cell phone

The Cellphone

Cell phones are so called because the physical area basically covering are a formatted cells. The origin of the cell phone is said that was way back in 1973 when the electronics company consumer Motorola launched the first portable cell phone, which was marketed under the name of Motorola DynaTAC 8000X.

Currently, the number of cell phone models entering the market is almost incalculable, and its sales generates hundreds of billions of dollars a year, so today is considered as the most used electronic device in the world.

The Cellphone

As we can see in any city or town, it is almost impossible to find a person without a cell phone or smartphone in hand, such is the degree of penetration that this device has reached between us, and it is no wonder, because thanks to the tasks which he is able to meet, and the number of important built in functions, we can improve our lifestyle, increasing our productivity and reducing times.

This last decade has seen the birth of the smartphone as we know it today, mixing computer and cell phone offers features with which we could not even dream at the time that was fashionable the Nokia 3210, for example.

But to know more about the smartphone and technology, click on this link.

What hardware integrates a cell phone?

The parts of a traditional cell phone are:

  • Circuit board
  • Antenna
  • Keyboard
  • LCD Screen (Liquid Crystal Display)
  • Battery
  • Microphone
  • Speaker

The Cellphone

Functions of a cell phone

Cell phones have a variety of functions. To name a few, depending on the type of cell phone:

  • Store contact information
  • Manage an agenda of commitments to date
  • Send and receive e-mails
  • 3d games
  • Send and receive text messages
  • Surf websites
  • Play mp3 and other audio formats
  • Play video and TV online
  • GPS service and maps of most cities in the world
  • Integration with other devices such as GPS receiver

The Cellphone

How a cell phone works?

Cell phones, operating on radio frequency, innovated to minimize the availability of RF spectrum. Now, several cell phone towers antennas are used to cover a large geographical area. Each tower (base station) covers a circular area called cell. A large geographic region is divided into a number of cells, allowing different base stations use the same channels / frequencies for communication.

Another important aspect of this division in cells, is that cell phones need less power to transmit to reach any base station and covering a smaller area. Reducing the energy required for transmission, battery size and weight is reduced accordingly. This contributes to the reduction in size of cell phones would not be possible without the cellular technology.

When you use your cell phone, your phone locates first base with the strongest signal station and requests a channel. The base station allows access to the channel and the call is then accepted. The call is then sent to the local telephone network if the call is for a common phone, otherwise will be transmitted by the mobile network.

The Cellphone

When the cell phone is connected, the SID (System Identification Code) in the control channel is equivalent to the SID the phone. If the SID is identified, the phone understands that the cell is communicating with the local system. The phone sends a registration request, along with the SID and the MTSO keeps the course of the phone’s location in the database. If the control does not identify the SID of your phone, then your phone is roaming.

Major cell phone manufacturers

Most popular cell phone models on the market are produced by Nokia, Sony Ericsson, Motorola, Samsung, LG and Alcatel, among many others.

If you liked this page, you can share…

What is phone cloning?

Basically, a cloned cell phone is a device that was reprogrammed to transmit the device code and subscriber code. Thus, the fraudster uses the cloned device to make phone calls and the same are debited to the account holder of the line.

This type of activity is more widespread than we all think, and even we even be happening at this time without realizing it. That is why in this article we will find enough information to understand how a cloned phone works and what the dangers are.

Phone cloning

As the cloning is performed

Generally the cloning fraud happens when the user is outside the area of mobility of origin, i.e. when the roaming mode is in use and operating in analog mode.

The unscrupulous people get the code of the device or the user code through the illegal monitoring of the cell phone. Supposedly, every cell phone has a unique code. But, after cloning, there will be two cell phones with the same device code and the same subscriber code. In this condition, the system of the cellular service provider fails to distinguish between a cloned telephone and a cellular properly enabled.

Fortunately, nowadays, there are several sophisticated detection and prevention solutions against the fraud and cloning, the providers have sought to have these resources as part of their operations solutions.

Phone cloning

Clues to see if our phone was cloned

Detect a phone that has been cloned is simple, if the following signs are taken into consideration:

  • Difficulty completing calls generated
  • Frequent connection falls
  • Difficulties to call your mailbox
  • Calls received from strangers, national and international numbers
  • Amounts for the provision of services much higher than average

What can we do?

In the event that we have detected fraud or cloning, or in the case of lost or theft of phone, the user must immediately contact the provider and request the blocking of the line.

If the act was denounced by phone, the user must log the full name of the person who has attended, date, time, case number generated and in the case of direct complaint, obtain hard copy of it.

Phone cloning

Plus: Basic precautions

You should try to repair your cell phone in authorized representatives by manufacturers or service you trust. This will prevent any malicious person can manipulate the phone.

Make a monthly review of the bill to verify any calls made.

When he was outside the area of operation of the provider, in the manner known as roaming, the connections are considered as a long distance, national or international. Fraud occur in that situation, since they will not be discovered until the call records are exchanged between the providers, which will require some time. Therefore, we must have more rigorous calls control when we travel.

Phone cloning

When purchasing a cell phone, new or used phone, require tax invoice and verify the origin, empowerment and control billing information, including the serial number.

In the case of a used cell phone, certify if it is not stolen by consulting to the provider to check if the device is not in that state.

In addition to the charge for calls made by the fraudulent user, the cloning fraud in mobile systems can cause temporary loss to the subscriber service and, eventually, the need to program the cell phone with a new number.

If you liked this page, you can share…