Piano non troppo. Jim. Jason Quinn. DanielCD. Heron. Novldp. Robert Merkel. Wiml. Jamelan.bot. Pgan002. Oli Filth. MER-C. Pratyeka. Evilandi. Pelago. Ht1848. Iandiver. Vina-iwbot~enwiki. Atlant. PipepBot. Tolly4bolly. Manumg. Anetode. Bhawani Gautam. The Original Wildbear. Hqb. . Johntimering. Hgonzale. MC MasterChef.org/wiki/Spectral_efficiency?oldid=596889632 Contributors: Charles Matthews. Leszek Jańczuk. Cacophony. Pgan002. SassoBot. Chrisb802. Capricorn42. Fosnez. Inter. Conquerist. Alinja. Rajeshnawal. Eskimbot. TXiKiBoT. Arpingstone. Gioto. Liftarn. ST47. Hardikvasa. Dl2000. Radagast83. Abldvlpr. Memming. Cryptext. Svinodh. Mazer. DerHexer. Kf4yfd. Sudeeprg. Ricky lais. Mehwoot. N0YKG. R. Sfear. Addbot. Emvee~enwiki. Abc518. Omnipaedista. Just plain Bill. Azumanga1. Seaphoto. Vk2tds. Vipul. Pbook8989. Glenn. Hadiyana. Thijs!bot. Liftarn. Johnuniq. Jumbuck. Oli Filth. Seikku Kaita. CLW. Escarbot. Cenora. Gjivan. Dawnseeker2000. Acather96. Jonathanriddell. Karn. Depictionimage. Ol Spanky. Ohnoitsjamie. Requestion. Zorrobot. Trevor MacInnis. Zzedar. TripleF. Dhani. Wt8008. The Rambling Man. Leonardomio.org/wiki/Minimum-shift_keying?oldid=654433421 Contributors: The Anome.henderson. Georgeccampbell. Oli Filth. Sakurambo. SmackBot. Teaktl17. Karada. Hede2000. Thierry Bingen. Dysprosia. Prolog. Alejo2083. Cydebot. Conti. Antonski. Falkonry. Mahira75249. Gwern. Kingboyk. ChrisHibbert. Gaius Cornelius. SmackBot. EagleOne.wikipedia. Graeme Bartlett. Wtshymanski. Peterl. Xezbeth. Welsh. Arvinarya. From That Show!. MrWeeble. Dicklyon. Kvng. Adoniscik. McM. Sbisolo. XLinkBot. ClueBot NG. Lambiam. Carnildo. JackieTW. EnTheMohammad. Citation bot. Engineerism. Seikku Kaita. 4th guy. Wavelength. Dreadstar. Addbot. Scls19fr. Munford. Smsarmad. Mange01. Lensi. Jacobko. Yobot. Materialscientist. Nageh. Aninhumer. Squam. Tedernst. Mentifisto. Mike Rosoft. Mrtrandaithang. Crashmatrix. OlEnglish. FrescoBot. Rmz. KnowledgeOfSelf. Living001. Omnipaedista. LaurentianShield.wikipedia. Addbot. Fiberware. Magioladitis. Spondoolicks. LucienBOT. Gene Nygaard. CosineKitty. Wrs1864. INkubusse. Jeffrey Mall. Radagast83. Khr0n0s. Andrejj. Katieh5584. Discospinster. Vina-iwbot~enwiki. DavidCary. Qef. RobertBrook. WildBot. Ary29. AntiSpamBot. SmackBot. Shahzad11. Dcarriso. CosineKitty. Smalljim. DaedalusRaistlin. ClueBot NG. GrinBot~enwiki. Matt Whyndham. Hydrargyrum. Rezd. Yobot. Tommy2010. DavidCary. TobeBot. Jnavas. Monty Dickerson. Cburnett. Abhinavvaid. Glenn. Ksn.sahani. Luispic. Wik. Pateldivakar. Widr. Muhandes. Htaccess. Bryan Derksen. Rchandra. Frazzydee. Patrick. IGeMiNix. Skarebo. Sardanaphalus. Arthena.henderson. Gekritzl. Rswanca. Zycxm and Anonymous: 188 • Minimum-shift keying Source: https://en. LilHelpa. Charliearcuri. Tom Morris. BeSherman. Hashar. Willpo~enwiki. Richy. Sam8. *drew. Dtneilson. ALM scientist. Cydebot. Pemboid. Mange01. Conti. Defeatedfear. Ὁ οἶστρος. Tagishsimon. Hobotraveler. Nil Einne. DmitryKo. DumZiBoT.com. Spartan-James. NPalmius. Nwynder. Addbot.wikipedia. Kbdankbot. . Chandankuila.org/wiki/General_Packet_Radio_Service?oldid=674501789 Contributors: Rjstott. Pan Camel. DorganBot. Sjakkalle. ChrisUK. Baloo rch. SieBot. WikHead. Haffner. Jheiv. Longhair. Henrikholm. Cedars. Wiki contributor 21. Betacommand. Winged-stone. OrphanBot. Stuart Ward UK. Bensci54. AnomieBOT. Ahoerstemeier. DixonDBot. Rod57.wikipedia. ChrisGualtieri. Tooki. Fuzheado. GreyCat. Dicklyon. Dafocus. Hallje. David e cooper. Mozzerati. Plamka. Mitch Ames. Isheden. Brucevdk. EmausBot. Marudubshinki. The Thing That Should Not Be. Scottydog010. Josh Parris. Glenn. Luen. Billinghurst. It Is Me Here. MSheshera. Mac. JTN. Smhanov. WikiSysop2. Xedaf. Lacbil. Jklin. Ptbotgourou. Andros 1337. S. Gzkn. Intgr. Richardcraib. Angrytoast. SpaceFlight89.266 CHAPTER 56. Alphathon. Requestion. Aldie. Ksn. Rimshot. Vrenator. LaaknorBot. Reedy. Donreed. Mittosi. CompRhetoric. FrescoBot. Neonumbers. DHN-bot~enwiki. SilvonenBot. Canaima. Tawkerbot4. Саша Стефановић. Kittani. Fleminra. Kishore407 and Anonymous: 22 • General Packet Radio Service Source: https://en. Carre. Tshuva. Billylikeswikis. Lerdsuwa. NorsemanII. Sohaibafzal. Ptbotgourou. EwaDuan. Sakurambo. Stevehughes. Animum. RomanSpa. Numbo3-bot. Zaret. Evergreen9. Geek2003. PhilHibbs. FH 3. Glenn. JAnDbot. HamburgerRadio. Mir09. Grendelkhan. Shadowjams. Andrewrutherford. 2A4Fh56OSA. DoubleBlue. KSchutte. GoingBatty. Graham87. Mild Bill Hiccup. RobotE. Vanished user 1234567890. Leonardomio. Utuado. Bobblewik. DumZiBoT. Hu12. Dr. Rjwilmsi. Shadowjams. LeviathinXII. Rogerbrent. Jim. Thue. Obiwankenobi. Tex23. Robbot. Mhasabel. Bering. Fgnievinski. Michael Hardy. Michael Hardy. Lightmouse. Luckas-bot. Jim. 24alpha. Gaurav647. Max Naylor.org/wiki/Constellation_diagram?oldid=563822154 Contributors: Michael Hardy. Joseph Solis in Australia. SmackBot. Hohum. Gsmcoupe. SmackBot. Electron9. Johnleemk. Colmanian. One half 3544. HappyCamper. Thunderbird2. RCHenningsgard. KelleyCook. Karn. Tiggerjay. Welsh. BrianWilloughby. Nakon. Lacbil. Thine Antique Pen. Splash. Ring0. Mathuranathan. CynicalMe. BattyBot. Mojodaddy. Diannaa. Pmsyyz. Helpful Pixie Bot and Anonymous: 45 • Digital Enhanced Cordless Telecommunications Source: https://en. Gsmcoupe. Tommike125. Stinkinrich88. Stewartadcock. Fudoreaper. An Sealgair. Albedo. Nelson50. STBotD. Lantizia. 0x0077BE. CryptoDerk. Bazonka.delanoy. Jeff G. Ohnoitsjamie. Alexbot. Misza13. Flewis. BRUTE. Dolovis. Fluppy. Stan Carver II. Uceboyx. Yevgeniwebmaster. Li-sung. WiMAX Pro. Comfr. KYSoh. Jgombos. Burke Libbey. Rbatts2000. Canaima. Babomb. Gran knee. Nerfer. Samfreed. Wereon. Nikpapag. Yobot. ThunderGold. Mange01. you know?. Kippspan. Blastoboy1000. Camilo Sanchez. Joycloete. Etrigan. KitchM. Firefoxian. Alaniaris. Bill37212. Jlin. Preamt. Amayc. Stassats. Eskimbot. Sam8. Eugenian. Melody Concerto. Onorem. Moji13. Redthoreau. YurikBot. Xomm. Waggers. Shariqhussain. CmdrObot. Lungpool. ShaneRevlett. Abab99. Hollomis. Basangbur. JLaTondre. Monkbot. Chmyr. Is Mise. WiMAXPro. Jepuente. Lagoset. KGV. Ormeci. Jrleighton. Johnleemk. BattyBot. Protious. Wolfkeeper. Amn12. Vespristiano. PStrait. JasonTWL. Cyclotronwiki. StephanKetz. Dicklyon. ABACA. Mark999. JAnDbot. Darkov. DJ Craig. Hadlock. D a keldsen. Baysalc. Editore99. Andrewrp. Thingg. FF2010. Monaarora84. Baa. Thumperward. Markstar. Jenny MacKinnon. SieBot. Wedgeoli. ClueBot. JYBot. Almit39. Porttikivi. GraemeL. Zaingenius. Coolhandscot. רנדום. Gsarwa. Autumn Wind. Sabihshad. Louperibot. Nurg.lala. Radialink. Radon360. Willhsmit. JKofoed. Mild Bill Hiccup. Ingenieurmt. Mleggott. AllanEising.mccormick. Lightbot. Chris the speller. Metageek. Tagishsimon.. Haakon. Poettx. Strom.ashwell. Ww. SQL. TashTish. XLinkBot. ClueBot NG. Edward. Sjjupadhyay~enwiki. Jobinbasani. Greenpacket. Imroy. Fignamoya. Sfan00 IMG. Dspart. KVDP. Vasiľ. The Thing That Should Not Be. Moritz. 1Improver1. 28421u2232nfenfcenc. MartinBot. Cyzor. Mojodaddy.rodrigez. Glaucus. Pgk. Dgw. Legobot. Fvw. Patman1782. Jalal0. Liamklay14. BotMultichill. Hut 8. Mjm1964. Gary Cziko. Saxtonrob. Brtbendele.Cardenas.M. Seantrac. Emiliosic. Svgalbertian. Mboverload. Cokoli. Ice Ardor. DumZiBoT. Bantusdiego and Anonymous: 1352 • 5G Source: https://en. MMuzammils.wikipedia. Bappy04. Mypslim. Frap. Xwas. BigrTex. Kashmiri. Bobblewik. Helpful Pixie Bot. JimR. KirbyRandolf. Jim. Szlevi. Kevin143. Weihao. Mxn. Sureshraspayle. TheRealNightRider.H. Gabriel Kent. Matt0401. Lerdthenerd. Mutiny32. Grim23. Kiranwashindkar. Rob. Sharcho. Legolas558. Muftak. StaticVision. Albanerendk. John Cline. Sdekleva. Dkang. Obradovic Goran. Bachrach44. GcSwRhIc. Alexius08. R6144. Calltech. . LordAnubisBOT. Nbertram. Tom W. Kashmiri. Robert Skyhawk. Wk muriithi. Dictouray. Macfanatic. Threebytesfull. NorthCoastReader. Mets501. Epbr123.amitkumar. ScriitorulAnonim. Alirezanoorian. Trappist the monk. Blhole~enwiki. Chowbok. Viking59. Shiro jdn. BradBeattie. Sesoe.anacondabot. W Nowicki. AndrewBud. Bellagio99. TaBOT-zerem. Grafen. Boardtc. ChrisCork. Xiong Chiamiov. NukeofEarl. berus. ClueBot NG. Duncan23. Thanatos666. Mar4d. DePiep. R'n'B. TiroDeAethra. Txuspe. Qxz. Yosh3000. BrianWilloughby. Weinrobe. Spellcast. Optionweb. Garion96. Romanm. Sbmeirow. PrologFan. ThreeBlindMice. Nevin.5. Illdini. Poweroid. Xpxpsi. Southandros. Rhobite. DMacks. Ffirmin. DabMachine. Nuttycoconut. Kmolnar. Kensai. Squiggleslash. Bovineone. Oliversl. KevM. 1mujin22. Drunkenmonkey. Lightmouse. Asparagus. Jan1jan1. A. SeanMack.org/wiki/WiMAX?oldid=674900969 Contributors: Jimbo Wales. Excirial. Bhny. Chealer. Vikrant singh dadwal. WinTakeAll. A kornishev. MeirM. Numbo3-bot. Williamliew. Nasa-verve. Zaurus. Anthony717. Pgan002. R'n'B. Picassob. Greg 12000~enwiki. BBird. Stilwebm. Stephenb. AntiVandalBot. Midnightcomm. Algocu. Vegaswikian. Ultraman2008. VolkovBot. Shermaineliu. Robertvan1. Compfreak7. Ms 2007 Cn. Gnulinux. Resurgent insurgent. SieBot. Feureau. Cswilly. Novacatz. Chrisvls. CosineKitty. Elch Yenn. Nerwal.56. Squiggleslash. Daniel. LivingforHim. Spl. Monkeyman. Tslocum. Luckas-bot. Jeffq. Brianski. Wca08. Palash bco. KasparBot and Anonymous: 181 • WiMAX Source: https://en. JREL. Ctownsend1000. Hserightjr. Samuel Grant. AlnoktaBOT. Engineernm25. SmackBot. Palthainon. Kynetx. Closeapple. Capricorn42. ArnoldReinhold. Kmonet. Poetnk. DieSwartzPunkt. LMB. Kenyon. Mr flea. ErkinBatu. Winhunter. AND LICENSES 267 KTo288. TakuyaMurata. 28bot. Luna Santin. Versus22. EnTerr. V. Spencer. Coffeehouse scholar. Jfromcanada. Smitprakash. Bk0. Evice. Bugnot. Mandarax. Guoguo12. Arundpt. Sg gower. Osakanataro. AnomieBOT. SLi. Mrmshane. Berlo84. Paulrosenthal. . Maury Markowitz. Itai. Fakrul. Lonaowna. Dilane. Verbal. Kurtvonn. Phil Holmes. Filceolaire. Nasir1973. Aeons. Erpel13. Sleeper Service. Jarmo s. Alphaman. Jnavas. Jeftrokat. Folajimi. Psheld. Jaan513. Benjamin-ziebarth. Markdelaney. Ricardoramirezj~enwiki. Armando. Richagd.chiu~enwiki. Kozuch. Gbleem. Wizardist. Sae1962. AnnaPfeiffer. Greglutz. Chych. After Midnight. Aintneo~enwiki. AliveFreeHappy. Nv8200pa. Resoru. Gwydion The Quick. Alansohn. Jorvik. Walor. ShelfSkewed. Vishal Singhal. Hebrides. DorganBot. Skarthi wi. 90 Auto. Mike Rosoft. Dismas. Costoa. Tcncv. Sysiphe. Rockfang. Nycmstar. FlaBot. Makru. Toygunm. Jonverve. Cyprianio. Kntrabssi. Ahruman. Oliver Lineham. Jimthing. Noloop. Gdo01. JCWilson. Khazar. Nilfanion. Ktassin. Eric Wester. Callidior. MarsRover. Rod57. Morton. Ericatkin. Kimchi. Whyrlessguy. Cadsuane Melaidhrin. EmausBot. SmackBot. Umedard. HarisM. Andrewpmk. Phanimithra. FrescoBot. WikiU2013. Cwlq. Gataya. TXiKiBoT. Polluks. Oli Filth. Digital Brains. VoABot II. ZimZalaBim. Signalhead. Toytoy. Beland. MER-C. Jpgs. Extraordinary. Guy Harris. Mmsarfraz. ForeverLearner. Funandtrvl. JasonWoof. =toma=. Uucp. Fred the Oyster.. NeonLego. Ehn. SashatoBot. DmitryKo. Thorpe. Cyclonius. Closedmouth. EmausBot. Sega381. Hymek. Jordancpeterson. Jyril. Dbirdz. Notbonbon. Swellesley. Stephan Leeds. Clarkepmmis. Salavat. Slingbroadband. MC-CDMA. Mendel. IrishFBall32. Gaiacomm. Rjwilmsi. Excirial. RoyBoy. TeaDrinker. El930692. . A.henderson. Mac. Johntinker. Rettetast. Robomaeyhem. TUF-KAT. Attitude2000.. Rodhullandemu.9. Ahoerstemeier. Discospinster. MerlIwBot. Chasingsol. Interiot. MarkWahl. Spearhead. Bpantalone. Muhandes. Discospinster. Neonumbers. Backslash Forwardslash. Lokedhs. Bushing. Nopetro. Drvipinlalt. Naraht. Docanand. Jennypei.rodez. Raydex. Doedoejohn. JhsBot. QEDK. Oioisaveloy. Shattered. Luisosma. Edchakom. Addbot. Davodd. I am One of Many. Paulturner1981. Tawker. Warut. TEXT AND IMAGE SOURCES. Jondel. Roy. Plamka. Siroxo. ZéroBot.williams. Gloriamarie. ArthurBot. MajorVariola. Ipilon. Brownout. Danielcohn. Lesswire. Jsc83.broeren. Jforster. Searchme. Miguel.wikipedia. La Pianista. IanA. Dabystru~enwiki. K8la. Kumaramitabh. Jdcurtis.lin. Alasdair. B. Kf4bdy. Gjeremy. Auntof6. ShakataGaNai. CTownsend. SHCarter. Gablar. Nisselua. AdemarReis. Mat du Lac. Chrisedwards. Kvng. Povlhp. MrOllie. Kbrose. Dkondo. LittleBenW. Rubinbot. Andros 1337. Rfc1394. Mozzerati. Kk0071987. Giftlite. Chase me ladies. Codnchips. Ausinha. Lemnaminor. Lrz35. Umerqureshi. Skysmith. Biot. Acalamari. Cybercobra. Vipinhari. TerryAlex. Cpl Syx. Dougher. Shah andre. Booyabazooka. Vicenarian. Download. Agoode. PyreneesJIM. Thijs!bot. Wikiuser13. Kingpin13. Nanners14. Mlewis000. Frank Shearar. RjwilmsiBot. RadiantRay. Adoniscik. Bctwriter. Yeastbeast. Sunrise. SixSix. TastyPoutine. Sareini. Gilliam. Blandine01. Kurt Shaped Box. HalifaxRage. Mdmcginn.org/wiki/5G?oldid=674686971 Contributors: Michael Hardy. Soundpartners. NSR. Mustafaerg. Yobot. Margosbot~enwiki. Dead3y3. Ditesh. Rajeshsweb. G2g886. Mindmatrix. Adamfranco~enwiki. Gomi no sensei. JonHarder. Mistercow. Aaronproot. Kaiwen1. Xqbot. M8al. Tuxa. Mam711. Mxl. Muhandes. RedWolf. Mwolleben. Surajit. EEgirl18. Socerhed. Stamptrader. Chaitanya. Djmalik. C0nanPayne. Jerome Colombe. J00tel. UncleBubba. Cfoure. Gomm. Kvdveer. Junkyardsparkle. XAKxRUSx. DixonDBot. Ramiza Tasneem. Conquerist. Materialscientist. X1cygnus. TimmyDee. Yurigagarin1. Lordvolton. CONTRIBUTORS. Prasannadm.gupta08. ZeroJanvier. Baryn. Djmckee1. Maethordaer. Just zis Guy. Nneonneo. Gnassar. Charles Matthews. Govinda1pk. Mojodaddy. Zzuuzz. MER-C. Fresnel57. GoingBatty. PRRfan. Grillmaster423. Angela. Shadowaltar. John Lucas. Abismo02. Maurauth. Wtmitchell. Hgmyung. Fbkintanar. Alex43223. Cfeet77. Arthur Rubin. Abeijon. Ultraviolet777. Selah. Hydrargyrum. OldakQuill. Computerjoe. Steve03Mills. Kermit2.y. Dhkkim. JCO312. Ashu vns. WikitanvirBot. Aspensti. Douglas Mwangi. Mange01. Notmicro. JHP. Kbk. Dan Aquinas. Jovianeye. Drcwright. SD5. Ctownsend. Robert Cassidy. William Avery. Kkm010. THEN WHO WAS PHONE?. Spansign. Tabledhote. Ross Fraser. Reify-tech. Sesu Prime. Mrman208. AnomieBOT. Philip Trueman. Fleroudier. Djg2006. TarzanASG. Abaqus. Marcwbrooks. Abune. Atama. Wafulz. Oleg Alexandrov. Darin-0. Marck~enwiki. Redjar. Parsiferon. Brick Thrower. Vakaris. Stephenthornton. Jay Gatsby. Dawnseeker2000. Nijuabraham. Mhenriday. Gensanders. Thisisabore. 1ForTheMoney. C 1. Cecilyen. Hadiyana. Chaos386. Ashroney. Satellizer.sg. Helloflife. Chimin 07. Kvng. Kcordina. J. Dethme0w. JimRCarlson. Paul1337. Sheldon Rampton. SoxBot III. Woohookitty. Trlovejoy. HidariMigi. Drusse11. Captain Conundrum. AnonymousWikier. Fresheneesz. Alecs. Ethear. I'm the Cavalry. Rich Farmbrough. Meltonkt. Tyz. David Eppstein. JayW. Jjjjjjjjjj. VolkovBot. Edcolins. CL. Tompagenet. Najeeb. Luqi~enwiki. Romanski. Fudoreaper.. Marudubshinki. Someguy1221. Lightmouse. Smnc. Philip Trueman. MrCellular. MechMykl. LogicalFinance33. Can't sleep. TheComputerMan. DaMan92. Ptrlow. Dicklyon. Kanags. RedBot. Javert. Awesomeguy529. Chenopodiaceous. Jakeroot. SmackBot. Wst~enwiki. Solphusion~enwiki. Firetwuck. Lisa Andersson. ChadCloman. Mikel Ward. Blin22. Nodove. John of Reading. DrBoris1. Langthorne. JAnDbot. Tbleher. ZéroBot. Muhandes. Spotticus. Bobo192. Billinghurst. Rjwilmsi. Daniel. Robvanvee. Tomlzz1. Imthiyaz5g. Otrfan. Maury Markowitz. EXonyte. Fbiots. Mlewis000. Omegatron. Eric. Skunk44. Semiautomata. Armbrust. DASHBot. Jsung123. Protious. Jb 007clone. Yellowdesk. Zarano. AnomieBOT. Orgio89. Editore99. ZPhilp. Yobot. MB1972. TheHoax. Epicgenius. Mpelcat. The Anome. Goofrider. Jesse Viviano. Materialscientist. Doris Meier. Mojodaddy. Ranjithsutari. Lamro. Nasula. Escottf. Sunilkumargc. Rage against. Rjwilmsi. 3enix. Manunamboodiri. Civeel. Kakisgr. HTML2011. Cydebot. Jwrosenzweig. Muhdbunahmad. Isoman00. SFK2. Benignbala. Dariel 01. YurikBot. Tech2010. Fang Aili. Tedder. KevM. Cs-wolves. Ensconsed. Frenchwhale. Chobot. R'n'B. AnomieBOT. Balaji280283.kim. Bevo. Hijklmno. Svick. 5amsara~enwiki. Sanpitch. HaeB. Brendabum. Chaldor. OgreBot. Alimxd1. Rage. MystBot. Omnipaedista. Klilidiplomus. LovesMacs. Manop. LatitudeBot. Tamahome5555. Jamessungjin. Bnc319. Cydebot. KamikazeBot. DragonBot. Iansanderson. Phobie. Alexlock. Ohnoitsjamie. Epameinondas. Nisselua. Malcolma. Insertcleverphrasehere and Anonymous: 81 • 2G Source: https://en. Santiperez. Jeremy Wong. ChuispastonBot. Groogle. Ptbotgourou. Russell Freeman. Lonniev. JohnTechnologist. Vassyana. Engsoonhock. AlanUS. Albertcobo. Widr. Anna Frodesiak. AVarchaeologist. Diferens. Carolinamed. MOBILE PHONE ACCESSORIES WereSpielChequers. Jerodlycett. Seaphoto. Psigmon. Guy M. Alakh. Materialscientist.org/wiki/Virtual_retinal_display?oldid=670660286 Contributors: Zundark. ProtocolOH. Logan. LukeTheSpook. Mvadu.. Discospinster. Fraggle81. NotJackhorkheimer. AvocatoBot. Rustemas. Jni. Chris the speller. Conti. Kozuch. MMuzammils. Spetalnick. Cesoid. Alexkon. Vanamonde93. TigerShark. Utcursch. SidP. Byrialbot. Magioladitis. Chobot. Addbot. Mbehrns. Cydebot. Spiral5800. Jakec. Dipankar biswas. JHunterJ. Davipo. Swellesley. Wyn. RedBot. Tanthalas39. Bouteloua. Mills00013. St3vo. Ffirmin. Opt 05. ClueBot NG. Themfromspace. Fishbert. TrevorBriggsCook. Crazy crayon and Anonymous: 180 • Virtual retinal display Source: https://en. Shadowjams. AnomieBOT. Luckas-bot.2.wikipedia. Mindmatrix. Illegitimate Barrister. Smack. Infopaktel. SmackBot. Dalyswe. Jomondel. Chrislenhart. SmackBot. Mheart. Dario.. Fstorino~enwiki. Rupert baines. Jim. MrCellular. EmausBot. Luckasbot. Cactusman2. Sanpitch. Haeinous. QueueNut. Bernopedia. Bender235. Ben. Frappyjohn. Wksam. Secator. Diannaa.org/wiki/2G?oldid=674660974 Contributors: DavidWBrooks. CmdrObot. Cycloneopp. JWaters. Gerti W. TheFrog001. Mgloerich. DumZiBoT. Jonesey95.jai. The RedBurn. Davepape. Dcarriso. EmausBot. Eugenious monk. Camw. Rick7425. Yobot. Chris3145. Solphusion~enwiki. Maryhit. Arthur Rubin. TheAllSeeingEye. Waldir. BenFrantzDale. Dom1986. AsceticRose. Mwolleben.Cardenas. Amitnaik. Xqbot. Tommy~enwiki. Psatsankhya. Radiojon. TheBigZzz. David Haslam. Gsarwa. Ronz. Dremora. MichaelVernonDavis. Go2Null. Rmashhadi. Cheval55. Johnnyjagger. Luca Lategan. Kevinmon. Citation bot. Hadiyana. Antiqueight. Camobrien. Kbrose. The Transhumanist. Isheden. Voidxor. Gurrag. AlleborgoBot. Rezabot. Alexandre. Acroterion. Tedder. Acetotyce. Jimthing. DemocraticLuntz. Mojodaddy. JMiall. SpK. Toussaint. Excirial. Governor Jerjerrod. Konst1977.wikipedia. Royal misha. Supremedemency. HellDragon. KirbyRandolf. Vipl0ve. Bressen. GottaGoFast and Anonymous: 146 • LTE (telecommunication) Source: https://en. Saini613. JLaTondre. Prasad ark. Sandakelum. Robbot. MystBot. Wirelessgal. Gamester17. AnomieBOT. Chris01720. John of Reading. TinucherianBot II. Zhitelew. Snickerdo. Dngnta. Stefoun.. Uruiamme. Darin-0. Helpsome. ClueBot NG. Judgeking. Sni56996. Wikiborg. Hayesgm. Nightscream. Rashed-NJITWILL. Drvipinlalt. Ksn. Tony1. Doodlebug777. Adrianski. Phatom87. Nageh. Thijs!bot. Capstar12. Ajklein5211. Futureseer. ClueBot NG. DVdm. Eikoseidel. Famousdog. David Levy. ZacBowling. Jpat34721. Bentogoa. Rockingbeat. Dantasticmantastic. Alex1961. Gilliam. Ithakiboy. Lmendo.henderson. Wayfarer. Anna Frodesiak. Helpful Pixie Bot. Boffob. Arda Xi. WikitanvirBot. GregA. Daveespionage. Kyng. Iandiver. JoelLimberg. Lightbot. Suffusion of Yellow. Shizhao. Novusuna. Akshaygs. MC-CDMA. Kcipsirhc.tut. Wingman4l7. 