Security_in_the_GSM_system
金鸽 S110 型 GSM 报警控制器用户手册说明书

A New UserFriendly ConceptGSM SMS Alarm For Your Assets!User ManualS110Ver 1.10Date Issued: 2010-09-01All rights reserved byKing Pigeon Hi-Tech.Co.,Ltd.GSM Alarm Control Paneli.e.: if the password is 1234, then you can send 1234AA to arm, 1234BB to disarm, the AA~EE must be Caps Lock.1. Brief introductionThe GSM Alarm System is a new security protection solution special for home, house and office and other applications. It based on Wireless GSM Communication network, integrated Lcd Menu display and Computer technology. When any sensor activated, it will Call & Send SMS to owner’s telephone immediately.The GSM Alarm System with user friendly design idea, all operations and settings are visual and intuitive!.What you need is a SIMCard which supports Call ID function.2.Safety DirectionsSafe StartupDo not use GSM Alarm System when using GSM equipmentis prohibited or might bring disturbance or danger.InterferenceAll wireless equipment might interfere network signals ofGSM Alarm System and influences its performance.Avoid Use at Gas StationDo not use GSM Alarm System at a gas station. Power offGSM Alarm System it near fuels or chemicals.Power it off near Blasting PlacesPlease follow relevant restrictive regulations. Avoid using thedevice in blasting places.Reasonable UsePlease install the product at suitable places as described inthe product documentation. Avoid signal screening bycovering the mainframe.Use Qualified Maintenance ServiceMaintenance can be carried out only by qualified maintainer.WaterproofnessThe product is not waterproof. Please install it at dry placesand keep it dry.3. Standard Packing ListControl Unit X1Wireless M agnetic Door Sensor X1Wireless Remote Controls X 2Wireless PIR Motion Sensor X1Wired Strobe Siren (110dB) X1Regulated 12VDC Power Supply X1User Manual X1GSM Antenna X1Optional Accessories: (Wireless Sensors or Wired Sensors)PIR Motion Sensor, Glass Break Sensor, Magnetic Window Sensor, Magnetic Steel Scrolling Door Sensor, Temperature Sensor, Photoelectric Beams, etc.4. Physical Layout4.1Control Unit physical layoutTips!1)In order to forbidden the intruder power off the alarm system, we equipped the powerExternal Power Connector, Connect to 2A@12V DC power through AC/DC Adaptor.Will start for 60seconds when alarm. The siren or strobe siren should be <12V DC.Connect the GSM ANT, if the GSM signal is not strong,4.2Working Principle DrawingThe unit works with wireless detectors or Wired detectors. It can switch on or off one appliance by SMS command. Please see below:5. Features5.1 The advantages of the GSM Alarm System1)Two-way Voice communication or wiretap are available;2)LCD displays the entire setup menu;3)Armed, Partial Armed(At House or Stay), Disarmed, SOS areavailable;4)Armed delay, alarm delay, siren work or not, more other functions areProgrammable by user;5)Watchdog,24Hours Zone, SOS zone are available;6)Using ICON to display armed, Partial Armed, Disarmed, Power status,Siren status and GSM Signal status.14)Supports wiretap through the internal microphone;15)Supports internal Speaker to special user for two-way voicecommunication;16)It is Compatible with PT2262 and PT2242 wireless IC;17)Standby internal rechargeable battery which can last 18 hours;18)Based on the GSM communication network and Operation MenuDisplay technology, apply to wide range situations.6. SettingsTips!1)Please insert the SIMCard firstly, and install the GSM Antenna then power on it.Also, you can insert the SIMCard after you setup.2)All the wireless sensors in the standard package we have assigned to the mainframealready. Needn’t to learn it again.3)After you power on the mainframe, the mainframe will auto detect and display theprocess. It will detect the 8 wired input current connection status and display on the LCD with 8 characters. O stands for Open, C stands for Close, L stands for with2.2K EOL, E Stands for not includes the before 3 status. If it with SIMCard, it will register the GSM Network and display the GSM Signal ICON in the left corner of the LCD. 4)All of the setup can be done by the LCD except modify the Zone name, if you needto modify the zone name, please see the command list in the related chapter.5)Only disarm by keyboard and modify settings requires password, the other operationneedn’t password. The default password is 1234. Enter password then press Enter button to enter the system.6)In standby mode, press #3#6, following UP button. The system will recovery tofactory default settings, the password will be 1234. But the registered wirelesssensors and the Wired type will remain.7)Two way communication:In standby mode, dial the telephone number, following the, the system will dial out; While incoming call, press the Button to answer the incoming. Pleasenote: if the income calling is from the preset number (Includes SMS Alert number and Auto-dial numbers), then before 6 tones, if answered it, will create two wayvoice communications. After 6 tones, will be entering into wiretap status. The user can listen in the alarm around sounds, Max. time is 10Minutes. If the income calling is not from the preset alarm number, after 6 tones, if hasn’t been answered, will hang up.8)If you want to test the two way voice communication, please make sure the otherphone is far from the , at least 500meters . Otherwise, the near-cross will make lots of noise interference.9)Please setup at least one alarm alert number, otherwise the mainframe will onlyactivate the siren to work 6 times, this is to remind you setup alarm numbers.10)The controller panel not accept PIN Code, please disable the SIMCard’s PIN Codefunction.6.1 Key-Function Descriptions.6.1.1 Led indicator DescriptionThe unit uses the icons to stand for the function, it is visual and intuitive to users.::: GSM Module indicator, registering will quickly flick, registered successful will slowly flick.Stay Mode indicator, on is in stay mode;Arm Mode indicator, on is in arm mode, off is in disarm mode;Alarm Indicator, on is alarming, off is normally;:: :6.1.2 LCD ICONS DescriptionThe unit uses the icons to descript the present status; it will be more user friendly.: Enabled the Timer to arm and disarm function; otherwise, will not display it.: Timer to Arm, has setup a time point to enter armed mode directly.: Timer to disarm. Has setup a time point to enter disarmed mode directly.::6.1.3 Keyboard functionsThe unit uses the icons to mark the buttons; it will be more user friendly to user.: Enter button, dial out and answer incoming.: Hang up the incoming, Exit, and Backspace button.: Up towards button.: Down towards button.: Turn right button, in special menu need it to choose the option.Disarm Button.Arm ButtonAt House, Stay mode button.SOS, Panic Button.Alarm link output indicator, when alarm, will turn on and last 4minutes, means the alarm link output relay closing.Separate output relay indicator, when the independent output relay closed, it will be on; when the independent output relay opened, will be off.Enabled the Watchdog zone. In the fixed time range if the sensors in the watchdog zone hasn’t been triggered, will alarm. Enabled the system condition report function. Will automatically send system condition to the user by SMS, otherwise, it will not display.In standby mode, press the button, you can see the Menu. Name30Min.” to the first SMS Alert numbers after the AC power failure 30minutes, if the power is recovery then will send SMS “AC Power is OK.”. Default is disabled.6)There’s no delay for Stay Mode.6.2.2.4 Advanced SettingNotice:1)The watchdog is special for elder or child or on-duty personnel , in the period (Startingtime point to Ending time point) if this sensor hasn’t been triggered, the system will alarm. This is very useful to monitor the elder or child goes out the bedroom or enters the kitchen to eat something. Or monitor the on-duty personnel in the polling period have gone to on-site inspection.2)If enable the RCO alert function, then when use any remote control which has beenregistered to the system to arm or disarm or stay operation, the system will send SMS to the first SMS number.3)If enable the GSM Jammer Alert function, when the GSM Signal is 0 for more than90s, the system will drive the siren for 60seconds and the link-output relay will close 4minutes.6.3 Modify the SMS Alert Content of the Zone (Zone or Sensor Name)The unit accepts SMS Command to modify the SMS Alert Content of the zone.1.Edit Timer2. Watchdog Timer3. RCO Alert4. GSM Jammer Alert5. Modify Password6. Default Set ---To setup the starting time to arm and the Ending time to disarm.---To setup the starting and ending time to work.---To setup the remote control operation reportfunction.---To setup the GSM Jammer Alert function.---Modify the system password.--- Restore the system settings to factory defaults. All of the remote controls and wireless sensorsshould be re-assigned again.Press the button “” on the remote control or Press Arm button on thekeyboard then select Arm, the Control Unit enters arm status (delay timeaccording to the setting), the ICON will be on. Under this status, anysensor triggered, the control unit will alarm, if answered the call, the sirenwill stop and can listen in the alarm area by phone.Press the button “” on the remote control, or press Disarm button on the Keyboard then input the password, the Control Unit disarms immediately.The ICON will be off. Under this status, any sensor triggered, the control unit will not alarm. Except the sensor type is the 24-Hour Zones orWatchdog zone or SOS zone.Press the button “” on the remote control or Press the Arm button on the keyboard then select Stay, the Control Unit enters Stay(Partial Armed)status, the ICON will be on. In this status, the sensors had been set as Stay Type triggered will alarm, but the sensors had been set as normalType triggered will not alarm. Please see the menu of the Edit RF Zone.Press Emergency button (SOS) “!” on the remote control or the controlunit or Press any Emergency button. The Control Unit will enteremergency alarm. The siren will not sound, but will alert the pre-set phone number immediately.7.2 SMS Commands for Arm or Disarm or Inquiry system status orswitch on/off independent output relay.The User can Arm/Disarm/Inquriysystem status/Switch on or off theindependent output relay by sending SMS to the Control unit. The SMSCommands are below:Notice:The system will carry out the commands immediately (with no delay) after theControl Unit receive this SMS command.7.2.1 ArmedIn the backside of the control unit, please install the GSM SIM card . The GSM ANT must be Vertical installation to ensure it in good working condition.e.t.c.Wireless glass break sensor can also be used (see below)For a Scrolling Steel Door, a special Wireless Scroll Steel Door magneticsensor must be used due to interference of the wireless signal caused bythe steel door.Installation: attach the larger half to the floor and attach (rivet or glue) thesmaller half to the scroll steel door. An alarm is triggered when the halvesare separated by more than three to 5.00 cm.Scroll Steel Door8.3Install the wireless PIR Motion SensorThe PIR sensor will detect a person since human temperature is different to ambient temperature. When triggered, the PIR will signal the Control Unit. Apply the detection area illustration below when installing.Wireless curtain sensor, detection area illustration below:8.4 Install the Wired Sensors and Electricity equipmentsPlease help to see below wiring diagram, then fixed the related wired sensors, the sensors connect to the related digital inputs.Tips!1)Please setup the NC, NO, EOL type in the Menu correctly;2)If you setup the Nodes type as NC(Default), and the sensor type must be NC.Please see below diagram.3)If you setup the input type as EOL, then please contact a 2.2K Resistor in series withevery inputs. Please see the below diagram.4)If you setup the input type as NO, then please keep the two points of the inputs byfree, and the sensor type must be NO. Please see the below diagram.5)******************************************************************while you connect to equipment device. also, please make sure the powerconsumption is less than 250W for long time working. If you need heavy equipment, please connect an additional relay ;6)The R1+ and R1- is for alarm-link output, when the system alarm, will close for 4minutes, the rated output power is 700W. If you need heavily equipment, pleaseconnect an additional relay .7)The R2+ and R2- is the relay output for SMS Command, CC is close, DD is open,EE is inquiry the status.8)The +12VDC is for the Detectors, if the detectors need 12VDC power, then pleasecontact it to the +12VDC. The 12VDC power is from external power, not from backup battery. So please note: When AC power failure, the +12VDC point will no powersupply.8.5Install the Control UnitIn order to avoid destruction of the Control Unit by intruders, please install it in a concealed location, convenient to the operator.If applicable, ensure that an uninterruptible AC power outlet is availablenear the Control Unit. First connect accessories to the Control Unit then the AC adapter.8.6Install SirenConnecting the Siren to the Control Unit and fix them in appropriate locations.Tips!The Siren should be at least 1.5meters away from the GSM SMS Controller unit, if possible, more than 3meters is better.8.7 Connecting the loudly siren to the Panel.Please see below mentioned diagram. The siren rated is 12V, so if you connect the siren to the motherboard, please ensure the panel powered on with AC power, it cannot work with the internal backup battery. Otherwise please contact external power to instead of the above mentioned diagram.)10. Technical specifications of Control UnitRated Voltage: 9~12VDC 2A Standby current: 30-40mASiren Output V oltage: 12VDCWorking temperature: -10℃~+60℃; Storage temperature:-20℃~+60℃Relative humidity: 10-90%, No condensationWork frequency: 900/1800/1900MHz or 850/900/1800/1900MHz Communication protocol: GSM PHASE 2/2+ (include data service) Wireless sensor receiving frequency: 433.92 MHzWireless sensor permission quantity: 16PcsWired Zones/ Remote Control permission quantity: 8Pcs/5PcsEffective distance wireless of remote control: 100 mBattery:Built-inlithium-ionbattery:************Standby time Approx.18hours (depending on the network condition)Size: 180mmX125mmX30mm (LXWXH); Net Weight: 0.36Kg11. Important information1)The Control unit will auto switch off when the backup battery voltageless than 3.7V, before switching off, it will drive the buzzer to alert you by sounds.2)Please read the User Manual carefully before you install the ControlUnit and set the Control Unit.3)The siren and relays will not work if the AC/DC power goes off,because of both of them are working at 12V voltage.4)Do not install the system in close vicinity with objects that generatestrong interference, such as TV set and computer.5)Install the system in a hidden place.6)Avoid getting water into the Control Unit.7)Have a secure connection to the main power supply.8)This product was designed for the indoor use.9)More information will be available of them, we will not inform you againAny questions please help to contact us feel free.。
铁路工程建设标准英语版翻译指南.

