summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.lof
diff options
context:
space:
mode:
authorTom2012-02-13 18:56:42 +0100
committerTom2012-02-13 18:56:42 +0100
commit260d6ca091d5959891e5ced30aae3717c8a4e55f (patch)
treec33eb3e2cb2baff0b394961c0bc63084c391c107 /Tex/Master/Master.lof
parentimsi catcher section started (diff)
downloadimsi-catcher-detection-260d6ca091d5959891e5ced30aae3717c8a4e55f.tar.gz
imsi-catcher-detection-260d6ca091d5959891e5ced30aae3717c8a4e55f.tar.xz
imsi-catcher-detection-260d6ca091d5959891e5ced30aae3717c8a4e55f.zip
Template.vsd added for images
Diffstat (limited to 'Tex/Master/Master.lof')
-rw-r--r--Tex/Master/Master.lof10
1 files changed, 5 insertions, 5 deletions
diff --git a/Tex/Master/Master.lof b/Tex/Master/Master.lof
index 6d11d21..79976be 100644
--- a/Tex/Master/Master.lof
+++ b/Tex/Master/Master.lof
@@ -2,15 +2,15 @@
\addvspace {10\p@ }
\addvspace {10\p@ }
\contentsline {figure}{\numberline {2.1}{\ignorespaces Growth of mobile GSM subscriptions. Compiled from \cite {GSM2009,GSM_history2011,GSM_stats2011}}}{4}
-\contentsline {figure}{\numberline {2.2}{\ignorespaces The main components of a GSM network.}}{5}
-\contentsline {figure}{\numberline {2.3}{\ignorespaces Authentication procedure}}{11}
+\contentsline {figure}{\numberline {2.2}{\ignorespaces The main components of a GSM network.}}{6}
+\contentsline {figure}{\numberline {2.3}{\ignorespaces Authentication procedure}}{12}
\contentsline {figure}{\numberline {2.4}{\ignorespaces Mapping of functional entities on the 900Mhz band.}}{14}
\contentsline {figure}{\numberline {2.5}{\ignorespaces Theoretical arrangement of radio cells compared to a realistic alignment. Cells with the same number share the same frequency \cite {GSM2009}.}}{15}
-\contentsline {figure}{\numberline {2.6}{\ignorespaces Common base station configurations. Compiled from \cite {protocols1999}.}}{15}
+\contentsline {figure}{\numberline {2.6}{\ignorespaces Common base station configurations. Compiled from \cite {protocols1999}.}}{16}
\contentsline {figure}{\numberline {2.7}{\ignorespaces Cyphering procedure for one frame of voice data. Adopted from \cite {kommsys2006}.}}{18}
\contentsline {figure}{\numberline {2.8}{\ignorespaces The combination of FDMA and TDMA.}}{19}
\contentsline {figure}{\numberline {2.9}{\ignorespaces Hierarchical Composition of the different frames.}}{20}
-\contentsline {figure}{\numberline {2.10}{\ignorespaces Structural Comparison of different Burst types. After \cite {GSM2009}.}}{20}
+\contentsline {figure}{\numberline {2.10}{\ignorespaces Structural Comparison of different Burst types. After \cite {GSM2009}.}}{21}
\contentsline {figure}{\numberline {2.11}{\ignorespaces Example mapping of logical channels. After \cite {protocols1999}.}}{22}
-\contentsline {figure}{\numberline {2.12}{\ignorespaces Example of Multiframe-configurations for a base station \cite {kommsys2006}.}}{23}
+\contentsline {figure}{\numberline {2.12}{\ignorespaces Example of Multiframe-configurations for a base station \cite {kommsys2006}.}}{24}
\contentsline {figure}{\numberline {2.13}{\ignorespaces The ''GA 900'' and a self build IMSI-Catcher.}}{26}