logo
Send Message
Shenzhen Olax Technology CO.,Ltd
About Us
Your Professional & Reliable Partner.
Shenzhen OLAX Technology Co.,Ltd , which Located in Shenzhen, China. OLAX Technology established in 2010, It is a leading domestic supplier of wireless communication terminal technology solutions and equipment.Our main products are 4g C P E WIFI routers, USB WIFI dongles, modems. Pocket WIFI hotspot.G S M and C D M A fixed wireless telephones, terminals, Moreover, we support card lock, network lockand SIM card security.We have a core team with more than ten years of experience in R & D, sales ...
Learn More

0

Year Established:

0

Million+
Employees

0

Million+
customers served

0

Million+
Annual Sales:
China Shenzhen Olax Technology CO.,Ltd High quality
Trust Seal, Credit Check, RoSH and Supplier Capability Assessment. company has strictly quality control system and professional test lab.
China Shenzhen Olax Technology CO.,Ltd DEVELOPMENT
Internal professional design team and advanced machinery workshop. We can cooperate to develop the products you need.
China Shenzhen Olax Technology CO.,Ltd MANUFACTURING
Advanced automatic machines, strictly process control system. We can manufacture all the Electrical terminals beyond your demand.
China Shenzhen Olax Technology CO.,Ltd 100% SERVICE
Bulk and customized small packaging, FOB, CIF, DDU and DDP. Let us help you find the best solution for all your concerns.