C组碎石、砾石类填料Granular fill of group C
C组细粒土填料Fine soil fill of group C
DMI显示单元Display unit of DMI
保留煤柱retaining coal pillar
保温thermal insulation
保温层thermal insulation layer; thermal insulating layer
保温措施thermal insulation measure
保温钉thermal insulation bolt
安全钳safety tongs
安全色safety colour
安全设计safety design
安全生产法律法规laws and regulations on production safety
安全生产费safety production fees
安全生产网safety operation network
安装功率installed power
安装装置installation device
氨压缩机间ammonia compressor room
氨盐amine salt
氨制冷剂系统ammonia refrigerant systems
岸坎bank ridge
岸坡bank slope
按钮button
按钮表示button indication
T-梁、T型梁、T形梁、T梁T-beam; T-girder
T形刚构桥T-shaped rigid frame bridge
GSM协议导读

GSM协议导读1 Um接口相关协议在无线接口上涉及到很多重要的ETSI(欧洲电信标准协会)GSM协议。
在最底层,所有的传输功能使用MS和BTS之间的协议。
然后,RIL3-RR使MS和BSC为无线资源的管理协同工作(按照TS GSM 04.08,RIL3-RR与另外两个协议一起定义):它是RR功能平面在无线接口上的具体实现。
这一协议还出现在Abis口上。
上层协议(RIL3-MM,RIL3-CC)定义了在MS和NSS实体间信令交换的规则,他们也出现在Abis口和A接口中。
以最后一个情况为例,BTS和BSC对这些信令的交换是透明的,既它们只作为信息的载体,而与信息的语义无关。
TS GSM 05.01是概述,介绍主要概念;TS GSM 0502从时间和跳频特性方面描述信道,并给出了突发脉冲的数字结构;TS GSM 05.03规定了使用于各种信道应用的不同纠错和检错码;TS GSM 05.04规定GMSK调制;TS GSM 05.05与“无线传输和接收”相关;TS GSM 05.08和05.10主要涉及无线资源管理;TS GSM 04.03从应用的角度定义了信道,并涉及蜂房信道配置的概念;TS GSM 04.05规定了LAPDm的一般方案;TS GSM 04.06规定了LAPDm协议规范的细节;TS GSM 04.07处理协议层之间的交互作用的建模;TS GSM 04.08描述了RIL3相关的协议和报文及信息元的编码;TS GSM 03.09处理切换功能;TS GSM 05.08描述了切换准备,功率控制和测量报告;TS GSM 08.58是RSM协议;Um接口的信令消息内容:2 Abis接口相关协议Abis接口由一系列规范约定组成,这些规范包括以下方面的内容:•物理电气参数•信道结构•信令传输规程•配置和控制规程•操作和维护支持Abis 接口的相关协议如下:GSM 08.52,给出Abis接口其余规范的基本原理和原则,并给出BSC和BTS在业务功能上的功能分割。
KP110 用户指南说明书

Selecting functions and options
Your phone offers a set of functions that allow you to customise the phone. These functions are arranged in menus and sub-menus, accessed via the two soft keys marked and . Each menu and sub-menu lets you view and alter the settings of a particular function. The roles of the soft keys vary according to the current context; the label on the bottom line of the screen just above each key indicates its current role.
5. Messaging 5.1 New message 5.2 Inbox 5.3 Drafts 5.4 Outbox 5.5 Sent 5.6 Listen to voicemail 5.7 Info messages 5.8 Templates 5.9 Settings
6. My stuff
6.1 Images 6.2 Sounds 6.3 Others 6.4 Games 6.5 External memory
› Select Anti Theft Mobile Tracker › Enter Default ATMT code. › Select Set ATMT › Select ON, press OK
整合大部分题库-安全L1题库

题型答单选单单单单单单单单单单单单单单单单单单单选单单单单单单单选单单单选单单单单单单单单单单单单单单选单单单单单单选单单单单单单单单选单单单单单单选单单选单单单单单选单选单选单选单选单选单选单单选单选单选单单单单单单单单单单选单选单选单选单选单选单选单选单选单单选单选单选单单单单单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单单单单单单单单单单单单单单选单选单单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选单选。
[整理]GSM中英文对照.
![[整理]GSM中英文对照.](https://img.taocdn.com/s3/m/a80b220643323968001c9230.png)
中英对照GSM词汇数字、英文1/4比特数quarter bit numberAGC恢复时间AGC recovery timeAGC启动时间AGC attack timeATM技术asynchronous transfer technics, 异步转移模式,为多种速率信息的情况下研究的一种合适的传输与交换方式。
GSM 泛欧数字蜂窝移动通信系统GSM PLMN接入能力GSM PLMN access capabilityGSM PLMN连接类型属性GSM PLMN connection type attributeGSM公共陆地移动网GSM PLMN用户身份模块:SIMJ-K触发器J-K flip-flopM-序列M-sequenceN进制数字信号n-ary digital systemRS-232总线RS-232 busA安全地线safe ground wire安全特性security feature安装线hook-up wire按半周进行的多周期控制multicycle controlled by half-cycle按键电话机push-button telephone set按需分配多地址demand assignment multiple access(DAMA)按要求的电信业务demand telecommunication service按组编码encode by groupB八木天线Yagi antenna白噪声white Gaussian noise白噪声发生器white noise generator半波偶极子halfwave dipole半导体存储器semiconductor memory半导体集成电路semiconductor integrated circuit半双工操作semi-duplex operation半字节Nib包络负反馈peak envelop negative feed-back包络延时失真envelop delay distortion薄膜thin film薄膜混合集成电路thin film hybrid integrated circuit保护比(射频)protection ratio (RF)保护时段guard period保密通信secure communication报头header报文分组packet报文优先等级message priority报讯alarm备用工作方式spare mode背景躁声background noise倍频frequency multiplication倍频程actave倍频程滤波器octave filter被呼地址修改通知called address modified notification 被呼用户优先priority for called subscriber本地PLMN local PLMN本地交换机local exchange本地移动用户身份local mobile station identity ( LMSI) 本地震荡器local oscillator比功率(功率密度) specific power比特bit比特并行bit parallel比特号码bit number (BN)比特流bit stream比特率bit rate比特误码率bit error rate比特序列独立性bit sequence independence必要带宽necessary bandwidth闭环电压增益closed loop voltage gain闭环控制closed loop control闭路电压closed circuit voltage边瓣抑制side lobe suppression边带sideband边带非线性串扰sideband non-linear crosstalk边带线性串扰sideband linear crosstalk边带抑制度sideband suppression边角辐射boundary radiation编号制度numbering plan编解码器codec编码encode编码律encoding law编码器encoder编码器输出encoder output编码器总工作时间encoder overall operate time编码效率coding efficiency编码信号coded signal编码约束长度encoding constraint length编码增益coding gain编译程序compiler鞭状天线whip antenna变频器converter变频损耗converter conversion loss变容二极管variable capacitance diode变形交替传号反转modified alternate mark inversion便携电台portable station便携设备portable equipment便携式载体设备portable vehicle equipment标称调整率(标称塞入率)nominal justification rate (nominal stuffing rate) 标称值nominal value标称呼通概率nominal calling probability标准码实验信号standard code test signal (SCTS)标准模拟天线standard artificial antenna标准频率standard frequency标准时间信号发射standard-time-signal emission标准实验调制standard test modulation标准输出功率standard power output标准输入信号standard input signal标准输入信号电平standard input-signal level标准输入信号频率standard input-signal frequency标准信躁比standard signal to noise表面安装surface mounting表示层presentation layer并串变换器parallel-serial converter (serializer)并馈垂直天线shunt-fed vertical antenna并行传输parallel transmission并行终端parallel terminal拨号错误概率dialing mistake probability拨号后延迟post-dialing delay拨号交换机dial exchange拨号线路dial-up line拨号音dialing tone拨号终端dial-up terminal波动强度(在给定方向上的)cymomotive force (c. m. f)波段覆盖wave coverage波峰焊wave soldering波特baud泊送过程Poisson process补充业务supplementary service (of GSM)补充业务登记supplementary service registration补充业务询问supplementary service interrogation补充业务互连supplementary service interworking捕捉区(一个地面接收台)capture area (of a terrestrial receiving station)捕捉带pull-in range捕捉带宽pull-in banwidth捕捉时间pull-in time不连续发送discontinuous transmission (DTX)不连续干扰discontinuous interference不连续接收discontinuous reception (DRX)不确定度uncertainty步谈机portable mobile stationC采样定理sampling theorem采样频率sampling frequency采样周期sampling period参考边带功率reference side band power参考差错率reference error ratio参考当量reference equivalent参考点reference point参考结构reference configuration参考可用场强reference usable fiend-strength参考灵敏度reference sensibility参考频率reference frequency参考时钟reference clock参考输出功率reference output power残余边带调制vestigial sideband modulation残余边带发射vestigial-sideband emission操作维护中心operation maintenance center (OMC)操作系统operation system (OS)侧音消耗sidetone loss层2转发layer 2 relay (L2R)插入组装through hole pachnology插入损耗insertion loss查号台information desk差错控制编码error control coding差错漏检率residual error rate差分脉冲编码调制(差分脉码调制)differential pulse code modulation (DPCM) 差分四相相移键控differential quadrature phase keying (DQPSK)差分相移键控differential phase keying (DPSK)差模电压,平衡电压differential mode voltage, symmetrical voltage差拍干扰beat jamming差频失真difference frequency distortion长期抖动指示器long-term flicker indicator长期频率稳定度long-term frequency stability场强灵敏度field intensity sensibility场效应晶体管field effect transistor (FET)超长波通信myriametric wave communication超地平对流层传播transhorizon tropospheric超地平无线接力系统transhorizon radio-relay system超高帧hyperframe超帧superframe超大规模集成电路very-large scale integrated circuit (VLSI) 超再生接收机super-regenerator receiver车载电台vehicle station撤消withdrawal成对不等性码(交替码、交变码)paired-disparity code (alternative code, alternating code) 承载业务bearer service城市交通管制系统urban traffic control system程序设计技术programming technique程序设计环境programming environment程序优化program optimization程序指令program command充电charge充电率charge rate充电效率charge efficiency充电终止电压end-of charge voltage抽样sampling抽样率sample rate初级分布线路primary distribution link初始化initialization处理增益processing gain传播时延propagation delay传播系数propagation coefficient传导干扰conducted interference传导杂散发射conducted spurious emission传递函数transfer function传递时间transfer time传声器microphone传输保密transmission security传输层协议transport layer protocol传输集群transmission trunking传输结束字符end of transmission character传输媒体transmission medium传输损耗transmission loss传输损耗(无线线路的)transmission loss (of a radio link) 传输通道transmission path传输信道transmission channel传真facsimile, FAX船舶地球站ship earth station船舶电台ship station船舶移动业务ship movement service船上通信电台on-board communication station ,ship communication station 船用收音机ship radio串并变换机serial to parallel (deserializer)串并行变换serial-parallel conversion串话crosstalk垂直方向性图vertical directivity pattern唇式传声器lip microphone磁屏蔽magnetic shielding次级分布线路secondary distribution link猝发差错burst error猝发点火控制burst firing control存储程序控制交换机stored program controlled switching system\D大规模集成电路large scale integrated circuit (LSI)大信号信躁比signal-to-noise ratio of strong signal带成功结果的常规操作normal operation with successful outcome带宽bandwidth带内导频单边带pilot tone-in-band single sideband带内谐波in-band harmonic带内信令in-band signalling带内躁声in-band noise带通滤波器band-pass filter带外发射out-of-band emission带外功率out-of-band power带外衰减attenuation outside a channel带外信令out-band signalling带状线stripline单边带发射single sideband (SSB) emission单边带发射机single side-band (SSB) transmitter单边带调制single side band modulation单边带解调single side band demodulation单边带信号发生器single side band signal generaltor单端同步single-ended synchronization单工、双半工simplex, halfduplex单工操作simplex operation单工无线电话机simplex radio telephone单呼single call单频双工single frequency duplex单频信令single frequency signalling单相对称控制symmetrical control (single phase)单相非对称控制asymmetrical control (single phase)单向one-way单向的unidirectional单向控制unidirectional control单信道地面和机载无线电分系统SINCGARS单信道无绳电话机single channel cordless telephone单信号方法single-signal method单音tone单音脉冲tone pulse单音脉冲持续时间tone pulse duration单音脉冲的单音频率tone frequency of tone pulse单音脉冲上升时间tone pulse rise time单音脉冲下降时间tone pulse decay time单音制individual tone system单元电缆段(中继段)elementary cable section (repeater section)单元再生段elementary regenerator section (regenerator section)单元增音段,单元中继段elementary repeater section当被呼移动用户不回答时的呼叫转移call forwarding on no reply (CFNRy)当被呼移动用户忙时的呼叫转calling forwarding on mobile subscriber busy (CFB)当漫游到原籍PLMN国家以外时禁止所有入呼barring of incoming calls when roaming outside the home PLMN country (BIC-Roam)当前服务的基站current serving BS当无线信道拥挤时的呼叫转移calling forward on mobile subscriber not reachable (CENRc)刀型天线blade antenna导频pilot frequency导频跌落pilot fall down倒L型天线inverted-L antenna等步的isochronous等幅电报continuous wave telegraph等权网(互同步网)democratic network (mutually synchronized network)等效比特率equivalent bit rate等效地球半径equivalent earth radius等效二进制数equivalent binary content等效全向辐射功率equivalent isotropically radiated power (e. i. r. p.)