GSM

The Global System for Mobile Communications (formerly Groupe Spécial Mobile, GSM) is a standard for fully digital mobile phone networks, mainly for telephony, but also for circuit-switched and packet-switched data transmission and short messages ( short messages ) will be used. It is the first standard of the so-called second generation ( " 2G " ) as the successor to the first generation of analog systems ( in Germany: A- network, B- grid and C- grid) and is the world's most widely used mobile standard.

GSM was created with the aim to provide a mobile telephone system that allowed participants a European mobility and compatible with ISDN or conventional analogue telephone network voice services offered.

In Germany, GSM is the technical basis of the D and E networks. Here GSM was introduced in 1992, which led to the rapid spread of mobile phones in the 1990s. The standard is now used in 670 GSM networks in 200 countries and territories of the world as mobile radio standard; This corresponds to a share of about 78 percent of all mobile subscribers. There are added later extensions to the standard, such as HSCSD, GPRS and EDGE for faster data transfer. For access to the networks, a total of 1700 different mobile phone models.

In March 2006, 1.7 billion people worldwide used GSM and daily come a million new customers - mainly from the growth markets of Africa, India, Latin America and Asia. Adding to all mobile standards together, about 2 billion people are mobiltelefonisch accessible worldwide. This was announced by the GSM Association and the GSA in October 2005. In 2003, implemented 277 billion U.S. dollars with GSM technology ( According to Deutsche Bank).

  • 2.6.1 Handover
  • 2.6.2 Mobility Management
  • 2.6.3 roaming
  • 2.6.4 Safety functions 2.6.4.1 authentication
  • 2.6.4.2 payload encryption
  • 2.6.4.3 anonymization
  • 2.6.4.4 User authentication
  • 3.1 Voice transmission 3.1.1 Full Rate Codec (FR)
  • 3.1.2 Half Rate Codec (HR)
  • 3.1.3 Enhanced Full Rate Codec ( EFR )
  • 3.1.4 Adaptive Multirate Codec ( AMR)
  • 3.1.5 Adaptive Multi Rate Codec or wide band (AMR -WB )
  • 4.1 CSD
  • 4.2 HSCSD
  • 4.3 GPRS
  • 4.4 EDGE
  • 4.5 streaming
  • 4.6 Generic Access
  • 4.7 Cell Broadcast
  • 4.8 BOS -GSM
  • 6.1 Man-in -the-middle
  • 6.2 Denial of Service
  • 6.3 encryption algorithms
  • 6.4 Countermeasures
  • 7.1 Situation in Germany
  • 7.2 Situation in Austria
  • 7.3 Situation in Switzerland

The emergence of GSM

In the late 1950s, the first analog mobile networks in Europe began operation; in Germany this was the A- net. However, their operation was complicated, and they only had capacity for a few thousand participants. There were also within Europe side by side several different systems which, although partly based on the same standard, but differed in some details. In the next generation of digital networks a similar situation should be avoided.

Technology

Generally

In contrast to the fixed network can be found at a mobile network various additional requirements:

  • Subscriber authentication
  • Channel access method
  • Mobility management (HLR, VLR location update, handover, roaming)
  • Participants are mobile and can thus change from one radio cell to another. If this happens during a call or data connection, then the call from one base station to another must be passed (handover), and the phone 's wireless connection always gets the most appropriate base station. In exceptional cases, the call will be routed via a neighboring base station in order to avoid overloading.
  • Efficient resource utilization
  • There is a lower data transfer rate than the fixed network available on the radio interface, the user data must be compressed. To keep the amount of data transfer rate, which must be used for signaling processes, small, the signaling messages were exactly as requested, specified in order to keep them as short as possible.
  • Mobile phones have only a limited battery capacity, which should be used sparingly. In general, sending costs more energy than receiving. Therefore, the amount of data transmitted and the status of messages should be kept as low as possible in standby operation.
  • Use of third-party networks (roaming)

Standardization

The standardization of GSM was started at CEPT, continued by ETSI (European Telecommunications Standards Institute ) and later handed over to 3GPP (3rd Generation Partnership Project). There GSM, the term GERAN (GSM EDGE Radio Access Network) further standardized. 3GPP is thus responsible for UMTS and GERAN.