22merlin. JaneStillman. Alansu. Chris gustafson. Tamersaadeh. Mcapdevila. Unbuttered Parsnip. Dlrohrer2003. Altaphon. Hasenburg. Chowbok. MaxHund. InternetMeme.wan. Oanjao. Edcolins. Cfeet77. SandStone. Jmgonzalez. Hmbr. Vernapp. Addbot. Newone. Helpful Pixie Bot. Bctwriter. Garthps2002. Tabletop. Masssly. Jonesey95. Amjadk. Brian2wood. Satellizer. TechWriterNJ. Ariel Pontes. Avamsik. Carson1968. Jayden54. Glenn. ArthurBot. Mortense. Guspaz. Vegaswikian. DylanW. Kotu Kubin. Mihitha.junior. Gilliam. Rich Farmbrough. Jlf~enwiki. Ejder. Bryanshook. Wrev. EleferenBot. Borgx. Vkgenjoy. Crati. SvenAERTS. IndianGeneralist. Joerasmussen. Havanafreestone. Vocaro. Pnk3-NJITWILL. Sajalkdas. Ebonelm. Wo. Thingg. Kaltros. Mogism. Lostart. Conquerist. Orionist. Ponydepression. Andrewman327. Wdfarmer. M2Ys4U.sabella. Elisabeth Hillman. 1983px. Flexar. Lemnaminor. Uvb~enwiki. Webclient101. Travidillo. Sridhar vasanth sri. Conti. Puffin. Oliyoung. Plastikspork. Deineka. Venge. Trappist the monk. Treekids. Nealmcb. Ninjagecko. Myscrnnm. MauritsBot. Mange01. RjwilmsiBot. Brotheryu. MMuzammils. Impala2009. RjwilmsiBot. Maximus Rex. GosiLomKj2. A. Toddst1. Fuelbottle.. Mean as custard. Hussainhssn. John from Idegon. Don4of4. Withemy. LiDaobing. Banus. Guy Harris. Muhandes. Basangbur. Kushal one. Suryaips. SkyMachine. Georgematewiki. Toowoomba. Eptin. Ehugne. Wtmitchell. Bjankuloski06en~enwiki. RLE64. Gabriel2008.arch. Koryosaram. Sanpitch. Mafmafmaf. Wiskica. Digitalcrowd. STBot. Jtxxtj. Setherson. Navwikiadroit. DXBari. Nasa-verve. . Adzad. Pekaje. VolkovBot. LittleWink. clown will eat me. RingtailedFox. TomoK12. Alexbot. Joconnor. J. J04n. Masssly. Marcelocantos. Muhandes. Ulric1313. Scrapking. CompRhetoric. The Quirky Kitty. C933103. Rettetast. Pratyya Ghosh. Grolltech. McGinnis. EmausBot. Nikpapag. Sfan00 IMG. Cliff. Encyclopedant. RP88. Arjayay. A yacout.268 CHAPTER 56. FT2. Andros 1337. Dewritech. Cleliasayswhat. Bbb2007. Sunflowermalta. Andrew G. Ptbotgourou. Julesd. Mblumber. AvocatoBot. Alansohn. Aytk. Paradoxian. Nabeelaslamkolassery. JaGa. Remind me never. Gscshoyru. Jackiecsq123. Jpatokal. BD2412. Bobbyblee. SpBot. CutOffTies. Mikaey. Ewalta. Miguelameida. InternetMeme. Tomi T Ahonen. Goingstuckey. Addbot. Dhkkim. Hillbillyholiday. Andros 1337. Addbot. Mafeu. Mindmatrix. ClueBot. Darrell Greenwood. EuroCarGT. BD2412. Sae1962. Buddy12345.bastug. Broadbot. EwaDuan. Paultt. Andreas. InternetMeme. TjBot. Afiler. Jesant13.beaudry. Virtualerian. Maikel. SilverSurfer477. Vadim Makarov. Letireur. Ftprinc. Someguyfromcrowd. Mikemoral. ABACA. Tamfang. Marv moskowitz. ICanAlwaysChangeThisLater. Charliearcuri. FrescoBot. ChuispastonBot. Gaius Cornelius. Nicknrm. Bssc81. Wordsmith. Materialscientist. Kjellmikal. Wow560. ChuispastonBot. Derek R Bullamore. C. Prashantlte. Barek. Stefan2. Biker Biker. Egmontaz. JefeMixtli. Daithibaru. Khazar. Dorsacato. Madiator. Nick in syd. AlleborgoBot. Envelopetracker. Tali. Soyguapa. MER-C. Flyer22. TRosenbaum. RA0808. Comediante. Jimthing. BG19bot. Frosty. Vladimirko. Mwanner. Etxkesa. JL-Bot. Vega702. Aintneo~enwiki. Xaltotun. Closedmouth. Reebsauce. Hulagutten. Gcfreeland. Alxsnc12. Metageek. Dawnseeker2000. Yobot. Acalamari. Adamr81. Cedars. Epicgenius. Oli Filth. Thayora. Lironl. Chmyr. Camilo Sanchez. XLinkBot. Nelson50. Alexm38. Fatphil. John Broughton. GoLLoMboje. Raamin. Mynetworks.amitkumar. Xqbot. VanishedUserABC. Милан Јелисавчић. Cuddlyable3. Shahzad. Utility Knife. Markalex. Xqbot. Siddhant. Jimys salonika. Ὁ οἶστρος. Domchi. AndreyKovalevsky. Demsiti. Tahir mq. Retroneo. Vishal Singhal. Josep1c.wikipedia. Zach Vega. Kartks. Scatter98.kagedal. Bshewmake. Louisarogers. Amirobot. Banej. RazrRekr201. Unyoyega. N0YKG. Alexander Chervov. Dagamer34. Egil. Piano1900. Comp. IRedRat. Jorny32. Intgr. Hajisamik. Dru of Id. Harryzilber. SJ Defender. Jeff G. Melody Lavender. Dwonak. Baloo rch. Eouw0o83hf. Tuxa. Mwaisberg. Mattew~enwiki. Ronraverivera. MrOllie. Rajivts. Ma Baker. Jakew. Malambis. 81120906713. Merf64. Jim1138. D Eaketts. Gh5046. BOTarate. H3llBot. Hgmyung. Jparker2589. Alvin-cs.luren. Iolaire. TGCP. Ipod3g. ClueBot. DmitryKo. Oknazevad. Yobot.kenobi. AvocatoBot. Denisutku. Naveenvrnew. Fudoreaper. Squiggleslash. XLinkBot. Elk Salmon. JustinRossi.org/wiki/LTE_(telecommunication)?oldid=674192135 Contributors: Damian Yerrick. Ashokec. BG19bot. Widr. Enkakad. Nageh. Lightmouse. Hamish59. Luckas-bot. Rockneedsasavior. Rhododendrites. Danindenver. TY-214. Sound-Mind. Materialscientist. EmausBot. Rahuloof. Ch Th Jo. Mrwojo. Schwijker. DynamoDegsy. ClueBot NG. Xoegki. Bazj. Redeagle688. BattyBot. Sriharid. Mange01. Jspaid. Worldicez. Nageh. Doco. BattyBot. Tbss42. Eskimbot. NuclearWarfare. Wizardman. Dougher. Bovineone. Seddon. Skr15081997. Dbiel. Marc Lacoste. Bpmeller. Ddoomdoom. XP1. Coinmanj. Wiki-ay. Thewikiguru1. Citidel. Natedawg1013. Anup peshne. EonLinE. CmdrObot. Robert K S. Zabbo. Tony1. MrCellular. Bloodholds. A n k u r. Marek69. Conti. Mazmohad. 6Anesthesia. Jamesx12345. TobeBot. Mcpatnaik. Mwolleben. Mortense. DHN-bot~enwiki. Mat-C.. Meewam. Riley Huntley. Mypslim. Spellcheck. Vegaswikian1. GrouchoBot. Faizannehal. Tedder. Ryper. Helpful Pixie Bot. Arunr. Skunk44. Ronraverivera. Katieh5584. Bearas. ClueBot. Mfaken. Muhandes. Guy Harris. CryptoDerk. Chris G. Rjwilmsi. VolkovBot. Sysiphe. Cfaerber. Jcsutton. Rjpaats. Daniel347x. Gimboid13. Koraiem. Malayalibuji. QueenCake. Gothgeek1. SlimJim. Brooklyndodger. InternetMeme. Fatboykim. . Matteoteo1234. Auric. Squids and Chips. Joseph Solis in Australia. ResidueOfDesign. Trevnerdio. Daveg1k. M. Citation bot. U-D13. Tesscass. Dewritech. Glenn. Craxyxarc. Thine Antique Pen. Spury98. Ollieinc. DASHBot. AltynAsyr. Mike16889. Eagleflo. Scopecreep. ClueBot NG. The Last Arietta. Tabletop. AnomieBOT. Batsonjay. Tbhotch. Flying9876. Rprpr. GeneralBelly. Gaius Cornelius. Ale jrb. Sasuke Sarutobi. Tjgould. B4hand. Manscher. VoABot II. Andryono. Feudonym. Shaggyjacobs. Vp734. Jmlk17. Tigger-oN. Lijunjie. Steve03Mills. Rcbarnes. Vlad. Wainstead. Oknazevad. Merlion444.barie. Rhaddon. A. Square87~enwiki. Madzyzome. Garamond Lethe. PL290. Ptbotgourou. Lightmouse.. TheGreyArea. Tony1. Scubafantic. Ritajefferson. Neko-chan. Noodles25. Katieh5584. Mattyw. Wser. Siddhant. Sirgrossgergeofficial. Campster68. Psatsankhya. AsceticRose. Ironholds. Superbomb17. Drkd3vil. Captain Assassin!. K6ka. OccamzRazor. Jmgonzalez. AndrejSpSk. Anna Frodesiak. CosmiCarl.henderson. Planetneutral. Armeria. Carbonoatom. Lorenrb. Plop. Rich Farmbrough. LMB.56. Idioma-bot. Symplectic Map. Nairobi123. Strike Eagle. Ajklein5211. Vchimpanzee. Abce2. BD2412. Suruena. AlbertC99.bastug. Tobias Bergemann. Spondoolicks. Sarg. Ringbang.me. Conquerist. Towel401. Aurynjaye. Dm8233. JefeMixtli. Tracer9999. ProprioMe OW and Anonymous: 592 • 4G Source: https://en. AL SAM. TheNewPhobia. FrankFlanagan. Coolbondin. Bazj. Boothy443. ChandlerMapBot. Mange01. Buddy12345. Against the current. Dan6hell66. Khr0n0s. Julesd. CanadianLinuxUser. Thumperward. Mihitha. Monkbot. Cattus. Yobot. Tyagi. BillyPreset. Jupter-manzana. Bluezy. Dcljr. J349. Maverick972. Mojodaddy. Rpt0. Apdreamland. DJ Bungi. Daniyal7871. ABACA. Canyouhearmenow. Malambis. Gene203. Lockoom. Nishkid64. Giftlite. Niklas a. Xavierchiang and Anonymous: 961 • IP Multimedia Subsystem Source: https://en. Jesse V. Jerryobject. Cannolis. Howsund. Miracle Pen. Scotth1. TonyRichards2. Izolight. Avenue X at Cicero. Niceguyedc. Mindmatrix. Ro2000. RA0808. B. NastalgicCam. Bobblewik. Mikemoral. Luckas-bot.. Rsrikanth05. Pappnese. Ijon. Toonmore. Aschauer. Alansohn. HMSSolent. Adavies42. Deepcruze. Ecemaml. Skapur. Oneiros. Poweroid. Stuffyvoid. Moilleadóir. Ejder. Jodosma. Synergy. Fraczek. SieBot. SpeedyGonsales. SaskatchewanSenator. Saimhe. Eken7. PPBlais. Lifeformnoho. Tsanth. Muttster. Chesterme. Yellowdesk. Jesant13. At. Two stripe. DSRH. Tomasohara. Davidtunderthesea. Gilo1969. Benandorsqueaks. Louis King . Davandron. Hrushikesh. Ssamanta6112. Rajeshontheweb. Gerixau. Deb2569. Bridgeplayer. SHCarter. Debadeba. Materialscientist. Polydeuces. Aniruddh88. Dev7229.junior. Frencheigh. JLaTondre. Enviroboy. Edward. M gol. Ne0Freedom. Thorwald. ARSH4D.m. Bete. Tsx11. CrookedAsterisk. HighTechGeek.ghosh. Andy Dingley. Justinbb. Shadowjams. Coogeeboy. Editore99. 1234567890ABCDEFG. Konstantin Kosachev. Lcmortensen. Debpratim. Degdol. Flinx. Louepower. Vchava. Nick Number. Brandon. Rps5. Abdullais4u. Nirion. Jeysaba. John of Reading. Piano non troppo. Jchap1590. D'ohBot. DasBub. JamesHaigh. Mushin. Ceros. AND LICENSES 269 JaconaFrere. Alphathon. ABACA. Alexandru Stanoi. Carmichael. YurikBot. Joconnor.niko. Pratyya Ghosh. Toby. FT2. MSBadrajith. Weijiangbei. Baryn. DJ Bungi. Raza514. Mjrichardson1. Kenshinflyer. Cometstyles. Flyer22. Mikel Ward. BG19bot. DOI bot. Nisselua.visu. Mtking. Vfhouse. Reebsauce. Edcolins. Dthomsen8. Siddhartha 90. Accenture Trivergence. Musabbir Islam. Glacialfox. Naeemirza. Redrose64. Bmhcjs. Alexander93nj. Mogism. Scatter98. LilHelpa. Merovingian. Thomas Blomberg. Satbir13. Ukexpat. Joy2035. C628. Ronbo76. Pinkadelica. Lbparker40. Manop. Pddu78000. Donperfectodewiki. Patprasert. Teemu Ruskeepää. Denisarona. HeffeQue. The Extremist. Wargamer. Java1245. Np76-NJITWILL. TEXT AND IMAGE SOURCES. Faizan. M4tth3wg.wikipedia. Verdatum. TheMagikCow. Markc113. Ettrig.Edits for Everyone.kim. NapoliRoma. Cristapone. BigJolly9. Alerante. Pseudonym. Dale Arnett. Melcous. Ngsayjoe. Sanpitch. D-Notice. Bigdaddybangbang. Quota. TheAllSeeingEye. 4gphonedude.Discovery Won. Ilyushka88. Back ache.mau. Cacophony. Steelerdon. Tnguye58. Thue. Arjayay. NoobishSVK. Madkayaker. Recognizance. Tjwoods. JanCeuleers. Gmplr831. Phy1729. Tiddly Tom. LCS check. Isj-wikipedia. Amconners. Mushroom9. Cluth. Amitnaik. Moocha. Sanjay250. Hallows AG. CesarB. Rupaheli. Bentogoa. SmackBot. Blasedef. DocWatson42. Suvrakanti. PKT. SmackBot. Matt tw. Alex43223. Citation bot 1.hawkins. SwisterTwister. Ronz. Ben Ben. Ronark. Starpchack. Noq. Czarkoff. Sandakelum. MER-C. Damianvila. Mfhulskemper. Bevo. Hipgnostic. Retroneo. Rajanib. FrescoBot. Mcapdevila. Witit. Ramchandra555. Midnight Comet. Jeffhall318. Beland. Wikid77. Cmlau. Turbo852. Rrc916. Asten77. ZayZayEM. Mitchell100. Cirne. Spuriousvarlot. Anomie. J. Netjeff. DoriSmith. I am One of Many.org/wiki/4G?oldid=674888077 Contributors: The Anome. Wcam. OussDB. A-Ge0. Epbr123. Addbot. Yosh3000. Qaywsxedc. FivePillarPurist. Bluemoose. Thingg. Download. Drizzd~enwiki. Widr. KreatorSveta. Bobblewik. Dimaf. Josh Parris. Falcon8765. Varlaam. Rjwilmsi. Benlisquare. Stamptrader. Bonadea. Uruiamme. Adieqwener. Bazonka. Tdangkhoa. Contact. Nalinking. Thunderbird2. Lights. RJFJR. Dalillama. Wyn. N3c. Dittaeva. SilvonenBot. Coffee&tv. Tbird20d. Triddle. Rafacvo. Gebjon. Stephenb. Michael Hardy. Robaston. Pastudan. Sysiphe. Cammello03. Arthur chos. Tiptoety. Fearstreetsaga. Andrewpmk. Suffusion of Yellow. W Nowicki. Insert Bill Here. Gilliam. Isheden. Matthellyeah. Thijs!bot. Yohanes. AntiVandalBot. MrChupon.wikipedia. Math Champion. Discospinster. Dawnseeker2000. ArwinJ. Mboverload. Senjuto. Renffeh. Joaquin008. FanHabbo. Widefox. Tiscando. Khazar2.9. Andros 1337. Cheung1303. Tyler. HisanKazamaru. FlaBot. Benson 26. Fatal!ty. Cnwilliams. WikitanvirBot. Sensori. Dave420. Nameless9123. MartinBot. Bota47. CaribDigita. Yahia. HighKing. Madlink. Jpatokal. JonHarder. Retran. Yintan. Tomi T Ahonen. Delldot. Lenin1991. Nono64. Aytk. IceBlade710. Velella. Bongwarrior. . MMuzammils. Minimac. Cuahl. True Tech Talk Time. Cryptchrysaetos. FreakyDaGeeky14. Bruce78. Bgwhite. Edcolins. Ehn. EdBever. Jpcg. Chenopodiaceous. Ffirmin. Flyingidiot. Robertomouracar4melo. K1812. Armando. Alexius08.arch. OutlawStar6891. Bzinimho.Talal. Telecomwiz. Plastikspork. Bobo192. Conscious. Suyash Sagar Bajpai. SoledadKabocha. Nurg. PDFbot. Prolineserver. Calmer Waters. L Kensington. Dalm. Squiggleslash. Donner60. Vegaswikian. RussBot. Mobit. Wanishahrukh. Xqbot. MastiBot. Trakon. Bender235. JohnOhman. Theopolisme. Vikibilim. Nua eire. Trusilver. Hebrides. Colonies Chris. Rangoon11. Asqueella. CONTRIBUTORS. Robbot. Sandrabf. Legobot II. Hu12. GoShow.. Frankchn. FrummerThanThou. Billsunny. Ellistev. Cntras. The Herald. Eikoseidel. Wayne Slam. Simon Beavis. Snowboard975. Bobbyring96. DragonBot. Sindhoor preeetham. Bhwang24. Ohnoitsjamie. Jak123. Jrockley. Dbenbenn.org/wiki/IP_Multimedia_Subsystem?oldid=660736520 Contributors: The Anome. Radiant!. Jcarroll. Prattflora~enwiki. Fuzheado. Accord. Mirfanmaqsood. Henryparachutegale. Dingar. DarrylJH. Jusdafax. Charles Gaudette. Geniac. Paisley Liverpool. Mojo Hand. Jim.mohanty. Danielyoung88. Murry1975. Ariconte. John254. PipepBot. Layer~enwiki.marcin. RjwilmsiBot. Siddhant.thehotcorner. Msmolnikar. YJAX. Axl. Jtxxtj. Dolescum. Ginsengbomb. Digitalcrowd. Versus22. Alexandre Gouraud. Bigint. Bluebot. Kgfleischmann. Jamesooders. Comp. Nasa-verve. Dave Bowman . Aunva6. Nirinsanity. Dmarquard. Rojypala. Pgan002. Gilliam. Jimthing. Tidywave. Muhaidib. Koavf.e. Indubitably. Hadiyana. Jaychan00. Resad-9. Utcursch. Mxn. Steel. Jkae94. Jamessungjin. Petri Krohn. Pmlnlahore. I dream of horses. Gomoker. Spinningspark. Opelio. KamikazeBot. Topperfalkon. Reatlas. Enkakad. M4gnum0n. Etxrge. Taonix. Coralmizu. Riyantojayadi. Mihir Pandey. Angrytoast. Sligocki. Wikisire.delanoy. Consider42. Rickjpelleg. Wikied~enwiki. Jeff G. Alexidh. CardinalDan. Rebeccafong. JDCMAN. LeilaniLad. Ashah73. Nfvs. Emandrawkcab. Sathish. SporkBot. Ground Zero. Mithaca. GallaghersGreek. Frap. Bbb2007. Gilderien. Jamesrules90. Gulmammad. MaxPont. Optimale. BanRay. CoolGin. Technoblitz. WillhenIII. Wikiuser13. User 30860135. Zmding. Mysticfish. Grmike. CarbonUnit. Veinor. Darin-0. Monaarora84. Cydebot. Pichote. Willking1979. RealLeo. XLinkBot. Woohookitty. Muhandes. GeneralBelly. Kbdankbot. Luckas-bot. Discretix. Hairy Dude. Rushton2010. Conti. Dpv. Tim Pritlove. Robbot. Tomi T Ahonen. Garion96. Jamelan. Jpatokal. Marius~enwiki. BetacommandBot. Radiant!. FrescoBot. Jpatokal. Ims guy. Triddle. Grunt. Chrisf8657. Zagothal. Sauralf. XLinkBot. Kauczuk. Tomi T Ahonen. Arvindverma77.org/wiki/IS-95?oldid=673558326 Contributors: CesarB. Onel5969. West Brom 4ever. Zirion~enwiki. Dan100. Andros 1337. Kozuch. Yobot. Crissov. Guy Harris. Makru. Securiger. Uzume. Nkcmt. AGuerrieri. ClueBot NG. SmackBot. Mathiastck. Mircea paciu. Joaopaulo1511. BoLingua. Flyer22. Stemonitis. Maximus Rex. JackieBot. Owt. Ghakko. Celltick. Chmyr. Longhair. Marudubshinki. Intgr. 3GPP guru. Broccoli. TXiKiBoT. Bilorv. Crimsonedge34. Epugachev. Mblumber. Paul1337. BOTarate. Nisselua. Brian2wood. Verdatum. RHaworth. Jakub~enwiki. Wrs1864. Espoo. Fudoreaper. Rizwan bhawra. ChuispastonBot. Ecbf and Anonymous: 275 • Service layer Source: https://en. VoxLuna. Jewel96. R'n'B. Yosh3000. Towel401. Ren0. Youssefsan. Harryzilber. N0YKG. Wk muriithi. EmausBot. Pgan002. Dale Arnett. Gentleben8282. Pkbeaumont. Leedryburgh. StigBot. Beland. AntiVandalBot.org/wiki/Open_Mobile_Alliance?oldid=659069904 Contributors: The Anome. Cdc.org/wiki/CDMA2000?oldid=666812912 Contributors: NuclearWinner. Tide rolls. D6. DmitryKo. Ksn. Cfaerber. McSly. ClueBot. Dgtsyb. Vrenator. Phatom87. Ghewgill. 