等效卫星线路躁声温度equivalent satellite link noise temperature低轨道卫星系统LEO satellite mobile communication system低气压实验low atmospheric pressure test低时延码激励线性预测编码low delay CELP (LD-CELP)低通滤波器low pass filter低温实验low temperature test低躁声放大器low noise amplifier地-空路径传播earth-space path propagation地-空通信设备ground/air communication equipment地波ground wave地面连线用户land line subscriber地面无线电通信terrestrial radio communication地面站(电台)terrestrial station第N次谐波比nth harmonic ratio第二代无绳电话系统cordless telephone system second generation (CT-2) 第三代移动通信系统third generation mobile systems点波束天线spot beam antenna点对地区通信point-area communication点对点通信point-point communication点至点的GSM PLMN连接point to point GSM PLMN电报telegraphy电报电码telegraph code电波衰落radio wave fading电池功率power of battery电池能量energy capacity of battery电池容量battery capacity电池组battery电磁波electromagnetic wave电磁波反射reflection of electromagnetic wave电磁波饶射diffraction of electromagnetic wave电磁波散射scattering of electromagnetic wave电磁波色射dispersion of electromagnetic wave电磁波吸收absorption of electromagnetic wave电磁波折射refraction of electromagnetic wave电磁场electromagnetic field电磁发射electromagnetic field电磁辐射electromagnetic emission电磁干扰electromagnetic interference (EMI)电磁感应electromagnetic induction电磁环境electromagnetic environment电磁兼容性electromagnetic compatibility (EMC)电磁兼容性电平electromagnetic compatibility level电磁兼容性余量electromagnetic compatibility margin电磁脉冲electromagnetic pulse (EMP)电磁脉冲干扰electromagnetic pulse jamming电磁敏感度electromagnetic susceptibility电磁能electromagnetic energy电磁耦合electromagnetic coupling电磁屏蔽electromagnetic shielding电磁屏蔽装置electromagnetic screen电磁骚扰electromagnetic disturbance电磁噪声electromagnetic noise电磁污染electromagnetic pollution电动势electromotive force (e. m. f.)电话机telephone set电话局容量capacity of telephone exchange电话型电路telephone-type circuit电话型信道telephone-type channel电离层ionosphere电离层波ionosphere wave电离层传播ionosphere propagation电离层反射ionosphere reflection电离层反射传播ionosphere reflection propagation电离层散射传播ionosphere scatter propagation电离层折射ionosphere refraction电离层吸收ionosphere absorption电离层骚扰ionosphere disturbance电流探头current probe电路交换circuit switching电屏蔽electric shielding电视电话video-telephone, viewphone, visual telephone电台磁方位magnetic bearing of station电台方位bearing of station电台航向heading of station电文编号message numbering电文队列message queue电文格式message format电文交换message switching电文交换网络message switching network电文结束代码end-of-message code电文路由选择message routing电小天线electronically small antenna电信管理网络telecommunication management network (TMN) 电信会议teleconferencing电压变化voltage change电压变化持续时间duration of a voltage change电压变化的发生率rate of occurrence of voltage changes电压变化时间间隔voltage change interval电压波动voltage fluctuation电压波动波形voltage fluctuation waveform电压波动量magnitude of a voltage fluctuation电压不平衡voltage imbalance, voltage unbalance电压浪涌voltage surge电压骤降voltage dip电源power supply电源电压调整率line regulation电源抗扰性mains immunity电源持续工作能力continuous operation ability of the power supply 电源去耦系数mains decoupling factor电源骚扰mains disturbance电子干扰electronic jamming电子工业协会Electronic Industries Association (EIA)电子系统工程electronic system engineering电子自动调谐electronic automatic tuning电子组装electronic packaging电阻温度计resistance thermometer跌落试验fall down test顶部加载垂直天线top-loaded vertical antenna定长编码block code定期频率预报periodical frequency forecast定时clocking定时超前timing advance定时电路timing circuit定时恢复(定时抽取)timing recovery (timing extration)定时截尾试验fixed time test定时信号timing signal定数截尾试验fixed failure number test定向天线directional antenna定型试验type test动态频率分配dynamic frequency allocation动态信道分配dynamic channel allocation动态重组dynamic regrouping动态自动增益控制特性dynamic AGC characteristic抖动jitter独立边带independent sideband独立故障independent fault端到端业务teleservice短波传播short wave propagation短波通信short wave communication短路保护short-circuit protection短期抖动指示器short-term flicker indicator短期频率稳定度short-term frequency stability短时间中断(供电电压)short interruption (of supply voltage)段终端section termination对称二元码symmetrical binary code对地静止卫星geostationary satellite对地静止卫星轨道geostationary satellite orbit对地同步卫星geosynchronous satellite对讲电话机intercommunicating telephone set对空台aeronautical station对流层troposphere对流层波道troposphere duct对流层传播troposphere propagation对流层散射传播troposphere scatter propagation多次调制multiple modulation多点接入multipoint access多电平正交调幅multi-level quadrature amplitude modulation (QAM)多分转站网multidrop network多服务器队列multiserver queue多工multiplexing多工器nultiplexer多功能系统MRS多级处理multilevel processing多级互连网络multistage interconnecting network多级卫星线路multi-satellite link多径multipath多径传播multipath propagation多径传播函数nultipath propagation function多径分集multipath diversity多径时延multipath delay多径衰落multipath fading多径效应multipath effect多路复接multiplexing多路接入multiple access多路信道multiplexor channel多脉冲线性预测编码multi-pulse LPC (MPLC)多频信令multifrequency signalling多普勒频移Doppler shift多跳路径multihop path多信道选取multichannel access (MCA)多信道自动拨号移动通信系统multiple-channel mobile communication system with automatic dialing 多优先级multiple priority levels多帧multiframe多址呼叫multiaddress call多址联接multiple access多重时帧multiple timeframe多用户信道multi-user channelE额定带宽rated bandwidth额定射频输出功率rated radio frequency output power额定使用范围rated operating range额定音频输出功率rated audio-frequency output power额定值rated value爱尔兰erlang恶意呼叫识别malicious call identification (MCI)耳机(受话器)earphone耳机额定阻抗rated impedance of earphone二十进制码binary-coded decimal (BCD) code二十进制转换binary-to-decimal conversion二十六进制转换binary-to-hexadecimal conversion二进制码binary code二进制频移键控binary frequency shift keying (BFSK)二进制数binary figure二频制位binary digit(bit)二频制two-frequency system二维奇偶验码horizontal and vertical parity check code二线制two-wire system二相差分相移键控binary different phase shift keying (BDPSK) 二相相移键控binary phase shift keying (BPSK)F发报机telegraph transmitter发射emisssion发射(或信号)带宽bandwidth of an emission (or a signal)发射机transmitter发射机边带频谱transmitter sideband spectrum发射机额定输出功率rated output power of transmitter发射机合路器transmitter combiner发射机冷却系统cooling system of transmitter发射机启动时间transmitter attack time发射机效率transmitter frequency发射机杂散躁声spurious transmitter noise发射机之间的互调iner-transmitter intermodulation发射机对答允许频(相)偏transmitter maximum permissible frequency(phase) deviation 发射类别class of emission发射频段transmit frequency band发射余量emission margin发送sending发送响度评定值send loudness rating (SLR)繁忙排队/自动回叫busy queuing/ callback反馈控制系统feedback control system反射功率reflection power反射卫星reflection satellite反向话音通道reverse voice channel (RVC)反向控制信道reverse control channel (RECC)泛欧数字无绳电话系统digital European cordless telephone方舱shelter方向性系数directivity of an antenna防爆电话机explosion-proof telephone set防潮moisture protection防腐蚀corrosion protection防霉mould proof仿真头artificial head仿真耳artificial ear仿真嘴artificial mouth仿真天线dummy antenna放大器amplifier放大器线性动态范围linear dynamic range of amplifier放电discharge放电电压discharge voltage放电深度depth of discharge放电率discharge rate放电特性曲线discharge character curve非等步的anisochronous非归零码nonreturn to zero code (NRZ)非均匀编码nonuniform encoding非均匀量化nonuniform quantizing非连续干扰discontinuous disturbance“非”门NOT gate非强占优先规则non-preemptive priority queuing discipline非受控滑动uncontrolled slip非线性电路nonlinear circuit非线性失真nonliear distortion非线性数字调制nonlinear digital modulation非占空呼叫建立off-air-call-set-up (OACSU)非专用控制信道non-dedicated control channel非阻塞互连网络non-blocking interconnection network分贝decibel (dB)分辨力resolution分布参数网络distributed parameter network分布式功能distributed function分布式数据库distributed database分别于是微波通信系统distributed microwave communication system 分布式移动通信系统distributed mobile communication system分布路线distribution link分段加载天线sectional loaded antenna分机extension分集diversity分集改善系数diversity improvement factor分集间隔diversity separation分集增益diversity gain分集接收diversity reception分接器demultiplexer分频frequency division分散定位distributed channel assignment分散控制方式decentralized control分散式帧定位信号distributed frame alignment signal分同步(超同步)卫星sub-synchronous (super-synchronous) satellite 分谐波subharmonic分组交换packet switching分组码block code分组无线网packet radio network分组循环分散定位block cyclic distributed channel assigment分组组装与拆卸packet assembly and disassembly封闭用户群closed user group (CUG)峰包功率peak envelop power峰值peak value峰值-波纹系数peak-ripple factor峰值包络检波peak envelop detection峰值功率peak power峰值功率等级(移动台的)peak power class (of MS)峰值检波器peak detector峰值限制peak limiting蜂窝手持机cellular handset蜂窝系统cellular system缝隙天线slot antenna服务基站serving BS服务访问点service access point (SAP)服务弧service arc服务可保持性service retainability服务可得到性service accessibility服务提供部门service provider服务完善性service integrity服务小区serving cell服务易行性service operability服务支持性service supportability服务质量quality of service服务准备时间service provisioning time符号率symbol rate幅度检波amplitude detection幅度量化控制amplitude quantized cntrol幅度失真amplitude distortion幅度调制amplitude modulation (AM)幅频响应amplitude-frequency response幅相键控amplitude phase keying (APK)辐射radiation辐射单元radiating element辐射方向图radiation pattern辐射干扰radiated interference辐射近场区radiating near-field region辐射能radiant energy辐射强度radiation intensity辐射区radiated area辐射实验场地radiation test site辐射效率radiation efficiency辐射源(电磁干扰)emitter (of electromagnetic disturbance)辐射杂散发射radiated spurious emission辐射阻抗radiation impedance俯仰角pitch angle负极negative electrode负离子negative ion负荷容量(过荷点)load capacity (overload point)负逻辑negative logic负码速调整(负脉冲塞入)negative justification (negative pulse stuffing)负载调整率load regulation负阻放大器negative resistance amplifier负阻效应negative resistance effect负阻振荡negative resistance oscillation附加符号additional character附加位overhead bit复合音complex sound复接器multiplexer复节-分接器muldex复接制multiple connection system复位reset复用转接器transmultiplexer复帧multiframe副瓣minor lobe副瓣电平minor level覆盖区(一个地面发射台的)coverage area (of a terrestrial transmitting station)G概率probability概率分布probability distribution概率信息probabilistic information概率译码probabilistic decoding干扰interference干扰参数interference parameter干扰限值limit of interference干扰信号interfering signal干扰抑制interfering suppression干扰源interfering resource干线trunk line感应近场区reactive near-field region港口操作业务port operation service港口电台port station港口管理系统harbor management system港口交通管理系统harbor traffic control system高[低]电平输出电流high (low)-level output current高[低]电平输出电压high (low)-level output voltage高波high-angle ray高层功能high layer function高层协议high layer protocol高级数据链路控制规程high level data link control (HDLC) procedure高级通信业务advanced communication service高级研究计划署Advanced Research Projects Agency (ARPA)高级移动电话系统Advanced Mobile Phone System (AMPS)高频放大器high frequency amplifier高频提升high frequency boost高频增益控制high frequency gain control高斯信道Gauss channel (AWG)高斯最小频移键控Guassian minimum shift keying (GMSK)高频制频率时的发射频偏transmitting frequency deviation of high frequency 高通滤波器highpass filter高温高湿偏置试验high temperature high humidity biased testing (HHBT) 高温功率老化burning高温试验high temperature test告警接收机warning receiver告警指示信号alarm indication signal (AIS)戈莱码Golay code戈帕码Goppa codes格码调制trellis codes modulation schemes (TCM)隔离放大器isolation amplifier个人数字助理personal digital assistant (PDA)个人电台personal station (PS)个人电台系统personal radio system个人识别号码personal identification number (PIN)个人通信personal communications个人通信网personal communication networks (PCN)个人携带电话personal handy phone (PHP)个人移动性personal mobility个体接收(在卫星广播业务中)individual reception跟踪保持电路track and hold circuit跟踪带宽tracking bandwidth更改地址插入changed address interception工科医用(的)ISM工科医用频段ISM frequency band工业干扰industrial interference工作最高可用频率operational MUF工作比duty cycle工作范围working range工作频率范围operating frequency range工作站work station (WS)工作周期cycle of operation公共分组交换网public packet switched network公共耦合点point of common coupling (PCC)公开密匙体制public