Range

The achievable with GSM ranges vary widely, depending on the terrain profile and building. Outdoors partially up to 35 km can be reached on sight. For longer distances, the signal propagation time of the radio signals prevents communication between base and mobile station. However, it is with the help of special tricks possible to increase the cell size, partly at the expense of capacity. This method is used in coastal regions. In cities the coverage is often due to attenuation by buildings and by the lower antenna height only a few hundred meters, where the base stations are closer together but also for capacity reasons.

Principle, however, that with GSM 900 due to lower pathloss and the larger output terminal performance greater ranges are achievable than with DCS in 1800.

According to the reach the cell size is determined. It also forecasted usage is taken into account to avoid overloading.

Physical transmission on the air interface

The digital data is transmitted with a combination of frequency and time division multiplexing, wherein the transmitting and receiving direction are separated by frequency division multiplexing and time division multiplexing the data. The GSM frequency band is divided into a plurality of channels having a spacing of 200 kHz. For GSM 900 in the range of 890-915 MHz for the uplink channel 124 (uplink) to the base station and in the range of 935-960 MHz channels 124 are provided for the downlink direction (downlink). The TDMA frame period is exactly 120/26 ms ( approximately 4.615 ms) and corresponds to the duration of exactly 1250 symbols. Each of the eight time slots per frame thus takes about 0.577 ms, corresponding to the duration of 156.25 symbol. In these time slots bursts of various types can be sent and received. The duration of a normal burst is approximately 0.546 ms, in which 148 symbols are transmitted.

The modulation method is Gaussian Minimum Shift Keying ( GMSK, dt: Gaussian minimum shift keying ), a digital phase modulation in which the amplitude is constant. With EDGE, then 8 -PSK has been introduced. During bit is transmitted per symbol with GMSK only 1 bit, it is 8-PSK 3, however, a better signal-to - noise power ratio is used for the radio link required.

Because at a distance of several kilometers, the radio signal by the propagation speed (the so-called group velocity ) can be slowed down and the burst of the mobile phone is no longer arrive within the specified time slot at the base station, this determines the signal propagation time and calls the phone on, the burst send out a bit earlier. For this purpose, it shall inform the mobile device with the parameter Timing Advance ( TA), which specifies the timing advance in 3.7 microsecond increments. This corresponds in each case to the duration of a bit, the bit rate is 270.833 kbit / s (see below). The Timing Advance has a value range from 0 to 63, the duration of a bit corresponds to a given group velocity a distance of approximately 1.106 kilometers, and there for the duration return direction must be considered together, corresponds to a change in the timing advance to one of a change in distance of slightly more than 553 m. This results in a maximum range of about 35.4 km, but which can be extended with technical tricks.

After the reception burst, the mobile phone turns on the offset by 45 MHz transmission frequency, and transmits where the burst of the reverse channel to the base station. Occur since downlink and uplink offset by three time slots (of the eight ), an antenna for both directions is sufficient. To increase noise immunity and the frequency pair can be changed periodically ( frequency hopping ), the result is a frequency hopping rate of 217 hops per second.

With a gross data rate of approximately 2166.664 kbit / s per channel ( 156.25 bits in each burst to 120/26 ms) stay per channel slot still 270.833 kbit / s gross left. This data rate 9.2 kbit / s will be reserved for the synchronization of the frame structure, so that 24.7 kbit / s net remaining for the data channel. By transmitting by radio lie in this bitstream before many bit errors.

