logo
Send Message
Shenzhen Olax Technology CO.,Ltd
About Us
Your Professional & Reliable Partner.
Shenzhen OLAX Technology Co.,Ltd , which Located in Shenzhen, China. OLAX Technology established in 2010, It is a leading domestic supplier of wireless communication terminal technology solutions and equipment.Our main products are 4g C P E WIFI routers, USB WIFI dongles, modems. Pocket WIFI hotspot.G S M and C D M A fixed wireless telephones, terminals, Moreover, we support card lock, network lockand SIM card security.We have a core team with more than ten years of experience in R & D, sales ...
Learn More

0

Year Established:

0

Million+
Employees

0

Million+
customers served

0

Million+
Annual Sales:
China Shenzhen Olax Technology CO.,Ltd High quality
Trust Seal, Credit Check, RoSH and Supplier Capability Assessment. company has strictly quality control system and professional test lab.
China Shenzhen Olax Technology CO.,Ltd DEVELOPMENT
Internal professional design team and advanced machinery workshop. We can cooperate to develop the products you need.
China Shenzhen Olax Technology CO.,Ltd MANUFACTURING
Advanced automatic machines, strictly process control system. We can manufacture all the Electrical terminals beyond your demand.
China Shenzhen Olax Technology CO.,Ltd 100% SERVICE
Bulk and customized small packaging, FOB, CIF, DDU and DDP. Let us help you find the best solution for all your concerns.

