Halaman

Sabtu, 01 Januari 2011

GSM PHASES

Google Ads
Google Ads
    In the late 1980s, the groups involved in developing the GSM standard realized that within the given time-frame they could not complete the specifications for the entire range of GSM
services and features as originally planned. Because of this, it was decided that GSM would be released in phases with phase 1 consisting of a limited set of services and features. Each new
phase builds on the services offered by existing phases.

Phase 1

   Phase 1 contains the most common services including:
          • Voice telephony
          • International roaming
          • Basic fax/data services (up to 9.6 kbits/s)
          • Call forwarding
          • Call barring
          • Short Message Service (SMS)
 
Phase 1 also incorporated features such as ciphering and Subscriber Identity Module (SIM) cards. Phase 1 specifications were then closed and cannot be modified.

 
Phase 2

   Additional features were introduced in GSM phase 2 including:
          • Advice of charge
          • Calling line identification
          • Call waiting
          • Call hold
          • Conference calling
          • Closed user groups
          • Additional data communications capabilities

Phase 2+

     The standardization groups have already begun to define the next phase, 2+. The phase 2+ program will cover multiple subscriber numbers and a variety of business oriented features.
Some of the enhancements offered by Phase 2+ include:
         • Multiple service profiles
         • Private numbering plans
         • Access to Centrex services
         • Interworking with GSM 1800, GSM 1900 and the Digital

    Enhanced Cordless Telecommunications (DECT) standard Priorities and time schedules for new features and functions depend primarily on the interest shown by operating companies and manufacturers and technical developments in related areas.
Google Ads
Facebook Twitter Google+ Lintasme

Related Posts :

  • GSM NETWORK COMPONENTS   The GSM network is divided into two systems. Each of these systems are comprised of a n…
  • Call Number Identification in GSM    If an adversary knows certain information (IMSI, IMEI, MSISDN) about the subscri…
  • 3G Security Principles 1  It was agreed that any new security architecture must be based on an evolution of GSM and mus…
  • Hello everybodyHello ,My name is mahmoud . A communications engineer .I'd like to share all things that i know with…
  • Authentication in GSM     The SIM card can be protected against unauthorised access with a four- to e…

Back To Top