412

123456789101112131415161718192021222324252627282930313233343536373839404142434445
Across
  1. 2. Wireless LAN
  2. 3. How FDMA separates users
  3. 8. SIM Location Information
  4. 9. Weak Wireless Auth Protocol
  5. 13. Verification of Identity
  6. 19. Deny ability to deny
  7. 22. Readable text
  8. 23. Secures EPC
  9. 24. Short Message Service
  10. 26. Base Station System
  11. 28. Peer to Peer network
  12. 30. Evolved Packet System
  13. 33. C in CIA
  14. 34. Subscriber ID (GSM International)
  15. 37. Encrypted Text
  16. 38. Identifies a Single AP
  17. 41. 2.5G
  18. 42. Phone Number
  19. 43. UMTS 3G Block Cipher
  20. 45. R in RR sublayer (GSM)
Down
  1. 1. C in CM sublayer (GSM)
  2. 4. GSM Radio Interface
  3. 5. GPRS Billing based upon
  4. 6. Multiple Access in 1G
  5. 7. Wireless to Wired Bridge
  6. 10. EPS Equivalent to GSM BTS
  7. 11. Multiple Access in 2G
  8. 12. Each bit in P effects all bits in C
  9. 14. Universal Mobile Telecommunication System
  10. 15. Identifies Multiple APs
  11. 16. How TDMA separates users
  12. 17. GPRS Radio Interface
  13. 18. I in CIA
  14. 20. Mapping Antenna Modulation (LTE)
  15. 21. International Mobile Equipment Identity
  16. 25. Mobile Station
  17. 27. IP Protection Protocol UMTS
  18. 28. A in CIA
  19. 29. EPS HLR
  20. 31. Identifies a Wireless Network
  21. 32. GPRS SIM
  22. 33. Backbone Network Medium
  23. 35. B in GSM B-Channel
  24. 36. Long Term Evolution
  25. 39. Improves Performance at Cell Edge (LTE)
  26. 40. SIM File Format
  27. 41. Global System for Mobile Communications
  28. 44. Subscriber Identity Module