quality Portable Wifi Routers & Wireless Wifi Routers manufacturer

Find Products That Better Meet Your Requirements.
Cases & News
The Latest Hot Spots
USIM in 5G (NR) system (1)
1.UE and UICC In the mobile communication system defined by 3GPP (3rd Generation Partnership Project), the user's terminal (UE) device is composed of: ME (mobile equipment) + UICC (Universal Integrated Circuit Card); where UICC is a Physical cards that are tamper-proof and resistant to software and hardware attacks. 2. UICC and USIM UICC can contain multiple applications, one of which is USIM; USIM securely stores and processes all sensitive data related to the user and home network. USIM is under the control of the home network operator; the operator selects the data to be configured in the USIM before issuance and remotely manages the USIM in the user's device through the OTA (over-the-air) mechanism. 3.USIM in 5G 3GPP defines USIM for the 5G system in Rel-15 for access and use in 3GPP and non-3GPP networks, allowing UE (user equipment) external data networks. USIM is defined in Rel-16 as network slice specific authentication. 4.First-time authentication is a mandatory procedure to allow UE (user equipment) to access 3GPP or non-3GPP networks. EAP-AKA' or 5G-AKA are the only authentication methods that allow primary authentication and the subscription credentials are always stored in the USIM when the terminal supports 3GPP access functionality. For primary authentication based on AKA, the mutual authentication performed in the USIM and the generation of the key material (integrity key IK and confidentiality key CK) sent by the USIM to the ME remain unchanged compared to 3G, 4G and Meets 3GPP TS 33.102 specification [3]. Changes in 5G Primary Authentication USIM include storing new security context and additional keying material in USIM (depending on the USIM's configuration). 4.1 5G support If the USIM supports storing 5G parameters, the ME will store the new 5G security context and the new keys defined for the 5G key hierarchy (i.e. KAUSF, KSEAF and KAMF) in the USIM. USIM can store a 5G security context for 3GPP access networks and a 5G security context for non-3GPP access networks. Storing the security context and key material in the USIM ensures faster reconnection when roaming (UICC moves from one ME to another). 4.2 NPN support Authentication in private networks (called independent non-public networks) can rely on the EAP framework supported by the 5G system; user equipment and service networks can support 5G AKA, EAP-AKA' or any other key generation EAP authentication method, where: ·When using AKA-based authentication methods, clause 6.1 of 3PPTS 33501[1] applies. ·When selecting an EAP authentication method other than EAP-AKA', the selected method determines the credentials required in the UE and network. How these credentials for EAP methods other than EAPAKA' are stored and processed within the UE is beyond the scope. But to ensure a high level of security for access to private networks, private network operators may decide to require the presence and use of a UICC containing USIM applications in order to securely store and process subscription credentials for EAP methods such as EAP-AKA' or EAP-TLS . 5. Secondary authentication This is an optional authentication based on EAP, conducted between UE (user equipment) and DN (external data network). Although the choice of EAP authentication method and credentials is beyond the scope of 3GPP, external data networks may decide to protect access to their DN by performing strong authentication thanks to the EAP-AKA' or EAP-TLS authentication method, UICC in the user device The presence of USIM on the DN securely stores and processes the credentials used to access the DN. Network Slice Specific Authentication Using network slice specific authentication between the user device and the AAA (Authentication, Authorization and Accounting) server to access the network slice is optional. Network slice specific authentication is based on the EAP framework and its user ID and credentials are different from the 3GPP subscription credentials. It follows the mandatory primary certification. Stakeholders deploying slices may decide to install USIM on the UICC of user devices to ensure a high level of security to access their slices and prevent the emergence of unauthorized users.
SIM Technology Innovation: An In-Depth Look at eSIM and vSIM
01.eSIM   eSIM, known as Embedded-SIM, or Embedded SIM, is a programmable, electronic SIM card technology whose main feature is that it does not require a physical slot, but rather an embedded chip that is integrated directly into the device's circuit board or inside other devices. Hardware part_     Integrated Circuit (IC) Chip: At the heart of the eSIM is a small IC chip that is built into the device's motherboard, similar to a physical SIM card. It contains the necessary hardware (CPU, ROM, RAM, EEPROM and serial communication unit) for storing and processing SIM data.   Software part_     Operating System (OS): The eSIM chip runs a dedicated operating system, often referred to as eUICC (Embedded Universal Integrated Circuit Card), which manages the SIM's functions, including data storage, secure processing and communication.     eSIM Production Process   ① Chip Manufacturing ② Chip testing ③ Integration into devices ④ Embedded software loading ⑤ Functional testing and verification   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   02.Virtual SIM (vSIM)   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   SoftSIM controls the information written to SoftSIM through the terminal provider, and the user purchases and uses communication services directly through the software without the intervention of the operator, which cuts off the direct connection between the user and the operator.   CloudSIM is a kind of SIM card function realized based on cloud computing technology, where users use network services on their devices through cloud services.   03.SIM service activation process   CloudSIM integrates the traffic resources of each operator into the cloud, selects operators according to the signal and network quality of different regions, and pushes them to the terminals to provide users with the best network services. The inclusion of multiple operators facilitates users to flexibly choose more favorable packages.       Do you want to learn more about SIM cards and other communication topics? We will continue to share more about this! See you in the next issue!
5G System Architecture Supporting ATSSS
  I. ATSSS is an abbreviation for Access Traffic Steering, Switching, Splitting; this is a function introduced by 3GPP for 5G (NR) that allows mobile devices (UEs) to simultaneously use 3GPP and non-3GPP access, manage user data traffic, control new data flows, select (new) access networks, switch all ongoing data to different access networks to maintain data continuity, and split individual data flows, allocating them to multiple access networks to improve performance or achieve redundancy. Specifically:   Control:The network determines which access method (e.g., 5G and Wi-Fi) a new data flow should use based on operator-defined rules and real-time conditions. Switching:The network transfers an ongoing data session from one access network to another. For example, a video call can be switched from Wi-Fi to 5G without interruption. Splitting:The network can simultaneously allocate a single data flow to two or more access networks. This can be used to increase bandwidth (link aggregation) or ensure reliability (redundancy). II. Working Principle ATSSS can operate at the IP layer (using protocols such as MPTCP) or below the IP layer (using underlying routing functions). Control is handled by the 5G core network's PCF (Policy Control Function), based on operator-defined rules and performance measurement data from the User Equipment (UE) and the network itself.   III. ATSSS Modes The main ATSSS modes are as follows: Primary/Backup Mode:Traffic is sent through the active link. If the active link fails, it switches to the backup link. Load Balancing Mode:Traffic is distributed among available access networks, typically based on a percentage to balance the load. Minimum Latency Mode:Traffic is routed to the access network with the lowest latency (round-trip time). Priority Mode:Traffic is initially sent through a high-priority link. If that link becomes congested, traffic is split or diverted to a lower-priority link. IV. Architecture Expansion and Functionality The 5G system architecture has been expanded to support ATSSS functionality (see Figures 4.2.10-1, 4.2.10-2, and 4.2.10-3); the 5G terminal (UE) supports one or more flow control functions, namely MPTCP, MPQUIC, and ATSSS-LL. Each flow control function in the UE can perform flow control, handover, and splitting between 3GPP and non-3GPP access networks according to the ATSSS rules provided by the network. For Ethernet-type MA PDU sessions, the UE must have ATSSS-LL functionality, with the following specific requirements for the UPF: - The UPF can support MPTCP proxy functionality, which communicates with the MPTCP function in the UE using the MPTCP protocol (IETF RFC 8684 [81]). - UPF can support MPQUIC proxy functionality, which communicates with the MPQUIC function in the UE using the QUIC protocol (RFC9000 [166], RFC9001 [167], RFC9002 [168]) and its multipath extension (draft-ietf-quic-multipath [174]). - UPF can support ATSSS-LL functionality, which is similar to the ATSSS-LL functionality defined for the UE. IV. ATSSS Application Characteristics 4.1 Ethernet type MA PDU sessions require the ATSSS-LL functionality (conversion) in 5GC. In addition: - UPF supports Performance Measurement Function (PMF), which the UE can use to obtain access performance measurements on the 3GPP access user plane and/or non-3GPP access user plane. - AMF, SMF, and PCF extend new functionality, which is discussed further in Section 5.32. 4.2 ATSSS control may require interaction between the UE and the PCF (as specified in TS 23.503[45]).   4.3 The UPF shown in Figure 4.2.10-1 can be connected via the N9 reference point instead of the N3 reference point.   V. Roaming Scenarios 5.1 Figure 4.2.10-2 shows ATSSS support in a roaming scenario for the 5G system architecture; this scenario includes home-roaming traffic, and the UE is registered to the same VPLMN via 3GPP and non-3GPP access. In this case, the MPTCP proxy function, MPQUIC proxy function, ATSSS-LL function, and PMF are located in the H-UPF. 5.2 Figure 4.2.10-3 shows ATSSS support in a roaming scenario for the 5G system architecture, this scenario includes home-roaming traffic, and the UE is registered to the VPLMN via 3GPP access and to the HPLMN via non-3GPP access (i.e., the UE is registered to different PLMNs). In this case, the MPTCP proxy function, MPQUIC proxy function, ATSSS-LL function, and PMF are all located in H-UPF.

