logo
Send Message
Shenzhen Olax Technology CO.,Ltd
About Us
Your Professional & Reliable Partner.
Shenzhen OLAX Technology Co.,Ltd , which Located in Shenzhen, China. OLAX Technology established in 2010, It is a leading domestic supplier of wireless communication terminal technology solutions and equipment.Our main products are 4g C P E WIFI routers, USB WIFI dongles, modems. Pocket WIFI hotspot.G S M and C D M A fixed wireless telephones, terminals, Moreover, we support card lock, network lockand SIM card security.We have a core team with more than ten years of experience in R & D, sales ...
Learn More

0

Year Established:

0

Million+
Employees

0

Million+
customers served

0

Million+
Annual Sales:
China Shenzhen Olax Technology CO.,Ltd High quality
Trust Seal, Credit Check, RoSH and Supplier Capability Assessment. company has strictly quality control system and professional test lab.
China Shenzhen Olax Technology CO.,Ltd DEVELOPMENT
Internal professional design team and advanced machinery workshop. We can cooperate to develop the products you need.
China Shenzhen Olax Technology CO.,Ltd MANUFACTURING
Advanced automatic machines, strictly process control system. We can manufacture all the Electrical terminals beyond your demand.
China Shenzhen Olax Technology CO.,Ltd 100% SERVICE
Bulk and customized small packaging, FOB, CIF, DDU and DDP. Let us help you find the best solution for all your concerns.