The data rate per time slot of 24.7 kbit / s is divided into 22.8 kbit / s for encoded and encrypted user data of the traffic channel (Traffic Channel) and 1.9 kbit / s for the subscriber-specific control channel ( control channel ). The channel coding involves a series of error protection mechanisms, allowing for the actual user data still 13 kbit / s are left (in the case of voice data ). An introduced later alternative channel coding allows the reduction of error protection in favor of the application data, since data transmission protocols, in contrast to voice transmission bit errors in a new request for the data block is possible.

Network architecture

Hardware

GSM networks are divided into four subsystems ( see the picture from left to right):

The blue letters in the image denote the data transmission paths between the components.

Addressing

In a GSM network, the following points for addressing the participants are used: The MSISDN ( Mobile Subscriber ISDN Number) is the actual phone number at which a subscriber is to reach worldwide. The IMSI (International Mobile Subscriber Identity ) is, accordingly, the internal user ID, ​​which is stored on the SIM and is used to identify a subscriber within a radio network. For privacy reasons, the IMSI is sent only during the initial authentication of the mobile station via the radio network, in other authentications a temporarily valid TMSI (Temporary Mobile Subscriber Identity) is used instead. For roaming, so the routing of telephone calls within the mobile network, the MSRN is ( Mobile Station Roaming Number) used.

Some important features within mobile networks

Handover

One of the most important basic functions in cellular mobile networks is initiated by the network cell changes during an ongoing call. This may be necessary for various reasons. The decisive factor is, inter alia, the quality of the wireless connection, but also the traffic load of the cell. It can be passed, for example, a call to a distant cell in order to avoid overloading.

Here, for example, due to the channel quality of the MS, a new channel is assigned within a cell.

Mobility management

Several procedures in the GSM network treat the movement ( mobility) of the participants in the network. In order for a mobile user that is located somewhere in the network area, call or it can be placed in a short message, must constantly the condition exist that the participants a query ( called paging ) can receive. To this end, his current whereabouts in a certain granularity must be constantly tracked.

To reduce the burden on the core network and extending the battery life only the location area is recorded centrally in which a registered prebooked phone is. Where it is within this area is not known. To save energy and transmission capacity, the mobile phone is in standby mode (idle mode) reports in specified by the network distances ( between 6 minutes and 25.5 hours) or when changing the location area in the network. Once the network wants to establish a connection to the mobile phone, this is called over all the base stations of the location area and the connection via the base station to which the terminal logs constructed in message.

The phone, however, is precisely known radio cell in which it is located. In standby mode, it scans the neighboring cells whose carrier frequencies it gets notified from the base station on special channels of information. The signal of one of the neighboring cells better than the current cell, then the handset switches to it. Noticed it make any change in the location area, then it has the power to tell his new abode.

Are the VLR ( Visitor Location Register) and the HLR for the mobility management ( Home Location Register) is of very great importance. The two are actually to be understood as databases. Each MS is exactly once registered in a HLR. There, all user data is stored. In the HLR, the VLR is always entered in whose area a MS has recently reported. In each case all VLR is located in the catchment area of a MSC MS entered.

Roaming

Since many mobile operators have taken from different countries roaming agreement, it is possible to use the phone in other countries and continue to be available under its own number and talk.

Security features

This section describes the security functions are listed. Deficits of these functions are listed security deficits in the section.

Authentication

Each participant is a 128 -bit long Subscriber Authentication Key Ki assigned upon admission to the network of a mobile operator. The key is stored on the subscriber side in the SIM card, the network side either in the HLR or in the AuC. The MS is sent from the network, a 128-bit random number RAND to authenticate. From this random number, and Ki is the A3 algorithm, the authentication key SRES ' ( Signed Response, 32-bit) calculated. This calculation takes place in the SIM card. The authentication key SRES is calculated separately from the mains in the AuC and the MS and compared the results from the VLR. Votes SRES and SRES ' match, the MS is authenticated.

