Skip to main content

Subscriber Identification Module (SIM)

A subscriber identity module or subscriber identification module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) and the related key used to identify and authenticate subscribers on mobile telephony devices ,such as mobile phones and computers.

It is also a portable memory chip used mostly in cell phones that operate on the Global System for Mobile Communications (GSM) network. These cards hold the personal information of the account holder, including his or her phone number, address book, text messages, and other data. When a user wants to change phones, he or she can usually easily remove the card from one handset and insert it into another. SIM cards are convenient and popular with many users, and are a key part of developing cell phone technology.

Sim Cards are of four (4) Types. Named as Below H1, H2, H3, H4

H1= You Will Get Normal Network On This Sim
H2= You Will Get Better Network On This Sim, Means Strong
H3= You Will Get More Better Network On This Sim, Means Stronger
H4= Normal, Better, More Better Is Nothing In Front OF This Sim.

Basically H4 Sim giving for Corporate Sim, Army Peoples etc. The Company doesn’t Provide H4 Sim To all User,because this Sim eat More bandwidth. For knowing Which Type of Sim is using Just Check Its Back Side and will Get the Sim No. and the Sim Type.

SIM cards are made in three different sizes to accommodate different devices. Most phones use mini-SIM or micro-SIM cards, which are quite small — the mini is 25 mm by 15 mm , and the micro is 15 mm by 12 mm.Full-sized cards are much larger, 85.6 mm by 53.98 mm , and are too big for most phones. All cards are only 0.76 mm thick, and the microchip contacts are in the same arrangement. This means that, with the proper adapter, the smaller cards can be used in devices designed for larger ones.

A SIM card offers security for both the user’s data and his or her calls. The cards can be locked, meaning that only someone who has the correct personal identification number (PIN) can use the card. If the phone is stolen, the thief cannot use a locked SIM or get any information off of it without the PIN.

Comments

Popular posts from this blog

Hi! I'm Java...

Java is a computer programming language. It enables programmers to write computer instructions using English based commands, instead of having to write in numeric codes. It’s known as a “high-level” language because it can be read and written easily by humans. Like English, Java has a set of rules that determine how the instructions are written. These rules are known as its “syntax”. Once a program has been written, the high-level instructions are translated into numeric codes that computers can understand and execute. Who Created Java? In the early nineties, Java was created by a team led by James Gosling for Sun Microsystems. It was originally designed for use on digital mobile devices, such as cell phones. However, when Java 1.0 was released to the public in 1996, its main focus had shifted to use on the Internet. It provided more interactivity with users by giving developers a way to produce animated webpages . Over the years it has evolved as a successful language for

I'm the Server Operating System

Server Operating System A server operating system is software that was especially developed to serve as a platform for running multi-user computer programs, applications that are networked and programs critical to business computing. This type of operating system (OS) often comes bundled with the most common types of applications deployed in the client-server model, a term used to indicate the exchange of information between computers. For example, a hypertext transfer protocol (HTTP) or web server hosts or "holds" the text files, images files and scripts that work together to form a website. When someone connects to the Internet and types in a web address, the server that holds the files of the site delivers or "serves" the requested pages to the client computer or the machine that made the request. Frequently used applications in the client-server model handle operations for sharing files and printers across a network, hosting and serving web pages via the

A Hit Count Using Java Servlet's Session Tracking

import java.io.*; import javax.servlet.*; import javax.servlet.http.*; public class SessionTracker extends HttpServlet {         public void doGet(HttpServletRequest req,HttpServletResponse res)         throws ServletException,IOException         {                res.setContentType("text/html");                PrintWriter out=res.getWriter();                HttpSession session=req.getSession(true);                Integer count=(Integer)session.getValue("tracker.count");                if(count==null)                {                         count=new Integer(1);                }else{                         count=new Integer(count.intValue()+1);                }                session.putValue("tracker.count",count);                out.println("<HTML><BODY><H1>SESSION TRACKING DEMO</H1>");                out.println("You've visited this page "+count+((count.intValue()==1)?" time.":"times."