summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.aux
diff options
context:
space:
mode:
Diffstat (limited to 'Tex/Master/Master.aux')
-rw-r--r--Tex/Master/Master.aux62
1 files changed, 48 insertions, 14 deletions
diff --git a/Tex/Master/Master.aux b/Tex/Master/Master.aux
index 939969c..ac42529 100644
--- a/Tex/Master/Master.aux
+++ b/Tex/Master/Master.aux
@@ -17,6 +17,9 @@
\citation{GSM2009}
\citation{protocols1999}
\citation{kommsys2006}
+\citation{GSM2009}
+\citation{protocols1999}
+\citation{kommsys2006}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
@@ -25,6 +28,7 @@
\FN@pp@footnotehinttrue
\citation{protocols1999}
\citation{kommsys2006}
+\citation{GSM2009}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
@@ -141,20 +145,52 @@
\newlabel{sec:Um}{{2.3}{18}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.8}{\ignorespaces The combination of FDMA and TDMA.}}{19}}
\newlabel{fig:fdma_tdma}{{2.8}{19}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.9}{\ignorespaces Hierarchical Composition of the different frames.}}{19}}
-\newlabel{fig:frame_hierarchy}{{2.9}{19}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}Radio Transmission}{19}}
\newlabel{sec:radio}{{2.3.1}{19}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2.10}{\ignorespaces Structural Comparison of different Burst types.}}{19}}
-\newlabel{fig:burst_types}{{2.10}{19}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Logical Channels}{20}}
-\newlabel{sec:channels}{{2.3.2}{20}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}Layers}{20}}
-\@writefile{toc}{\contentsline {section}{\numberline {2.4}IMSI-Catcher}{20}}
-\newlabel{sec:catcher}{{2.4}{20}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{20}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Possible Attacks}{20}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.3}Law situation in Germany}{20}}
+\@writefile{toc}{\contentsline {subsubsection}{Frame Numbering}{19}}
+\citation{GSM2009}
+\citation{GSM2009}
+\citation{GSM2009}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.9}{\ignorespaces Hierarchical Composition of the different frames.}}{20}}
+\newlabel{fig:frame_hierarchy}{{2.9}{20}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.10}{\ignorespaces Structural Comparison of different Burst types. After \cite {GSM2009}.}}{20}}
+\newlabel{fig:burst_types}{{2.10}{20}}
+\@writefile{toc}{\contentsline {subsubsection}{Burst Types}{20}}
+\citation{protocols1999}
+\citation{protocols1999}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}Logical Channels}{21}}
+\newlabel{sec:channels}{{2.3.2}{21}}
+\citation{kommsys2006}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.11}{\ignorespaces Example mapping of logical channels. After \cite {protocols1999}.}}{22}}
+\newlabel{fig:channels}{{2.11}{22}}
+\@writefile{toc}{\contentsline {subsubsection}{Dedicated Channels}{22}}
+\@writefile{toc}{\contentsline {subsubsection}{Common Channels}{22}}
+\citation{gsm0502}
+\citation{GSM2009}
+\citation{GSM2009}
+\citation{kommsys2006}
+\citation{kommsys2006}
+\citation{kommsys2006}
+\citation{protocols1999}
+\@writefile{lof}{\contentsline {figure}{\numberline {2.12}{\ignorespaces Example of Multiframe-configurations for a base station \cite {kommsys2006}.}}{23}}
+\newlabel{fig:channel_example}{{2.12}{23}}
+\@writefile{toc}{\contentsline {subsubsection}{Combinations}{23}}
+\citation{3gpp_ts_0405}
+\citation{3gpp_ts_0406}
+\@writefile{lot}{\contentsline {table}{\numberline {2.5}{\ignorespaces Possible combinations of logical channels for the base station. From \cite {GSM2009}.}}{24}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.3}Layers}{24}}
+\newlabel{sec:layers}{{2.3.3}{24}}
+\@writefile{toc}{\contentsline {paragraph}{Physical Layer (Layer 1):}{24}}
+\@writefile{toc}{\contentsline {paragraph}{Data Link (Layer 2):}{24}}
+\citation{protocols1999}
+\@writefile{toc}{\contentsline {paragraph}{Network (Layer 3):}{25}}
+\@writefile{toc}{\contentsline {section}{\numberline {2.4}IMSI-Catcher}{25}}
+\newlabel{sec:catcher}{{2.4}{25}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{25}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.2}Possible Attacks}{25}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.4.3}Law Situation in Germany}{25}}
+\FN@pp@footnotehinttrue
+\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
\bibstyle{acm}
\citation{*}
@@ -173,8 +209,6 @@
\bibcite{protocols1999}{12}
\FN@pp@footnotehinttrue
\FN@pp@footnotehinttrue
-\FN@pp@footnotehinttrue
-\FN@pp@footnotehinttrue
\@writefile{toc}{\contentsline {chapter}{Bibliography}{I}}
\bibcite{hsdpa}{13}
\bibcite{hsupa}{14}