The A3 algorithm is an elementary component of security in the GSM network. It can be selected from any network operator itself, the specific implementation details are kept secret.

Payload encryption

To encrypt a 64 -bit long code key (English: Ciphering Key ) is required for authentication from the random number RAND and the user key Ki with the algorithm A8 Kc determined. The code key is used by the algorithm A5 for the symmetric encryption of transmitted data.

Even given the small key length can be assumed that the encryption does not provide significant protection against serious attacks. Furthermore, it was already shown by several attacks in 2009 and 2010 on the used algorithm A5 / 1 that this is basically insecure. However, the encryption prevents easy listening, as it is possible in the analog police radio.

The encryption with the uncertain A5/1-Algorithmus is normally on in Germany. In countries such as India allowed the mobile phone network is not encrypted. In principle provides the GSM standard that Mobile Phones in unencrypted connections a warning.

Anonymization

In order to ensure a degree of anonymity, the unique subscriber identifier IMSI over which a participant is to identify globally unique, hidden on the air interface. Instead, the VLR TMSI is a temporary generated, which will be reset with each new location update and is only transmitted encrypted. See IMSI catcher.

User Authentication

The user has to compete with the SIM card (and thus over the mobile network) to authenticate as an authorized user. This is done by means of a PIN. It is set on the SIM card if the PIN code request to be deactivated. The PIN is entered incorrectly three times in a row, the SIM card will be locked automatically. To unlock them again, the PUK ( Personal Unblocking Key) is required. The PUK code may be entered incorrectly ten times in a row before the SIM card is definitely locked. The mobile network does not need to authenticate to the user itself.

Services to the user

Fixed network side of the GSM standard is based on the ISDN standard and therefore provides similar call-processing features. With the possibility of short messages ( SMS, short for Short Message Service) to send and receive, a new service has been created which has been enthusiastically received and has become an important source of revenue for the network operator.

Voice transmission

For the GSM voice transmission several codecs have been standardized over the years. The usual speech codecs, which typically manage with a data rate of less than 20 kbit / s, lead a human language by adapting feature extraction, thus making them useful only for the transmission of speech. Music or other sounds they can therefore be transferred only with lower quality. Following the speech codecs used in the GSM network are briefly summarized:

Full Rate Codec (FR)

The first GSM speech codec was the full-rate codec ( FR). For him there is only a net data rate of 13 kbit / s is available (in contrast to G.711 64 kbit / s ISDN). The audio signals must therefore be heavily compressed, but still achieve an acceptable voice quality. When FR codec is a mixture of long -term and short -term prediction is used, the effective compression allows (RPE / LTP voice compression LPC: Linear Predictive Coding, Long Term Prediction Regular Pulse Excitation ).

Technical each 20 ms speech is sampled and buffered, then subjected to the speech codec (13 kbit / s). For forward error correction (Forward Error Correction FEC), the 260 bits of such a block will be divided into three classes, accordingly, how strongly a bit error would affect the speech signal. 50 bits of the block are divided into class Ia. You are most to protect and preserve a CRC checksum of 3 bits for error detection and error concealment (error concealment ). Together with 132 bits of class Ib, which are to be protected less, they are subjected to a convolutional code that is generated from the 185 input bits output bits 378. The remaining 78 bits are transmitted unprotected. Thus, from 260 bits 456 bits of user data error protected data, thereby reducing the required bit rate to 22.8 kbit / s increases.

The 456 bits are divided by interleaving on eight half bursts, each 57 bits. After deinterleaving at the receiver is transient disturbances ( for example, a burst length) act by the error spread only still rather low. By combining the different error protection method in GSM, is, even though the radio channel is extremely error-prone, often achieves a good speech quality.