quality Portable Wifi Routers & Wireless Wifi Routers manufacturer

Find Products That Better Meet Your Requirements.
Cases & News
The Latest Hot Spots
USIM in 5G (NR) system (1)
1.UE and UICC In the mobile communication system defined by 3GPP (3rd Generation Partnership Project), the user's terminal (UE) device is composed of: ME (mobile equipment) + UICC (Universal Integrated Circuit Card); where UICC is a Physical cards that are tamper-proof and resistant to software and hardware attacks. 2. UICC and USIM UICC can contain multiple applications, one of which is USIM; USIM securely stores and processes all sensitive data related to the user and home network. USIM is under the control of the home network operator; the operator selects the data to be configured in the USIM before issuance and remotely manages the USIM in the user's device through the OTA (over-the-air) mechanism. 3.USIM in 5G 3GPP defines USIM for the 5G system in Rel-15 for access and use in 3GPP and non-3GPP networks, allowing UE (user equipment) external data networks. USIM is defined in Rel-16 as network slice specific authentication. 4.First-time authentication is a mandatory procedure to allow UE (user equipment) to access 3GPP or non-3GPP networks. EAP-AKA' or 5G-AKA are the only authentication methods that allow primary authentication and the subscription credentials are always stored in the USIM when the terminal supports 3GPP access functionality. For primary authentication based on AKA, the mutual authentication performed in the USIM and the generation of the key material (integrity key IK and confidentiality key CK) sent by the USIM to the ME remain unchanged compared to 3G, 4G and Meets 3GPP TS 33.102 specification [3]. Changes in 5G Primary Authentication USIM include storing new security context and additional keying material in USIM (depending on the USIM's configuration). 4.1 5G support If the USIM supports storing 5G parameters, the ME will store the new 5G security context and the new keys defined for the 5G key hierarchy (i.e. KAUSF, KSEAF and KAMF) in the USIM. USIM can store a 5G security context for 3GPP access networks and a 5G security context for non-3GPP access networks. Storing the security context and key material in the USIM ensures faster reconnection when roaming (UICC moves from one ME to another). 4.2 NPN support Authentication in private networks (called independent non-public networks) can rely on the EAP framework supported by the 5G system; user equipment and service networks can support 5G AKA, EAP-AKA' or any other key generation EAP authentication method, where: ·When using AKA-based authentication methods, clause 6.1 of 3PPTS 33501[1] applies. ·When selecting an EAP authentication method other than EAP-AKA', the selected method determines the credentials required in the UE and network. How these credentials for EAP methods other than EAPAKA' are stored and processed within the UE is beyond the scope. But to ensure a high level of security for access to private networks, private network operators may decide to require the presence and use of a UICC containing USIM applications in order to securely store and process subscription credentials for EAP methods such as EAP-AKA' or EAP-TLS . 5. Secondary authentication This is an optional authentication based on EAP, conducted between UE (user equipment) and DN (external data network). Although the choice of EAP authentication method and credentials is beyond the scope of 3GPP, external data networks may decide to protect access to their DN by performing strong authentication thanks to the EAP-AKA' or EAP-TLS authentication method, UICC in the user device The presence of USIM on the DN securely stores and processes the credentials used to access the DN. Network Slice Specific Authentication Using network slice specific authentication between the user device and the AAA (Authentication, Authorization and Accounting) server to access the network slice is optional. Network slice specific authentication is based on the EAP framework and its user ID and credentials are different from the 3GPP subscription credentials. It follows the mandatory primary certification. Stakeholders deploying slices may decide to install USIM on the UICC of user devices to ensure a high level of security to access their slices and prevent the emergence of unauthorized users.
SIM Technology Innovation: An In-Depth Look at eSIM and vSIM
01.eSIM   eSIM, known as Embedded-SIM, or Embedded SIM, is a programmable, electronic SIM card technology whose main feature is that it does not require a physical slot, but rather an embedded chip that is integrated directly into the device's circuit board or inside other devices. Hardware part_     Integrated Circuit (IC) Chip: At the heart of the eSIM is a small IC chip that is built into the device's motherboard, similar to a physical SIM card. It contains the necessary hardware (CPU, ROM, RAM, EEPROM and serial communication unit) for storing and processing SIM data.   Software part_     Operating System (OS): The eSIM chip runs a dedicated operating system, often referred to as eUICC (Embedded Universal Integrated Circuit Card), which manages the SIM's functions, including data storage, secure processing and communication.     eSIM Production Process   ① Chip Manufacturing ② Chip testing ③ Integration into devices ④ Embedded software loading ⑤ Functional testing and verification   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   02.Virtual SIM (vSIM)   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   SoftSIM controls the information written to SoftSIM through the terminal provider, and the user purchases and uses communication services directly through the software without the intervention of the operator, which cuts off the direct connection between the user and the operator.   CloudSIM is a kind of SIM card function realized based on cloud computing technology, where users use network services on their devices through cloud services.   03.SIM service activation process   CloudSIM integrates the traffic resources of each operator into the cloud, selects operators according to the signal and network quality of different regions, and pushes them to the terminals to provide users with the best network services. The inclusion of multiple operators facilitates users to flexibly choose more favorable packages.       Do you want to learn more about SIM cards and other communication topics? We will continue to share more about this! See you in the next issue!
5G(NR) RAN Study -- Path Switch Request (1)
In 5G, a path request is a signaling message sent by the target base station to the core network during handover to redirect the path of the terminal (data) session. TS 38.413 defines the following:   I. PDU Session Setup Failures   If any PDU session setup fails, the list of failed sessions shall be included within the “Path Switch Request Setup Failure Transport IE” in the PATH SWITCH REQUEST message. The AMF shall process this information as specified in TS 23.502.   2. User Security and Path Information   For each PDU session, if its "additional redundant DL QoS flow information IE for each TNL" is included in the PATH SWITCH REQUEST Transfer IE of the Path Switch Request message, Then the SMF can use each included UP transport layer information as the downlink termination point for the associated QoS flows contained in this PDU session, and these QoS flows are split into different tunnels for redundant transmission. For each PDU session, if the Path Switch Request Transfer IE of its "Path Switch Request" message contains "Redundant DL NG-U TNL information Reuse IE", then the SMF should (if supported) treat the included DL transport layer address as the DL transport layer address for redundant transfer. As described in TS 23.501. For each PDU session, if the Path Switch Request Transfer IE of its "Path Switch Request" message contains the "Global RAN Node ID of the auxiliary NG-RAN node" IE, the SMF should (if supported) handle this information as stipulated in TS 23.501. For each PDU session contained in the PATH SWITCH REQUEST message, if the "Path Switch Request Transmission IE" contains the "Current QoS Parameter Set Index IE", the SMF should treat it as the currently implemented QoS parameter set among the alternative QoS parameters of the involved QoS flow. The NG-RAN node should (if supported) report the processing indicator IE based on the PDU set in the "PATH SWITCH REQUEST Transmission IE" in the Path Switch Request message. If the "PATH SWITCH REQUEST Transfer IE" in the Path Switch Request message contains a processing indicator IE based on the PDU set, the SMF should (if supported) handle this information as stipulated in TS 23.501. If the "PATH SWITCH REQUEST Transport IE" in the Path Switch Request message contains the MBS support indicator IE, then the SMF should (if supported) handle this information as stipulated in TS 23.247. If supported, the NG-RAN node should report the PATH SWITCH REQUEST transmission of the ECN tag in IE or congestion information report status IE in the Path Switch Request message. If the ECN tag or congestion information reporting status IE is included in the PATH SWITCH REQUEST Transport IE of the Path switch Request message, the SMF should (if supported) use it to infer whether the ECN tag at NG-RAN, the ECN tag at UPF, or congestion information reporting is active. As described in TS 23.501.   3. Upstream Data Processing   If the PATH SWITCH REQUEST ACKNOWLEDGE Transfer IE of the Path Switch Request Acknowledge message contains UL NG-U UP TNL Information IE Then the NG-RAN node should store this information and use it as the uplink termination point for the user plane data of this PDU session. If the PATH SWITCH REQUEST ACKNOWLEDGE Transfer IE of the Path Switch Request Acknowledge message contains additional NG-U UP TNL Information IE, Then the NG-RAN node should store this Information and use the UL NG-U UP TNL Information IE contained therein as the uplink termination point for the user plane data of this PDU session (split into different tunnels). If the PATH SWITCH REQUEST ACKNOWLEDGE transmission IE of the path switch request acknowledge message contains redundant UL NG-U UP TNL information IE, the NG-RAN node should (if supported) store this information. And use it as the uplink termination point of the user plane data for the redundant transmission of this PDU session, as described in TS 23.501. If the PATH SWITCH REQUEST ACKNOWLEDGE transmission IE of the path switch Request acknowledge message contains additional redundant NG-U UP TNL information IE, the NG-RAN node should (if supported) store this information. And use the included UL NG-U UP TNL information IE as the uplink termination point for the user plane data split in different tunnels of this PDU session