key system公路交通管制系统highway traffic control system公用数据网public data network公众陆地移动电话网public land mobile network (PLMN)功能键function key功能群,功能群令function group, function grouping功率合成power synthesis功能控制报文power control message功率控制电平power control level功率谱密度power spectrum density功率损耗power loss功率因子power factor供电系统阻抗supply system impedance共道抑制co-channel suppression共道信令co-channel signalling共模电压,不平衡电压common mode voltage, asymmetrical voltage 共模电流common mode current共模转换common code conversion共模干扰common code interference共模抑制比common code rejection ratio (CMRR)共模增益common mode gain共模阻抗common code impedance共信道再用距离co-channel re-use distance贡献路线contribution link固定电台fixed station固定基地电台fixed base station固定信道指配fixed channel assignment固态发射机solidstate transmitter固有可靠性inherent reliability固有频差inherent frequency error故障fault故障安全fault safe故障保护fault protection故障弱化failsoft故障修复fault correcting故障原因fault cause故障准则fault criteria挂机信号hang-up signal管理中心administration center (ADC)广播控制信道(BCCH)划分BCCH allocation (BA)广播寻呼系统broadcast paging system广域网wide area network (WAN)归零码return to zero code (RZ)归一化的偏置normalized offset规程protocol规范specification规则脉冲激励编码regular-pulse excitation (RPE)规则脉冲激励长时预测编码regular-pulse excitation LPC (RPE-LPC)轨道orbit国际标准international standard国际单位制international system of units国际电报电话咨询委员会CCITT国际电工委员会IEC国际电信联盟ITU国际互连网Internet国际民航组织ICAO , international civil aviation organization国际通信卫星组织INTERAT国际海事卫星组织INMAR-SAT国际无线电干扰特别委员会CISPR国际无线电干扰委员会CCIR国际移动识别码international mobile station equipment identity (IMEI) 国际移动用户识别码international mobile subscriber identity (IMSI)国际原子时间international automatic time (TAI)国家标准national standard国家信息基础结构national information infrastructure (NII)过充电overcharge过滤带transition band过放电overdischarge过荷保护电路overload protecting circuit过荷分级控制overload control category过荷控制overload control过调制overmodulation过流保护overcurrent protection过压保护overvoltage protectionH海岸地球站coast earth station海岸电台coast station海事卫星通信maritime satellite communications汉明距离Hamming distance汉明码Hamming code汉明重量Hamming weight航空地球站aeronautical earth station航空电台aeronautical station航空器地球站aircraft earth station航空器电台aircraft station航空移动业务aeronautical mobile service航天器(宇宙飞船)spacecraft毫米波millimeter wave黑格巴哥码Hagelbarger code恒比码constant ratio code恒步的homochronous恒流电源constant current power supply恒温恒湿试验constant temperature and humid test恒压充电constant voltage charge恒压电源constant voltage power supply恒电磁波小室transverse electromagnetic wave cell (TEM cell) 喉式传声器throat microphone后瓣back hole厚模电路thick-film circuit呼叫call呼叫支持call hold (HOLD)呼叫存储call store呼叫等待call waiting (CW)呼叫改发call redirection呼叫建立call establishment呼叫建立时间call set-up time呼叫接通率percept of call completed呼叫控制信号call control signal呼叫清除延时call clearing delay呼叫释放call release呼叫序列calling sequence呼叫转移call transfer (CT)呼救distress call呼救系统distress system呼损率percept of call lost呼通概率calling probability互补金属氧化物半导体集成电路complementary MOS integrated circuit (COMOS-IC)互连interworking互连的考虑interworking consideration互连功能interworking function (IWF)互调intermodulation互调产物(一个发射台的)intermodulation products (of a transmitting stastion) 互调抗扰性intermodulation immunity互调失真intermodulation distortion互通性interoperability互同步网mutually synchronized network话路输入电平voice circuit input level话路输入电平差异voice circuit input level difference话务量telephone traffic话音活动检测voice activity detection (VAD)话音激活voice exciting话音激活率speech activity话音数字信令speech digit signalling话音突发speech spurt环境试验environment test环境系数environment factor环境应力筛选environment stress screening (ESS)环境躁声ambient noise环路传输loop transmission环路高频总增益loop RF overall gain环路可锁定最底(最高)界限角频率loop lockable minimum (maximum) margin angular frequency环路滤波器比例系数loop filter proportion coefficient环路躁声带宽loop noise bandwidth环路增益loop gain环路直流总增益loop DC overall gain环路自然谐振角频率loop natural resonant angular frequency环形波ring wave环形混频器ring mixer环行器circulator环行延迟rounding relay恢复recovery恢复规程restoration procedure汇接交换tandem switching汇接局tandem office会话(在电信中)conversation (in telecommunication)会话层session layer会议电话conference telephone混合ARQ hybrid ARQ混合差错控制hybrid error control (HEC)混合分集hybrid diversity混合集成电路hybrid integrated circuit混合扩频hybrid spread spectrum混合路径传播mixed-path propagation混合信道指配hybrid channel assignment混频器mixer混频器的寄生响应mixer spurious response活动模式active mode“或”门OR gate“或非”门NOR gateJ机壳辐射cabinet radiation机载电台aircraft station基本传输损耗(无线线路的)basic transmission loss (of a radio link) 基本接入basic access基本业务(GSM的)basic service (of GSM)基本越区切换规程basic handover procedure基本最高可用频率basic maximun usable frequency基波(分量)fundamental (component)基波系数fundamental factor基带baseband基地(海岸)(航空)设备base (coast)(aeronautical) equipment基地电台base station (BS)基站控制器base station controller (BSC)基站识别码base station identity code (BSIC)基站收发信台base transceiver station (BTS)基站系统base station system (BSS)基站区base station area基准条件reference condition基准阻抗reference impedance奇偶校验码parity check code奇偶校验位parity bit激活activation吉尔伯特码Gilbert code级联码concatenated code即时业务demand service急充电boost charge急剧衰落flutter fading集成电路integrated circuit集成电路卡integrated circuit card集群电话互连trunked telephone connect集群电话互连器trunked telephone connector集群基站trunked base station集群效率trunking efficiency集群移动电话系统trunked mobile communication system集体呼叫group call集体接收(在卫星广播业务中)community reception集中控制方式centralized control集中式帧定位信号bunched frame alignment signal计费信息advice of charge计算机病毒computer virus计算机辅助测试computer-aided test (CAT)计算机辅助工程computer-aided engineering (CAE)计算机辅助管理computer-aided management (CAM)计算机辅助教学computer-aided instruction (CAU)计算机辅助设计computer-sided design (CAD)寄生反馈parasitic feedback寄生调制parasitic modulation寄生振荡parasitic oscillation加密encipherment加密保护encipherment protection加密方案encipherment scheme加权(互同步)网hierarchic (mutually synchrohous) network假负载dummy load假设参考电路hypothetical reference circuit尖峰信号spike间接分配indirect distribution间接调频indirect frequency modulation监测音峰频偏supervisory audio tone peak deviation监测音频单音supervisory audio tone (SAT)兼容话compatible telephone兼容性compatibility检波器的充电时间常数electrical charge time constant of a detector检波器的电流灵敏度detector current sensitivity检波器的电压灵敏度detector voltage sensitivity检波器的放电时间常数electrical discharge time constant (of a detector) 检波失真detection distortion检波效率detection efficiency检错error detection检错反馈系统error-detecting and feedback system检错码error detecting code检错能力error-detecting capacity。
常见的英语缩略词

常见的英语缩略词学习老不少英语,但是大家知道的英语缩写有哪些吗?接下来,小编给大家准备了常见的英语缩略词,欢迎大家参考与借鉴。
常见的英语缩略词ADSL 英文Asymmetrical Digital Subscriber Line的缩写,又名网络快车。
APEC英文Asian-Pacific Economic Cooperation的缩写,即亚太经济合作组织。
AQ英文Adversity Quotient的缩写,逆境商数,指一个人处理逆境的能力。
ATM英文Automatic Teller mACHINE的缩写,即自动柜员机,又称自动取款机。
BBS英文Bulletin Board System的缩写,公告牌系统或电子公告板。
BSS英文Base Station System的缩写,即基站系统,指移动通信中的空中接口部分。
CARM英文Chinese Association of Rehabilitation Medicine的缩写,即中国康复医学会。
CATV英文Cable Television的缩写,即有线电视。
CBD英文Central Business District的缩写,又称中央商务区。
CCEL英文China Certification Committee for Environment Labelling Production的缩写,即中国环境标志产品认证委员会。
CD-ROM英文Compact Cisk- Read Only Memory的缩写,即光盘只读存储器,也就是人们常说的光驱。
CEO英文Chief Enective Officer的缩写,即首席执行官。
CET英文College English Test的缩写,即大学英语测试。
CFO英文Chief Finance Officer的缩写,即首席财务主管。
CGFNS英文Commission on Graduates of Foreign Nuring Schools的缩写,即外国护士毕业生委员会。
FMB920 小型智能追踪器快速手册说明书

FMB920Small and smart trackerQuick Manual v1.8CONTENTKnow your device (3)Pinout (4)Wiring scheme (5)Set up your device (6)PC Connection (Windows) (7)How to install USB drivers (Windows) (7)Configuration (8)Quick SMS configuration (10)Mounting recommendations (12)Basic characteristics (13)LED indications (13)Electrical characteristics (16)Safety information (17)Certification and Approvals (18)Warranty (19)Warranty disclaimer (19)KNOW YOUR DEVICETOP VIEWBOTTOM VIEW (WITHOUT COVER)PIN NUMBER PIN NAME DESCRIPTION1VCC (6-30) V DC (+)(Red) Power supply(+6-30 V DC)2GND (-)(Black) Ground3DIN1(Yellow) Digital input, channel 1. DEDICATED FOR IGNITION INPUT4AIN1(Grey) Analog input, channel 1. Input range: 0-30 V DC5DOUT1(White) Digital output. Open collector output. Max. 0,5 A DCPINOUT23451FMB920 pinoutWIRING SCHEMESET UP YOUR DEVICEHOW TO INSERT MICRO-SIM CARD41COVER REMOVAL3BATTERY CONNECTION2MICRO-SIM CARD INSERTATTACHING COVER BACKGently remove FMB920 cover using plastic pry tool from both sides.Insert Micro-SIM card as shown with PIN request disabled or read our Wiki 1how to enter it later in Teltonika Configurator 2. Make sure that Micro-SIM card cut-off corner is pointing forward to slot.1 /index.php?title=FMB920_Security_info 2 /view/Teltonika_ConfiguratorConnect the battery as shown on device. Position the battery in place where it does not obstruct other components.After configuration, see PC Connection (Windows)3, attach device cover back.3 Page 7, "PC Connection (Windows)"PC CONNECTION (WINDOWS)HOW TO INSTALL USB DRIVERS (WINDOWS)1. Please download COM port drivers from here 1.2. Extract and run TeltonikaCOMDriver.exe .3. Click Next in driver installation window.4. In the following window click Install button.5. Setup will continue installing the driver and eventually the confirmation window will appear. Click Finish to complete thesetup.1 /downloads/en/fmb920/TeltonikaCOMDriver.zip1. Power-up FMB920 with DC voltage (6 – 30 V) power supply using power wires. LED’s should start blinking, see “LED indications 1”.2. Connect device to computer using Micro-USB cable or Bluetooth connection:• Using Micro-USB cable• You will need to install USB drivers, see “How to install USB drivers (Windows)2”• Using Bluetooth• FMB920 Bluetooth is enabled by default. Turn on Bluetooth on your PC, then select Add Bluetooth or other device > Bluetooth . Choose your device named – “FMB920_last_7_imei_digits ”, without LE in the end.