2025

12/04

What's different about 5G (NR) in Release 16 (2)?
  Besides defining SA (Standalone) as the standard 5G configuration, Release 16 5G enhances many features to support numerous improvements to the air interface, including unlicensed spectrum in the millimeter wave (mmW) band, and support for Industrial Internet of Things (IIoT) and Ultra-Reliable Low-Latency Communication (URLLC), making it more powerful. Specific additions are as follows:   I. Feature Enhancements As 5G network deployment progresses, the capacity requirements of the Radio Access Network (RAN) continue to grow, and the flexibility of network deployment is also increasing, including support for dedicated networks; RAN capacity and performance have become key to solving problems;   1.1 Capacity Enhancements include:   MIMO (Multiple-Input Multiple-Output) Improvements: Enhanced CSI II codebook to support MU-MIMO, multiple transmissions and receptions (multiple TRPs/panel transmissions), multi-beam operation in the millimeter wave band FR2, and low peak-to-average power ratio (PAPR) reference signals. Unlicensed Spectrum Applications: Similar to Licensed Assisted Access (LAA) and Enhanced LAA, 3GPP Release 16 supports unlicensed spectrum for NR access to improve the throughput and capacity of Wi-Fi in the 5-6 GHz band. 1.2 Performance Improvements:   RACS (Radio Access Capability Signaling) Optimization: Establishing RACS IDs and mapping them to device radio capabilities optimizes signaling for UE radio capabilities. Multiple UEs can share the same RACS ID, which is stored in the Next Generation Radio Access Network (NG-RAN) and Access and Mobility Management Function (AMF). Additionally, a new network function called UCMF (UE Capability Management Function) is introduced. TDD Applications: NR is primarily used in high-frequency time-division duplex bands: Due to electromagnetic wave reflection and refraction, the downlink of one cell can interfere with the uplink of another cell; this cross-link interference is inherent. NR Release 16 supports remote interference management to mitigate this cross-link interference. II. Flexible Network Deployment R16's IAB (Integrated Access and Backhaul) functionality can increase network capacity by rapidly deploying denser access points. Additionally: Non-Public Networks (NPNs): R16 supports two types of NPNs: Standalone NPN (SNPN) and Public Network Integrated NPN (PNI-NPN).  Flexible SMF and UPF Deployment: R16 introduces management flexibility for Session Management Functions (SMFs) and User Plane Functions (UPFs), allowing multiple SMFs to control a single UPF, and the UPF can assign IP addresses in place of the SMF. Enhanced Network Slicing Capabilities: R16 adds Network Slice-Specific Authentication and Authorization (NSSAA) to support individual authentication and authorization for services within a given network slice. Enhanced eSBA (Service-Based Architecture): R16 enhances service discovery and routing capabilities, including the introduction of a new Service Communication Broker (SCP) network function. R16 also enhances Network Automation Architecture (eNA). Release 15 supports data collection and network analytics public functionality. In Release 16, network analytics IDs can be used to assign specific analytics data, such as network usage per network slice, UE mobility information, and network performance, enabling the Network Data Analytics Function (NWDAF) to collect specific data associated with that analytics ID.

