Across
- 2. Wireless LAN
- 3. How FDMA separates users
- 8. SIM Location Information
- 9. Weak Wireless Auth Protocol
- 13. Verification of Identity
- 19. Deny ability to deny
- 22. Readable text
- 23. Secures EPC
- 24. Short Message Service
- 26. Base Station System
- 28. Peer to Peer network
- 30. Evolved Packet System
- 33. C in CIA
- 34. Subscriber ID (GSM International)
- 37. Encrypted Text
- 38. Identifies a Single AP
- 41. 2.5G
- 42. Phone Number
- 43. UMTS 3G Block Cipher
- 45. R in RR sublayer (GSM)
Down
- 1. C in CM sublayer (GSM)
- 4. GSM Radio Interface
- 5. GPRS Billing based upon
- 6. Multiple Access in 1G
- 7. Wireless to Wired Bridge
- 10. EPS Equivalent to GSM BTS
- 11. Multiple Access in 2G
- 12. Each bit in P effects all bits in C
- 14. Universal Mobile Telecommunication System
- 15. Identifies Multiple APs
- 16. How TDMA separates users
- 17. GPRS Radio Interface
- 18. I in CIA
- 20. Mapping Antenna Modulation (LTE)
- 21. International Mobile Equipment Identity
- 25. Mobile Station
- 27. IP Protection Protocol UMTS
- 28. A in CIA
- 29. EPS HLR
- 31. Identifies a Wireless Network
- 32. GPRS SIM
- 33. Backbone Network Medium
- 35. B in GSM B-Channel
- 36. Long Term Evolution
- 39. Improves Performance at Cell Edge (LTE)
- 40. SIM File Format
- 41. Global System for Mobile Communications
- 44. Subscriber Identity Module