Half Rate Codec (HR)

With the introduction of the half-rate codec it was possible to deal with on a time slot of the air interface not only one but two calls simultaneously. As the name suggests, only the HR is half the data rate available, as the FR codec. To achieve nevertheless a useful speech quality, instead of scalar quantization used in the FR codec vector quantization is used. Wherein about three to four times the computing power is required as in the FR codec for coding. Because the voice quality is still rather moderate, HR will only be used by mobile network operators when a radio cell is overloaded.

Enhanced Full Rate Codec ( EFR )

ERA uses a similar data rate as the full-rate codec, namely 12.2 kbit / s Better voice quality was a more efficient algorithm ( CELP ), compared with the full-rate codec is reached, which corresponds with a good radio channel less the level of ISDN telephone conversations ( G.711a ).

Adaptive Multirate Codec ( AMR)

When AMR is a configurable codec with different data rates from 4.75 to 12.2 kbit / s In the 12.2 - kbit / s setting it corresponds to the algorithm as well as the audio quality of her largely the GSM -EFR codec. The lower the data rate of the voice data, the more bits are available for the channel coding for error correction and thereby available. Thus, the 4.75 - kbit / s codec is referred to as the most robust, because despite the high bit error rate in the radio transmission is still an understandable conversation is possible. During a call, the cellular network measures the bit error rate and selects the most appropriate codec from a list, the Active Codec Set ( ACS) from. The code rate used is thus continuously adapted to the channel quality.

Adaptive Multi Rate Codec or wide band (AMR -WB )

This codec is an extension and optimization of the already available AMR codec sets. As the " WB " ( wideband ) already suggests the transferable frequency range of currently about 3.4 kHz is raised to about 6.4 kHz and 7 kHz, without taking up more radio resources. The development of this codec is finished for some time, and he was by the ITU ( G.722.2 ) and 3GPP (TS 26 171 ) standardized. The codec to voice and ambient noise better transmitted together by the larger bandwidth, which allows in a noisy environment better voice quality. Ericsson has performed in the T- Mobile UMTS network in Germany in the summer of 2006 with selected customers in the cities of Cologne and Hamburg AMR -WB mode test. The end of 2008 were all prepared Ericsson BSC of the telecom network for AMR -WB. Since the end of 2011, all final customers of Telekom AMR -WB can use. AMR -WB is marketed in Germany as HD Voice.

Data transmission

If a GSM channel for data transmission used is obtained after the decoding steps a usable data rate of 9.6 kbit / s This type of transmission is called Circuit Switched Data (CSD ). An advanced channel coding allows 14,4 kbit / s, results in poor radio conditions, but many block errors, so that the " download speed " may actually turn out lower than with increased security over the radio path. Therefore, depending on the bit error rate from 9.6 to 14.4 kbit / s voltage controlled switch ( = Automatic Link adaptation, ALA).

Both are however many Internet and multimedia applications too little, so that extensions under the name HSCSD and GPRS have been created that allow a higher data rate by more bursts can be used per unit of time for the transfer. HSCSD utilizes a fixed allocation of multiple channel slots, GPRS uses radio slots dynamically for the bridged logical connections (better for Internet access ). An enhancement of GPRS is E-GPRS. This is the use of EDGE for packet data transmission.

Locating

The position of a mobile phone is known for the cellular operator by the permanent registration on the network within certain accuracy limits. In standby mode, it is at least given by the assignment to the location currently used area. This information is periodically updated upon movement of the mobile station.

GSM localization is depending on the application is an alternative to GPS and is used for various services, including location-based services, route planner, fleet management for transport company or a help to retrieve a mobile phone.

The use of emergency services allows you to quickly find accident victims. Likewise, GSM positioning is used in law enforcement as an aid to the police.

Extensions and further developments of GSM

GSM was originally designed primarily for telephone calls, faxes and data transmissions with a constant data rate. Burst-type data transmissions with highly fluctuating data rate, as is common in the Internet were not scheduled.

With the success of Internet, therefore, started so-called " GSM evolution ", wherein the GSM network is completely backwards compatible with enhanced possibilities for packet-oriented data transmission. In addition, only minimal costs should arise from the exchange of components used in many cases.