quality Portable Wifi Routers & Wireless Wifi Routers manufacturer

Find Products That Better Meet Your Requirements.
Cases & News
The Latest Hot Spots
USIM in 5G (NR) system (1)
1.UE and UICC In the mobile communication system defined by 3GPP (3rd Generation Partnership Project), the user's terminal (UE) device is composed of: ME (mobile equipment) + UICC (Universal Integrated Circuit Card); where UICC is a Physical cards that are tamper-proof and resistant to software and hardware attacks. 2. UICC and USIM UICC can contain multiple applications, one of which is USIM; USIM securely stores and processes all sensitive data related to the user and home network. USIM is under the control of the home network operator; the operator selects the data to be configured in the USIM before issuance and remotely manages the USIM in the user's device through the OTA (over-the-air) mechanism. 3.USIM in 5G 3GPP defines USIM for the 5G system in Rel-15 for access and use in 3GPP and non-3GPP networks, allowing UE (user equipment) external data networks. USIM is defined in Rel-16 as network slice specific authentication. 4.First-time authentication is a mandatory procedure to allow UE (user equipment) to access 3GPP or non-3GPP networks. EAP-AKA' or 5G-AKA are the only authentication methods that allow primary authentication and the subscription credentials are always stored in the USIM when the terminal supports 3GPP access functionality. For primary authentication based on AKA, the mutual authentication performed in the USIM and the generation of the key material (integrity key IK and confidentiality key CK) sent by the USIM to the ME remain unchanged compared to 3G, 4G and Meets 3GPP TS 33.102 specification [3]. Changes in 5G Primary Authentication USIM include storing new security context and additional keying material in USIM (depending on the USIM's configuration). 4.1 5G support If the USIM supports storing 5G parameters, the ME will store the new 5G security context and the new keys defined for the 5G key hierarchy (i.e. KAUSF, KSEAF and KAMF) in the USIM. USIM can store a 5G security context for 3GPP access networks and a 5G security context for non-3GPP access networks. Storing the security context and key material in the USIM ensures faster reconnection when roaming (UICC moves from one ME to another). 4.2 NPN support Authentication in private networks (called independent non-public networks) can rely on the EAP framework supported by the 5G system; user equipment and service networks can support 5G AKA, EAP-AKA' or any other key generation EAP authentication method, where: ·When using AKA-based authentication methods, clause 6.1 of 3PPTS 33501[1] applies. ·When selecting an EAP authentication method other than EAP-AKA', the selected method determines the credentials required in the UE and network. How these credentials for EAP methods other than EAPAKA' are stored and processed within the UE is beyond the scope. But to ensure a high level of security for access to private networks, private network operators may decide to require the presence and use of a UICC containing USIM applications in order to securely store and process subscription credentials for EAP methods such as EAP-AKA' or EAP-TLS . 5. Secondary authentication This is an optional authentication based on EAP, conducted between UE (user equipment) and DN (external data network). Although the choice of EAP authentication method and credentials is beyond the scope of 3GPP, external data networks may decide to protect access to their DN by performing strong authentication thanks to the EAP-AKA' or EAP-TLS authentication method, UICC in the user device The presence of USIM on the DN securely stores and processes the credentials used to access the DN. Network Slice Specific Authentication Using network slice specific authentication between the user device and the AAA (Authentication, Authorization and Accounting) server to access the network slice is optional. Network slice specific authentication is based on the EAP framework and its user ID and credentials are different from the 3GPP subscription credentials. It follows the mandatory primary certification. Stakeholders deploying slices may decide to install USIM on the UICC of user devices to ensure a high level of security to access their slices and prevent the emergence of unauthorized users.
SIM Technology Innovation: An In-Depth Look at eSIM and vSIM
01.eSIM   eSIM, known as Embedded-SIM, or Embedded SIM, is a programmable, electronic SIM card technology whose main feature is that it does not require a physical slot, but rather an embedded chip that is integrated directly into the device's circuit board or inside other devices. Hardware part_     Integrated Circuit (IC) Chip: At the heart of the eSIM is a small IC chip that is built into the device's motherboard, similar to a physical SIM card. It contains the necessary hardware (CPU, ROM, RAM, EEPROM and serial communication unit) for storing and processing SIM data.   Software part_     Operating System (OS): The eSIM chip runs a dedicated operating system, often referred to as eUICC (Embedded Universal Integrated Circuit Card), which manages the SIM's functions, including data storage, secure processing and communication.     eSIM Production Process   ① Chip Manufacturing ② Chip testing ③ Integration into devices ④ Embedded software loading ⑤ Functional testing and verification   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   02.Virtual SIM (vSIM)   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   SoftSIM controls the information written to SoftSIM through the terminal provider, and the user purchases and uses communication services directly through the software without the intervention of the operator, which cuts off the direct connection between the user and the operator.   CloudSIM is a kind of SIM card function realized based on cloud computing technology, where users use network services on their devices through cloud services.   03.SIM service activation process   CloudSIM integrates the traffic resources of each operator into the cloud, selects operators according to the signal and network quality of different regions, and pushes them to the terminals to provide users with the best network services. The inclusion of multiple operators facilitates users to flexibly choose more favorable packages.       Do you want to learn more about SIM cards and other communication topics? We will continue to share more about this! See you in the next issue!
PDU Session Anchor (PSA) in 5G Systems
  In 5G (NR) systems, the PSA (PDU Session Anchor) is the UPF (User Plane Function). It acts as a gateway connecting to the external DN (Data Network) via the N6 interface of the PDU session. As the anchor point for user data sessions, the PSA manages data flow and establishes connections to services such as the Internet.   I.There are three PSA modes: SSC Mode 1, SSC Mode 2, and SSC Mode 3. SSC Mode 1: In this mode, the 5G network maintains the UE connection service. For IPv4, IPv6, or IPv4v6 class PDU sessions, the IP address is reserved. In this case, the User Plane Function (UPF) acting as the PDU session anchor remains unchanged until the UE releases the PDU session. SSC Mode 2: In this mode, the 5G network can release the connection to the UE, i.e., release the PDU session. If the PDU session was used to transmit IP packets, the allocated IP address will also be released. One application scenario for this mode is when the anchor UPF requires load balancing, allowing the network to release connections. In this case, the PDU session can be transferred to a different anchor UPF by releasing the existing PDU session and subsequently establishing a new one. It uses a "disconnect + establish" framework, meaning the PDU session is released from the first serving UPF and then a new PDU session is established on the new UPF. SSC Mode 3: In this mode, the 5G network maintains the connection provided to the UE, but some impacts may occur during certain processes. For example, if the anchor UPF changes, the IP address assigned to the UE will be updated, but the change process ensures that the connection is maintained; that is, a connection to the new anchor UPF is established before releasing the connection with the old anchor UPF. 3GPP Release 15 only supports Mode 3 for IP-based PDU sessions. II. The main uses of the PDU session anchor point include: Data Termination Point: The PSA is the UPF where the PDU session terminates its connection with the external data network. Data Routing: It routes user data packets between the user equipment (UE) and the external DN. IP Address Allocation: The PSA is associated with an IP address pool. The UE's IP address is allocated from this pool, either by the UPF itself or through an external server (e.g., a DHCP server). The Session Management Function (SMF) manages this address pool. Data Path Control: The SMF controls the data path of the PDU session, selects the PSA, and manages the termination of the N6 interface.