• Enter default password 5555, press Connect and then select Done .3. You are now ready to use the device on your computer.1 Page 13, "LED indications"2 Page 7, "How to install USB drivers (Windows)"CONFIGURATIONAt first FMM003 device will have default factory settings set. These settings should be changed according to the users needs. Main configuration can be performed via Teltonika Configurator1 software. Get the latest Configurator version from here2. Configurator operates on Microsoft Windows OS and uses prerequisite MS .NET Framework. Make sure you have the correct version installed.1 /view/Teltonika_Configurator2 /view/Teltonika_Configurator_versionsMS .NET REQUIREMENTSOperating system MS .NET Framework version Version LinksWindows VistaWindows 7MS .NET Framework 4.6.232 and 64 bit 1 Windows 8.1Windows 101 /en-us/download/dotnet-framework/net462Downloaded Configurator will be in compressed archive. Extract it and launch Configurator.exe. After launch software language can be changed by clicking in the right bottom corner.Configuration process begins by pressing on connected device.After connection to Configurator Status window will be displayed.Various Status window1 tabs display information about GNSS2, GSM3, I/O4, Maintenance5 and etc. FMB920 has one user editable profile, which can be loaded and saved to the device. After any modification of configuration the changes need to be saved to device using Save to device button. Main buttons offer following functionality:Load from device – loads configuration from device.Save to device – saves configuration to device.Load from file – loads configuration from file.Save to file – saves configuration to file.Update firmware – updates firmware on device.Read records – reads records from the device.Reboot device – restarts device.Reset configuration– sets device configuration todefault.Most important configurator section is GPRS – where all your server and GPRS settings6can be configured and Data Acquisition7 – where data acquiring parameters can be configured. More details about FMM003 configuration using Configurator can be found in our Wiki8.1 /view/FMB920_Status_info2 /view/FMB920_Status_info#GNSS_Info3 /view/FMB920_Status_info#GSM_Info4 /view/FMB920_Status_info#I.2FO_Info5 /view/FMB920_Status_info#Maintenance6 /index.php?title=FMB920_GPRS_settings7 /index.php?title=FMB9201_Data_acquisition_ settings8 /index.php?title=FMB920_ConfigurationQUICK SMS CONFIGURATIONDefault configuration has optimal parameters present to ensure best performance of track quality and data usage.Quickly set up your device by sending this SMS command to it:Note: Before SMS text, two space symbols should be inserted.GPRS SETTINGS:2001 – APN2002 – APN username (if there are no APN username,empty field should be left)2003 – APN password (if there are no APN password, empty field should be left)SERVER SETTINGS:2004 – Domain 2005 – Port2006 – Data sending protocol (0 – TCP, 1 – UDP)123456DEFAULT CONFIGURATION SETTINGSDEVICE MAKES A RECORD ON MOVING IF ONE OF THESE EVENTS HAPPEN:MOVEMENT AND IGNITION DETECTION:VEHICLE MOVEMENTwill be detected by accelerometer300seconds passesVEHICLE DRIVES 100 metersIGNITION WILL BE DETECTED by vehicle power voltage between 13,2 – 30 VVEHICLE TURNS 10 degreesSPEED DIFFERENCEbetween last coordinate and currentposition is greater than 10 km/hAfter successful SMS configuration, FMB920 device will synchronize time and update records to configured server. Time intervals and default I/O elements can be changed by using Teltonika Configurator 1 or SMS parameters 2.1 /view/Teltonika_Configurator2 /view/Template:FMB_Device_Family_Parameter_listDEVICE MAKES A RECORD ON STOP IF:RECORDS SENDING TO SERVER:1 HOUR PASSESwhile vehicle is stationary and ignition is offIF DEVICE HAS MADE A RECORDit is sent to the server every 120 secondsMOUNTING RECOMMENDATIONSCONNECTING WIRES• Wires should be fastened to the other wires or non-moving parts. Try to avoid heat emitting and moving objects near the wires.• The connections should not be seen very clearly. If factory isolation was removed while connecting wires, it should be applied again.• If the wires are placed in the exterior or in places where they can be damaged or exposed to heat, humidity, dirt, etc., additional isolation should be applied.• Wires cannot be connected to the board computers or control units.CONNECTING POWER SOURCE• Be sure that after the car computer falls asleep, power is still available on chosen wire. Depending on car, this may happen in5 to 30 minutes period.• When module is connected, measure voltage again to make sure it did not decrease.• It is recommended to connect to the main power cable in the fuse box.• Use 3A, 125V external fuse.CONNECTING IGNITION WIRE• Be sure to check if it is a real ignition wire i. e. power does not disappear after starting the engine.• Check if this is not an ACC wire (when key is in the first position, most of the vehicle electronics are available).• Check if power is still available when you turn off any of vehicles devices.• Ignition is connected to the ignition relay output. As alternative, any other relay, which has power output when ignition is on, may be chosen.CONNECTING GROUND WIRE• Ground wire is connected to the vehicle frame or metal parts that are fixed to the frame.• If the wire is fixed with the bolt, the loop must be connected to the end of the wire.• For better contact scrub paint from the spot where loop is going to be connected.BEHAVIOUR MEANINGPermanently switched on GNSS signal is not received Blinking every secondNormal mode, GNSS is working OffGNSS is turned off because:Device is not working or Device is in sleep modeBlinking fast constantlyDevice firmware is being flashedBEHAVIOUR MEANING Blinking every secondNormal mode Blinking every two secondsSleep mode Blinking fast for a short time Modem activityOffDevice is not working or Device is in boot modeLED INDICATIONSNAVIGATION LED INDICATIONSSTATUS LED INDICATIONSBASIC CHARACTERISTICSMODULE Name Teltonika TM2500Technology GSM, GPRS, GNSS, BLUETOOTHGNSS GNSS GPS, GLONASS, GALILEO, BEIDOU, SBAS, QZSS, DGPS, AGPS Receiver33 channel Tracking sensitivity -165 dBM Accuracy < 3 m Hot start < 1 s Warm start < 25 s Cold start < 35 sCELLUAR Technology GSM2G bandsQuad-band 850 / 900 / 1800 / 1900 MHzData transfer GPRS Multi-Slot Class 12 (up to 240 kbps), GPRS Mobile Station Class B Data supportSMS (text/data)POWERInput voltage range 6 - 30 V DC with overvoltageprotectionBack-up battery170 mAh Li-Ion battery (0.63Wh) Internal fuse 3 A, 125 VPower consumption At 12V < 2 mA (Ultra Deep Sleep1) At 12V < 4 mA (Deep Sleep2)At 12V < 5 mA (Online Deep Sleep3) At 12V < 6 mA (GPS Sleep4)At 12V < 35 mA (nominal with no load)At 12V < 1A Max. (with full Load / Peak)BLUETOOTHSpecification 4.0 + LE1 wiki.teltonika.lt/index.php?title=FMB920_Sleep_modes&Ultra_Deep_ Sleep_mode2 wiki.teltonika.lt/index.php?title=FMB920_Sleep_modes&Deep_Sleep_ mode3 wiki.teltonika.lt/index.php?title=FMB920_Sleep_modes&Online_Deep_ Sleep_mode4 wiki.teltonika.lt/index.php?title=FMB920_Sleep_modes&GPS_Sleep_ mode SupportedperipheralsTemperature and Humiditysensor5, Headset6, OBDII dongle7,Inateck Barcode Scanner INTERFACEDigital Inputs1Digital Outputs1Analog Inputs1GNSS antenna Internal High GainGSM antenna Internal High GainUSB 2.0 Micro-USBLED indication 2 status LED lightsSIM Micro-SIMMemory128MB internal flash memory PHYSICAL SPECIFICATIONDimensions79 x 43 x 12 mm (L x W x H) Weight54 g5 teltonika.lt/product/bluetooth-sensor6 wiki.teltonika.lt/view/How_to_connect_Blue-tooth_Hands_Free_ adapter_to_FMB_device7 wiki.teltonika.lt/view/How_to_connect_OBD_II_Blue-tooth_Dongle_to_ FMB_deviceOPERATING ENVIRONMENTOperatingtemperature(without battery)-40 °C to +85 °CStorage temperature(without battery)-40 °C to +85 °C Operating humidity5% to 95% non-condensing Ingress ProtectionRating IP54Battery chargetemperature0 °C to +45 °CBattery dischargetemperature-20 °C to +60 °CBattery storage temperature -20 °C to +45 °C for 1 month -20 °C to +35 °C for 6 monthsFEATURESSensors AccelerometerScenarios Green Driving, Over Speeding detection, Jamming detection, GNSS Fuel Counter, DOUT Control Via Call, Excessive Idling detection, Unplug detection, Towing detection, Crash detection, Auto Geofence, Manual Geofence, Trip88 /view/FMB920_Features_settingsSleep modes GPS Sleep, Online Deep Sleep,Deep Sleesp, Ultra Deep Sleep9Configuration andfirmware updateFOTA Web10, FOTA11, TeltonikaConfigurator12 (USB, Bluetooth),FMBT mobile application13(Configuration)SMS Configuration, Events, DOUTControl, DebugGPRS commands Configuration, DebugTimeSynchronization GPS, NITZ, NTPFuel monitoring LLS (Analog), OBDII dongle14 Ignition detectionDigital Input 1, Accelerometer,External Power Voltage, Engine RPM(OBDII dongle14)9 /view/FMB920_Sleep_modes10 /view/FOTA_WEB11 /view/FOTA12 /view/Teltonika_Configurator13 /view/FMBT_Mobile_application14 /view/How_to_connect_OBD_II_Bluetooth_ Dongle_to_FMB_deviceELECTRICAL CHARACTERISTICSCHARACTERISTICDESCRIPTION VALUE SUPPLY VOLTAGE MIN.TYP.MAX.UNITSupply Voltage(RecommendedOperating Conditions)+6+30V DIGITAL OUTPUT (OPEN DRAIN GRADE)Drain current (DigitalOutput OFF)120µA Drain current(Digital Output ON,RecommendedOperating Conditions)0.5AStatic Drain-Sourceresistance (DigitalOutput ON)300mΩDIGITAL INPUTInput resistance (DIN1)47kΩInput voltage(RecommendedOperating Conditions)030V Input Voltage threshold 2.5V CHARACTERISTICDESCRIPTION VALUESUPPLY VOLTAGE MIN.TYP.MAX.UNIT ANALOG INPUTInput Voltage(RecommendedOperating Conditions)030V Input resistance150kΩMeasurement erroron 12V3% Additional error on 12V360mV Measurement erroron 30V3% Additional error on 30V900mVThis message contains information on how to operate FMB920 safely. By following these requirements and recommendations, you will avoid dangerous situations. You must read these instructions carefully and follow them strictly before operating the device!•The device uses SELV limited power source. The nominal voltage is +12 V DC. The allowed voltage range is +6...+30 V DC.•To avoid mechanical damage, it is advised to transport the device in an impact-proof package. Before usage, the device should be placed so that its LED indicators are visible. They show the status of device operation.•When connecting the connection (1x5) cables to the vehicle, the appropriate jumpers of the power supply of the vehicle should be disconnected.• Before dismounting the device from the vehicle, the 1x5 connection must be disconnected.•The device is designed to be mounted in a zone of limited access, which is inaccessible to the operator. All related devices must meet the requirements of EN 62368-1 standard.