CSD

HSCSD

Through the coupling of multiple channels HSCSD achieved a higher overall data rate, maximum 115.2 kbit / s To use HSCSD, it takes a compatible mobile telephone, on the part of the network operator changes in hardware and software components within the base stations and the core network are needed. In Germany, support only Vodafone and E-Plus HSCSD.

GPRS

GPRS first time allowed a packet-switched data transmission. Actual data throughput depends inter alia on the network load from and is a maximum of 171.2 kbit / s At low load, a user may use a plurality of time slots in parallel, while at a high network load any GPRS slot can be used by multiple users. GPRS requires the network operator, however, additional components within the core network ( GPRS Packet Core ).

EDGE

EDGE was possible to increase the data rate by a new modulation ( 8PSK ). It amounts to a maximum of 384 kbit / s With EDGE, GPRS be extended to E-GPRS (Enhanced GPRS) and HSCSD for ECSD (Enhanced Circuit Switched Data).

Streaming

Streaming services require a minimum guaranteed data rate. This is not provided for in GPRS. In the meantime (that is, from 3GPP release 99) were created by the introduction of Quality of service parameters and some other properties of the prerequisites for enabling real streaming over GPRS.

Generic Access

Since mid-2004, working in the standardization bodies on a method that will allow mobile devices, GSM services instead of the GSM air interface even have any kind of other ( IP ) to use transmission systems. For the transmitting stations of WLAN, Bluetooth etc. via so-called Generic Access Controller to the GSM core network to be connected. The GSM - user data and the signaling data are then hindurchgetunnelt through the IP network.

Cell broadcast

Cell broadcast or Cell Broadcasting ( CB short ) is a mobile service for network-side sending text messages to everyone in a particular base station logged- MS.

BOS -GSM

BOS GSM ( depending on the provider also BOS @ GSM, GSM -BOS ) is a technique for digital radio communications of users with special security requirements such as public authorities and organizations with security tasks (BOS: police, fire, ambulance ).

Trivia

In French usage, the abbreviation " GSM " is often " mobile phone " is used for the German word, especially in Belgium. Also in the Bulgarian language, which borrows many words from the French for over 200 years, "GSM" is synonymous with " mobile phone " used.

Safety deficiencies

GSM boasts some shortcomings in terms of safety. These include, among others:

Man-in -the-middle

The protocol of GSM is against man-in -the-middle attacks ( MITM ) is not armed. An example of the possible use is an IMSI catcher. The device enforces the elimination of encryption.

Presented in 2003 Elad Barkan, Eli Biham and Nathan Keller an alternative man-in- the-middle attack on GSM, which makes it possible to bypass the A5/3-Verschlüsselungsalgorithmus. This attack is an attack against the GSM protocol and no attack on KASUMI itself A longer version of this paper was published in 2006. The attacker has positioned itself with its own base station between the mobile subscriber and the proper base station ( operator network). The Challenge RAND is forwarded to the mobile subscriber. The response SRES but cached by the attacker. The mobile phone will be prompted by the attacker to start a A5/2-Verschlüsselung. After conclusion of the encryption, the attacker breaks within one second the ciphertext and extracted the key Kc. The attacker then sends the cached SRES to the operator network. The attacker is authenticated to the network. The network asks the attacker to now to use an encryption A5 / 1 or A5 / 3. The attacker uses the previously extracted Kc and it is concluded encrypted communication. The attacker can then can listen to conversations, they decode in real time or cache. Redirecting and the acquisition of talks, the change of SMS and making calls at the expense of the other is also possible.

Denial of Service

As part of the USENIX Security Symposium in 2013 it was shown that using a speed-optimized OsmocomBB firmware - installed on a few devices - a GSM network can be brought to a denial of service by the prepared cell phones all paging requests to answer ( with about 65 responses per second ) before the authorized recipient can respond. GSM looks then on subsequent requests, authentication follows in the next step. Half of all networks (global ) tests in less than one in ten cases the legitimacy of the terminal.

