You are on page 1of 1

43. The identity which guaranties the integrity of mobile subscriber on the radio interface is ----------------. 44.

The temporary number used for routing call to MS IS -------------. 45. The structure of MSRN is the same as that of ------------------ . 46. The max: length of LAC is --------------. 47. The algorithm used for authentication purpose is -----------------. 48. RAND, SRE, Kc are together called --------------. 49. RAND signal is of ---------------- bit length. 50. GSM belongs to ----------------- generation mobile communication standard. 51. The inputs of A3 algorithm are ----------. 52. The output of A3 algorithm is ----------. 53. -------------- carries authentication check. 54. VLR provides ------------ to BTS for encryption the radio path. 55. The inputs of A8 algorithm are ----------. 56. The output of A8 algorithm is ----------. 57. An action taken by MSC/VLR set the subscriber status to present is -------------.

You might also like