What is HLR and VLR and its function in GSM
As From the Name VLR means Visitor Location Register and HLR means Home Location Register so HLR having all detail of subscriber and VLR having temporary details for mainly call…
Telecom Techniques Guide
GSM technology, GSM RF optimization, GSM Planning and How GSM Works.
As From the Name VLR means Visitor Location Register and HLR means Home Location Register so HLR having all detail of subscriber and VLR having temporary details for mainly call…
If the voice signal is modulated and transmitted directly after channel coding, due to the condition changes in mobile communication channel, a deep of the fading will influence a…
The SIM card contains its internal memory, in which the data, personal and financial information as well as the identity for GSM / CDMA are stored. The SIM card stores…
When the voice signal is transmitted after being processed and modulated, the frequency hopping technique will be used too, i.e. the transmission carrier varies constantly at different timeslots (of course,…
The LogicalĀ Channel is used in time multiplex in a physical channel, which is categorized according to the types of messages transmitted in the physical channel. Different logical channels are…
What is Fading: – Fading is most important thing when you design any RF Design lets understand what is fading and how its effect. The communication between the base station…
Frequency hopping can be briefly defined as a sequential change of carrier frequency on the radio link between the mobile and the base station. In GSM, one carrier frequency is…
BSIC=NCC+BCC In GSM system, each BTS is allocated with a color code, which is called BSIC. MS can identify two cells with the same BCCH by the help of BSIC….
MCC MNC – Telecom What is mcc and mnc :- Both are very first question in your mind when you start learning on telecom its basic behind numbering system in…
The Below a GSM burst. It consists of several different elements. These elements are as below: This is the area in which the speech, data or control information is held….
When we talk about Mobile Business then its worst useful without authentication means to make Network as business all user required to be authenticate lets understand how authentication done in…
NCC is a part of BSIC. MS uses it to distinguish adjacent BTS that belong to different GSM PLMN. NCC is composed of 3 bits, with the range of 0…