1ForTheMoney. Gaius Cornelius. Kbdankbot. Wikalicious. Jaxl. Cacophony. Ksmetana. Ilia Kr. RobyWayne. Coolestguru. Porttikivi. Golbez. Richietjpr. N0YKG. Ulf Abrahamsson~enwiki. DexDor. Guy Harris. Kinema. Harryzilber. Khazar2 and Anonymous: 52 • CDMA2000 Source: https://en. Rl. Pausch. Cn2000. Subviking. EmausBot. Vlad. Woohookitty. YUL89YYZ. Niceguyedc. Ha runner. Alohawolf.org/wiki/Telecoms_%26_ Internet_converged_Services_%26_Protocols_for_Advanced_Networks?oldid=541109490 Contributors: Pgan002. Armstrongsoo. Mike Schwartz. Sladen. Mihhkel. FaTony. Fuzheado. Eurolite x3. Sassospicco. Cydebot. Ejflores. Sarg. Barkeep. Varkonyib. Techtoucian. Lagoset. Samarkham. Widr. Mindmatrix. Vernon. Vingarzan. Wbm1058 and Anonymous: 1 • Open Mobile Alliance Source: https://en. Smileglance. Karn. Joneslee319. Jpgordon.. Lappkast. GoingBatty. Asankakr. Petri Krohn. StradivariusTV. LilHelpa. RibotBOT. Yobot. Saksham. Forage. Hadal. Preslethe. Email4mobile. Addbot. . Jesus. KJRehberg. Helpful Pixie Bot. DogGunn. Rdschwarz. IMSoP. Henri de Solages. Compozer. Dgtsyb. WouterBot. Kjboyleii. Baloo rch. Samthemander. ZéroBot.org/wiki/Service_layer?oldid=607028324 Contributors: Lockley. FrescoBot. TonyW. Calltech. MCBastos. Ercraig2. Lesswire. Ablabla459. Wikiborg. Addbot. Chester Markel. Harryzilber. Monedula. Dillard421. Kennethmac2000. Sakimori. Bibaza. Liftarn. RAMChYLD. Johnuniq. CrZTgR. Bluezy. Ke6jjj. CmdrObot. Cnwilliams. Dianafoi. Siddhant. Aughtandzero. Spilton. Elume. Fraggle81. Umbrau44. Helixblue.org/wiki/Universal_Mobile_Telecommunications_System? oldid=674390124 Contributors: Damian Yerrick. JonHarder. Jhdaly. Rei-bot. Kanardzilla. Nedlowe. SteveW. FlaBot.. Djordjes. RedWolf. Towel401. Goofrider. Rjairam. Dudyk al. Pan Camel. Diarmuidmallon. Kensai. Bookandcoffee. Phil Holmes. Ffirmin. Comp. France3470. SimonInns. JustinRossi. Brianga.pole.anacondabot. ClueBot. Christopherwoods. Dinamik-bot. Rita2008. Haruyasha. Thierryc. Beej. Siddhant. Mojodaddy. Addbot. Gilliam. DylanW. Pparco and Anonymous: 286 • IS-95 Source: https://en. Nk. Cluth. AnomieBOT. Bobblewik. Centrx. SmackBot. InternetMeme. Bluezy. Tobias Conradi. Drjmb. Bobblewik. Thijs!bot. Thomas Ludwig. Qst. Vespristiano. DKEdwards. JanCeuleers. Swid. Jeff Wheeler. RFerreira. Kyng. Beland. Bsoft. VoABot II.szabo. Lightbot. Engineerism. VoxLuna.wikipedia. Bluezy. Devourer09. Xxxccc. Sasuke Sarutobi. EmausBot. Wdwd. Mpeylo. Protean. Aintneo~enwiki. DrilBot. Fudoreaper. MOBILE PHONE ACCESSORIES DylanW. TJJFV. Σ. Nowa. Addbot. Jonverve. Unforgettableid. Kineto ss. Delan006. FrescoBot. LeviStrauss. Shanes. Kooky.wikipedia. FrescoBot. Likri. Niceguyedc. Asankakr. John Chamberlain. The Fifth Horseman. Vadivelji. Antoniogartime ule. Markjeff. Daniel C. The Anome. Hardikvasa. Jesse Viviano.D. Joviman. MastiBot. Zigger. Twasono. Jay-Sebastos. Bdragon. Dwonak. John of Reading. LeaveSleaves. Sewebster. K6ka. Jmoz2989. Ahaapaka. Debot~enwiki. Crystallina. Asqueella. Kbdankbot. Kvng. Glossologist. Omegatron. Ohnoitsjamie. Cek. Michael Hardy. DropDeadGorgias. TheTito. SkyWalker. Mattiasw. Luckas-bot. Petiatil. Alex. Intgr. Yobot. Mogism. Jarrodchambers. Varnav. Woohookitty. Mojodaddy. Bertra g. Rstonehouse. Malcohol. Chobot. PhilHibbs. Stephan Leeds. Andros 1337. ArnoldReinhold. Nisselua. Compfreak7. Jackcall. Breno. Stickee. Toreau. Cipz. Fragglet. Jpatokal. W. Tfine80. Cfailde. Imroy. Edcolins. Jeff G. David Johnson. ASG123. Osayi. Squiggleslash. Mindmatrix. Nikkaro. CitationCleanerBot. YurikBot. Dw2cco. Docu. MichaelWheeley. Bunnyhop11. Epolk. Mozzerati. WPinNYC. Gmmour.wikipedia. Armando. Khalid hassani. Travisyoung. Carre. Skyfire. FlaBot. Legobot II. Anomalocaris. Armando. Apoc2400. Andy Dingley. Diana cionoiu. Zoicon5. Snickerdo. Vegaswikian. Deville. Martarius. Bobblewik. Crazytales. Picapica. Johnuniq. Tagishsimon. Wamatt. JL-Bot. WriterHound. Santryl.wikipedia. Shankarcps. Beland. Dimikaz. Discospinster. Joel7687. SimonInns. Blither. Mojodaddy. Bovineone. Idioma-bot. Omegatron. Chronulator. MMuzammils. Edcolins. Cmgross. Dburhans. Jtact. TacoJim. DmitTrix. Jabz10. Maurreen. Icairns. Tasmanian Angel. Vespristiano. Addbot. DekuDekuplex. Jivecat. DuncanHill. Frap. BebelA4. Mysterioususer. Lproven. HHubi and Anonymous: 88 • Universal Mobile Telecommunications System Source: https://en. Chobot. Iandiver. Vances. R'n'B. Balance500.thomas. ClueBot NG. Firsfron. Stefankroon. Bercenicity. Ario28. YurikBot. Sst01. Eventhelix. Andros 1337. KnightRider~enwiki. Mandarax. Nyttend. Bgurg. Soumyasch. Kphua. Ffirmin and Anonymous: 22 • GSM services Source: https://en. Econgiu. . Mailer diablo. Jmdwp. XLinkBot. Jonverve. Rubinbot. Nicolaiplum. Requestion. Pdelong. Imcdnzl. Danthemankhan. McM. RSStockdale. D p hieu. Andros 1337. Ceyockey. SmackBot. Mojodaddy.wikipedia. Mr. Modster. Addbot. Oliver Lineham.atkins. MrOllie. Mathiastck. Rillian. AlistairMcMillan. Gkansal. Jensbn. Rait.wikipedia. Brentdax. Busyanuj. Arbitrarily0.. Tokosk16. Trialsanderrors. Bodulo~enwiki.wikipedia. Richard Kervin. CaribDigita. Kozuch. Jnavas. Espoo. EmausBot. Samuel~enwiki. Rohini. Calum MacÙisdean. Everyking. Hadal. Kbrose. Brons. Gbeeker. Mathiastck. Editore99. Thunderbird2. Jommike. Enfors. WCroslan. Citation bot. Guppie. Azurepalm. Cydebot. Ontist.munozb. Rdschwarz. Petri Krohn. Jusjih. JLaTondre. SimonArlott. Sureshchitturi. Goofrider. Gdn. Supaklailert. Alny. Adaryanto~enwiki. Jim. Addbot. David Hedlund.P. Sietse Snel. Abdull. RoyBoy. CesarB. Dziban303. Bluezy.org/wiki/GSM_services?oldid=657522559 Contributors: Zoicon5. ChrisUK. Stephan Leeds. Voidxor. SmackBot. THEN WHO WAS PHONE?. Materialscientist. Pearle. Rait. Wirelesspont. Wikiliki. VolkovBot. Fiftytwo thirty. Ginosbot. Shashank Reddy. Guy Harris. Mozzerati. FlaBot. Btilm. Iandiver. KJRehberg. Luckas-bot. Mange01. Jasonb. Algocu. Fuzheado. Primawan. I don't remember my username. Compfreak7. John of Reading. Yobot. MChesterMC. Moe Epsilon. Probell. Vishyvoice. BigFatBuddha. Maartsen. Gene. Markalex. Dulciana. Isnow. Markalex. SmackBot. CmdrObot. Bluemoose. Ka9q. Mckoss. NotJackhorkheimer. BattyBot. Canopus49. Maimone. Snigbrook. Thijs!bot. BD2412. Hongooi. Lkt1126. YurikBot. Ryanrs. Armando. Orioane. Cmdrjameson. Rjstott. Axylight. Matthi2. Tmaufer. Auntof6. Kozuch. DabMachine. Ksn. Hu12. Beetstra. Zigger. Zagothal. Wknight94. Musically ut. Bearcat.liu~enwiki. Invenio. Stachelfisch. Betacommand. Maximaximax. Sepia tone. DylanW. Elimerl. Kgfleischmann. Philggg. Rohan Jayasekera. Cacophony. Tahir mq. Gmatsuda. Jamelan. R'n'B. Jamie. James. Fuzheado. Zygmunt lozinski. Noisy.henderson.bot. Trachten.arch. Netjeff. Sesse. Karvendhan. STBot. Mlaffs. Ylva Hubatsa. Compfreak7. Chengli. Tilgon. Sega381. Vclaw. Bobo192. Kbrose. R'n'B. Jdavidb. Tyler. Mikefzhu. DancingMan. Deineka. Gpvos. Prouzet. BG19bot. John Aronsson. Mapet~enwiki. Dianafusion and Anonymous: 34 • Telecoms & Internet converged Services & Protocols for Advanced Networks Source: https://en. Mac. Danwarne. InternetMeme. Cydebot.270 CHAPTER 56. Mange01. MagicBanana. AllyUnion. Salsa Shark. Marvinglenn. Pascal666. Hylaride. CmdrObot. Avik pram. AAAAA. Omiazad. Alexbot. The Haunted Angel. Ruchira. Ghettoblaster. Mgarlop. VQuakr. SmackBot. Feathers. Wildrider99. Timeineurope. Admrboltz. Thumperward. Jax 0677. West London Dweller. Nath85. Mac. Kevin Dorner. HEAD ON APPLY DIRECTLY TO THE FOREHEAD. Hu12. OrphanBot. LrdChaos. Mange01. Innv. Mojodaddy. Lkinkade. Omnipaedista. Cydho. Matt croxson. Jhansonxi. Nixdorf. TobeBot. Hedonologist. Joy. Rjwilmsi. Themfromspace. Spinningspark. FlaBot. Huw Powell. InfernalPanda. Nielchiano. Pingveno. DrSeehas. Andrewman327. Guanabot. Mathiastck. NawlinWiki. A Man In Black. JBFrenchhorn. Porttikivi. Dcljr. Satbuff. Radiojon. Katherine. Addbot. Egil. Boffy b. Dasune. JonHarder. David Jordan. Draco flavus. Acharya 87. Epastore. JustAGal. Luckas-bot. Sergioag. Yulu. EJDyksen. AnomieBOT. Nakedcellist. Niceguyedc. BetacommandBot. Rhobite. Msileinad. Bovineone. Nmulder. Escape Orbit. BIL. Chobot. Peterl. Viakenny. SkylineEvo. Haabet. Alohawolf. MMuzammils. Trusilver. J~enwiki. Vkem~enwiki. Patrick. Zeerak88. Diego Moya. CambridgeBayWeather. Tri400. Harryzilber. LuoShengli. Dog 65. Rubinbot. Homer. Oknazevad. Mgaved. Snip3rM00n. Harmil. Michael Hardy. Nate Silva. DagnyB. Squiggleslash. Darin-0. Riki. Kyle. Jhonan. BigHairRef. Sleske. Bencmq. Kyle the bot. Omicronpersei8. Broadbot. Intothemiddle. GNU4eva. RedSpruce. Whkoh. Danny. PixelBot. Chrismiceli. Andrewpmk. Saltine. Jeffss. Broadbot. Omegatron. SashatoBot. Cavort. Magioladitis. XGrape. GraemeL. Basem. Cmdrjameson. Rdschwarz. Ronz. Addbot. Hydrox. Fhontoy. DStoykov. Imroy. Giftlite. Vegaswikian. Oxymoron83. Tsaitgaist. David Levy. KazekageTR. DrJolo. Lightmouse. AlistairMcMillan. BotKung. Byeee. Klisanor. Giraffedata. Peter Shearan. KJRehberg. Scottperry. Arkrishna. Nil Einne. Andrewpayneaqa. Kjabbe. Magioladitis. Planetneutral. Toyoda. EmausBot. Widr. Rusmr1. Medconn. Rich Farmbrough. Mean as custard. Polpo. Henrik.org/wiki/Satellite_phone?oldid=673937261 Contributors: Robert Merkel. WayKurat. Muhandes. Hcheney. OfFire. AlleborgoBot. Spiral5800. DylanW. Miaow Miaow. Isaac Rabinovitch. Jakupju. JBsupreme. MMuzammils. Bobblewik. Toussaint. Cool Hand Luke. Yubal. MOThistory. Vary. Qui1che. Wyn. PseudoSudo. Velella. Richmeister. Mojodaddy. Amelshabrawy. Knuckleskin. Jondel. Kbdank71. SN74LS00. Meehawl. Dgtsyb. Wikicuentaus and Anonymous: 176 • Satellite phone Source: https://en. Xp54321. D'ohBot. TimSE. Yabbakazoo. Tcolgan001. Armando. Evan Robidoux. Helpsome.kim.wikipedia. Prasad ark. Grafen. MureninC. . CatherineMunro. Morgan Phoenix. WuBot. Henrik46. DmitTrix. Jmgonzalez. Petri Krohn. CommonsDelinker. Rafael. Gilliam. Skatebiker. Gwernol. EmausBot. Lizmm. MI canuck. Scaredpoet. Vegaswikian. IvanLanin. OlEnglish.wikipedia. Davandron. Ahoerstemeier. ClueBot. Jmnbatista. Securiger. Cslibby. CmdrObot. ChrisUK. Betty456.sp~enwiki. Abune. Gregoire23. OS2Warp. Skapur. Bouteloua. JoeOnSunset. John of Reading. Chillllls. AVM. Kgrr.56. SassoBot. Parrot of Doom. DylanW. Dale Arnett. NotMuchToSay.غامدي. Corpx. ArglebargleIV. Junkyardsparkle. Krawi. Bgwhite. Dj stone. Polarscribe. Speer320. Greatpouya2. Nneonneo. Petiatil. Agentbla. Q43. Krich. Riadlem. Fredrik. TEXT AND IMAGE SOURCES. DKSalazar. Jonsaad. Stw. Fennec. Materialscientist. Jupix. Meelar. 97198. ClueBot. Bearcat. MrChrome. AndreNatas. Puffin. Koavf. Cmh044.bot. CmdrObot. N0YKG. Sajalkdas. Alf Boggis. ZimZalaBim. Nealmcb. Zquack. Dcxf. Mike Rosoft. Cmpoel. Mark Kim. Bengl. GraemeL. Speedarius. Xcriteria. AmiDaniel. Bwaav. MarkPos. RedWolf. Mennonot. Kashmiri. Billinghurst. RjwilmsiBot. WikitanvirBot. Dougher. Manop. JAnDbot. EugeneZelenko. YurikBot. Andros 1337. Mpitt. Amargosa. StarlitGlitter. XP1. Vanished user g454XxNpUVWvxzlr. Nukeless. Sfacets. Obey. Srd2005. Jonabbey. Bubba73. Ipatrol. Huntersquid. YurikBot.org/wiki/Smartphone?oldid=674862270 Contributors: Damian Yerrick. Midnight Hour. Watgap. Cydebot. Rjemma. Ellywa. Mattrix18. Salamurai. ChrisGualtieri. ClueBot NG. RoyBoy. Kungming2. Andryono. Jesse Viviano. Oli Filth. Yug. . Stephen Turner. Julesd. Signalhead. BG19bot. BjKa. Rearden9. Husond.junior. Thenoflyzone. Southernsontn. Fourdee. Hardylane. Maertsria. Furrybeagle. GenQuest. Mr. Cellulardreams. DVdm. DylanW. Bresolver. Gogo Dodo. Uzume. Super Rad!. Tiddly Tom. CesarB. Oli Filth. Beland. GrouchoBot. Jite25. Xezbeth. Moritz der Moralapostel. Kyng. Drizzd~enwiki. Roboto de Ajvol. Yuil. Kbdankbot. Andres. Schnellundleicht. Ansible. Lisatwo. Allen3.9. CannotResolveSymbol. The Thing That Should Not Be. Parker007. Can't sleep. Tawkerbot2. Lesser Cartographies. Tomgibbons. Tpbradbury. Terinthanas. KH-1. Aymatth2. Estirabot. Indefatigable. The Rambling Man. Mortense. Lan1g1r0. UnrealG. Wuerzele. AnomieBOT. CaribDigita. Dale Arnett. Jonathan Daley. MSheshera. Angela. ABACA. Descendall. Jmoz2989. Nightwalker-87. Haakon. clown will eat me. Knight of Truth. TechPurism. Everlasting enigma. BaRiMzI. SmackBot. Cybercobra. Emanuel del olmo and Anonymous: 219 • Smartphone Source: https://en. Mcduck. Juan M. Johannylindskog. Plasticup. Digitrics. Seven of Nine. Retroneo. Mike Linksvayer. Nightscream. Frymaster. Fuzheado. Armando. Michael Devore. Nisselua. FenSerkan. 159753.أحمد24. RodkaRom. Frap. Tklaer. Cyberglobe. Kenglen76. Rawmustard. SIPH0R. ToePeu. AntiVandalBot. Graywolf~enwiki. Lkinkade. MER-C. Hadiyana. Garthwimbush.Tr. Zpetro. Danhash. Nurg. CL.wikipedia. Requestion. SamanthaPuckettIndo. Discospinster. Flinders Petrie. BD2412. Scaredpoet. Jamessungjin. Rhobite. Fcassia. DavidWBrooks. Robbot. Erc. Ghoctor. TuHan-Bot. Chris Price. Frank Lofaro Jr. Bhny. Tommytentimes. OpenToppedBus. Thumperward. WadeSimMiser. JohnTechnologist. Andries. Shadowjams. Qnonsense. Shufengbai. Lbecque. Elch Yenn. Aeons. Speer320. GFellows. Andros 1337. KungFuMonkey. Vodomar. AdamJacobMuller. Branddobbe. Altzinn. JoeSmack. Embryonated.. Jantangring. Guy Harris. JSpink137. MrBeauGiles.org/wiki/IDEN?oldid=670603263 Contributors: Taral. Urod. Mrkmrk. Szcy2008. Kozuch. Reynan suba. NetworkINV. Rsnake123. Newark777. Martarius.henderson. Navshot. Cydebot. Alpha Quadrant. Philosophistry. KnowledgeOfSelf. Lightmouse. Geofone. SieBot. Saimhe. Ignorance is strength. Sleepygreen~enwiki. Martarius. Pavel Vozenilek. Grafen. EwaDuan. Michas pi. Apoc2400. CKyle22. Towel401. Jaykaynam. Rchandra. JediSaint. Miquonranger03.de. Zollerriia. Eraserhead1. Shaul1. Euchiasmus. Escarbot. XLinkBot. YurikBot. Alansohn. Evano1van. Totsugeki. Cacophony. Yobot. Bgwhite. Sublite. Paul Foxworthy. Comet Tuttle. Tournesol. ErikTheBikeMan. Mattmitchell. Winged-stone. Insomniacity.Hapmouche. Xqbot. TexasAndroid. ClueBot NG. Rsrikanth05. Into The Fray. Ahoerstemeier. Jondel. Ilnyc8. Brianreading. TXiKiBoT. Cleared as filed. Night Gyr. Forward Unto Dawn. Jmchuff. Caltas. Juncaceres and Anonymous: 462 • IDEN Source: https://en. Yobot. DJ Rubbie. Emyil. Kwiki. AntiVandalBot. Gonzalez. Ask123. CONTRIBUTORS. Hoosss. Fuelbottle. Monkeyblue. Guy Harris. Stojo34. SHCarter. SoSaysChappy. Wtmitchell. Taxman. RickK. ChrisGualtieri. FlaBot. Wtmitchell. Gilliam. Ch Th Jo. Ianb. Pichote. Arado. Stojo71. Smalljim. Amakader. Bluebot. GregA. Stesmo. Beyond My Ken. Chris the speller. Broccoli. Nasa-verve. Tpatricio. Addbot. Psychojosh13. Versus22. Ale jrb. Hede2000. Lithis7. Racerx11. Evice. Laugh~enwiki. Iheartcorruption. Vegaswikian. Epolk. Strong Bad. Moniker42. ClueBot NG. SABACC. Stevage. Xrobertcmx. Jbonneau. Shattered. Tanhabot. Erencexor. DocWatson42. RobertStar20. Nv8200pa. Trieste. Doris Meier.drerup. Contemno~enwiki. Gisegre. Josh Parris. Altenmann. Aisaacson. FrescoBot. Jonesey95. MyNameIsNeo. LittleOldMe. Materialscientist. Woohookitty. MITBeaverRocks. Pol098. Mr4top. SmackBot. Fuzheado. Nageh. Tahir mq. Greensburger. Maury Markowitz. WhisperToMe. JPG-GR. A Man In Black. Int21h. Jmoz2989. Jfdwolff. Juansidious. Duhaggie. Woohookitty. Harryzilber. Joycloete. ZéroBot. SandStone. Jeffq. आशीष भटनागर. GavMag. Himanshu301989. Sdfisher. Sheehan. Petershank. RebeccMWinfid. La Pianista. Onco p53. Lightbot. Tide rolls. Kittynboi. Rkarlsba. Ὁ οἶστρος. JonHarder. JonoP. John of Reading. Sdudah. Seaphoto. BlkStarr. Jc3. Gareth Griffith-Jones. Wiki-uk. AvicBot. Rursus. Sjö. DavidOrme. Sango123. Tristanb. Legobot. Binba. Murmurr. Quadratic. Cmlewan. Bbb2007. PEHowland. FrescoBot. JimMcKinley123. Stamppot. BIGShorts. Howan. Notmicro. Joshua. Leion. Adamantios. Dancter. Dawnseeker2000. Alansohn. Focalpointfecta. El Foes. Rcsprinter123. GTBacchus. InternetMeme. Magnus. Jan1nad. CharlieEchoTango. Epicgenius. Morphh. Mlaffs. Robth. Helpful Pixie Bot. Jamelan. CommonsDelinker. Jim. Mdrejhon. ChuispastonBot. Patcat88. Arteitle. Feydey. Rjwilmsi. Burntsauce. Engineerism. Macaddct1984. Robertyhn. SFK2. Tequendamia. Omnipaedista. Fellipec. TimoVink. Herbert44. Fibonacci. NeonMerlin. LorenzoB. RockMFR. Scottalter. Mac. FrescoBot. Tobias Bergemann. DocWatson42. Minghong. Qrsdogg. AND LICENSES 271 KGasso. Teammm. Suamme1. Thijs!bot. FlieGerFaUstMe262. Skier Dude. JLaTondre. Taskinen. Shirtwaist. Poor Yorick. Thijs!bot. Landroo. Helifella. Robertbarlow13. Treekids. Equazcion. Billinghurst. R'n'B. Lightbot. Wikiliki. 27thPW. JJ-Stern. Zziccardi. Youxiarock. OnBeyondZebrax. Rubiscous. Ianereed. CoolingGibbon. Clovis Sangrail. NathanYDR. CRJO-CRJO.ajb. Manway. Magioladitis. Morrism1. Caj27. Monaarora84. Jamesmartin01. P. Aoidh. Georgy90. Daniel. Bomazi. Phatalflaw. Ha us 70. AxG. Stefansoc.Koslowski. EngGerm12. Wo. DragonBot. Baronnet. Jim1138. Kraftlos. Hellokitty123 qwer. DaisyField. Ronhjones. XBotJerom2.Marlow. Immunmotbluescreen. Keraunos. Greswik. RjCan. Sfan00 IMG. Nedge2k. TheHoax. Piotrek54321. CommunistManifesto. Adriatikus. In2thats12. Zalunardo8. A8UDI. Hypnotist uk. Glacialfox. Grahamperrin. Grajales. Nazrich. Madhav the king. ChristophBurger. Akuyume. Graywolfmoon1. JonHarder. JamieS93. YoursBadDay. Old port. Peyre. JCrue. KelleyCook. Oli Filth. UCLATre. Zanter. Ck2go. Mix Bouda-Lycaon. Braincricket. Hydrogen Iodide. Cvdr. Kep161289. Little Mountain 5. Pluma. MyronAub. Gruffyddd. Satellizer. Jsribeiro. Jprg1966. Schrödinger’s Cake. F1MotoGPWRC. Tikru8. O. Mavtrevor. Rtisme. Lester. Winner 42. Mahaloso. RandomLittleHelper. Eman1003. Cyruslei. PTSE. Halloween. KnowBuddy. Ruchir257. Cellcom. John Sawyer. Limequat. Larkhill97. Risperidone1234.com. Richardguk. VidhyaDhivya. Wasill37. Maniacgeorge. Chris the speller. Quebec99.turek18. Daniel-crawford. MOBILE PHONE ACCESSORIES MySchizoBuddy. A Quest For Knowledge. Kris159. EVula. Joseph Solis in Australia. CanadianPenguin. Dude7190. Creativeminds34. Aclassifier. 