2025

12/03

What's different about 5G (NR) in Release 16 (1)?
  3GPP introduced LTE in Release 8 and LTE-Advanced in Release 10. As the first version of the 5G specification, Release 15 defined the 5G (NR) air interface and the 5G radio access network and core network. Release 16 (R16) introduced standalone (SA) and non-standalone (NSA) deployments, allowing operators to take advantage of the additional benefits of 5G.   I. Evolution from 4G to 5G In Release 16 (R16), 3GPP enhanced 5G capabilities to support several improvements to the NR air interface, including unlicensed spectrum in the millimeter-wave (mmW) band and improved support for Industrial Internet of Things (IIoT) and Ultra-Reliable Low-Latency Communication (URLLC). The network also underwent several enhancements to improve deployment flexibility and performance.   II. R16 Support for 5G Applications 5G was developed to meet the diverse application scenarios of wirelessly connected devices, covering enhanced mobile broadband (eMBB), massive Internet of Things (mIoT), and ultra-reliable low-latency communication (URLLC). Release R15 primarily focused on eMBB, with limited support for other application scenarios. Release R16 enhances URLLC and IoT capabilities and adds support for 5G vehicle-to-everything (V2X) communication.   III. Key 5G Application Scenarios include:   1. Ultra-reliable low-latency communication New enhancements provide low-latency communication to support industrial automation, connected cars, and telemedicine applications; specifically: The Time-Sensitive Networking (TSN) architecture supports redundant transmissions, thus supporting URLLC applications. Furthermore, the TSN service provides time synchronization for packet transmissions through integration with external networks. R16 enhances the uplink synchronization (RACH) process by supporting low latency and reducing signaling overhead, enabling two-step RACH compared to the previous four-step approach. New mobility enhancements reduce downtime and improve reliability during 5G connected device handover. 2. Internet of Things (IoT): 5G-supported Industrial Internet of Things (IIoT) capabilities can meet the service needs of industries such as manufacturing, logistics, oil and gas, transportation, energy, mining, and aviation.   Cellular Internet of Things (CIoT), now available in 5G, offers similar functionality to that provided in LTE (LTE-M and NB-IoT), allowing IoT traffic to be carried in network signaling. Energy-saving features such as enhanced discontinuous reception (DRX), relaxed radio resource management for idle devices, and enhanced scheduling can extend the battery life of IoT devices. 3. Vehicle-to-Everything (V2X): Release 16 goes beyond the V2X service capabilities supported by LTE in Release 14, leveraging 5G (NR) access to enhance V2X in several ways, such as enhanced autonomous driving, accelerated network effects, and energy-saving features.

2025

12/02