•The device FMB920 is not designed as a navigational device for boats.SAFETY INFORMATIONDo not disassemble the device. If the device is damaged, the power supply cables are not isolated or the isolation is damaged, DO NOT touch the device before unplugging the powe supply.All wireless data transferring devices produce interference that may affect other devices which are placed nearby.The device must be firmly fastened in a predefined location.The programming must be performed using a PC with autonomic power supply.The device must be connected only by qualified personnel.Installation and/or handling during a lightning storm is prohibited.The device is susceptible to water and humidity.CERTIFICATION AND APPROVALSThis sign on the package means that it is necessary to read the User‘s Manual before your start using the device. Full User‘s Manual version can be found in our Wiki 1.1 /index.php?title=FMB920Hereby, Teltonika declare under our sole responsibility that the above described product is in conformity with the relevant Community harmonization: European Directive 2014/53/EU (RED).E-Mark and e-Mark are the European conformity marks issued by the transport sector, indicatingthat the products comply with relevant laws and regulations or directives. Vehicles and relatedproducts need to go through the E-Mark certification process to be legally sold in Europe.SIRIM QAS International Sdn. Bhd. is Malaysia’s leading testing,inspection and certification body.The RoHS1 is a directive regulating the manufacture, import and distribution of Electronics and Electrical Equipment (EEE) within the EU, which bans from use 10 different hazardous materials (to date).The Declaration EAC and the Certificate EAC in conformity with the technical regulation TR CU of the EurAsEC Customs Union are EAC certification documents issued by independent organizations. Such organizations perform their function through laboratories accredited to the public agencies in charge of the supervision of metrology and standardization in the three countries of the EAC Custom Union, joining at the moment the certification system : Russia, Belarus, Kazakhstan, Armenia and Kyrgyzstan.Para maiores informações, consulte o site da ANATEL .brEste equipamento não tem direito à proteção contra interferência prejudicial e não pode causar interferência em sistemas devidamente autorizados.For more information, see the ANATEL website .brThis equipment is not entitled to protection against harmful interference and must not cause interference in duly authorized systems.This sign on the package means that all used electronic and electric equipment should not be mixed with general household waste.CHECK ALL CERTIFICATES All newest certificates may be found in our Wiki 2.2 /view/FMB920_Certification_%26_ApprovalsREACHREACH addresses the production and use of chemical substances, and their potential impacts on both human health and the environment. Its 849 pages took seven years to pass, and it has been described as the most complex legislation in the Union's history and the most important in 20 years. It is the strictest law to date regulating chemical substances and will affect industries throughout the world.WARRANTYWe guarantee our products 24-month warranty1 period.All batteries carry a 6-month warranty period.Post-warranty repair service for products is not provided.If a product stops operating within this specific warranty time, the product can be:• Repaired• Replaced with a new product• Replaced with an equivalent repaired product fulfilling the same functionality• Replaced with a different product fulfilling the same functionality in case of EOL for the original product1 Additional agreement for an extended warranty period can be agreed upon separately. WARRANTY DISCLAIMER• Customers are only allowed to return products as a result of the product being defective, due to order assembly or manufacturing fault.• Products are intended to be used by personnel with training and experience.• Warranty does not cover defects or malfunctions caused by accidents, misuse, abuse, catastrophes, improper maintenance or inadequate installation – not following operating instructions (including failure to heed warnings) or use with equipment with which it is not intended to be used.• Warranty does not apply to any consequential damages.• Warranty is not applicable for supplementary product equipment (i. e. PSU, power cables, antennas) unless the accessory is defective on arrival.• More information on what is RMA11 /view/RMA_guidelines。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Security in the GSM systemBy Jeremy Quirke | Last updated 1st May 2004© 2004 AusMobile SECURITY IN THE GSM SYSTEM (1)INTRODUCTION (2)SECURITY FEATURES OFFERED BY GSM (2)A UTHENTICATION (3)The SIM card (3)Additional local security in the SIM (4)The A3 algorithm and authentication procedure (4)Authentication failure (6)More on the A3 algorithm (6)C IPHERING (6)Ciphering algorithms (8)A NONYMITY (8)D ISTRIBUTION OF THE AUTHENTICATION AND CIPHERING INFORMATION THROUGHOUT THE NETWORK (10)I MPLEMENTATIONS OF A3,A8 (11)F REQUENCY HOPPING (11)FLAWS WITH THESE MEASURES (13)N ETWORK DOES NOT AUTHENTICATE ITSELF TO A PHONE (13)C OMMON IMPLEMENTATION OF A3/A8 IS FLAWED – CONTAINS A NARROW PIPE (13)C OMMON IMPLEMENTATION OF A3/A8 IS FLAWED – REDUCES STRENGTH OF CIPHERING KEY K C (14)V ULNERABILITIES IN THE SUBSCRIBER IDENTITY CONFIDENTIALITY MECHANISM (14)O VER THE AIR CRACKING OF K I (15)C IPHERING OCCURS AFTER FEC (17)F LAWS IN A5/1 AND A5/2 ALGORITHM (18)MEASURES TAKEN TO ADDRESS THESE FLAWS (18)GSM-N EWER A3/A8 IMPLEMENTATION (18)GSM-A5/3 CIPHERING (19)GPRS–GEA3 CIPHERING (19)GPRS/UMTS–C IPHERING BEFORE FEC (19)UMTS–N ETWORK AUTHENTICATION TO PHONE (19)UMTS–I MPROVED, STRONGER ALGORITHMS (20)Authentication and key generation (20)Ciphering and integrity (21)CONCLUSION (22)REFERENCES (23)APPENDIX A – A5/1 IMPLEMENTATION (24)B ASIC ALGORITHM (24)I NITIAL STATE (25)G ENERATING CIPHER STREAM (25)APPENDIX B – ALGORITHMS USED BY AUSTRALIAN OPERATORS (25)GSM/GPRS (25)UMTS (26)IntroductionMobile phones are used on a daily basis by hundreds of millions of users, over radio links. Due to the fact that unlike a fixed phone, which offers some level of physical security (i.e. physical access is needed to the phone line for listening in), with a radio link, anyone with a receiver is able to passively monitor the airwaves.Therefore it is highly important that reasonable technological security measures are taken to ensure the privacy of user’s phone calls and text messages (and data), as well to prevent unauthorized use of the service.As a result of recent mainstream controversy involving David Beckham’s alleged text messages, some articles have been published criticizing GSM’s security, even though it is highly unlikely in this case that any messages were in fact intercepted over the radio link (if at all).As a result of some of these articles, I have decided to publish a technical article dealing with only the facts of how security measures are implemented in the GSM system, the world’s most commonly used mobile telephony system. There is also a section summarizing the known flaws in these measures, and what has been done in subsequent revisions of the standard (i.e. by 3GPP) to resolve them.Security features offered by GSMGSM specification 02.09 identifies three areas of security that are addressed by GSM.-Authentication of a user – this deals with the ability for a mobile phone to prove that it has access to a particular account with the operator-Data and signaling confidentiality – this requires that all signaling and user data (such as text messages and speech) are protected against interception by means of ciphering-Confidentiality of a user – this deals with the fact that when the network needs to address a particular subscriber, or during the authentication process, the uniqueIMSI (international mobile subscriber identity) should not be disclosed inplaintext (unciphered). This means someone intercepting communications should not be able to learn if a particular mobile user is in the area.These 3 areas are covered in detail below.AuthenticationAuthentication is needed in a cellular system to prohibit an unauthorized user from logging into the network claiming to be a mobile subscriber. If this were possible, it would be easily possible to “hijack” someone’s account and impersonate that person (or simply making that person pay for the services). In fact, this was possible in some earlier cellular systems.In order to solve this problem, some sort of challenge needs to be issued by the network which the mobile phone (MS) must respond to correctly.The SIM cardMany users of GSM will be familiar with the SIM (Subscriber Identity Module) – the small smartcard which is inserted into a GSM phone. On its own, the phone has no association with any particular network. The appropriate account with a network is selected by inserting the SIM into the phone.Therefore the SIM card contains all of the details necessary to obtain access to a particular account. These details come down to just 2 items of information.-The IMSI – International Mobile Subscriber Identity – a unique number for every subscriber in the world. It includes information about the home network of thesubscriber and the country of issue. This information can be read from the SIMprovided there is local access to the SIM (normally protected by a simple PINcode). The IMSI is a sequence of up to 15 decimal digits, the first 5 or 6 of which specify the network and country (i.e. 50501 for Telstra, Australia) -The Ki – the root encryption key. This is a randomly generated 128-bit number allocated to a particular subscriber that seeds the generation of all keys andchallenges used in the GSM system. The Ki is highly protected, and is onlyknown in the SIM and the network’s AuC (Authentication Centre). The phoneitself never learns of the Ki, and simply feeds the SIM the information it needs to know to perform the authentication or generate ciphering keys. Authenticationand key generation is performed in the SIM, which is possible because the SIM is an intelligent device with a microprocessor.The SIM authentication conceptAdditional local security in the SIMThe SIM itself is protected by an optional PIN, much like an ATM PIN protects your ATM card. The PIN is entered on the phone’s keypad, and passed to the SIM for verification. If the code does not match with the PIN stored by the SIM, the SIM informs the user (via the phone) that code was invalid, and refuses to perform authentication functions until the correct PIN is entered.To further enhance security, the SIM normally “locks out” the PIN after a number of invalid attempts (normally 3). After this, a PUK (PIN UnlocK) code is required to be entered, which must be obtained from the operator. If the PUK is entered incorrectly a number of times (normally 10), the SIM refuses local access to privileged information (and authentication functions) permanently, rendering the SIM useless.The A3 algorithm and authentication procedureNow that we have established that there is a ‘secret’ Ki known only in the SIM and the network, the authentication procedure simply has to involve the SIM (via the phone) proving knowledge of the Ki. Of course, we could simply submit the Ki to the network for comparison when the network asks for it, but this is highly insecure, since the Ki could be intercepted.Instead, the network generates a 128-bit random number, known as the RAND, which it then uses the A3 algorithm (see figure) to mathematically generate an authentication token known as the SRES. It then sends the RAND to the phone for the phone to do the same. The SIM generates the 32-bit SRES, which is returned to the network for comparison. If the received SRES matches the network’s generated SRES, then the Ki’smust be the same (to a high mathematical probability), and the phone has proved knowledge of the Ki and is thus authenticated.The RAND must obviously be different every time. Otherwise, if it were the same, an attacker could impersonate the user by sending the same SRES.The