573W1E. Inventor7777. David Hedlund. Drobatch. The Pink Oboe. Josh3580. YonaBot. Kcomstock. Evilruletheworld96. OlavN. Lewispb. Deviceapps. Jostake. Citizensmith. Electronicguru1. A4bot. Ianboudreault. Surenkarapetyan. Slurpy121. Tangent1000. Mogism. Kiranrs143. SuperHero2111. Trasz. Mange01. Aurelie Branchereau-Giles. Melody Lavender. Shawnc. Tracersystems. Wireless Buddy. Jynto.mac. Eshade. Theaveng. Nicoleross101. Healybd. Erianna. ItsZippy. WiZZLa. Pvanheus. LeilaniLad. Currab. JAnDbot. Lun4tic. Tmuller2. Stjson. Wknight94. Curl7985. Leujohn. Craig VG. YORCELYLUNA. Pjatusf. Spellmaster. Gmumru. Sebindcruz. Filedelinkerbot. SF007. Yintan. Cornea503. Im Buff. Klilidiplomus. WikitanvirBot. Mononomic. Reliablesoft. Mjbmrbot. Editrrr. Pdahomepage. Jonesey95. Reatlas. The Wild Falcon. Kudpung. Mvjs. Kellen. SoCalSuperEagle. HuskyMoon. WikipedianYknOK. HennersJCL. FrescoBot. Ztan0015. Alex890. Singerdg1. Qiekai1. Jerome Charles Potts. PS. Skr15081997. Marrowmonkey. Westie4321. MrOllie. Gold Hat. Shrine Maiden. Gsarwa. Macaulay94. Calabe1992. Ipsign. GateKeeper. Jekyllhide. SPQRobin. Wbm1058. Hiugheerg. LaVieEntiere. GraemeL. A123a10. Prillen. Arp120. Deane@gooroos. TastyPoutine.au. Mosmof. MartinPoint. Harris james. Bflaherty77. Pishcal. Narnars0. AndrewSpec. Versus22. Soulparadox. Obiwankenobi. Nozomimous. Mac John Concord. Closedmouth. JetBlast. Phatom87. Sean13zz. Smart1954. Dodi 8238. DPRoberts534. War wizard90. Res2216firestar. Thumperward. Prathameshsasane. FinnsDeal. Maxí. Starofwonder. ClueBot NG. Cams0ft. Auntof6. Webclient101. Barana. Looneybunny. Atenyi. Varkman. Red Jay. Martarius. 16@r. Escarbot. Phearson. GoingBatty. Pinethicket. Lifes g00d 561. RedBot. Psavageknepshield. Cnwilliams. LittleWink. Jimmy Bergmark. Flowanda. Hcobb. A930913. SuperHamster. Mark Schierbecker.luren. ThaWhistle. Jo3sampl. Mlg07e. Kajowi. Loser997. BattyBot. MillenniumB. Pats1. Greyfrontier. Whereismylunch. Nakakapagpabagabag. PatrikN. Wyn. Rhinestone K. Lun Esex. Signalhead. Livitup. Mwenechanga. Malik Shabazz. Kariteh. Electronicbazaarnz. HereToHelp. Biker Biker. Michael A M Davies. Cole2235. Smmgeek. Mato. Zach Vega. Siliconov. Frosty. Aillema. Treekids. Posix memalign. HybridBoy. GeorginaMat. ReverseEngineered. Radiier. Melcous. Winstartup. David Samar. Delphii. Luxure.laylah. Wikimhb. ScottyBerg.finnan. Tomas. JamesWeb. Sameer singh17. Helddtheblog. CLW. Cattus. Doomsday28. Maine12329. J. Commontimect. Sfsmartp. Jamesx12345. Netrapt. Tria3.0. MerveillePédia. Navacell. Ramu50. Sdarw. Qwazix. Omardarwish10. Taka76. ירק. MadenssContinued. Davis445. Intershark. DumbBOT. Addbot. Katieh5584. Lai888. Mstobbs. TruthDebunked. Jesus borbolla. ThaddeusB. Gregorysalt. Lukan4ica. Alleongto. Editor182. Radon210. Changshui88. Ginsuloft. Memaster3. Nopetro. ZéroBot. Gookey. Jwojdylo. Ajsandboch. Strz4life. Dan6hell66. Sayid98. Kuru. 28bot. Pmlineditor. DumZiBoT. Jackson Peebles. Ignis Fatuus. Comaleaf. Javiermejia. Secretsorry. TXiKiBoT. Makyen. Stephen B Streater. VirusKA. Ginsengbomb. . Donner60. Snigbrook. Waidawut. Socialmaven1. Lobcitizen32. Sambot. Kercker. Skizzik. Mdwh. JDDJS. Jerryobject.henderson. Calcwiki. Tahir mq. DaveChild. SantiLak. Maproom. Skittle. InternetMeme. Aeminigs. Pmarshal. Jusdafax. Gilliam. Mikhail Ryazanov. Gfannick. Xyzzyavatar. Kkm010. Mikehelms.amitkumar. 12dstring. Numbo3-bot. John of Reading. Wiki admi. Harryzilber. Sebastian Mandrean~enwiki. Amaury. Coolaaron88. Jeffrd10. TimeClock871. Degenerate prodigy. Sfgiants1995. Aaditya 7. Hamza1909. Bripat. Baltergeist. Thiled. Gordon Ecker. Akashtablet. Nicola. Soliloquial. Helpful Pixie Bot. Marco. Human. Elassint. Adib5271. Slazenger. Oontay. Smartmo. McGeddon. Mebden. Tallalsardar1. Mckote. GrouchoBot. Dmarquard. Cadillac000. IntrigueBlue. DivineAlpha. Cxtom. JorisvS. I already forgot. Mortense. Frmorrison. G&CP. Jarble. Faunas. Sadegh87. Geologyguy. ClueBot. Mild Bill Hiccup. Ron2. Smartphonespakistan. AnomieBOT. HMSSolent.ecn. John Cline. SmackBot. Tony1. Bakshi41c. Epicgenius. RibotBOT. Onel5969. Suwatest. OrphanBot. Lilprincess$22. Srich32977. Saazeditor. Anaxial. Parintachin. Hadiceberg. Blobby54. ImageRemovalBot. Bellerophon5685. A8v. Jim. Xqbot. Leszek Jańczuk. DerBorg. JayJay. George Parastatidis. Patvac-chs. Rgreed. Lightbot. Garant^ ^. Slitchfield. Sainath468. Excirial. Waqas Hussain. Verne Equinox. Ktsai503. Uboa297. Gomm. Hmainsbot1. Barek. Kvng. K6ka. Youbeeho. Max Doberman.Avinash. Kozuch. Codetiger. AvocatoBot. Bendes~enwiki. Rubinbot. CommonsDelinker. Sctechlaw. Eugenia loli. Skintigh. Haseo9999. Ltomuta. Kboy23. Mean as custard. Ohnoitsjamie. LibLord. Jaesi25. The-apathy. AndyTheGrump. Acrisius. Jæs. Bkuniyil. SirJibby. Loriendrew. AKA MBG. Yean3d. DemocraticLuntz. Hpak14. Sdrazfar. Galadh. Tfgbd. Rezabot. Nitro. Papa Kern. Dilshankgc. Josve05a. Taketa. Solarra. Snow Blizzard. Piano non troppo. General Ization. A. Fraggle81. Lambtron. Neoarchon. Canalteen. HDCase. Emma23 K. Podius. EWikist. Scrtcwlvl. Arny. Jsherwood0. Tentinator. Irky. SpaniardGR. Bahaltener. Pbrown111. Pitzik4. Ddavid2005. Boomur. Mksword. ViperSnake151. Level plus~enwiki. Maxtremus. Icedwater. Samwb123. M0rphzone. Wallace1966. RjwilmsiBot. E. Miquonranger03. Meatsgains. Anupam. Just another editor. CalumCook234. Ticell. Cst17. Ajayy99.Kazi. AlnoktaBOT. Widr. Avoided. Masgatotkaca. BethNaught. Jfrausto323. Acalamari. Technical 13. Sofia Koutsouveli. Jaspermaz. KristinaMcloud. Lazulilasher. Mardelamesa. Cactusframe. Hervegirod. MeanMotherJr. Kingpin13. Moberg. Tokyogamer. Tinton5. Bombot. Tesi1700. Vacation9. Tatterfly. Catan wen. Lilac Soul. Takamaxa. Myscrnnm. AkhtaBot. Suriel1981. Ptbotgourou. RenamedUser01302013. Sjcramer. Kinst. Justin Mauger. Mdann52. 3Coins. Mike989. Logan. Sbookface. Kwaichi. Tommy2010. EmausBot. RJaguar3. Evolutiondb. ZarlanTheGreen. EnglishTea4me. Laurasmith70308. Vrenator. Repetition. KaiserKIS. Coretheapple. Jesant13. Argentina subcampeon 1789. Verkinto. Lotje. VoABot II. JCDenton2052. JNW. TVS99. Rayman60. Newyorkadam. 842U. Amarendra. Bongwarrior. Jajosh66. Glennwells. Tcomotcom. Happysailor. Yobot.Manini. Brittanybee1121. Nick Number. DadaNeem. Neoguy999115. Tombomp. MER-C. Atama. Mike Dillon. Farolif. Thine Antique Pen. Charivari. Hamiltha. Sapibobo. Citation bot. Ciphers. ChaChaFut. Swoof. Lenin1991. Arjayay. XLinkBot. Machinegoesbing. KarmaGeddon. Klokbaske. Harlem Baker Hughes.wa. R'n'B. I. Gobonobo. Querencia. Thestick. Arunsingh16. Prymshbmg.laylah. The Thing That Should Not Be. Bellerophon. Interframe. Illyria05. Hu12. Momen. Jojalozzo. Samad120. Chowboi. Groink. Cadiomals. Luckas-bot. Arab Dynasty. Rollins83. Marksza. Connordudes. . Neo Ogilvy. ModWilliam. Cmf. Rreagan007. Marcisjustice.delanoy.272 CHAPTER 56. Cmp101.v2. AniRaptor2001. Dreambringer. Materialscientist. Hobartimus. VolkovBot. Alf. Erdy-kun. Greedo8.junior.. Smartphones’ r4u. Serg3d2. ChamithN. Kentynet. Kathovo. Diannaa. Paspie. ALSLUG. Tide rolls. Jagdterrier. Richiekim. Kresp0~enwiki. Ali raxa11146. Paul 1953. Mikael Häggström. BG19bot. Pyfan. Nickolai 420. Thisma. I dream of horses. Sandstein. RA0808. Hancock720. Acolin f. Waveees. Acather96. Hogyn Lleol. JohnChrysostom. Shalroth. Nerdeff. FicticiousAnimation. Seaphoto. Austinuity. Smeagol 17. ZipoB. TjBot. JPNEX. Quantum7. Little Professor. Giggett. Monkopotamus. BillHaywood. Ishdarian. Portillo. Aeons. Tuju. Pwhitehurst. Father Goose. Nupur Ray. Steel Wool Killer. Imsilly123.difresco. SieBot. Feinoha. Techexpertist. Xanchester. MetaManFromTomorrow. Gogo Dodo. Fyrael. Bibijee. Esrever. Arafael. Grahamatter. Ne0Freedom. Wilson410. Wikipelli. Togopogo. Philip Trueman. Hammersoft. Atul. Technopat. Reyk. Aytk. Jediknightelectro1997. WOLF LΔMBERT. Groop3UNH. Sofffie7. Yunshui. Jobin RV. Monkbot. Nallimbot. Xajel. Menmenmenmenmanlymenmenmen. Balazer. Nathan94124. Hu12. Toschlog. Download. RibotBOT. Skagedal. MTSbot~enwiki. Phantomsteve. Dirkbb. Ejjazaccountant. Donner60. Gene. Loadmaster. LtNOWIS. Bornintheguz. Waldyd. Tripbeetle. Cydebot. Cuye. Rasik01. Luckas-bot. Brandmeister. SHCarter. Ike9898. Guy Harris.o. Jojalozzo. Bouvierjr. Addbot. Potjernik. Arthur Rubin. Nach0king. Neelix. MerlLinkBot. Jimgawn. Graham87. BogdanRa. Wael Ellithy. Metagraph. Gallup. AndyTheGrump. CaribDigita. Mojodaddy. Wry.tan. Olivier. Qji. Danieldavidturner76. Siskus. EmausBot. DarkRyder. Jppcap. . Deli nk. I am One of Many. Abesford. Gadfium. Matt. Andrewfrancis. Condem. Anthonyramos1. Cvdr. Kiran Gopi. Mackeriv. VolkovBot. EdgarSanchez. Cap'n Refsmmat. SystemBuilder. Darguz Parsilvan. Prajwalbizzflies. Silverxxx.arboit. Dreadstar. Unixxx. Wcchenoweth. Wikipelli. FrescoBot. Panindra. Marchash. Johnuniq. Jsharpminor. John Nevard. Paul August. Jcarella. Niteowlneils. MARKELLOS. Zbuhman. Widr. Zorro1024. Wingman358. Archon 2488. Nricardo. Capricorn42. KnightRider~enwiki. Torc2. AND LICENSES 273 A0145247. Rubyaxles. UkPaolo. Richwales. Flyer22. I dream of horses. Whaledad.L. Pol098. Zx2c4. M. Slusk. Jbroderi. Elv2003. AA. Leonardo H Almeida. 16@r. Nivix. A5b. Dmprantz. Parrot. Nathan Hamblen. Obijuanvaldez. Cambookpro. Kinclli. SDC. Starshadow. Pascal. PigFlu Oink.jenkins. Suniltheblue. Gaga. Pxpt. Mmsarfraz. Mack2. Addbot. Jonathan Oldenbuck. DavidD12. Simon Arons. PotfromKP. Addbot. Cliffb. Ianlotinsky. Hashier. Matt Gies. DoorsAjar. Mksword. Jerome Charles Potts. Vivek kumar indian and Anonymous: 304 • International mobile subscriber identity Source: https://en. ArthurBot. Warren Pena. PuzzleMeister. Pnm. Bahram. Hanche. Jengelh. Danno uk. Qasimali7071. Workman161. Elockid. Jerryobject. Kashmiri. Lihui912. Helix84. Squash. AnandKumria. Eric Le Bigot.zahir. MaGa. Shaimay2. Quuxplusone.9. Nageh. Kaiser matias. Iandiver. Julo. Toh. Chrislk02. SchreiberBike. Connorl9382. Apoorv Chauhan. Meleegy. Biranjan. Jbass. Foofy. Halfpad and Anonymous: 111 . SpBot. Krymson. Fang Aili. Jhwilder. Dale Arnett. Widr. Nikevich. DavidRCrowe. Ruud Koot. ClueBot. RobotE. KeithTyler. Mustafa. 001. TXiKiBoT. Synthebot. JLaTondre. 17cannibal. Frap. Debasish Dey. YFdyh-bot. NerdyNSK. Thijs!bot. F73. Guinness2702. TitaniumDreads. Chobot. Mgramlich. Timeastor. JimD. A3RO. Yelyos. Palica. Roboto de Ajvol. ChrisGualtieri. Rrmorris. HenryEvary and Anonymous: 430 • Luhn algorithm Source: https://en. Dmitrytorba. Topbanana. GrayFullbuster. Espoo. Mojodaddy. Wfaulk. Mauls. Egil. RedWolf.org/wiki/Luhn_algorithm?oldid=673955786 Contributors: The Epopt. Triwbe. Dodger~enwiki. Enzomich. Noelkoutlis. Helpfulweasal. Animedude5555. BenB4. Cinnamon42. Jni. Alvinhenrick. Metageek. Zaian. Not-just-yeti. Slakr. Tregoweth. Daudajos. Twang. Rehno Lindeque. Verdatum. Giftlite. Matthijs J. Andrew dashin. Smalljim. Orokusaki. Full-date unlinking bot. Inufuusen. DocendoDiscimus. Zimbricchio. Amicaveritas. YurikBot. Bananaleaf13. Improv. Slawojarek. L buis. Virgofenix. Taka76. Atiqur515. Arnel enero. Shubhrajyoti. Zephyris.org/wiki/Subscriber_identity_module?oldid=674861531 Contributors: Alex. Mandarax. Suicidalhamster. Mr Minchin.org/wiki/International_mobile_subscriber_identity?oldid= 674016332 Contributors: Egil. Mitch Ames. Ubiq. Ronhjones. Ohnoitsjamie. Moraja. Dispenser. RjwilmsiBot. Seriyes1. AndrewHZ. Xcbsmith. Velella. Tentoila. Lavinio. Abdel Hameed Nawar. Kvantikos afros. SmackBot. T0ky0. Lord Yaar. Ericamick. MikeKn. Yarin Kaul. Espoo. Toolnut. Bellhalla. Qwertymith. Deflective. Tsaukpaetra. Mejamkabilokyuk. Kencf0618. Gary. SmackBot. Sega381. Kle0012. Chkno. CommonsDelinker. Yaser09363239065. DocWatson42. Xompanthy. Chris the speller. Louismax. TBadger. . Nilpo. InternetMeme. Squarehead9454. Charles Matthews.wikipedia. Brighterorange. Watgap. MaxiLego. Gilliam. Pythoulon. NeonHD. Shan2097. Indon. Dcoetzee. Daemondust. Pushp vashisht. Zorrobot. MartynDavies. OsamaBinLogin. Babca. ScriptFanatic. Homunq. Flex. Bsoft. AnomieBOT. Ankitawakde. Justincheng12345bot. Stephan Leeds. Biblioworm. Inkling. VoABot II. Wikiklrsc. Mange01.emiliozzi. VinceBowdren. Mralston. Lonaowna. Tfeledy. Psychonaut. Wilee. Michael Bednarek. Ale jrb. WikitanvirBot. Geoff Plourde. Adamdoupe.keshav. Edin1. Nokezie. Shirishag75. I dream of horses. Towel401. Xqbot. Tom. ObuK. Kennethmac2000. David Traynor. D'ohBot. DGamey. Khairul Islam.wikipedia. Alexburke. Julesd. JAnDbot. ChuckBiggs2. InverseHypercube. Pgan002. Chinju. Daniel. Dkastner. Quietbritishjim. AnomieBOT. S. OrphanBot. Sidasta. Michael Hardy. David n m bond. Ravedave. Unyoyega. Koman90. Mikething. Ed g2s. Justin Ormont. Raindeer.P. JordanTeater. .Drees. Dtcdthingy. RandalSchwartz. Moocowsrock. Old Aylesburian. Oosoom. Aoidh. GravisZro. AdamAtlas. Ashkhan. Whpq. Plustgarten. Materialscientist. CONTRIBUTORS. CLW. Lo2u. Simon Shek. Greg Knapp. VolkovBot. Emanlifts. W96. Rjwilmsi. Satori Son. Clawed. Sin Harvest. AnomieBOT. VoxLuna. Xrtc. Alexsh. Celebsbio. Glane23. Skeejay. Hutchyy. Cmglee. Foosterhoff. DrilBot. ClueBot NG. Bubbachuck. HiW-Bot. Nanda~enwiki. Niftierthanthou. Lokpest. Travix. Rossumcapek. RadioActive~enwiki. XLinkBot. PesoSwe. Deadpixel1. Genius boy me. ClementSeveillac. C Ruth. Rubinbot. Comperr. MusikAnimal. Luna Santin.wikipedia. Bwpach. Eole. FrescoBot. DBlomgren. BigHairRef. Electron9. M3mb3rsh1p and Anonymous: 1291 • Subscriber identity module Source: https://en. Plop. Jtjdt. TEXT AND IMAGE SOURCES. Neelix. GrinBot~enwiki. Purnaregmi. YurikBot. Tothwolf. Mohammed rafath. Spa34a. RobLandau. Dtobias. Ashwin. Xaosflux. Gabouel~enwiki. KasparBot. SmackBot. Zr40. Sopermi. Rchandra. Gareth Griffith-Jones.Tesson. Akghsh. Yobot. D'n. Electron9. Guanabot. Matthiaspaul. MichaelStanford. Ghettoblaster. Zr40. A. Heron. AntiVandalBot. NeuLex. Jamelan. Cchenoweth. Sparky rad. Peter Karlsen. Dezwitser. Vegaswikian.vaa. Elektron. Duckbill. Mik01aj. Alex Neman. ClueBot NG. Audin. Ginbot86. Andros 1337. John of Reading. Zarcillo. DrilBot. Ntsm. ShadowOfDestine. EmausBot. Sidnext2none. Plaws. Baloo rch. Skratowicz. Julien~enwiki. Sanders muc. Wikijimmy. Hadal. Georgy90. EnTheMohammad. Smyth. Bombay01. Etmjang. Blakegripling ph. Psychemaster. Bennylin. SilentForce. Bota47. Fangfufu. FlaBot. Frigoris. Konstable. RebelBodhi. Supdiop. SystemBuilder. Wapcaplet.anacondabot. Lliang1900. Modster. L0ngpar1sh. Ckatz. Isnow. Tawkerbot2.k. Dragonhacks. Ecb29. Dubbzup. Yehezkel. Amoon ahmed. Skr15081997. Bencherlite. Shamanx. Benboy00. HuggaBounce. JDBurnZ. Exekute. Gr8dude. Thesyberplace. Mandsford. Kostpolt. Dananos. Mys 721tx. Yintan. Audriusa. Moocha. Lebmonk. TheFallenCrowd. Cmskog. Innv. Sbingner. Care. Bart. Foobaz. DWaterson. Dabombazzz. Darac. Tahir mq. Oleg Alexandrov. L33th4x0rguy. UmbertoCorponi. Jeffq. Slartybartfarster. Fraggle81. Andrew Vi. Yobot. Shadowjams. Sukendro. Mehmet Karatay. Jarijokela. TonyW. Idioma-bot. Jusdafax. . Apdreamland. Peripitus. Bazj. Grafen. Starionwolf. Excirial. Kedadi. A3nm. Jesant13. Bazonka. Freewol. Mintleaf~enwiki. Tapuwiki. Rubel0172209. Jeff Song. Mh2135428. Pmokeefe. Vicentemf. MrCellular. Quondum. Rafiuddin. Gehzumteufel. TimothyPilgrim. Bu4man. Agrefski. Uzume. Bratch. Utuado. Dront. Naveedb9. Askari Mark. Titoxd. Sartan. WalterTross. Efenna. Williampoetra. Intgr. Cmare740. Yoyosamo. UKWikiGuy. Ivolocy. Hu12. Pc123-123. Gusennan. DerHexer. DmitTrix. Obiwankenobi. Yamaguchi . Jpatokal. Fix101. JLD. Regsocks1987. Syn1kk. Gilliam. Jmgonzalez. Baloo rch. Abdull. ZXIII. Bluebot. SFK2. Avjoska. Jdulaney. NeocNeoc. CarlHinton~enwiki. Qxz. KeithTyler. Paul Marshall UK.56. Wikiliki. Ozga. The Thing That Should Not Be. Mushroom. Brianegge. Martarius. Moocha. Mroach. BG19bot. Werdna. Lightbot. Ledpup. Michaeldsuarez. Aled D. Yaronf. Jimmayoy007. Escarbot. Katieh5584. Yobot. Dysprosia. Rich Janis. Lsi john. Situwei. George Hernandez. Cydebot. Cumbrowski. Ocram. Asdino. Boostworthy. Thrownshadows. Imzadi1979. Arseny1992. Jamelan. Onniscente~enwiki.vanassche. Rairden. Gilliam. JAnDbot. Zorakoid. Minesweeper. Glueball. Isnoop. GSMfan. Trasz. UncleDouggie. Sreekanthys. GrouchoBot. Jmichael ll. Michael Shields. Rezabot. Ohmygeek. Nelhage. Ponydepression. Bogybogy~enwiki. Lobas~enwiki. V35b.golam. Johnsonja. Thumperward. Dysprosia. Yvh11a. Mrnaz. Sffubs. SIZIK. Anthony Ivanoff. Suresh govinda. Chorny. LPfi. Niceguyedc. Iced Kola. Omegatron. Radagast83. AlastairIrvine. Tngu77. Alan. Snuffkin~enwiki. Gamelore. Andrewferrier. Oyigit. Mac. Salimfadhley. Duncan. Kendall-K1. Stephan Leeds. Rouenpucelle. Josemanimala. DragonBot. Mindmatrix. Peppery9. Muro Bot. Tawkerbot2. Leion. Billymac00. Rubinbot. Joeleoj123. Rubena. Tahir mq. Darcro89. Raghunathdark. Shadowjams. KelleyCook. Dodiad. A5b. AxG. SieBot. Cubiccompass. Hydrargyrum. Kwamikagami. Chris the speller. ZIKRIE. Acdx. Joaquinferrero. Janax 3rd. Sligocki. Glutnix. Aeusoes1. SteveSims. Talrias.ece. Marlinjuice. Stesmo.mk. MaxHund. ClueBot NG. Wk muriithi. Nil Einne. Garion96. Iandiver. Mustafiz012. Teque5. Gorm. Mitch Ames. Zeugma fr. Scepia. Balmi~enwiki. Simonjwall. Paul nz. Romanskolduns. Quasicharacter. TonyW. Aido2002. Petertorr. Hmwith. Mozzerati. 