summaryrefslogtreecommitdiffstats
path: root/Tex/Master/Master.toc
diff options
context:
space:
mode:
Diffstat (limited to 'Tex/Master/Master.toc')
-rw-r--r--Tex/Master/Master.toc37
1 files changed, 20 insertions, 17 deletions
diff --git a/Tex/Master/Master.toc b/Tex/Master/Master.toc
index 66db81c..752ea2b 100644
--- a/Tex/Master/Master.toc
+++ b/Tex/Master/Master.toc
@@ -5,23 +5,26 @@
\contentsline {section}{\numberline {2.1}A Historical Perspective}{3}
\contentsline {section}{\numberline {2.2}The GSM Network}{5}
\contentsline {subsection}{\numberline {2.2.1}Mobile Station}{7}
-\contentsline {subsection}{\numberline {2.2.2}Basestation Subsystem}{10}
-\contentsline {subsection}{\numberline {2.2.3}Network Subsystem}{10}
+\contentsline {subsection}{\numberline {2.2.2}Base Station Subsystem}{10}
+\contentsline {subsubsection}{The Cellular Principle}{11}
+\contentsline {subsubsection}{Baste Station Controller}{11}
+\contentsline {subsubsection}{Base Transceiver Station}{11}
+\contentsline {subsubsection}{Frequencies}{11}
+\contentsline {subsubsection}{Transcoding rate and Adaption Unit}{11}
+\contentsline {subsection}{\numberline {2.2.3}Network Subsystem}{11}
\contentsline {subsubsection}{Mobile Switching Center}{11}
-\contentsline {subsubsection}{Home Location Register}{11}
-\contentsline {subsubsection}{Visitor Location Register}{11}
-\contentsline {subsubsection}{Equipment Identification Register}{12}
-\contentsline {subsubsection}{Authentication Center}{12}
-\contentsline {subsection}{\numberline {2.2.4}Intelligent Network}{13}
-\contentsline {subsection}{\numberline {2.2.5}The Cellular Principle}{14}
-\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{14}
-\contentsline {subsection}{\numberline {2.3.1}Interfaces}{14}
-\contentsline {subsection}{\numberline {2.3.2}Layers}{14}
-\contentsline {subsection}{\numberline {2.3.3}The Radio Channel}{14}
-\contentsline {subsection}{\numberline {2.3.4}Logical Channels}{14}
-\contentsline {section}{\numberline {2.4}IMSI-Catcher}{14}
-\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{14}
-\contentsline {subsection}{\numberline {2.4.2}Possible Attacks}{14}
-\contentsline {subsection}{\numberline {2.4.3}Law situation in Germany}{14}
+\contentsline {subsubsection}{Home Location Register}{12}
+\contentsline {subsubsection}{Visitor Location Register}{13}
+\contentsline {subsubsection}{Equipment Identification Register}{13}
+\contentsline {subsubsection}{Authentication Center}{14}
+\contentsline {subsection}{\numberline {2.2.4}Intelligent Network}{15}
+\contentsline {section}{\numberline {2.3}The $U_m$ Interface}{16}
+\contentsline {subsection}{\numberline {2.3.1}Layers}{16}
+\contentsline {subsection}{\numberline {2.3.2}The Radio Channel}{16}
+\contentsline {subsection}{\numberline {2.3.3}Logical Channels}{16}
+\contentsline {section}{\numberline {2.4}IMSI-Catcher}{16}
+\contentsline {subsection}{\numberline {2.4.1}Mode of Operation}{16}
+\contentsline {subsection}{\numberline {2.4.2}Possible Attacks}{16}
+\contentsline {subsection}{\numberline {2.4.3}Law situation in Germany}{16}
\contentsline {chapter}{Bibliography}{I}
\contentsline {chapter}{Acronyms}{III}