above procedure can be summarized as follows:(prior) – the network pre-generates a RAND and pre-calculates the SRES for that subscriber.1.Some connection is attempted between the phone and the network.2.The phone submits its identity. All potential messages used at the start of aconnection contain an identity field. Where possible, it avoids sending its IMSI in plaintext (to prevent eavesdroppers knowing the particular subscriber isattempting a connection). Instead, it uses its TMSI (Temporary Mobile Subscriber Identity). This will be discussed later in this article.3.The network sends the AUTHENTICATION REQUEST message containing theRAND.4.The phone receives the RAND, and passes it to the SIM, in the RUN GSMALGORITHM command.5.The SIM runs the A3 algorithm, and returns the SRES to the phone.6.The phone transmits the SRES to the network in the AUTHENTICATIONRESPONSE message.7.The network compares the SRES with its own SRES. If they match, thetransaction may proceed. Otherwise, the network either decides to repeat theauthentication procedure with IMSI if the TMSI was used, or returns anAUTHENTICATION REJECT message.Authentication failureIf authentication fails the first time, and the TMSI was used, the network may choose to repeat the authentication with the IMSI. If that fails, the network releases the radio connection and the mobile should consider that SIM to be invalid (until switch-off or the SIM is re-inserted).More on the A3 algorithmThe A3 algorithm does not refer to a particular algorithm, rather the algorithm the operator has chosen to be implemented for authentication. The most common implementations for A3 are COMP128v1 and COMP128v2. In fact, both of these algorithms perform the function of both A3 and A8 (the ciphering key generation algorithm – discussed later) in the same stage.Whenever the SIM is asked to compute the SRES (with the RUN GSM ALGORITHM command) it also computes a new Kc (ciphering key – discussed later). Thus not only is the authentication procedure used to verify a user, it is also used whenever the network wishes to change keys.CipheringCiphering is highly important to protect user data and signaling data from interception. The GSM system uses symmetric cryptography - the data is encrypted using an algorithm which is ‘seeded’ by the ciphering key – the Kc. This same Kc is needed by the decryption algorithm to decrypt the data. The idea is that the Kc should only be known by the phone and the network. If this is the case, the data is meaningless to anyone intercepting it.The Kc should also frequently change, in case it is eventually compromised. The method of distributing the Kc to the phone is closely tied in with the authentication procedure discussed above.Whenever the A3 algorithm is run (to generate SRES), the A8 algorithm is run as well (in fact the SIM runs both at the same time). The A8 algorithm uses the RAND and Ki as input to generate a 64-bit ciphering key, the Kc, which is then stored in the SIM andreadable by the phone. The network also generates the Kc and distributes it to the base station (BTS) handling the connection.At any time, the network can then order the phone to start ciphering the data (once authenticated) using the Kc generated. The network can pick from a number ofalgorithms to use, as long as the phone supports the one chosen (this is indicated to the network earlier in a classmark message, which specifies the phone’s capabilities).The ciphering algorithm works by generating a stream of binary data (the cipher block), which is modulo-2 added (XORed) with the user data, to produce the ciphered text which is transmitted over the air. The data is decrypted by XORing the received data with the cipher block, which should be the same if the Kc is the same.Kc (from A3)Cipher text COUNTUser dataThe algorithm is also ‘seeded’ by the value COUNT, which is based on the TDMA frame number, sequentially applied to each 4.615ms GSM frame. Internal state of the algorithm is flushed after each burst (consisting of 2 blocks of 57 bits each). In the case of multislot configurations, different cipher contexts are maintained for each timeslot. The same base Kc is used, however it is manipulated for each timeslot by XORing bits 32-34 of the Kc with the 3-bit timeslot number (0-7).Ciphering algorithmsAs mentioned above, the network can choose from up to 7 different ciphering algorithms (or no ciphering), however it must choose an algorithm the phone indicates it supports. Currently there are 3 algorithms defined – A5/1, A5/2 and A5/3. A5/1 and A5/2 were the original algorithms defined by the GSM standard and are based on simple clock-controlled LFSRs. A5/2 was a deliberate weakening of the algorithm for certain export regions, where A5/1 is used in countries like the US, UK and Australia.A5/3 was added in 2002 and is based on the open Kasumi algorithm defined by 3GPP. AnonymityAs mentioned above, one of the main goals of GSM security was to avoid having to use the IMSI (International Mobile Subscriber Identity) in plaintext over the radio link, thus stopping an eavesdropper from determining if a particular subscriber was in an area and what services they were using.This is avoided by addressing the phones by a 32-bit TMSI (Temporary Mobile Subscriber Identity), which is only valid in a particular Location Area (i.e. one paging domain). The subscriber addresses itself or is paged by the 32-bit TMSI from then on.The TMSI is updated at least during every location update procedure (i.e. when the phone changes LA or after a set period of time). The TMSI can also be changed at any time by the network. The new TMSI is sent in ciphered mode whenever possible so an attacker cannot maintain a mapping between an old TMSI and a new one and “follow” a TMSI.Allocating a new TMSI (when not location updating or location change duringconnection)Allocating a new TMSI (when moving into a new location area in idle mode)The phone must store the TMSI in non-volatile memory (so it is not lost at switch off). It is normally stored in the SIM.Initially of course the phone will have no TMSI, and thus is addressed by its IMSI. Once ciphering has commenced the initial TMSI is allocated. The VLR controlling the LA in which the TMSI is valid maintains a mapping between the TMSI and IMSI such as that the new VLR (if the MS moves into a new VLR area) can ask the old VLR who the TMSI (which is not valid in the new VLR) belonged to.Distribution of the authentication and ciphering information throughout the networkAs discussed above, the root key of all ciphering key generation and authentication is the Ki, stored only in the SIM and the network’s AuC (considered to be part of the HLR – Home Location Register).Therefore, when a particular VLR (Visitor Location Register), which serves one of more MSC (Mobile Switching Centres) and handles the mobility management for that area needs to authenticate a user, it must obtain information from the HLR. However, distributing the Ki to the VLR is a security threat, particularly if the subscriber is roaming, the foreign network would learn the Ki.Furthermore, constantly asking for information from the HLR every time authentication is needed would cause a large signaling load on the HLR.Instead, the HLR distributes authentication vectors, consisting of a valid SRES, Kc and RAND for the particular IMSI the VLR has specified. Normally multiple sets are distributed to the VLR for it to use. This reduces signaling load as well as keeping the Ki secret. Furthermore, the new VLR may be able to retrieve the unused vectors from the previous VLR when moving VLR areas.Passing of authentication information between VLRsImplementations of A3, A8Although the design of the GSM system allows an operator to choose any algorithm they like for A3 & A8, many decided on the one that was developed in secret by the GSM association, COMP128.COMP128 eventually ended up in public knowledge due to a combination of reverse engineering and leaked documents, and serious flaws were discovered (as discussed below).Some GSM operators have moved to a newer A3/A8 implementation, COMP128-2, a completely new algorithm which was also developed in secret. This algorithm for now seems to have addressed the faults of the COMP128 algorithm, although since it has yet to come under public scrutiny it may potentially be discovered via reverse-engineering and any possible flaws could be learned.Finally, the COMP128-3 algorithm can also be used, it is simply the COMP128-2 algorithm, however all 64-bits of the Kc are generated, allowing maximal possible strength from the A5 ciphering algorithm (COMP128-2 still sets the 10 rightmost bits of the Kc to 0), deliberately weakening the A5 ciphering.Frequency hoppingFinally, slow frequency hopping is used in GSM, where the transceiver changes physicalcarrier every frame (4.615ms), or about 217 times per second.The hopping sequence is defined by two parameters – the HSN (Hopping Sequence Number), and the MAIO (Mobile Allocation Index Offset). There are 2 modes of hopping – cycling hopping and non cyclic hopping. In both modes, the MAIO simply chooses the phase in the hopping sequence that is to be used. If the HSN is 0, cyclic hopping is used where the mobile station simply steps through a set of frequencies (called the mobile allocation).In non-cyclic hopping, the (publicly known) frame number is used to seed a more complex hopping algorithm.In both cases, the hopping adds a layer of security. In order to decipher the stream with no knowledge (at the time of eavesdropping) of the hopping sequence, the entire bandwidth needs to be sampled. In both GSM900 and GSM1800 this can amount to tens of megahertz (although can be reduced if the operator’s frequency allocation for that area is known).Of course, if the channel information is allocated to the phone in plaintext, as it is at the start of the connection, then that sequence can be easily followed. But, typically, when setting up a data or voice (TCH) channel, an additional channel is allocated by sending messages on the initial channel when encryption has been enabled, thus making it significantly more difficult for an attacker to learn the TCH sequence.The main problem security-wise with the hopping sequence is that the hopping sequence parameters on a particular base station are usually fairly static, and given the attacker has access to the network (easily achievable even with a prepaid kit), the typical hopping parameters of that base station can be learned quickly. Thus, there is not a great deal of security to be found in the hopping sequence, it simply adds just another layer of complexity for the attacker.Flaws with these measuresNetwork does not authenticate itself to a phoneThis is the most serious