274 CHAPTER 56. MOBILE PHONE ACCESSORIES • Mobile equipment identifier Source: https://en.wikipedia.org/wiki/Mobile_equipment_identifier?oldid=665705169 Contributors: Radiojon, Elektron, Rich Farmbrough, Wikiklrsc, Ketiltrout, Vegaswikian, RussBot, Grafen, Tony1, Alin0Steglinski, SmackBot, Bluebot, Metageek, Cybercobra, Weekilter, Quasar Jarosz, CmdrObot, Cydebot, Dawnseeker2000, Darklilac, Bwooce, DavidRCrowe, Logan, ClueBot, Blanchardb, Zabwung~enwiki, Middayexpress, Yobot, DrilBot, ClueBot NG, Testing10, Lemnaminor, JaconaFrere, Drock2369 and Anonymous: 15 • SIM lock Source: https://en.wikipedia.org/wiki/SIM_lock?oldid=673130745 Contributors: Damian Yerrick, Dreamyshade, The Anome, Stephen Gilbert, Rjstott, William Avery, Bob Jonkman, Patrick, JohnOwens, Geoffrey~enwiki, Ronz, Plop, Julesd, Miernik, Dale Arnett, Psychonaut, Mervyn, Hadal, Aomarks, Brian Kendig, Hazzamon, Orrc, Thewikipedian, Beland, Mzajac, TonyW, JulieADriver, KeithTyler, Crispy, Maikel, Corti, Mernen, Hinrik, Discospinster, Habbit, Sladen, Iediteverything, Vinko, IlyaHaykinson, Bender235, TerraFrost, JoeSmack, MBisanz, JRM, Richi, Sleske, Towel401, Pearle, Oolong, Alansohn, Patrick Bernier, Pebbens, M3tainfo, Stephan Leeds, Dtcdthingy, Bsadowski1, Justin5117, Ron Ritzman, Asav, Pol098, Tabletop, LinkTiger, Graham87, Bilbo1507, Elvey, Josh Parris, Sjö, Amire80, Vegaswikian, Nneonneo, XLerate, Brighterorange, Manesh, MatthewMastracci, TiagoTiago, SchuminWeb, Ground Zero, Mancini, Chobot, Mhking, YurikBot, Wavelength, Epolk, Wimt, Kennethmac2000, Grafen, Tailpig, Lexicon, Komiksulo, Cmskog, WikiY, Phgao, Zzuuzz, Petri Krohn, GraemeL, Fram, Fourohfour, ViperSnake151, Snaxe920, Mtffm, Veinor, SmackBot, C.Fred, Blue520, Stifle, Edgar181, Mauls, Unforgettableid, Kazkaskazkasako, Mnbf9rca, Bluebot, Thumperward, Jerome Charles Potts, Colonies Chris, Arg, Hgrosser, Wikipedia XP, Fenixdrakken, Ww2censor, Nakon, Richard001, Derek R Bullamore, WoodyWerm, Juux, ThurnerRupert, The undertow, T g7, Slowmover, Hg-it, Wnorris, Ckatz, JHunterJ, MarkSutton, Trounce, Adyason, Phuzion, Hu12, Tomwood0, Iridescent, Thewrxman, Pavithran, Blakegripling ph, JHP, Ziusudra, Mrjoe4215, JForget, CmdrObot, Ale jrb, Requestion, Curtis.e, Cahk, Achangeisasgoodasa, Rifleman 82, Gogo Dodo, Jeremy68, DumbBOT, Visualscope, Longwayround, Maxmq, Davidhorman, NigelR, Dantheman531, Turb0chrg, AntiVandalBot, Gioto, TheBlueFox, Rbyrd8100, Mikenorton, JAnDbot, MER-C, CosineKitty, A1 salah, Robpegoraro, Leolaursen, Joshua, Acroterion, SteveSims, Bongwarrior, Sarten-X, Giannicola, Jimjamjak, SlamDiego, Ztobor, E2a2j, DandanxD, Amacedo, Manticore, Mojodaddy, Rbrewer42, Jesant13, NerdyNSK, NagamasaAzai, Diego.viola, Toon05, Joshua Issac, Atama, Jevansen, CardinalDan, VolkovBot, HughD, Jorioux, Jeff G., 4300streetcar, Mobilegadgets, TobyDZ, Davidwr, Philip Trueman, Ahblair, Dmrowell, Rich Janis, Jwmci, JhsBot, Wolfrock, Why Not A Duck, Hmwith, Biscuittin, SPQRobin, SieBot, TJRC, Caltas, RJaguar3, Nitrooreo, Goosnarrggh, Geoffk01, Smsmasters, Jojalozzo, Harry~enwiki, Pac72, Phonehacker~enwiki, SH84, Sasawat, IdreamofJeanie, Jfromcanada, Wiknerd, Mr. Stradivarius, Moonside, Dabomb87, Telewayhk, TopFloridaRealtor, ClueBot, The Thing That Should Not Be, Rjd0060, Randall1190, Meekywiki, Luchnikov, Ktr101, Excirial, Mojtaba Cazi, PixelBot, SpikeToronto, Sun Creator, NuclearWarfare, Jdeuces86, Yjk83, Newyorxico, Nukeless, Dannysiu, Thewildwolf, Zenexer, Johnuniq, RonnyNussbaum, SF007, Ginbot86, DumZiBoT, SwirlBoy39, GodfreyChan, Skarebo, WikHead, Geeklogic, Addbot, Jdnewman123, Pyerre, JBsupreme, Melab-1, Claque, CanadianLinuxUser, MrOllie, Download, Louperivois, Quantumobserver, Dynam1te3, Legobot, Tukka, Yobot, Philippachaucer, Balfour4ireland, Echtner, AnomieBOT, Andrewrp, Killiondude, Jim1138, Will.true113, Law, Materialscientist, Citation bot, Quebec99, Capricorn42, Shahzad11, Taihongnin, Der Falke, Jtunlock, Tabledhote, Taka76, Alvb, Fartface1234(theprettywon), Cody Cooper, Stefano65, Citation bot 1, Jonjbar, Troy.frericks, Reconsider the static, Vrenator, Diannaa, Tbhotch, Mean as custard, RjwilmsiBot, UnlockItNow, Danic6, Evelhal, Rsmaah, John of Reading, Orphan Wiki, Kodabmx, Dewritech, RA0808, Gedoe1976, Tommy2010, Wikipelli, K6ka, DaveDaytona, Danpeig, Thekguy, Cellphoneexpert, Mcmatter, Vanished user fois8fhow3iqf9hsrlgkjw4tus, Johdory, The Talking Toaster, L Kensington, MadnessInside, ChuispastonBot, GrayFullbuster, DASHBotAV, WikiSpector, ClueBot NG, Gareth Griffith-Jones, Unlockblackberry, JetBlast, MelbourneStar, Chrisminter, TheRyk, YuMaNuMa, Braincricket, Helpful Pixie Bot, FtDesoto, HMSSolent, Calidum, Ramaksoud2000, BG19bot, Nickaang, Jmranger, Wikilovr44, Northamerica1000, Julianxhh, Nikos 1993, Kirananils, Rm1271, AdventurousSquirrel, Rvbrvbrvbrvb, Writ Keeper, ProdigyMike, Netwerk Media, Flirty mc henry, Ajpayne26, Settybodzin, Rsfrosty, Fraulein451, Domenicofavotto1, ChrisGualtieri, Gdfusion, Laberkiste, Khazar2, IsraphelMac, Raymond1922A, BigJolly9, Mogism, Ibro0079, Mofolo, Ikesham, HistoricMN44, Zxcvzxcvqwer, 900mill, Thecellularclinic, Pincrete, Epicgenius, SalamiSRS, Pasazman, Voidz, Louismax, Andre’s Possee, Nightbraker, Glaisher, Bisswajit, NyGuha, NottNott, Alibushara, Iamsrkfan, Jianhui67, Brokerpolitic, JaconaFrere, Stuartwalker169, Joeleoj123, Codeofdusk, Coo coo pigeon, Mrgnfrncs, Andreilow, CoronaryKea, Kashish Arora, Jason9451966, Bilal945, Cstdomains, Nocturnt, SoniaFulton, Vijay.singularity.krish, Nicu madalin, Mirrorguy, Maka42 and Anonymous: 512 • Mobile phone Source: https://en.wikipedia.org/wiki/Mobile_phone?oldid=673950473 Contributors: WojPob, Bryan Derksen, Robert Merkel, Zundark, The Anome, Koyaanis Qatsi, Malcolm Farmer, Ed Poor, Xaonon, Youssefsan, RobertBrook, Hajhouse, Nate Silva, Little guru, William Avery, LionKimbro, Heron, Rsabbatini, Montrealais, Youandme, Tzartzam, Olivier, Edward, Patrick, Infrogmation, Michael Hardy, Tim Starling, Paul Barlow, DopefishJustin, Jtdirl, Pnm, GUllman, Liftarn, Gabbe, Ixfd64, Dcljr, Sannse, Cameron Dewe, 6birc, Tzaquiel, Delirium, Dori, Minesweeper, Goatasaur, Tregoweth, NuclearWinner, Ellywa, Ahoerstemeier, Mac, Nanshu, Jpatokal, Snoyes, Angela, Jdforrester, Kingturtle, Pmolinero~enwiki, RadRafe, Stefan-S, Rossami, Benjaminong, Kwekubo, Andres, Tristanb, Jimregan, Wael Ellithy, GRAHAMUK, Ehn, Arteitle, Reinhard Kraasch, Stephenw32768, Alakon, Chatool, Dysprosia, Fuzheado, WhisperToMe, Selket, Steinsky, Radiojon, Roadmr, DJ Clayworth, Birkett, Tpbradbury, Kierant, Maximus Rex, Furrykef, Pacific1982, Saltine, Nv8200pa, ZeWrestler, Phoebe, Wernher, דוד, Topbanana, Fvw, Stormie, Pakaran, Guppy, Francs2000, Cluth, Owen, Lumos3, Shantavira, RadicalBender, Northgrove, Riddley, Robbot, Paranoid, Dale Arnett, Hankwang, Craig Stuntz, PBS, Jredmond, Gak, RedWolf, Donreed, Moncrief, Psychonaut, TimothyPilgrim, Pelle, Babbage, JustinHall, P0lyglut, Denots, Merovingian, Alexblainelayder, Academic Challenger, Alexaq~enwiki, Rhombus, Jondel, Rasmus Faber, Leedar, Hadal, Cyrius, Alan Liefting, David Gerard, Matthew Stannard, Giftlite, Dbenbenn, Anym, Lcgarcia, DocWatson42, Laudaka, Dinomite, Geeoharee, Lupin, MathKnight, Orangemike, Obli, Monedula, Peruvianllama, Everyking, Capitalistroadster, Curps, Alison, Cantus, Filceolaire, Bsoft, Sundar, Zoney, AlistairMcMillan, Thomas Ludwig, Solipsist, Foobar, Iceberg3k, Khalid hassani, Uzume, Bobblewik, Tagishsimon, Wmahan, Somebody512, Wikiwiki~enwiki, Mackeriv, Utcursch, 159753, SoWhy, Spizzer2, Sohailstyle, CryptoDerk, LiDaobing, Technogeek, Yardcock, Antandrus, Beland, Joeblakesley, OverlordQ, Scottperry, Kusunose, ShakataGaNai, Arsene, CaribDigita, Thevirus, Heman, Rdsmith4, Kesac, OwenBlacker, Maximaximax, Mysidia, Elroch, Mozzerati, Sam Hocevar, Histrion, Jklamo, Gscshoyru, Tooki, Jamesp~enwiki, Creidieki, Neutrality, Joyous!, Jcw69, Ianneub, Shadowlink1014, Cab88, Kevin Rector, M1ss1ontomars2k4, Damieng, Trevor MacInnis, Acsenray, Moxfyre, Randwicked, Grunt, Canterbury Tail, Andylkl, Qui1che, Bluemask, Zaf, Forschung, Joseph Philipsson, Corti, Mike Rosoft, Myfanwy, Imroy, Discospinster, Rich Farmbrough, KillerChihuahua, Rhobite, Guanabot, Oliver Ruehl, NrDg, Hydrox, DrMac, Selphie, Wrp103, Vsmith, StephanKetz, YUL89YYZ, IlyaHaykinson, Xezbeth, Mjpieters, Saintswithin, Ibagli, Zazou, Mani1, Pavel Vozenilek, Xeper, Paul August, Pnevares, Plumpy, Bender235, ESkog, TerraFrost, Ground, JoeSmack, Janaagaard, Petersam, Violetriga, Evice, Billlion, Stebbiv, Yvolution, Brian0918, Tompw, Sockatume, CanisRufus, Torindkflt, FirstPrinciples, MBisanz, El C, Lycurgus, Hayabusa future, Mwanner, Jantangring, PhilHibbs, Mavhc, Sietse Snel, Art LaPella, RoyBoy, Cacophony, G worroll, Mairi, Coolcaesar, 2005, Jpgordon, Alxndr, Bastique, Sole Soul, Bobo192, Danwarne, NetBot, Longhair, Feitclub, Func, Rackham, DrYak, Blue Wizard, Elipongo, Cohesion, Angie Y., Nesnad, Kappa, Harcoi, Sasquatch, Kjkolb, Darwinek, Famousdog, Cinnamon~enwiki, Tarun telang~enwiki, Opspin, B0at, Q3aiml, Ardric47, Towel401, Idleguy, Wrs1864, MPerel, Sam Korn, Haham hanuka, Ral315, Hooperbloob, Nsaa, Officiallyover, QuantumEleven, Eje211, Nickfraser, Espoo, Jumbuck, Mithent, Alansohn, JYolkowski, Davidl, ChrisUK, Schnell, Neria, Polarscribe, DenisHowe, Guy Har- 56.9. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 275 ris, Joolz, Wiki-uk, Lordthees, Atlant, Rd232, Mr Adequate, Andrewpmk, Verdlanco, Ronline, Andrew Gray, Lord Pistachio, Txredcoat, Wikidea, Eagleamn, Yamla, Lectonar, Goldom, Zippanova, Water Bottle, Lightdarkness, Kocio, Mrmiscellanious~enwiki, Monty Dickerson, Chrisjohnson, Mysdaao, Denniss, Malo, Joris Gillis, PeteVerdon, Wtmitchell, Bucephalus, Blancandrin, SidP, Helixblue, Danaman5, ProhibitOnions, Wtshymanski, Jrleighton, Keni~enwiki, Stephan Leeds, Amorymeltzer, Grenavitar, Drat, Red essence, Danthemankhan, LFaraone, BlastOButter42, Versageek, Sleigh, DV8 2XL, SteinbDJ, Alai, Rjhanson54, Algocu, Micdab, HenryLi, Panchurret, Firthy2002, Red dwarf, BerserkerBen, Oleg Alexandrov, Muhgcee, Tom.k, Lafraia~enwiki, Centralman, Dr Gangrene, Novacatz, Flawiki, Thryduulf, Angr, Boothy443, OwenX, Woohookitty, 2004-12-29T22:45Z, LizardWizard, Mindmatrix, Lochaber, Anilocra, Swamp Ig, Pinball22, Localh77, Daniel Case, Uncle G, Polyparadigm, Admrboltz, Pol098, Before My Ken, SP-KP, Byped, JeremyA, Matijap, Tabletop, Privacy, Wikiklrsc, Richardr443, GregorB, MiG, Rchamberlain, Leemeng, Prashanthns, Gimboid13, Liface, Nwahsnwahs018, Static3d, Winged-stone, Palica, NeonGeniuses, ObsidianOrder, Mandarax, Fleetham, MassGalactusUniversum, SqueakBox, Matilda, Graham87, WBardwin, Deltabeignet, Magister Mathematicae, Chun-hian, SamuraiClinton, Kbdank71, Bunchofgrapes, FreplySpang, Haikupoet, Jasonaj, JIP, RadioActive~enwiki, Miss Pippa, Edison, Rjwilmsi, Sideshowjohn, Phonedude, Quale, Misternuvistor, Commander, Moosh88, Vary, Mjm1964, Hairymon, Tim Eliseo, Quiddity, Tangotango, Sdornan, Bruce1ee, Zpetro, Collard, Mike Peel, Vegaswikian, Kazrak, Ligulem, Sferrier, Boccobrock, Brighterorange, Thekohser, DoubleBlue, MarnetteD, Plastictv, Utuado, Renaissance Man, Yamamoto Ichiro, A Man In Black, SNIyer12, Allen Moore, FlaBot, Ian Pitchford, Sky Harbor, G Clark, Ground Zero, Polaralex, Zeppelin4Life, Jak123, Winhunter, Descent~enwiki, Who, Mathiastck, Nivix, Chanting Fox, Ipats~enwiki, SuperDude115, Abrooks, RexNL, Gurch, RobyWayne, Jrtayloriv, Cbmaster, CoolFox, Snarkibartfast, Lmatt, Webshared, SteveBaker, Srleffler, OpenToppedBus, Arickp, Dnbosiris, Mrschimpf, Smaley, Party on Aisle 7, Chobot, Kellergraham, Mhking, Stoive, VolatileChemical, Cactus.man, Belowzero, Adam J. Sporka, Gwernol, Wjfox2005, Elfguy, The Rambling Man, YurikBot, Wavelength, GMT, Playstationman, Klingoncowboy4, Angus Lepper, Andynormancx, Eraserhead1, Sceptre, Kencaesi, Retodon8, Stormerne, DMahalko, Muchness, Briaboru, TheDoober, Splash, Qubeular, DanMS, SpuriousQ, CanadianCaesar, Hydrargyrum, Mythsearcher, Stephenb, Lord Voldemort, Manop, Polluxian, C777, CambridgeBayWeather, Tungsten, Wimt, Pelago, TheMandarin, Rhindle The Red, Terra Green, NawlinWiki, Muntuwandi, Edinborgarstefan, Dat789, Wiki alf, Chick Bowen, Jaxl, Welsh, Joel7687, ZacBowling, Mmccalpin, ONEder Boy, Lone Odessan, Cleared as filed, JDoorjam, Irishguy, Nick, Aaron Brenneman, Dalziel 86, JRG, Anetode, Esther scholle, Brandon, Cholmes75, The Land of Smeg, Matticus78, Night Tracks, PhilipO, Larry laptop, Chal7ds, Rickyboy, Momon526, Obey, William Graham, Hopperlexington, Furball~enwiki, Voidxor, Semperf, Tony1, Alex43223, EEMIV, Brucevdk, M3taphysical, Mysid, Lcmortensen, CDA, DeadEyeArrow, Psy guy, Bota47, ColinFine, Caspian, Nescio, Bbaumer, Brisvegas, Dv82matt, Tirerim, Navstar, Wknight94, Bob247, Mugunth Kumar, Mütze, BazookaJoe, Saric, Hans Joseph Solbrig, Zero1328, Db9970a, 2over0, Zzuuzz, PTSE, Marketdiamond, Imaninjapirate, Nachoman-au, Teiladnam, Ageekgal, Gimmeahighfive, Closedmouth, VAgentZero, Hrshgn, Fang Aili, Tim Parenti, Pb30, KGasso, David Justin, Tsunaminoai, GraemeL, JoanneB, Alasdair, Red Jay, Chriswaterguy, Shawnc, Cp33, Anclation~enwiki, Mhenriday, QuillOmega0, Skittle, Garion96, Jonnymoblin, X3210, Bluezy, Mhkay, Arunvijayan, John Broughton, Auroranorth, Roke, DVD R W, Eenu, Ryūkotsusei, Veinor, MacsBug, Vvill, SmackBot, Nick Dillinger, Unschool, Salilm, Hux, Davepape, Iamajpeg, Reedy, Brianyoumans, Tomer yaffe, Prodego, KnowledgeOfSelf, TestPilot, CompuHacker, Marc Lacoste, McGeddon, The Monster, David.Mestel, Unyoyega, Od Mishehu, Thunderboltz, Karmastan, Compay~enwiki, KVDP, Delldot, Chaosfeary, Adammathias, Agentbla, Frymaster, Gjs238, Fnfd, Imzadi1979, BiT, Nil Einne, Edgar181, Mauls, Septegram, SmartGuy Old, Siradia, Aksi great, Richmeister, Unforgettableid, PeterSymonds, Gilliam, Boul22435, Ohnoitsjamie, Choalbaton, OldsVistaCruiser, Andy M. Wang, Sonicandfffan, GeorgeBuchanan, Julie C. Chang, Constan69, Jeffro77, Shrensh, Flurry, Optikos, Kurykh, Spilla, SMP, Cattus, Master of Puppets, Thumperward, Raymond arritt, Oli Filth, Ankurjain, Elatanatari, Tree Biting Conspiracy, Jeysaba, Repetition, Joost P. Vermeer, Mdwh, SchfiftyThree, Victorgrigas, Bonaparte, Deli nk, Neo-Jay, Analogue Kid, Jerome Charles Potts, Telecom.portal, Dlohcierekim’s sock, ERobson, Viewfinder, Jfsamper, DHN-bot~enwiki, The Moose, Colonies Chris, Hallenrm, Darth Panda, Firetrap9254, A. B., Andyiou52345, Thief12, Mordantkitten, Brideshead, Sebhaque, Salmar, Zsinj, Decemberster~enwiki, Dethme0w, Can't sleep, clown will eat me, SheeEttin, Vasilken, Volphy, Mitsuhirato, Newcop, DéRahier, Djido, X570, Ioscius, Flibbert, OrphanBot, Onorem, Jennica, Yidisheryid, TheKMan, Rrburke, Homestarmy, Krsont, VMS Mosaic, Addshore, Grover cleveland, Miken2005, Perspective16, Khoikhoi, COMPFUNK2, Jmlk17, Krich, Bindyree, PiMaster3, Solarapex, Jaimie Henry, Cybercobra, Khukri, Nakon, Bsteger, Lubar, Gamgee, LMF5000, Anoopkn, Dreadstar, Richard001, Tova86, Rescbr, DylanW, Hgilbert, Weregerbil, SeanAhern, IE, Woodysee, DMacks, Wizardman, Ultraexactzz, Kendrick7, Twir, Salamurai, LeoNomis, Richard0612, Pilotguy, Kukini, Bezapt, Keyesc, Ardenn, Ohconfucius, Paul 012, L337p4wn, Lexicontra, Tydus Arandor, Snowgrouse, The undertow, SashatoBot, Rory096, Krashlandon, Robomaeyhem, Mksword, AThing, Lester, Harryboyles, Howdoesthiswo, BrownHairedGirl, Stewie814, Zero10one, Kuru, Celluser, JackLumber, Jidanni, Vitall, Roarke, Scientizzle, Shaliron, Soptep, Mwboyer, Freewol, J 1982, Heimstern, Nobodyinpart, Disavian, Calum MacÙisdean, CPMcE, Rohan Lean, Tennis Dynamite, Wibbble, JohnI, Soumyasch, Sir Nicholas de Mimsy-Porpington, Shlomke, Tony Corsini, Slinga, GCW50, MidnightSwinga, Accurizer, Goodnightmush, ManiF, AMac2002, Gregorydavid, Jaywubba1887, Aleenf1, Rawmustard, Anand Karia, 041744, Ckatz, Cortezz~enwiki, CyrilB, 16@r, Ex nihil, Sinaerem, JHunterJ, MarkSutton, Stupid Corn, Andypandy.UK, Slakr, Karn-b, Drumersrule, Beetstra, LuYiSi, Milesdowsett, Mr Stephen, Dicklyon, Mariersteve, Larrymcp, Waggers, Dammit, Felixluo, TastyPoutine, Synergism, Tuspm, Goldline~enwiki, Gizmoleeds, Mintchocolatebear, MTSbot~enwiki, H, PSUMark2006, Haveronjones, Agent 86, Dl2000, Andreworkney, GorillazFanAdam, Hu12, Stephen B Streater, Hetar, BranStark, OnBeyondZebrax, Chuck 266, Fan-1967, Iridescent, Ft93110, Stangoldsmith, Joseph Solis in Australia, Kernow, Newone, JHP, Casull, Cradle, The nibbmeister, Igoldste, Cls14, QcRef87, RekishiEJ, Beno1000, Esurnir, Estrategy, EurowikiJ, Svego~enwiki, Mr Chuckles, FIshstick, Linkspamremover, Illyria05, Rayoflight278, Eluchil404, Tawkerbot2, Hogibear, I3lizzard, Simplyagro, Chris55, Flubeca, AbsolutDan, Lahiru k, JohnTechnologist, Rpb161, SkyWalker, J Milburn, JForget, RSido, Vega84, CmdrObot, Ale jrb, Cxw, Top Cat, Dread Specter, Wafulz, Zarex, Ric36, Jorcoga, Comrade42, KyraVixen, Cellphones and Pagers, The White Cat, Dgw, Splenius, Kai360uk, Priceytom, Smallpond, GargoyleMT, Imaginationac, MarsRover, WeggeBot, Kalemika, Moreschi, Smoove Z, Jerressy44, Ken Gallager, Joostjodel, Trex005, Omnicog, Vanished user fj0390923roktg4tlkm2pkd, Nilfanion, Votingontheinternet, AndrewHowse, AMFilmsInc, Pit-yacker, Grenno, Cydebot, Abcde123456, Dynamic1, Mashby, MVimislik, Neurocistance, Shritwod, Stephanbim~enwiki, Garyruskin, Gogo Dodo, Xxhopingtearsxx, Corpx, Swat828, Mglickman, Coolguy22468, Myscrnnm, Pascal.Tesson, Scott14, Simmysimsim, Dancter, LaserBeams, Dr.enh, Evelynchai, B, Tawkerbot4, Codetiger, Energetic is