2025

11/25

5G Repeater Classification and Technical Standards
  I. Characteristics of Repeaters In mobile communication systems, a repeater (Mobile Repeater), also known as a signal amplifier (repeater) or mobile signal booster, is a device that amplifies existing mobile phone signals to improve signal strength in weak areas. Its working principle involves using an external antenna to receive weak signals, transmitting them to a signal amplifier for amplification, and then rebroadcasting the enhanced signal through an internal antenna. This improves mobile phone connectivity within its effective range, making it particularly suitable for rural areas, large concrete and metal structures, or vehicles.   II. Repeater Standards Signal boosters used in 5G (NR) systems are classified into: Repeaters, NCRs (Network Control Repeaters), and auxiliary equipment; among them, NCRs are further divided into NCR-Fwd and NCR-MT. The applicable requirements, procedures, test conditions, performance evaluation, and performance standards for different types of base stations in wireless networks are as follows:   NR repeaters equipped with antenna connectors that can be terminated during EMC testing meet the RF requirements for type 1-C repeaters in TS 38.106[2] and demonstrate compliance with TS 38.115-1[3]. NR repeaters without antenna connectors, i.e., antenna elements do not radiate during EMC testing, meet the RF requirements for type 2-O repeaters in TS 38.106[2] and demonstrate compliance with TS 38.115-2[4]. NCRs equipped with antennas or TAB connectors that can be terminated during EMC testing meet the RF requirements for NCR-Fwd/MT type 1-C and type 1-H in TS 38.106[2] and demonstrate compliance with TS 38.115-1[3]. The NCR is not equipped with an antenna connector, meaning that the antenna element was not radiated during EMC testing, which complies with the NCR-Fwd/MT 2-O type RF requirements in TS 38.106 [2] and demonstrates its compliance by conforming to TS38.115-2 [4]. The repeater usage environment classification refers to the residential, commercial, and light industrial environment classifications used in IEC 61000-6-1 [6], IEC 61000-6-3 [7], and IEC 61000-6-8 [24]. These EMC requirements were chosen to ensure that the equipment is sufficiently compatible in residential, commercial, and light industrial environments. However, these levels do not cover extreme situations that may occur in any location but with a low probability.

2025

11/24

5G Terminal AM (Access and Mobility) Application Examples
In 5G (NR) systems, the policy management and execution of network and terminal service capabilities are entirely guaranteed by the PCF (Policy Control Function) and AMF (Mobility Function), which are also known as AM policy management. Application examples are as follows:   Example 1: AM/UE Policy Control Based on Consumption Limits This is a new function introduced by 3GPP in Rel-18, allowing the PCF responsible for the UE to perform AM/UE policy decisions in non-roaming scenarios based on available consumption limit information (such as whether the user's daily/weekly/monthly mobile data consumption limit has been reached or is close to being reached). This example demonstrates how to implement the operator's AM/UE policy management policy in the PCF.   The PCF interacts with the CHF (Charging Function) to request and/or subscribe to receive consumption limit-related reports for one or more "policy counters" (i.e., consumption limit indicators). Once configured, the CHF will notify the PCF of any changes to the current or pending status of subscribed policy counters, and optionally, the activation time of pending statuses (e.g., due to an upcoming billing cycle expiration). The PCF will then use all these dynamically collected policy counter states and related information as input to its internal policy decisions to apply relevant pre-configured operator-defined actions. With this functionality, operators can dynamically configure, establish, and execute AM/UE policy decisions (such as downgrading or upgrading the UE-AMBR, changing URSP rules, and updating service area restrictions) based on expenditure limit information.   In 3GPP Rel-19, this functionality is further extended to roaming scenarios to support dynamic changes to UE policies based on expenditure limit information.   Example 2: Network-Assisted Performance Level Enhancement Using Frequency Management Recommendations AM policy management plays a crucial role in improving network performance by enhancing RFSP index management.   The PCF can implement more dynamic and differentiated mobility control policies. The PCF can provide RFSP index values ​​to the AMF to assist in frequency selection and enable finer-grained radio resource management at the UE end. PCF determines the RFSP index values ​​to provide based on multiple factors, such as cumulative usage information (e.g., usage volume, usage duration, or both), network analysis data from NWDAF (including current load levels of relevant network slice instances or UE communication-related information), UE communication behavior information, user data congestion information, and perceived service experience. This flexible frequency selection and mobility management policy framework enhances user experience, optimizes network efficiency, and supports differentiated service delivery across different user groups and network conditions.   With the introduction of 5G-A (3GPP Rel-18 and later) and artificial intelligence technologies, these capabilities will be further enhanced, enabling more autonomous, dynamic, and intelligent network management. This paves the way for increased control over how the network treats user equipment (UEs), such as: real-time policy management based on AI-native network architecture and intent-driven automation; more granular UE differentiation for personalized experiences; and efficient connection of a large number and diverse range of UEs (e.g., IoT devices, sensors). We look forward to the rollout of these exciting new features and application scenarios in the future.

2025

11/22