Encryption algorithms

The algorithm A5 / 1 and A5 / 2 can be broken in real time. The A5/3-Algorithmus with a 64 bit key based on the KASUMI cipher. The KASUMI cipher applies since 2010 as theoretically broken. A successful practical attack against A5 / 3 is not known. As is certainly true of A5/4-Algorithmus with a 128 bit key.

Countermeasures

Security researcher Karsten Nohl calls short term the use of SIM cards with additional verification function. A small Java program on the card could verify the network operator with respect to the mobile subscriber. This would be replaced by a mutual authentication, the current one-sided. This procedure prevents MITM attacks and also helps against DoS attacks paging. Furthermore, it must use network providers and mobile device encryption algorithm A5 / 3 and waive combinations with A5 / 1 and A5 / 2.

The long term, calls the expert use of A5 / 4 and the use of USIM cards.

In the section links can be found with the GSM Security Map a visual overview of GSM security in different countries.

Frequencies used

GSM operates at different frequencies for the uplink ( from the mobile phone to the network ) and downlink ( from the network to the mobile phone ). The following frequency bands are used

In particular, on the American continent, not all bands available in all countries (for example, in Brazil only DCS 1800, in the U.S. and Canada only GSM 850 and PCS 1900).

Situation in Germany

In Germany took GSM mobile phone instead of by the year 2005 only in the P- GSM and DCSF 1800 range. The end of 2005, the Federal Network Agency opened the entire E-GSM band for GSM mobile phone.

Then began the E-Plus and O ₂ from April 2006 to move to the part in the E-GSM range (E -Plus: 880.2 to 885.0 MHz / 925.2 to 930.0 MHz and O ₂: 885.2 to 890, 0 MHz / 930.2 to 935.0 MHz). These areas use the two vendors from now on development of their networks in sparsely populated regions. Thus all four German mobile operators have spectra in both areas.

The old assignments in the DCS -1800 range they had to hand in part as compensation in January 2007. They were re-assigned in the spectrum auction in 2010:

The current GSM licenses run 2016Vorlage: Future / In 2 years, and are then expected to re- auctioned by the Federal Network Agency again.

Channels ( ARFCN ) of the individual bands are distributed as follows among the five German Operator:

Mid-December 2010 allowed the Federal Network Agency E-Plus the use of its GSM900 spectrum for UMTS, see.

End of June 2013 had announced that the 2016Vorlage December 31, the Federal Network Agency: Future / In 2 years expiring rights of use would be to auction again at the mobile frequencies. In addition to the frequencies in the 900 MHz and 1800 MHz band, also frequency blocks in the 700 MHz and 1.5 GHz to be awarded within the framework of the auction. The previous four mobile network areas Bern is ever allocated in the 900 MHz Breich outside of the auction to secure the basic needs one frequency.

R- GSM, E-GSM (GSM 900)

DCS 1800 (GSM 1800) *

* Vf = Vodafone

Situation in Austria

In Austria the frequency bands 880-915 MHz and 925-960 MHz, 1710-1785 MHz and 1805-1880 MHz for GSM are reserved, the ARFCNs are awarded as follows:

R- GSM, E-GSM (GSM 900)

DCS 1800 (GSM 1800)

Situation in Switzerland

In early 2012, the frequencies were reassigned technology-neutral means of an auction, the information below must therefore be considered as historical data.

By decree of May 2009, the distribution channel was re-established in Switzerland. From April 2010 UMTS is approved in the GSM 900 band. Channels ( ARFCN ) of the individual bands are distributed as follows among the five Swiss Operator:

R- GSM, E-GSM (GSM 900)

DCS 1800 (GSM 1800)

19383
de