[email protected], DumbBOT, Chrislk02, Starionwolf, Shoobe01, Pokeman, In Defense of the Artist, Bpadinha, Legis, Kozuch, Ward3001, Abtract, Arcayne, Omicronpersei8, Vanished User jdksfajlasd, Zalgo, Michaelorgan, PamD, Kuang Eleven, Xwas, .:.Critical.:., EvocativeIntrigue, Thijs!bot, Epbr123, Andy Eng, Dr.Bhatta, Wikid77, Ashlie123, Lov ya, Qwyrxian, Lfrench, Daniel, HappyInGeneral, Josephbrophy, CompC, Keraunos, Nachdenklich, Mojo Hand, Marek69, Electron9, Peace01234, AlexanderM, Overridex, Doyley, Second Quantization, Z10x, Tellyaddict, Cool Blue, Sinn, LG4761, Hcobb, AgentPeppermint, InfernalPanda, Zachary, DaveJ7, Blathnaid, Srose, Mobilekick, DeusMP, Lajsikonik, SusanLesch, Dawnseeker2000, Eiffelle, AlefZet, Escarbot, Pie Man 360, Eleuther, LachlanA, Hmrox, KrakatoaKatie, AntiVandalBot, Rahularora1985, Majorly, Joejoew97, Gioto, Luna Santin, Caledones, Sirishar, Stile4aly, Opelio, Alois.Daniel, CZmarlin, Fru1tbat, Apiya27, 29productions, TheBlueFox, Prolog, Benclinch, Autocracy, Khin007, Almondwine, Tmopkisn, Tjmayerinsf, Postlewaight, Arghlookamonkey, Caffeinatedblog, Kristoferb, Povins, Sehsuan, Ankushj, Ran4, Alphachimpbot, Kzaral, Leevclarke, Lfstevens, A*A*, Canadian- 276 CHAPTER 56. MOBILE PHONE ACCESSORIES Bacon, Kniwor, Golgofrinchian, Res2216firestar, Kariteh, HanzoHattori, JAnDbot, Key-global, Harryzilber, Bobvila2, BenjaminGittins, MER-C, Kprateek88, Wesborland, Sonicsuns, Ericoides, Arch dude, Blood Red Sandman, Cleanupman, Dhp~enwiki, Grant Gussie, Sosh, Andonic, Roleplayer, Hut 8.5, Dave101, Greensburger, Dricherby, PhilKnight, AOL account, Rothorpe, Joneyf1, GoodDamon, Madhive, Y2kcrazyjoker4, LittleOldMe, SiobhanHansa, Acroterion, Yosh3000, MaxPont, Pedro, Whatever626, Bongwarrior, VoABot II, Peas and corn, Dannyc77, AuburnPilot, Jpmaurya, HorseloverFat, JamesBWatson, Adrian122, Think outside the box, BobTheMad, Cadsuane Melaidhrin, Pugetbill, Cumiskey192, Trottsky, Mphung, Euhedral, Nyttend, Paul Haymon, Dendrolimus, Froid, Nick Cooper, MadeinIndia, Bubba hotep, Catgut, MobileMistress, Have hat, will travel, Indon, Times10, Dhurowitz, Acornwithwings, Frijole, ArchStanton69, Mittosi, Thedreamdied, Robotman1974, Stoneice02, 28421u2232nfenfcenc, Badie, TerryChen, Allstarecho, Kingutd, Tswsl1989, Netboyak, Gomm, Marinebro0306, V 1993, Glen, Chris G, DerHexer, GermanX, Esanchez7587, Streetsk8ta4life, Cool.x, Patstuart, Flami72, Tidus187, Stewartpalmer, Khr0n0s, Gjd001, Stephenchou0722, Onlynokia, S3000, Alx 91, MartinBot, Dennisthe2, Bentleywannabe, PaulLev, Andycole, STBot, Gasheadsteve, Musicalmelodygirl, Arjun01, Tvoz, Solcuerda, Umeshunni, Jim.henderson, Brogman, Rettetast, Bissinger, Andsam, Jonathan Hall, Tskam1, Burnedthru, Kostisl, Mycroft7, CommonsDelinker, Duncanelliott, Nono64, AgarwalSumeet, PrestonH, Siliconov, Antb, Jeroldc, Slugger, HarZim, J.delanoy, Captain panda, Martinf hk, Pharaoh of the Wizards, Mange01, MoiraMoira, Trusilver, Darin-0, Rgoodermote, Chinese goods, Neutron Jack, Quiksilver11709, Ali, Bogey97, Redtestarossa, All Is One, SimpsonDG, Jesant13, Ginsengbomb, Boris Allen, Extransit, TrueCRaysball, Geoweb54, WarthogDemon, SedireX, Thaurisil, NerdyNSK, Ian.thomson, Scottrb, The-gr8, Davidprior, Acalamari, Ivanam, Aestiva, Cazanoma, DanielEng, Kingj123, WikiBone, It Is Me Here, Elkost, Monty54, Bot-Schafter, Katalaveno, Markseth, Atomichippo, Hometownmallonline, DarkFalls, McSly, Ignatzmice, Apurv1980, Tetonca, Mikael Häggström, Skier Dude, Ahodacsek, Beeva24, AntiSpamBot, (jarbarf), TomasBat, Vaughanemery, Michaellubelle, Btd, SJP, Carewser, Cobi, Mobile Cell Phone Forensics, Touch Of Light, ThinkBlue, Tanaats, Joeykry, Toby lodge, Potatoswatter, Grmarkam, Schwal, Deshawnjon, Cmichael, Andy Farrell, Juliancolton, Cometstyles, RB972, Yosarian~enwiki, Greatestrowerever, Jamesontai, Noctuidae, Crummie, Shawt-NurRhd, Danield101, Gtg204y, TWCarlson, Culdesacjungle, SquishyTheQueeniac, Useight, StoptheDatabaseState, TheNewPhobia, CardinalDan, CrZTgR, Idioma-bot, Funandtrvl, DecadeMan, Jc7919, Echosmoke, Black Kite, Lights, Buttin, X!, Flikes123, Dragonvulture, LeeColleton, Hellno2, Shiggity, The stripy penguine, Hammersoft, VolkovBot, Traf22, CWii, Science4sail, SimplyCellPhone, Leebo, Jeff G., Indubitably, Dmaonk, Mathteacher1729, Bovineboy2008, Soliloquial, Helplessstar88207~enwiki, Aesopos, Gracemusante, Cacolantern, Philip Trueman, WalrusMan118, RPlunk2853, FluffyWyld2, Trenwith, Martinevans123, Isaac Sanolnacov, Drunkenmonkey, Blendus, RiSeLing, TXiKiBoT, Prieplauka, Newtown11, Eve Hall, SethFreeman, Thepulse2007, Mettler, Aghibner, SK hockey fan, Graavy, Anonymous Dissident, Funky Monkey 2000, Kishonti~enwiki, Tangerineduel, WikipedianYknOK, Qxz, Piperh, RMWLLC, Warrush, Anna Lincoln, Aeharding, Lradrama, Melsaran, Kovianyo, CanOfWorms, Bagle, Abdullais4u, Canaima, LeaveSleaves, Edgar187, Raryel, Darkkaangel, Tim9798, PDFbot, Cremepuff222, Maxim, ARUNKUMAR P.R, C-M, Bkbroiler, Tri400, Shifter95, Sses401, Vladsinger, Jensgram, Aron.Foster, Graymornings, Poopyunderwear1, Gracenotes’ left sock, Synthebot, Altermike, Saramarie8789, Falcon8765, Hg5131, Richtom80, RMW42, Vchimpanzee, MyronAub, Sesshomaru, Unused0030, Runarreistrup, Amalia07, Rboxer, Agape25, Superdude444, Doc James, AlleborgoBot, Nagy, Symane, PGWG, Pc9889, Cheesecake13, PRChinaMan, Wwwwhite, Fearthisname, Jackky, Red, D. Recorder, Hmwith, Redoggy101, Marioblooper, Kbrose, DenverF666, Jimmayoy007, The Random Editor, Biscuittin, 3e solutions, Darkieboy236, Markomiha, SieBot, Froztbyte, Whiskey in the Jar, Smlowe5, Celeste67, Thennessey8910, Anhimgr8, Augustus Rookwood, YonaBot, Scarian, Jevo90, Luboogers25, Malcolmxl5, Ellbeecee, Loveshoes, Ashayh, Ypps~enwiki, Hertz1888, Jack Merridew, Iveschavira, Luisa Yeom, Da Joe, Caltas, Karlson753, Twinkler4, Shochin, DIAMOND LOVE2007, RJaguar3, Lcfuentes, CurranH, Feoray, Gravitan, LeadSongDog, Cbird09, Infodriveway, Bhagwatkumar, Nummer29, Wheelspins13, Dllew1, Blake3522, Archers princess, Jrfireboy2, Cocomaxwater, Chromaticity, Tiptoety, Radon210, Smsmasters, Larek, TheThingy, Glenibaby06, Stumbler7, Nopetro, Eamclellan, Exrev, Jnottingham13, JetLover, Undead Herle King, Aureliusweb, Jimthing, Jimblobodob, Guildwarsplayar, Istaro, Oxymoron83, Kkgorykid, Sammygooders, Faradayplank, AngelOfSadness, Physik, Editor91, Peter k john, Lightmouse, Tomi T Ahonen, Kd24, Macy, Sacon, Wrmscomet, Ooza, Spitfire19, Schmidty247, Correogsk, LonelyMarble, StaticGull, Martycell, Cyfal, Kdevin, Mygerardromance, Realm of Shadows, Thedarkcookie, Immy92, Vig vimarsh, Dust Filter, Altzinn, MichaelIvan, Petete333, Klaus100, Kelan19, Dabomb87, Superbeecat, Florentino floro, Cutiepie 10129, Princess habibu, Daveruzius, Adnanp, C0nanPayne, Tomahiv, Vonones, Perspective Vortex, Explicit, Mcarrieri, Falcon-eagle2007, Anthony060708, Cactuscake, Faithlessthewonderboy, Loren.wilton, Sfan00 IMG, Tanvir Ahmmed, Elassint, ClueBot, Admiral Norton, Schaea, Pressforaction, Cpljwlusmc, Stinkehund, PipepBot, Snigbrook, Badger Drink, Foxj, LondonBVE2, The Thing That Should Not Be, Cellfire1, Gpermant, TherionPhusikos, Rjd0060, Tsomas214, Cambrasa, EoGuy, Royalgam, Figarema, P0mbal, Frmorrison, SecretDisc, Phone2phonee, Klabber, CounterVandalismBot, Leodmacleod, Shaliya waya, Niceguyedc, Blanchardb, Harland1, Argonistic professor, Klabber1, Xjohnjohnx, Bob bobato, Neverquick, Volleyballspider, Danaeb, Michaelmoran, Namazu-tron, Glaurio2000, Amirul2008, Mmark089, MrTobe, Silverbackwireless, Mr. Laser Beam, Thewhoissuperb24, AcademicallyIntelligent, D10025g, 123456789abcdefghi, DragonBot, SteveRamone, SapientiaSativa, Pc on whee1s, Gimli007~enwiki, Excirial, KihakuNoSenshi, Iloveulikeafatkidlovescake, Congolese fufu, Fireflyfan1, Ashirv, Dan373, Rodgersmas214, Resoru, Smartfunda, Mas214Kapinga, Daymas214, John Nevard, ZHUMAS214, Jeffwashere, Smallmas214, Estirabot, Lartoven, TUMAS214, Lunchscale, Jotterbot, Chirag Patil, Okiefromokla, Promethean, Pokespot, GuffasBorgz7, JamieS93, Gbvjcczxhb, RayquazaDialgaWeird2210, Mgw89, Dekisugi, Dnaphd, Gundersen53, Queenmegmeg, Nukeless, Careida, Nedim.sh, Sallicio, Ottawa4ever, Polly, ChrisHodgesUK, Swingout, Orionrulesallpeeps, Sudhir.rao, Thingg, Error −128, Quinn111, Aitias, Volodimir~enwiki, Versus22, Teleomatic, Dana boomer, Mshadowsbabywoo, Xman4sho, Djk3, Katanada, David Chiam, Chuuplo, Johnuniq, SoxBot III, Apparition11, SF007, ClanCC, Ginbot86, DumZiBoT, InternetMeme, Loo4, Dairyqueen8, XLinkBot, Mattthistle, Emmette Hernandez Coleman, Gwandoya, Rror, Duncan, Mitch Ames, SilvonenBot, NellieBly, Ericloewe, Sawickin, Sweetpoet, Noctibus, Pcpersons, NHJG, Zodon, Cooljc~enwiki, Catgirl, Sk8erking85, Sassygirl101leahu, Supercool277, Websi7, Thatguyflint, Kbdankbot, Addbot, Speer320, Schesnais, Vandalism bot1, Jcfan710, Witysmartone, Bluejm2, Willking1979, AVand, Some jerk on the Internet, DOI bot, Alex1city, Ente75, Kiy765630, Fgnievinski, Pjjafc, Orangesbob, Nibbles249, Pieman196, Monkeysocks2, Ja2ck2ie2, Mohamedhp, Battleboom13, Naughtyshakil, CanadianLinuxUser, Rj1200, NjardarBot, Ka Faraq Gatri, Cst17, MrOllie, Austinnielson, Belmond, CarsracBot, Thom443, Ccacsmss, Lalalosurr, Glane23, DoraXplorer, Mathu321, Bloopasareverykool, Buddha24, Favonian, Jasper Deng, West.andrew.g, Tyw7, Livni, Ssseeeaaan, Deathspawn the suicidal, Numbo3-bot, Wikinoob123, Theking17825, Evildeathmath, Cylover, Sinadoom, Tide rolls, Ghustaff0809010, Verbal, Krano, Nuberger13, Aadieu, QuadrivialMind, Gail, Wireless friend, Abracadabration, Narayan, Jackelfive, Chaldor, Luckas-bot, HikaruTora, Yobot, Fonboozles, Walter.Geo, Geroldorules69ers, Tohd8BohaithuGh1, JSimmonz, Cflm001, Specious, Donfbreed, II MusLiM HyBRiD II, GOR42, KamikazeBot, IW.HG, South Bay, Tempodivalse, OregonD00d, Retro00064, Backslash Forwardslash, AnomieBOT, Bctwriter, Lilduff2008, 1exec1, IRP, Galoubet, Pyrrhus16, ISquishy, JackieBot, Majikboom, Solidsandie, Flewis, Bluerasberry, Limideen, B2031919, Rtyq2, Crockie422, Citation bot, IRKAIN2, Lisamcghee87, GACHealth, Syberiyxx, Patentideas, Glevinso, Frankenpuppy, Neurolysis, ArthurBot, Quebec99, Bobbyjoe101, Speedstick76, Rosenblattl, Xqbot, ManningBartlett, Bjorn Elenfors, Transity, Dockfish, Addihockey10, Capricorn42, Termininja, Robot85, Khajidha, GenQuest, TheWeakWilled, Repsrule, GrandKokla, JascalX, , Tomwsulcer, Connshearer, Handshaines, Karthik6129, Wiki2contrib, Shahzad11, GrouchoBot, Burstorange, Waffleboy666, 0wnag34life, Ute in DC, Wizardist, Kopieto, Mark Schierbecker, 56.9. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 277 SassoBot, Karghazini, Southberry, Kcdtsg, KMoore175, Catstuffer1, Kennny27, Yoganate79, Eckerslike, Connerc 11, LyleHoward, Shadowjams, Kyle Hardgrave, Bluesoju, Taka76, Klapouchy, FreeKnowledgeCreator, GliderMaven, FrescoBot, Akuvar, Kat081685, Chrsschm, Tobby72, GEBStgo, Tiramisoo, JuniperisCommunis, Varundbest10, Troglo, Austria156, DivineAlpha, Wireless Keyboard, HamburgerRadio, Avani089, Elvisforpresident, Citation bot 1, Zhwn24, Tonyupward, Ryannie1991, Rsolero, Nokia ST, Cpflieger, I dream of horses, Seals9889, Robert A. Maxwell, Chatfecter, The Arbiter, Toomuchcash, Angstorm, Dneubert, Tinton5, Cooltwig, PSUdesigner, Vincenzo 90, Jamesinderbyshire, Phoenix7777, Sajalkdas, Jirka.h23, FoxBot, Mjs1991, VEO15, TobeBot, Yunshui, DriveMySol, Lionslayer, Lotje, Ladiesman2215, Extra999, Olliecracknell, Aoidh, David Hedlund, Crysb, Lambanog, Trinary M01, Jamiespinks, Iloveyourfaceman, MegaSloth, FelixtheMagnificent, H.ehsaan, DARTH SIDIOUS 2, Northwestern guy, Renault555, Horshamknowsbest, Maryjaneadams, Lacastrian, Meeghaman, RjwilmsiBot, Anotherskinnykid, Scoreymjp, Vtstarin, Bokorember, NameIsRon, Ripchip Bot, Carnell robison, Pioneer valley, Realglobalist, Carolynlowe, Caster33, Lopifalko, Rubinl88, Esibun, Powerkeys, Chapy26, BobbyChristmas, Zaeriuraschi, Glamour girl1994, Bo789789, Becritical, Spidey9995, Stinkyindian, Northwesternep15, EmausBot, John of Reading, Repiceman89, WikitanvirBot, Ghostofnemo, Ever388, Emmalewis1, Karagirl25, Rusty Sheklelfurd, Dewritech, Qjawls2030, Modou 1990, Yt95, GoingBatty, Cicely5, G&CP, Zachanders, Wikipelli, Americanhaute, Evanh2008, Kkm010, Listmeister, Udvarias, Acategory, Jack Sebastian, Arunj 001, Idh0854, Samgj127, Pyro721, Unreal7, Alex Neman, Hamiltha, Palosirkka, Gsarwa, Rangoon11, ChuispastonBot, Wakebrdkid, Targaryen, DJDunsie, Ksmit139, Georgy90, Woolfy123, Diamondland, ResearchRave, Mikhail Ryazanov, Emma23 K, Jwhimmelspach, ClueBot NG, Jnorton7558, W.Kaleem, Matthiaspaul, Gilderien, Daveduv, David O. Johnson, Singhmahendra20, Theimmaculatechemist, DieSwartzPunkt, Mesoderm, ScottSteiner, Ivan345garcia, Yev121, Abcd888, Nigs12345, Zackaback, Chacha15, Funkymonkey1997, Aurelie Branchereau-Giles, Joshb094, Joshb09444, Theopolisme, Mobileready, Utgard~enwiki, Helpful Pixie Bot, GGink, FtDesoto, Julietlewis, Roshanamila, Ceekee, පසිඳු කාවින්ද, Webzoneme123, Phonenotebook, Nomam123123123, Skaldragon, Gob Lofa, Tyagirl100, Pine, Smart1954, Kndimov, Northamerica1000, RobLandau, AvocatoBot, Davidiad, Bobultranerd, Architect101, NNU-01-05100137, Rsamahamed, Ddavid2005, Shirudo, Russianamerican1, Cynival, BattyBot, Bagoto, RichardMills65, SchreibStang, Brimur05, Khazar2, Froekenjul, Harpsichord246, HuntersMoon22, BrightStarSky, Katiewiltshire, Dexbot, Aditya Mahar, Blobbie244, Jcardazzi, KarinaJ son, Lugia2453, Kskhh, Kevin12xd, Reatlas, Gabby Merger, Karthikeyankc, Polytope4d, Seqqis, Zalunardo8, Ryenocerous, Sahildhiman27091999, Andrewlyly, Spyglasses, Melody Lavender, Gokul.gk7, Saiful7, MameTozhio, Publiususa, Meteor sandwich yum, Lagoset, CyHack, Monkbot, Dannywong1190, Filedelinkerbot, Qwertyxp2000, Amarkowitz1, Bpmeller, Wiki.wonder.56, GeorginaMat, Maodit, Kaufmanitay, Morlvi, Junaid sipra, KasparBot and Anonymous: 2609 • Cellular frequencies Source: https://en.wikipedia.org/wiki/Cellular_frequencies?oldid=671667374 Contributors: CesarB, Kingturtle, Cluth, Merovingian, Rdcole, Rchandra, Beland, Mind21 98, Canterbury Tail, Andros 1337, Vsmith, Swid, Pmetzger, Giraffedata, Atlant, Stephan Leeds, Unixxx, Brycen, Woohookitty, Armando, Erebus555, Vegaswikian, AySz88, Mathiastck, Siddhant, Killdevil, WiMAXPro, Theda, NFH, Jnc8651, SmackBot, Elonka, Bluebot, Carbondiamond, Ksn, JustinRossi, JForget, DangerousPanda, CmdrObot, Rawling, Cydebot, RLE64, Lautsprecher~enwiki, Nisselua, Magioladitis, Mytomi, An Honest Conversation About Politics, Nyttend, V 1993, Jim.henderson, Nikpapag, Squiggleslash, Mange01, Mojodaddy, Hmwith, SieBot, Iandiver, Sauralf, InternetMeme, Svgalbertian, Addbot, Abacos, Angelia2041, RTG, Ericdabbs, Hadsn, FrescoBot, Biker Biker, A8UDI, Sambarutan, Vega702, Smitty0157, WikiSpector, NiteSnow, Okwengu, Ffirmin, Ramaksoud2000, Altaïr, Ryukxio, K7L, Ginsuloft, Ecbf, Wyn.junior and Anonymous: 99 • Tethering Source: https://en.wikipedia.org/wiki/Tethering?oldid=674389022 Contributors: Darkwind, Julesd, David Latapie, Nurg, Xanzzibar, Pne, OwenBlacker, John Foley, Welshie, Jaruzel, AllyUnion, Ashlux, Gbeeker, Lensovet, GregorB, Sega381, Mortenf, Foxmulder, CecilWard, D'Agosta, BiH, Borisbaran, SmackBot, Melchoir, KVDP, Brianski, Chris the speller, Thumperward, Snori, Jgera5, Jdthood, Jnavas, Frap, MrRadioGuy, MichaelBillington, Esrever, Hvn0413, Kvng, IvanLanin, Semper malus, Pithecanthropus, Zds, Kozuch, Wabatl, Affiray, Aebp2003, Ph.eyes, Minnaert, Albany NY, Tinucherian, Chlnarayana, Jim.henderson, Acalamari, Hibruce, Whitebro, Josh Tumath, Sawta, Jmrowland, A4bot, Applehead77, JukoFF, Michael Frind, Benoit Rochon, IndulgentReader, CMBJ, Kbrose, Biscuittin, Jerryobject, Treekids, Denisarona, ClueBot, SakuraAvalon86, Nnemo, ColinHelvensteijn, Boing! said Zebedee, Excirial, Alexbot, Qiuwo, DumZiBoT, XLinkBot, Jmkim dot com, MystBot, Addbot, Mortense, Poco a poco, Pngolla, 84user, Jarble, Legobot, Luckasbot, Edoe, Peter92542007, Maxí, AnomieBOT, Jim1138, Jo3sampl, HackTheGibson, Materialscientist, Kimsey0, Xqbot, RibotBOT, Rockin56, Taka76, Schw3rt, Chenopodiaceous, JeremySchriver, Winterst, LittleWink, Spidermario, Duncanlim, TobeBot, Sosomary, Miracle Pen, Mjolnir1134, Andrewshousha, EmausBot, Ms.henrick, Dewritech, Dhomstad, ZéroBot, Harcom, Joel8520, Wingman4l7, Hamiltha, A Bloke Wandering, Yukix9, DancingGerbil, ClueBot NG, Helpful Pixie Bot, Sfarry, BG19bot, WikiTryHardDieHard, Eshiv, Sb300869, Abumalih, Mtumbaya, Maquinadigital, Maleziyo, Shiroishimatora, Shierro, SFK2, DavidLeighEllis, Anurag03, Anuj ks and Anonymous: 120 • Mobile phone accessories Source: https://en.wikipedia.org/wiki/Mobile_phone_accessories?oldid=672884616 Contributors: Ronz, Bearcat, Orangemike, Antandrus, Rich Farmbrough, Lankiveil, BD2412, RussBot, Closedmouth, Banana04131, SmackBot, McGeddon, Gjs238, Ctbolt, IronGargoyle, Noah Salzman, Cydebot, Future Perfect at Sunrise, Gogo Dodo, PamD, MER-C, Y2kcrazyjoker4, T@nn, Jim.henderson, CommonsDelinker, J.delanoy, Martino3, Largoplazo, Biscuittin, L32007, Jojalozzo, EoGuy, Pcpersons, CANfilms, Yobot, OregonD00d, AnomieBOT, TracyMcClark, I dream of horses, LittleWink, Pianoplonkers, Aoidh, Bobgoldy, Autumnalmonk, RAN1, Emmalewis1, Mosiurrahman, ClueBot NG, BuyItFlogIt, Vibhijain, Strike Eagle, Baayi, Adallace, Nancypreetha, Zhgfsh, EagerToddler39, Shiv.k.gupta, Epicgenius, Red-eyed demon, Yea55, Eyesnore, Sailvan, Rdumobile, Sam Hollingsworth, Lagoset, Filedelinkerbot, KH-1, Emorigift, Alyastark and Anonymous: 42 56.9.2 Images • File:16QAM_Gray_Coded.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/1e/16QAM_Gray_Coded.svg License: CCBY-SA-3.0 Contributors: Own work Original artist: Splash • File:1990_CPA_6190.jpg Source: https://upload.wikimedia.org/wikipedia/commons/7/77/1990_CPA_6190.jpg License: Public domain Contributors: http://s-collection.com.ua/ru_co1_marki_sssr_1990_g_html.html Original artist: Post of Soviet Union. • File:1XEV_Mobile_Phone_Screenshot_blackberry.png Source: Phone_Screenshot_blackberry.png License: Fair use Contributors: BlackBerry® OS Original artist: ? https://upload.wikimedia.org/wikipedia/en/a/af/1XEV_Mobile_ • File:2007Computex_e21Forum-MartinCooper.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/1f/2007Computex_ e21Forum-MartinCooper.jpg License: CC-BY-SA-3.0 Contributors: Rico Shen Original artist: Rico Shen 278 CHAPTER 56. MOBILE PHONE ACCESSORIES • File:3121376_G_sized.jpg Source: https://upload.wikimedia.org/wikipedia/commons/2/22/3121376_G_sized.jpg License: Public domain Contributors: made by en:User:Towel401 Original artist: Towel401 • File:3GPP_Long_Term_Evolution_Country_Map.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9b/3GPP_Long_ Term_Evolution_Country_Map.svg License: CC0 Contributors: • Data: LTE World Map and LTE Evolution Report, p.30-32. (registration required) Original artist: Frank Bennett / Orionist • File:3G_With_USB_cable.jpg Source: https://upload.wikimedia.org/wikipedia/commons/9/96/3G_With_USB_cable.jpg License: CC BY 2.0 Contributors: originally posted to Flickr as 3G: With USB cable Original artist: Julien Min GONG • File:3G_symbol_Android.png Source: https://upload.wikimedia.org/wikipedia/commons/d/d4/3G_symbol_Android.png License: CC BY-SA 4.0 Contributors: Own work Derived work from Flickr image https://www.flickr.com/photos/hax/7367622758/ by Daniel Hackney (original date : 2012-06-13). Original artist: The RedBurn, Daniel Hackney • File:4G_LTE_Logo_Android_4.1_on_the_Galaxy_Nexus.