fault with the GSM authentication system. The authentication procedure described above does not require the network to prove its knowledge of the Ki, or any other authentication context to the phone.Thus it is possible for an attacker to setup a false base station with the same Mobile Network Code as the subscriber’s network. Since the authentication procedure initiation is up to the network’s discretion, the false network may choose not to authenticate at all, or simply send the RAND and ignore the response. It does not have to activate ciphering either. The attacker can set the cell reselection parameters of his false base station to values that will highly encourage his ‘victims’ to camp on it – such as a highCELL_RESELECT_OFFSET.The subscriber could then unknowingly be making calls or sending text messages that could be intercepted using this man-in-the-middle attack (as the false network could then route the calls back to the public telephone network).Common implementation of A3/A8 is flawed – contains a narrow pipeThe most common implementation of the A3 and A8 algorithms is rolled into a single algorithm, COMP128, which generates the 64-bit Kc and the 32-bit SRES from the 128-bit RAND and the 128-bit Ki input.This algorithm is seriously flawed, in that carefully chosen values for the input RAND will provide enough information to determine the Ki in significantly less than the ideal number of attempts (a brute force on the order of 2128 values). The flaw exists in the fact that in the second round of the algorithm, a narrow pipe exists (such that invididual bytes in isolated groups of 4 bytes in the second round output depend only on unique groups of 4 bytes in the input (2 of which are in the Ki, 2 are in the RAND) ), and thus a collision attack can be performed.Earlier attacks based on repeated 2R attacks could typically crack a SIM in approximately 217 RANDs.Dejan Kaljevic has written a utility (Sim Scan) which uses 2R, 3R, 4R and 5R attacks to obtain various bytes of the Ki, which he estimates can recover the Ki in around 18,000 RAND values on average. In my experience with this utility, it has recovered Ki’s with between 7000 and 35,000 RAND attempts, i.e. around 213 – 215 attacks.With this sort of attack, a Ki can be extracted within an hour (depending on the speed of a SIM – many smartcard readers can ‘overclock’ the SIM to higher clock rates such as10MHz for faster extraction). At 6MHz I was able to achieve around 7 RAND attempts per second on some of the SIMs I tested.Many have argued that this is not a serious attack, as it still requires physical access to the SIM (and the PIN, if one is used). Furthermore, some users have found it useful in order to ‘clone’ several of their SIMs onto a single programmable smartcard (to enable convenient switching between accounts).However when paired with the previous concern (the network does not authenticate) the potential seriousness of this vulnerability is more clear, as described in a later section. Common implementation of A3/A8 is flawed – reduces strength of ciphering key KcThe common implementation of A3/A8, COMP128 has yet another “flaw”, however this is almost certainly a deliberate weakening. When generating the 64-bit Kc, it always sets the least significant 10 bits of the Kc to 0. This effectively reduces the strength of the data ciphering algorithm to 54 bits (a reduction by a factor of 1024), regardless of which ciphering algorithm is used.This same deliberate weakening is also present in the other algorithm of choice,COMP128-2.Vulnerabilities in the subscriber identity confidentiality mechanismAs described earlier, the GSM specifications have gone to great length to avoid phone’s being addressed (i.e. paged) or identifying themselves in plaintext by their IMSI. This is supposed to prevent an eavesdropper listening in on the initial plaintext stage of the radio communication learning that a particular subscriber is in the area (and what they are doing – i.e. the nature of communication can be known prior to ciphering – SMS, voice call, location update, etc).Thus where possible the network pages users by their TMSI (Temporary Mobile Subscriber Identity) and maintains a database in the VLR mapping TMSIs to IMSIs.If the network somehow loses track of a particular TMSI, and therefore cannot determine who the user is, it must then ask the subscriber its IMSI over the radio link, using the IDENTITY REQUEST and IDENTITY RESPONSE mechanism. Obviously, the connection cannot be ciphered if the network does not know the identity of the user, and thus the IMSI is sent in plaintext.Combined with the previously described flaw that the network does not have to authenticate itself to a phone, an attacker can use this to map a TMSI to its IMSI. The attacker accomplishes this by imitating a legitimate base station of the subscriber’s network, and paging that subscriber by its IMSI. The subscriber’s phone will then establish a radio connection, and then the attacker can simply send the subscriber the IDENTITY REQUEST(Identity Type=IMSI) message, and the phone will respond with the IMSI.Over the air cracking of KiThe previous mentioned flaws combined can result in a more serious attack.By imitating a legitimate GSM network, the attacker can then use the authentication procedure many times to exploit the vulnerabilities in COMP128.To accomplish this, the attacker would imitate a valid base station with the same mobile network code as the customer’s network. It would then page the mobile phone, either by its IMSI (or TMSI), to establish a radio (RR) connection to it.Once the connection is established, if the phone was paged by its TMSI, the IMSI can easily be found out by sending the phone the IDENTITY REQUEST command (to which the phone must respond at any time).Following this, the attacker can keep choosing RANDs as such to exploit the COMP128 algorithm flaws and submitting them to the phone via AUTHENTICATION REQUEST messages (imitating a legitimate network asking the phone to authenticate itself). The phone, as required, simply returns the SRES. The attacker could then repeat the authentication requests many times, collecting the SRESes until he/she has gained enough information to learn the Ki.Once the Ki and IMSI are known the attacker can impersonate that user, and make and receive calls and SMS messages in their name. It can also be used to eavesdrop, sinceRANDs from the legitimate network to the legitimate user can be monitored, and thus combined with the known Ki can be used to determine the Kc used for the encryption. This attack will work on any GSM phone, without any previous access to the phone (or even knowledge of the IMSI) – a random phone’s TMSI can be chosen by monitoring radio traffic. Being an over-the-air attack, it can even be performed from many kilometers away.We will initially pick conservative values for our calculations, because even then it can be shown that GSM is highly vulnerable to over-the-air attacks. For the COMP128 flaws, we will use repeated 2R attacks, resulting in approximately 217 RANDs needed to find the Ki.We must now determine the rate at which the phone can be challenged with RANDs over the air. Authentication typically happens on the SDCCH (Standalone Dedicated Control Channel), which in either mode (SDCCH/4, SDCCH/8) allows 1 radio-block (consisting of 4 bursts) in every 51-muliframe period (defined to be 120*51/26 milliseconds, or235ms). The transmit and receive timing (transmit lagging) is skewed by 15 frames + 3 timeslots, equating to 15*120/26 + 3*120/26/8 or about 71ms. The authentication messages AUTHENTICATION REQUEST and AUTHENTICATION RESPONSE will each fit into their own SDCCH block. This means if the phone wishes to respond to the challenge in the next available SDCCH slot it has about 71ms – 4*120/26 = 52ms to decode and process the information, pass it to the SIM to run A3/A8, receive the SRES from the SIM and code and transmit it back to the network. This would certainly be an unrealistic expectation for some equipment. The GSM specifications allow up to 12 seconds for authentication processing, however we will be more realistic and decide the phone can process it by the next SDCCH transmit period, or 52ms + 235ms or around 288ms, a more reasonable expectation.Using these figures, a challenge is delivered in the first 235ms period, and the response is sent back in the next 235ms period (at the same time as a new challenge is delivered). Thus around 4 challenges can be computed per second. Thus the expected time to recover the Ki in this method would be around 217 RANDs / 4 RAND/s = 215 seconds or 9 hours. Now most terminals are battery powered and would be unable to sustain constant transmission for 9 hours (or may move out of range of the attacker). However, the attack can simply be broken into many time periods, so long as the attacker retains the ‘context’ of the challenges he has sent and received.Furthermore, these estimates as stated were based on the 2R attack. By using more sophisticated attacks (such as used by Dejan Kaljevic’s Sim Scan, which uses 2R, 3R, 4R and 5R attacks) this time could be reduced even more (Dejan estimates his Sim Scan can recover the Ki in an expected time of 18,000 RANDs). If this were the case, in this example, the key could be recovered in just over an hour.In Australia, the 2 largest operators (Telstra and Optus) which have approximately 80 per cent of the mobile market share use COMP128 and are vulnerable to this attack. Ciphering occurs after FECIn the GSM system, like all digital radio communications systems, forward error correction (FEC) is used over the radio link to assist in the correction from errors caused by noise or signal fading.FEC works by adding redundancy to the data stream, thus increasing the amount of bits to transfer.The problem in GSM is that ciphering occurs after FEC, meaning the redundant stream of bits is then modulo-2 (XORed) added with the ciphering stream, meaning the known redundancy patterns could be used to assist in a crypt-analytical attack. In the most simple example, suppose the error correction codes consist of the convolutional-code polynomials G1 = 1 and G2 = 1, corresponding to a simple twice repetition of bits. Suppose a received 6-bit sequence is 101110. Thus, it can be concluded that the 6-bit ciphering stream consisting of the bits abcdef is such that:a=b’, c=d, and e=f’Of course it is far more complicated than that; in GSM the data is interleaved over many blocks and the coding on most encrypted channels is a ½ rate (i.e. non punctured) convolutional code generated by polynomials with m from 5 to 7. Furthermore, on voice channels, only certain bits are protected with the convolutional code (unequal error protection).。