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/11/4G_ LTE_Logo_Android_4.1_on_the_Galaxy_Nexus.jpg License: CC BY 2.5 Contributors: File:Android 4.1 on the Galaxy Nexus.jpeg Original artist: The RedBurn, Sitic • File:802_16-Schéma_synoptique_réalisé_avec_Inkscape.png Source: https://upload.wikimedia.org/wikipedia/commons/0/06/802_ 16-Sch%C3%A9ma_synoptique_r%C3%A9alis%C3%A9_avec_Inkscape.png License: CC-BY-SA-3.0 Contributors: Schéma synoptique réalisé avec Inkscape Original artist: Gilles Lécuyer • File:8PSK_Gray_Coded.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/11/8PSK_Gray_Coded.svg License: CC-BYSA-3.0 Contributors: Made by Splash using w:Inkscape. Original artist: Splash • File:ARIN_logo.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/fc/ARIN_logo.svg License: Public domain Contributors: ARIN @ a glance Original artist: American Registry for Internet Numbers • File:ASUS_Mobile_ZenFone6_20141109.jpg Source: https://upload.wikimedia.org/wikipedia/commons/8/8a/ASUS_Mobile_ ZenFone6_20141109.jpg License: CC0 Contributors: Own work Original artist: OnionBulb • File:Active_mobile_broadband_subscriptions_2007-2014.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/05/ Active_mobile_broadband_subscriptions_2007-2014.svg License: CC BY-SA 4.0 Contributors: Own work Original artist: Chris55 • File:Ambox_current_red.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/98/Ambox_current_red.svg License: CC0 Contributors: self-made, inspired by Gnome globe current event.svg, using Information icon3.svg and Earth clip art.svg Original artist: Vipersnake151, penubag, Tkgd2007 (clock) • File:Ambox_globe_content.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/bd/Ambox_globe_content.svg License: Public domain Contributors: Own work, using File:Information icon3.svg and File:Earth clip art.svg Original artist: penubag • File:Ambox_important.svg Source: https://upload.wikimedia.org/wikipedia/commons/b/b4/Ambox_important.svg License: Public domain Contributors: Own work, based off of Image:Ambox scales.svg Original artist: Dsmurat (talk · contribs) • File:Ambox_question.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/1b/Ambox_question.svg License: Public domain Contributors: Based on Image:Ambox important.svg Original artist: Mysid, Dsmurat, penubag • File:Android_L_Develpment_Preview.png Source: https://upload.wikimedia.org/wikipedia/commons/a/a7/Android_L_Develpment_ Preview.png License: Apache License 2.0 Contributors: Android L Developer Preview website Original artist: AOSP • File:BPSK_Gray_Coded.svg Source: https://upload.wikimedia.org/wikipedia/commons/4/41/BPSK_Gray_Coded.svg License: CCBY-SA-3.0 Contributors: ? Original artist: ? • File:Blackberry_Z10.jpg Source: https://upload.wikimedia.org/wikipedia/commons/0/0d/Blackberry_Z10.jpg License: CC BY-SA 3.0 Contributors: Own work Original artist: Romazur • File:BluetoothLogo.svg Source: https://upload.wikimedia.org/wikipedia/commons/f/fc/BluetoothLogo.svg License: Public domain Contributors: Bluetooth.com Original artist: House • File:BluetoothUSB.jpg Source: https://upload.wikimedia.org/wikipedia/commons/f/f2/BluetoothUSB.jpg License: Public domain Contributors: Transferred from en.wikipedia to Commons. Original artist: Abidh786 at English Wikipedia • File:Bluetooth_headset.jpg Source: https://upload.wikimedia.org/wikipedia/commons/c/c0/Bluetooth_headset.jpg License: CC-BYSA-3.0 Contributors: ? Original artist: ? • File:Bluetooth_protokoly.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9f/Bluetooth_protokoly.svg License: GFDL Contributors: Wersja rastrowa dostępna pod adresem: http://pl.wikipedia.org/wiki/Plik:Protokoly.gif Original artist: Wersję rastrową zamieścił użytkownik polskiego projektu wikipedii: Leszek Chuchla, Zwektoryzował: Krzysztof Zajączkowski • File:Caller_ID_receiver.jpg Source: https://upload.wikimedia.org/wikipedia/commons/5/5a/Caller_ID_receiver.jpg License: CC BYSA 3.0 Contributors: Transferred from en.wikipedia; transferred to Commons by User:Josve05a using CommonsHelper. Original artist: Sjcramer (talk). Original uploader was Sjcramer at en.wikipedia • File:CdmaOneNetworkGeneralView.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/09/ CdmaOneNetworkGeneralView.svg License: CC BY 3.0 Contributors: Own work Original artist: Pan Camel • File:Cerf’{}s_Up-marquee-20071031.jpg Source: https://upload.wikimedia.org/wikipedia/commons/a/a8/Cerf%27s_ Up-marquee-20071031.jpg License: CC BY 2.0 Contributors: Cerf’s up Original artist: Joi Ito from Inbamura, Japan • File:Channel_capacity_for_complex_constellations.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/cb/Channel_ capacity_for_complex_constellations.svg License: CC-BY-SA-3.0 Contributors: Own work Original artist: original code by w:User: Speedplane, adapted for SVG by Alessio Damato • File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: ? Contributors: ? Original artist: ? • File:Cordless.phone.750pix.jpg Source: https://upload.wikimedia.org/wikipedia/commons/1/1d/Cordless.phone.750pix.jpg License: Public domain Contributors: ? Original artist: ? 56.9. TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 279 • File:Crystal_Clear_app_browser.png Source: https://upload.wikimedia.org/wikipedia/commons/f/fe/Crystal_Clear_app_browser.png License: LGPL Contributors: All Crystal icons were posted by the author as LGPL on kde-look Original artist: Everaldo Coelho and YellowIcon • File:DBQPSK_timing_diag.png Source: https://upload.wikimedia.org/wikipedia/en/2/2f/DBQPSK_timing_diag.png License: Cc-bysa-3.0 Contributors: ? Original artist: ? • File:DELL_TrueMobile_350_Bluetooth_card.jpg Source: https://upload.wikimedia.org/wikipedia/commons/2/28/DELL_ TrueMobile_350_Bluetooth_card.jpg License: CC BY-SA 3.0 Contributors: Taken by User:Omegatron using a Canon Powershot SD110, modified in Photo Acute and The GIMP Original artist: User:Omegatron • File:DPSK_BER_curves.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/7c/DPSK_BER_curves.svg License: CC-BYSA-3.0 Contributors: Own work Original artist: Splash • File:Diff_enc_BPSK_BER_curves.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/13/Diff_enc_BPSK_BER_curves. svg License: CC-BY-SA-3.0 Contributors: Own work Original artist: Splash • File:Differential_Codec.png Source: https://upload.wikimedia.org/wikipedia/en/e/ed/Differential_Codec.png License: Cc-by-sa-3.0 Contributors: ? Original artist: ? • File:Disassembled_SIM_Card_Film.JPG Source: https://upload.wikimedia.org/wikipedia/commons/5/50/Disassembled_SIM_Card_ Film.JPG License: CC0 Contributors: Own work Original artist: Dabombazzz • File:Dishes_ft_worth2.JPG Source: https://upload.wikimedia.org/wikipedia/commons/e/e8/Dishes_ft_worth2.JPG License: Public domain Contributors: Transferred from en.wikipedia to Commons by Matt Heard using CommonsHelper. Original artist: Rockydallas at English Wikipedia • File:Drone_4.jpg Source: https://upload.wikimedia.org/wikipedia/commons/7/7b/Drone_4.jpg License: Public domain Contributors: Own work Original artist: Mmckinley • File:DynaTAC8000X.jpg Source: https://upload.wikimedia.org/wikipedia/commons/7/74/DynaTAC8000X.jpg License: CC BY-SA 3.0 Contributors: http://en.wikipedia.org/wiki/File:DynaTAC8000X.jpg Original artist: Redrum0486 • File:EDGE_symbol_Android.png Source: https://upload.wikimedia.org/wikipedia/commons/a/a7/EDGE_symbol_Android.png License: Public domain Contributors: Own work Original artist: The RedBurn, AliDabbirKhan • File:Edit-clear.svg Source: https://upload.wikimedia.org/wikipedia/en/f/f2/Edit-clear.svg License: Public domain Contributors: The Tango! Desktop Project. Original artist: The people from the Tango! project. And according to the meta-data in the file, specifically: “Andreas Nilsson, and Jakub Steiner (although minimally).” • File:Embedded_SIM_from_M2M_supplier_Eseye_with_an_adapter_board_for_evaluation_in_a_Mini-SIM_socket_ blurred.jpg Source: https://upload.wikimedia.org/wikipedia/commons/2/27/Embedded_SIM_from_M2M_supplier_Eseye_ with_an_adapter_board_for_evaluation_in_a_Mini-SIM_socket_blurred.jpg License: CC BY-SA 3.0 Contributors: https: //upload.wikimedia.org/wikipedia/commons/3/3b/Embedded_SIM_from_M2M_supplier_Eseye_with_an_adapter_board_for_ evaluation_in_a_Mini-SIM_socket.jpg Original artist: Paul Marshall UK, Benboy00 • File:Emblem_of_the_United_Nations.svg Source: https://upload.wikimedia.org/wikipedia/commons/5/52/Emblem_of_the_United_ Nations.svg License: Public domain Contributors: Based on File:Flag_of_the_United_Nations.svg Original artist: Spiff • File:Flag_of_Argentina.svg Source: https://upload.wikimedia.org/wikipedia/commons/1/1a/Flag_of_Argentina.svg License: Public domain Contributors: Based on: http://manuelbelgrano.gov.ar/bandera/creacion-de-la-bandera-nacional/ Original artist: (Vector graphics by Dbenbenn) • File:Flag_of_Australia.svg Source: https://upload.wikimedia.org/wikipedia/en/b/b9/Flag_of_Australia.svg License: Public domain Contributors: ? Original artist: ? • File:Flag_of_Brazil.svg Source: https://upload.wikimedia.org/wikipedia/en/0/05/Flag_of_Brazil.svg License: PD Contributors: ? Original artist: ? • File:Flag_of_Canada.svg Source: https://upload.wikimedia.org/wikipedia/en/c/cf/Flag_of_Canada.svg License: PD Contributors: ? Original artist: ? • File:Flag_of_Chile.svg Source: https://upload.wikimedia.org/wikipedia/commons/7/78/Flag_of_Chile.svg License: Public domain Contributors: Own work Original artist: SKopp • File:Flag_of_Colombia.svg Source: https://upload.wikimedia.org/wikipedia/commons/2/21/Flag_of_Colombia.svg License: Public domain Contributors: Drawn by User:SKopp Original artist: SKopp • File:Flag_of_Ecuador.svg Source: https://upload.wikimedia.org/wikipedia/commons/e/e8/Flag_of_Ecuador.svg License: Public domain Contributors: http://www.presidencia.gob.ec/pdf/Simbolos-Patrios.pdf Original artist: President of the Republic of Ecuador, Zscout370 • File:Flag_of_El_Salvador.svg Source: https://upload.wikimedia.org/wikipedia/commons/3/34/Flag_of_El_Salvador.svg License: Public domain Contributors: Own work Original artist: user:Nightstallion • File:Flag_of_Germany.svg Source: https://upload.wikimedia.org/wikipedia/en/b/ba/Flag_of_Germany.svg License: PD Contributors: ? Original artist: ? • File:Flag_of_Guam.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/07/Flag_of_Guam.svg License: Public domain Contributors: ? Original artist: ? • File:Flag_of_Guatemala.svg Source: https://upload.wikimedia.org/wikipedia/commons/e/ec/Flag_of_Guatemala.svg License: Public domain Contributors: Own work Original artist: User:K21edgo • File:Flag_of_India.svg Source: https://upload.wikimedia.org/wikipedia/en/4/41/Flag_of_India.svg License: Public domain Contributors: ? Original artist: ? wikimedia.svg Source: https://upload. transferred by User:M0rphzone using CommonsHelper.gov. Zscout370 • File:Flag_of_Peru.svg Source: https://upload.aspx?c_id=13050 Original artist: Various • File:Flag_of_South_Korea.org/wikipedia/commons/2/2c/Flag_of_Morocco. New York OCLC: 7548838.wikimedia.wikimedia.svg License: PD Contributors: ? Original artist: ? • File:Flag_of_Thailand. Modifications by Denelson83.svg Source: https://upload.wikimedia.jpg License: CC BY-SA 4.il/MFA/History/Modern%20History/Israel%20at%2050/The%20Flag%20and%20the%20Emblem Original artist: “The Provisional Council of State Proclamation of the Flag of the State of Israel” of 25 Tishrei 5709 (28 October 1948) provides the official specification for the design of the Israeli flag.0 Contributors: based on GSM Micro SIM Card vs.svg License: Public domain Contributors: Own work Original artist: Zscout370 • File:Flag_of_the_People’{}s_Republic_of_China.wikimedia.svg License: Public domain Contributors: Own work. The National Symbols Kit.280 CHAPTER 56.justice.wikimedia. redrawn by User:Denelson83 and User:Zscout370 • File:Flag_of_the_Philippines.wikimedia.org/wikipedia/en/a/ae/Flag_of_the_United_Kingdom.Break Apart.svg License: PD Contributors: ? Original artist: ? • File:Flag_of_the_United_Nations.mfa.org/wikipedia/commons/c/cf/Flag_of_Peru.svg License: Cc-bysa-3.svg License: Public domain Contributors: ? Original artist: ? • File:Flag_of_Russia.0 Contributors: Own work Original artist: User:AliDabbirKhan Source: • File:HTC_Thunderbolt.wikimedia. pp.svg License: PD Contributors: ? Original artist: ? • File:Folder_Hexagonal_Icon.org/wikipedia/commons/a/a9/Flag_of_Thailand.org/wikipedia/en/9/9e/Flag_of_Japan.gov.sg/who/42/National-Flag.(2012.svg Source: https://upload.aspx.svg License: CC0 Contributors: the actual flag Original artist: Unknown • File:Flag_of_Singapore.html Original artist: Drawn by User:SKopp.svg License: Public domain Contributors: Peru Original artist: David Benbennick • File:Flag_of_Puerto_Rico.org/wikipedia/commons/6/65/HSPA_plus_logo_ Android_Screenshot.06.wikimedia. Zscout370 and Madden.jpg License: CC BY-SA 4.svg License: Public domain Contributors: ? Original artist: ? • File:Flag_of_Mexico.svg License: PD Contributors: ? Original artist: ? • File:Flag_of_Jordan. Original artist: Ryry17354 at English Wikipedia • File:Hama_Twiddle.wikimedia.svg License: PD Contributors: ? Original artist: ? • File:Flag_of_Saudi_Arabia.svg Source: https://upload.wikimedia.svg Source: https://upload.wikimedia.org/wikipedia/en/4/48/Folder_Hexagonal_Icon.wikimedia.svg Source: https://upload. Construction and color guidelines (Russian/English) ← This site is not exist now.svg Source: https://upload.org/wikipedia/en/f/f3/Flag_of_Russia.org/wikipedia/commons/2/28/Flag_of_Puerto_Rico. Communications and the Arts.org/wikipedia/commons/c/c0/Flag_of_Jordan.org/wikipedia/commons/d/d4/Flag_of_Israel. as amended November 11. 5.wikimedia.hk/flags/eng/n_flag/ design.org/wikipedia/commons/2/2f/Flag_of_the_United_Nations. Official construction sheet here.svg Source: https://upload.wikipedia to Commons.svg Source: https://upload.0 Contributors: Own work Original artist: Hama GmbH & Co KG .svg Source: https://upload.svg Source: https://upload.05) Original artist: Various • File:Flag_of_Sweden.org/wikipedia/commons/0/02/HTC_Thunderbolt.jpg Source: https://upload.jpg License: CC BY-SA 3.org/wikipedia/commons/0/0d/Flag_of_Saudi_Arabia. MOBILE PHONE ACCESSORIES • File:Flag_of_Israel.flickr.org/wikipedia/en/4/4c/Flag_of_Sweden. Original artist: The RedBurn.org/wikipedia/commons/f/fc/Flag_of_Mexico.png License: CC BY-SA 3.svg License: Public domain Contributors: The drawing was based from http://app. GSM Mini Sim Card .0 Contributors: ? Original artist: ? • File:GSM_SIM_card_evolution.wikimedia.svg Source: https://upload.svg Source: https://upload.png https://upload. http://www.svg Source: https://upload.pantone.org/wikipedia/commons/0/09/Flag_of_South_Korea.0 Contributors: Transferred from en. ISBN 8880968010 Pantone 032 shade from http://www.wikimedia.wikimedia.com/pages/pantone/colorfinder.protocol.org/wikipedia/commons/e/e0/GSM_SIM_card_evolution. Clive Darra • File:HSPA_sign_shown_in_notification_bar_on_an_Android_powered_smartphone-_2014-04-28_13-56. Original artist: Wilfried Huss / Anonymous • File:Flag_of_the_United_States.wikimedia.org/wikipedia/en/a/a4/Flag_of_the_United_States.svg Source: https://upload.wikimedia.svg License: Public domain Contributors: Ordinance Act of the Law concerning the National Flag of the Republic of Korea.svg License: Public domain Contributors: http://www. 9 April 2006 • File:Flag_of_Morocco.svg Source: https://upload.wikimedia.gov. svg License: Public domain Contributors: Flag of the United Nations from the Open Clip Art website.org/wikipedia/commons/0/00/HSPA_sign_shown_in_notification_bar_on_an_Android_powered_ smartphone-_2014-04-28_13-56.ma (Arabic) Original artist: Denelson83.wikimedia.svg Original artist: Cvdr based on Justin Ormont's work • File:HSPA_plus_logo_Android_Screenshot.wikimedia. Colors from the book: (2001).svg License: Public domain Contributors: adala.0 Contributors: Own work Derived work from Flickr image https://www.org/wikipedia/commons/9/99/Flag_of_the_Philippines.jpg Source: https://upload.org/wikipedia/commons/f/fa/Flag_of_the_ People%27s_Republic_of_China..svg Source: https://upload.svg License: CC BY-SA 3. Singapore: Ministry of Information.wikimedia.wikimedia. • File:Flag_of_Japan.jpg Source: https://upload.svg License: Public domain Contributors: The design was taken from [1] and the colors were also taken from a Government website Original artist: User:Achim1999 • File:Flag_of_the_United_Kingdom.svg License: Public domain Contributors: This vector image was created with Inkscape.svg Source: https://upload. Original artist: Alex Covarrubias.www. 1952.com/photos/ osde-info/14787845766/in/photostream/ by Clive Darra (original date : 2014-08-02).org/wikipedia/commons/4/48/Flag_of_Singapore. United Nations (1962) The United Nations flag code and regulations.org/wikipedia/commons/f/fb/Hama_Twiddle.svg Source: https://upload. jpg License: CC-BY-SA-3.org/wikipedia/ commons/3/33/Member_states_of_the_International_Telecommunication_Union.0 Contributors: Own work Original artist: Kelvinsong • File:IPurse_Pouch_Phone_case_16.0 Contributors: Own work Original artist: Yann Forget • File:ITU_2.0 Contributors: Own work Original artist: Coolcaesar • File:Iden.png License: CC-BY-SA-3.wikimedia.56.wikimedia.JPG License: Public domain Contributors: Transferred from en.org/wikipedia/commons/6/6e/Mobile_payment_01.wikimedia.org/en/press/German/booklet.0 Contributors: Transferred from en.manually created version of the diagram from 3GPP TS 23.org/wikipedia/commons/3/3f/Internet_map_ 1024_-_transparent%2C_inverted.272 v9.svg License: Public domain Contributors: ? Original artist: ? • File:MicroB_USB_Plug.wikipedia to Commons.wikimedia.wikimedia.com Original artist: ? • File:IPhone_5S_home_button.wikimedia.org/wikipedia/commons/8/83/Ims_overview-2.wikipedia.png Source: https://upload.0 Contributors: Own work .org/wikipedia/commons/0/0f/Mergefrom.icann.org/wikipedia/commons/d/db/MicroB_USB_Plug.6.svg License: CC-BY-SA-3. AND LICENSES 281 • File:Huawei_E220_(Three).jpg Source: https://upload.16.png Source: https://upload.png License: CC BY 2.png Source: https://upload.wikimedia.png Original artist: Ims_overview.org/wikipedia/en/d/de/IEEE_802.jpg License: CC BY 3.jpg License: CC-BY-SA-3.png License: CC BY 3.org/wikipedia/commons/4/46/Icannheadquartersplayavista.wikimedia.png Source: https://upload.5 Contributors: Originally from the English Wikipedia.jpg License: CC-BY-SA-3.jpg Source: https://upload.png Source: https://upload.jpg Source: https://upload.16.JPG Source: https://upload.org/wikipedia/en/4/4f/ICANN. http://www.png Source: https://upload.png License: Public domain Contributors: Own work Original artist: Bluezy • File:Internet_map_1024_-_transparent.jpg License: CC BY-SA 3.org/wikipedia/commons/9/9e/IBM_Simon_ Personal_Communicator._inverted. description page is/was here.png License: ? Contributors: www.0 Contributors: Own work Original artist: Thepurse • File:ITU.jpg Source: https://upload.org/wikipedia/commons/7/77/ITU.0 Contributors: Own work Original artist: User:masamic • File:Mobile_payment_01.png License: CC-BY-SA-3. jpg License: CC BY-SA 3.org/wikipedia/commons/a/a9/ITU_monument%2C_Bern.jpg Source: https://upload.wikimedia.png Source: https://upload.png License: Public domain Contributors: • Ims_overview.JPG Source: https://upload.wikimedia.jpg Source: https://upload.wikimedia.wikimedia.png Source: https://upload.jpg Source: https://upload.png Source: https://upload.jpg License: CC BY 3.svg Source: https://upload.org/16/ website.png License: Fair use Contributors: The logo is from the http://www.png: Bluezy • File:Ims_overview. Original artist: Alinor at English Wikipedia • File:Merge-arrow.wikimedia.org/wikipedia/en/2/23/ICANN_ Government_Advisory_Committee.0 Contributors: Own work Original artist: Yann Forget • File:ITU_monument.wikimedia.0 Contributors: Own work Original artist: Korax1214 • File:IBM_Simon_Personal_Communicator.jpg Source: https://upload.org/wiki/File:IBM_SImon_in_charging_ station.org/wikipedia/commons/b/b2/Lacnicheadquarters.wikimedia.svg License: Public domain Contributors: ? Original artist: ? • File:Mergefrom.wikimedia. Stage 2 (Release 9)" Original artist: go2null • File:Lacnicheadquarters.org/wikipedia/commons/5/5e/Iden.svg Source: https://upload.ieee802.wikimedia.wikimedia.wikimedia.wikimedia.wikimedia.png License: Public domain Contributors: http://commons.9.wikipedia • File:Ims_overview-2.apple.org/wikipedia/commons/2/20/Huawei_E220_%28Three%29.0 Contributors: Own work Original artist: Japinderum • File:IEEE_802.0 Contributors: Own work Original artist: HLundgaard • File:Mobile_phone_evolution.svg Source: https://upload.ieee802.org/wikipedia/en/a/af/ LTE-CSFB-E-UTRAN-UTRAN-GERAN-Interfaces.org/16/logo.org/wikipedia/commons/a/aa/Merge-arrow. CONTRIBUTORS.wikimedia.org/wikipedia/en/3/3e/IOS_8_Homescreen.org/wikipedia/commons/6/60/Ims_overview.org/wikipedia/commons/d/d3/ITU_2.wikimedia.jpg License: CC BYSA 3._Bern.wikimedia.JPG License: CC BY-SA 3.jpg License: Public domain Contributors: Own work Original artist: Anders . TEXT AND IMAGE SOURCES.0 Contributors: ? Original artist: ? • File:Icannheadquartersplayavista. transferred to Commons by User:Quadell using CommonsHelper.jpg Source: https://upload.png Original artist: Bcos47 • File:ICANN.svg License: Fair use Contributors: http://www.org/wikipedia/commons/6/6d/IPhone_5S_home_button.wikimedia.png Original artist: ? • File:IOS_8_Homescreen.0 Contributors: Own work Original artist: FabioMr • File:Member_states_of_the_International_Telecommunication_Union. Original artist: The Opte Project • File:LTE-CSFB-E-UTRAN-UTRAN-GERAN-Interfaces.0 (2010-12): “Circuit Switched Fallback in Evolved Packet System. Original artist: Original uploader was MrChrome at en.org/wikipedia/commons/c/cf/IPurse_Pouch_Phone_case_ 16.pdf Original artist: ? • File:ICANN_Government_Advisory_Committee.org/wikipedia/commons/d/d6/Mobile_phone_evolution.svg Source: https://upload. png Source: https://upload.wikimedia.svg Source: https://upload.svg License: Public domain Contributors: Based on the Junicode font Original artist: Glanthor Reviol • File:Ruzgar-deneme-yönetici4.wikimedia.wikipedia to Commons.0 Contributors: Own work Original artist: User:Notbonbon • File:Portal-puzzle.svg Source: https://upload. MOBILE PHONE ACCESSORIES • File:Mobile_phone_map_1980-2009.jpg Source: https://upload.org/wikipedia/commons/d/d1/Mobile_phone_map_ 1980-2009.org/wikipedia/en/f/fd/Portal-puzzle.org/wikipedia/en/2/2e/Qi_logo.svg Source: https://upload.org/wikipedia/commons/a/ad/Pi-by-O-QPSK_Gray_Coded.org/wikipedia/commons/8/8f/QPSK_Gray_Coded. 3.jpg License: CC-BY-SA-3.wikimedia.svg License: CC BY-SA 4.wikimedia.JPG Source: https://upload.wikimedia.wikimedia.wikimedia.wikipedia.jpg Source: https://upload.openmobilealliance.svg License: CCBY-SA-3.0 Contributors: Own work Original artist: User:Georgy90 .wikimedia.org/wikipedia/commons/c/cd/ NocellphonesSouthsidePlaceTX.org Original artist: HappyCamper • File:Runic_letter_berkanan.png created by User:Equazcion Original artist: Tkgd2007 • File:Receiver_QPSK.org/wikipedia/en/b/b7/OMA_logo.svg License: CC-BYSA-3.svg Source: https://upload.svg License: Public domain Contributors: Based on Runic letter berkanan.jpg License: CC-BY-SA-3.wikimedia.) Original artist: Towel401 (talk) • File:OMA_logo.) Original artist: Mfatic • File:Pi-by-4-QPSK_Gray_Coded.wikimedia.gif Source: https://upload.org/wikipedia/commons/6/6f/Runic_letter_ior. I dug this out of a drawer and took the photo myself. Original artist: ? • File:Question_book-new.org/wikipedia/commons/7/7b/Oqpsk_phase_plot.org/wikipedia/commons/a/a5/Pi-by-4-QPSK_Gray_Coded.org/wikipedia/commons/e/e7/Mobile_phone_ subscribers_1997-2014_ITU.png Source: https://upload.wikimedia.wikipedia.org/wikipedia/en/9/99/Question_book-new.org/ Original artist: ? • File:OQPSK_timing_diagram. 220x296 (12719 Byte) (Palm Pilot 5000 This template will categorize into Category:Wikipedia license migration candidates.svg Source: https://upload.0 Contributors: • Oqpsk_phase_plot.wikimedia.org/wikipedia/commons/7/77/PSK_BER_curves.svg Source: https://upload.282 CHAPTER 56.png Source: https://upload.png License: Public domain Contributors: Own work Original artist: Splash • File:Oqpsk_phase_plot.wikimedia.jpg License: CC BY-SA 3.wikimedia.wikimedia.org: 00:35.0 Contributors: wikipedia english Original artist: Splash • File:Pi-by-O-QPSK_Gray_Coded. Based on Image:Question book.org/wikipedia/commons/b/be/QPSK_timing_diagram.png Source: https://upload.PNG Source: https://upload.png License: CC-BY-SA-3. Mfatic .org/wikipedia/commons/b/bc/Pi-by-4-QPSK_timing_ diagram.0 Contributors: en.0 Contributors: en.0 Contributors: Own work Original artist: The Anome • File:NocellphonesSouthsidePlaceTX.org/wikipedia/en/9/96/Mobile_wimax_usb.org/wikipedia/commons/f/fb/Ruzgar-deneme-y%C3% B6netici4.0 Contributors: Own work Original artist: Mik81 • File:Pmc_wizird.png License: CC-BY-SA-3.gif License: CC BY-SA 3.wikimedia.png Original artist: • This hand-crafted SVG version by Qef (talk) • File:PSK_BER_curves.svg License: Fair use Contributors: The logo may be obtained from Wireless Power Consortium.0 Contributors: Own work Original artist: Chris55 • File:Mobile_wimax_usb.org/wikipedia/commons/c/c2/Pmc_wizird.png License: CC-BY-SA-3.wikimedia.svg Source: https://upload.org/wikipedia/commons/6/6e/Runic_letter_berkanan.jpg Source: https://upload.org/wikipedia/commons/1/1a/Receiver_QPSK.png.png License: Fair use Contributors: http://www. .org/wikipedia/commons/e/e7/PalmPilot5000.jpg License: PD Contributors: Photo of product as supplied by WiMAX Network Operator Original artist: Anonymous • File:Multiplexing_diagram. Original artist: Splash • File:Pi-by-4-QPSK_timing_diagram.wikimedia.0 Contributors: ? Original artist: ? • File:QPSK_timing_diagram.0 Contributors: Own work Original artist: Michael Hale • File:Mobile_phone_subscribers_1997-2014_ITU. .jpg License: Public domain Contributors: Own work (Original text: I (Towel401 (talk)) created this work entirely by myself.0 Contributors: en.0 Contributors: Created from scratch in Adobe Illustrator. Jul 2004 .wikipedia.wikimedia.wikimedia.org/wikipedia/commons/6/6f/Multiplexing_diagram.jpg Source: https://upload.0 Contributors: Transferred from tr.png Source: https://upload.org/wikipedia/commons/4/43/OQPSK_timing_diagram.svg Source: https://upload.JPG License: Public domain Contributors: Own work Original artist: WhisperToMe • File:Nokia6650_unlocked.svg Source: https://upload.org/wikipedia/commons/4/4e/SIM_Card.org Original artist: Splash • File:Qi_logo. svg License: CC-BY-SA-3.wikimedia. Original artist: The original uploader was Ruzgar at Turkish Wikipedia • File:SIM_Card.svg License: Public domain Contributors: ? Original artist: ? • File:QPSK_Gray_Coded.wikimedia.wikimedia.svg License: Cc-by-sa-3.PNG License: CC-BY-SA3.svg License: CC BY-SA 3.wikimedia.svg License: CC-BYSA-3. Original artist: ClaesWallin • File:Runic_letter_ior. which was based on the Junicode font.svg Source: https://upload.wikimedia. svg License: CC-BY-SA-3.0 Contributors: Own work Original artist: Splash • File:PalmPilot5000.jpg Source: https://upload.0 Contributors: Made by Splash using w:Inkscape.svg Source: https://upload.org/wikipedia/commons/f/ff/Nokia6650_unlocked.svg Source: https://upload. org/wikipedia/en/4/48/WP8.png Source: https://upload. CONTRIBUTORS.wikimedia.0 Contributors: Own work Original artist: Kirk • File:UMTS-fridge.svg Source: https://upload.wikimedia.org/wikipedia/en/3/37/Transmitter_QPSK_2.jpg Source: https://upload.svg License: Public domain Contributors: • Vrd_blocks. Esham (bdesham) • File:Tf_sim_both_sides.svg License: Public domain Contributors: Created by bdesham with Inkscape.wikimedia.wikimedia.jpg License: CC BY 2.svg Source: https://upload.wikimedia. based upon Text-x-generic. Original artist: Benjamin D.org/wikipedia/en/9/9c/TISPAN_IMS_Reference_ Architecture.0 Contributors: Own work Original artist: Japanexperterna] • File:Virtual_Retinal_Display_Diagram.org/wikipedia/commons/1/1e/UMTS-fridge.jpg Source: https://upload.jpg License: Public domain Contributors: www.0 Contributors: Own work Original artist: PPP • File:UMTS_structures. 2004 Sep 5 (UTC) Original artist: .jpg License: CC-BY-SA-3. The original uploader was Mozzerati at English Wikipedia • File:Telecom-icon.navy.png License: Fair use Contributors: Microsoft (http://blogs.jpg Source: https://upload.0 Contributors: originally posted to Flickr as Samsung CDMA Phone Original artist: Steve Jurvetson • File:Satellite_phone.jpg License: Public domain Contributors: azermarka.jpg License: Public domain Contributors: uj020288 Original artist: User:uj020288 • File:Text_document_with_red_question_mark.wikimedia. jpg License: CC BY-SA 3.1_Start_Screen.jpg License: CC-BYSA-3. TEXT AND IMAGE SOURCES.svg Source: https://upload.org/wikipedia/commons/6/61/Satellite_phone.wikimedia.aspx) Original artist: Microsoft Corporation . AND LICENSES 283 • File:SIM_Card_Holder.org/wikipedia/en/d/db/Symbol_list_class.0 Contributors: Own work (Zephyris) Original artist: Richard Wheeler (Zephyris) • File:Samsung_4G_LTE_modem-4.org/wikipedia/commons/d/de/Samsung_4G_LTE_modem-4.jpg Source: https://upload.org/wikipedia/en/1/10/WISP_CPE_installed_on_ a_residence.png Source: https://upload.jpg Source: https://upload.JPG License: PD Contributors: ? Original artist: ? • File:WP8.com/windows_phone/b/windowsphone/archive/2014/04/02/ cortana-yes-and-many-many-other-great-features-coming-in-windows-phone-8-1.svg from the Tango project.jpeg Source: https://upload.jpg License: CC BY 2. Mozzerati 13:13.jpg Source: https://upload.gif: Tadtad • File:WISP_CPE_installed_on_a_residence.0 Contributors: Own work Original artist: Victorgrigas • File:Smartcard_chip_structure_and_packaging_EN.wikimedia.0 Contributors: Own work Original artist: Prolineserver (<a href='//commons.org/wikipedia/commons/a/a4/Text_document_ with_red_question_mark.org/wikipedia/commons/2/2d/USB_battery_charger.JPG Source: https://upload.org/wikipedia/commons/8/81/UMTS_structures.jpg Source: https://upload.png License: Public domain Contributors: Own work Original artist: Koman90 • File:Transmitter_QPSK_2.org/wikipedia/commons/8/89/Symbol_book_class2.svg Source: https://upload.0 Contributors: Own work Original artist: Rait • File:Tdma-frame-structure.jpg Source: https://upload.org/wikipedia/commons/4/4e/Telecom-icon.wikimedia.svg Source: https://upload.org/wikipedia/commons/7/7f/Typical_cellphone_SIM_ cards.org/wikipedia/commons/2/23/Telia_micro_SIM_with_ brackets.JPG Source: https://upload.mil/view_single.png Source: https://upload.gif Original artist: Vrd_blocks.png Source: https://upload.svg License: CC BY-SA 2.wikimedia._2015-1223.org/wikipedia/commons/6/61/Virtual_Retinal_Display_ Diagram.wikimedia.JPG License: CC BY-SA 3.wikimedia.png License: CC-BY-SA-3.org/wikipedia/commons/d/d6/Sidewalk_ electronics_repair_in_Hong_Kong.wikimedia.0 Contributors: The diagram was drawn by me and I hereby donate the copy on Wikipedia to the Wikipedia project.wikimedia.wikimedia.windows.org/wikipedia/commons/0/00/Galaxy_note.5 Contributors: Own work Original artist: • File:Stamps_of_Azerbaijan.svg License: ? Contributors: • drawing by Own work • icons from Gnome Original artist: Tsaitgaist • File:USB_battery_charger.svg License: Public domain Contributors: ? Original artist: ? • File:Telia_micro_SIM_with_brackets.svg License: Public domain Contributors: ? Original artist: ? • File:TISPAN_IMS_Reference_Architecture.wikimedia.org/wikipedia/commons/8/8a/SIM_Card_Holder.org/wikipedia/commons/2/2e/Smartcard_ chip_structure_and_packaging_EN.5 Contributors: Mad by Lokal_Profil by combining: Original artist: Lokal_Profil • File:Symbol_list_class.jpg Source: https://upload.org/wikipedia/commons/1/14/Stamps_of_ Azerbaijan%2C_2015-1223.org/wikipedia/commons/9/9e/Tethering.wikimedia.org/wiki/User_talk: Prolineserver' title='User talk:Prolineserver'>talk</a>) • File:Samsung_CDMA_Phone.wikimedia.PNG License: Cc-bysa-3.0 Contributors: ? Original artist: ? • File:Typical_cellphone_SIM_cards.wikimedia.jpg Source: https://upload.wikimedia.png License: CC-BY-SA-3.svg License: CC BY-SA 3.org/wikipedia/commons/7/71/Tf_sim_both_sides.org/wikipedia/commons/f/f9/Tdma-frame-structure.jpg) Original artist: Jeffrey Russell • File:Sidewalk_electronics_repair_in_Hong_Kong.asp?id=23384 (Image 050404-N-6665R-343.wikimedia.wikimedia.org/wikipedia/commons/7/76/Samsung_CDMA_Phone.wikimedia.jpg License: CC BY-SA 3.wikimedia.0 Contributors: Own work Original artist: Justin Ormont • File:Smartphone.1_Start_Screen.jpg License: CC-BY-SA-3.56.0 Contributors: Own work Original artist: Mroach • File:Tethering.svg Source: https://upload.PNG Source: https://upload.wikimedia.az Original artist: Post of Azerbaijan/Azermarka • File:Symbol_book_class2.jpg License: CC BY 3.9.svg Source: https://upload.wikimedia. based on original logo tossed together by Brion Vibber • File:Wimax.svg Source: https://upload.0 Contributors: originally posted to Flickr as Armoires contenant les équipements WiMAX Original artist: Groupe Aménagement Numérique des Territoires • File:WiSOA_Logo_80px.png: Phil Holmes • File:WiMAX_equipment.jpg License: CC BY 2. User:Ramac et al.jpg Source: https://upload.284 CHAPTER 56.wikimedia.wikimedia.org/wikipedia/commons/f/f8/Wiktionary-logo-en.0 Contributors: Own work Original artist: Benjamin M.wikimedia. Original artist: Vectorized by Fvasconcellos (talk · contribs).3 Content license • Creative Commons Attribution-Share Alike 3.svg License: CC-BY-SA-3.org/wikipedia/commons/7/7a/WiSOA_Logo_80px.wikimedia.org/wikipedia/commons/1/1c/Wiki_letter_w_cropped.wikimedia.9.org/wikipedia/commons/1/13/WiMAXArchitecture. svg License: CC BY-SA 3.org/wikipedia/commons/d/df/Wikibooks-logo-en-noslogan.svg License: Public domain Contributors: • WiMAXArchitecture.0 Contributors: Own work Original artist: User:Bastique.jpg Source: https://upload.0 Contributors: • Wiki_letter_w. A'Lee 56.svg: Jarkko Piiroinen • File:Wikibooks-logo-en-noslogan.png.0 .jpg License: Attribution Contributors: ? Original artist: ? • File:Wiki_letter_w_cropped.svg Source: https://upload.svg Source: https://upload.svg Source: https://upload.org/wikipedia/commons/7/76/Wimax.svg Source: https://upload.svg Original artist: Wiki_letter_w.wikimedia.org/wikipedia/commons/d/d2/WiMAX_equipment.wikimedia. MOBILE PHONE ACCESSORIES • File:WiMAXArchitecture.svg License: Public domain Contributors: Vector version of Image:Wiktionary-logo-en.png Original artist: WiMAXArchitecture. • File:Wiktionary-logo-en.svg License: CC-BY-SA-3.