2025

09/15

G (NR) RAN Learning -- Path Switch Request During Handover
Similar to the previous generation 4G (LTE) systems, the Path Switch Request is a signaling message sent by the target base station to the core network during handover to redirect the (user) data path of the terminal's (packet data) session. This message initiates a process where the session management unit instructs the user plane to change the downlink data endpoint from the old site (source) to the new site, ensuring uninterrupted data flow to the user's new location.   I. Path Switch Request In 5G, the path request process establishes a terminal (UE)-related signaling connection with the 5GC and, where applicable, requests switching the downlink terminal point of the NG-U transport bearer to a new terminal point. This process utilizes UE-related signaling.   II. Path Request Process As illustrated in Figure 8.4.4.2-1 below, the “PATH SWITCH REQUEST” is initiated by the target NG-RAN node to the AMF. Its specific definition is as follows: The NG-RAN node initiates the process by sending a Path Switch Request (PATH SWITCH REQUEST) message to the AMF. Upon receiving the PATH SWITCH REQUEST message, the AMF shall transparently transfer the Path Switch Request Transfer IE to the SMF associated with each PDU session indicated in the PDU Session ID IE. Upon receiving the PATH SWITCH REQUEST message, the AMF shall deactivate the activated MT communication processing as described in TS 23.502.   III. Path Request Message Processing If the PATH SWITCH REQUEST message contains an RRC Resume Cause IE, the AMF shall (if supported) use it in accordance with the user plane CIoT 5GS optimization provisions for NG-RAN nodes acting as ng-eNBs specified in TS 23.502. If the PATH SWITCH REQUEST message contains a RedCap Indicator IE or eRedCap Indicator IE, the AMF shall (if supported) treat the UE as a RedCap UE or eRedCap UE previously served by an E-UTRA cell, respectively, and use this IE according to TS 23.501. After all necessary updates (including uplink path switching) are successfully completed in the 5GC, the AMF shall send a Path Switch Request Acknowledge message to the NG-RAN node for at least one PDU session resource included in the Path Switch Request. The process then terminates.   IV. PDU Session Handling For an IAB-MT or mobile IAB-MT where the PDU session ID IE in the PATH SWITCH REQUEST message indicates an unassigned PDU session identifier (as defined in TS 24.007), the AMF shall (if supported) consider the IAB-MT or mobile IAB-MT to lack a PDU session and proceed as specified in TS 23.501. Subsequently, the NG-RAN node shall (if supported) ignore the PDU Session Resource Switched List IE in the Path Switch Request Acknowledge message. For each PDU session where the Path Switch Request Transfer IE within the Path Switch Request message contains an Additional DL QoS Flow per TNL Information IE, The SMF can use each included uplink transport layer information as the downlink termination point for the associated QoS flows split across different tunnels for this PDU session.

2025

09/13

CPE extremely fast network experience
As a key device for realizing small-scale network transmission, routers have become an indispensable electronic product around the world. Simply put, it is a connection medium, responsible for "connecting various small local area networks together. With the increasing maturity and popularity of 4G/5G technology, many terminal devices have appeared on the market, especially 4G/5GCPE, because of its excellent performance and flexibility. What is CPE CPE is actually a network terminal device that receives mobile signals and forwards them as wireless Wi-Fi signals. It can support a large number of mobile terminals surfing the Internet at the same time. 4G CPE It is indeed inconvenient to open broadband at home when you live for a short period of time or the broadband cost is not cost-effective. But now with wireless router °4G CPE, everything has become simpler. There is no need to extend the broadband, just plug in the SIM card and turn on the power, and you can easily achieve a high-speed Internet experience from 4G to Wi-Fi. This plug-and-play feature greatly simplifies the network deployment process, allowing renters, small home users, and mobile office users to easily enjoy convenient network services. If you have requirements for the performance of wireless routers and want to be more cost-effective, you can also try our LTE Cat12 equipment such as R80a. The theoretical peak rate is 600Mbps (DL)/150Mbps (UL), which can meet customer requirements for high rate levels. . Qualcomm SDX12 has better power consumption and speed characteristics, bringing users a faster and better mobile communication experience. It also supports both 2.4GHz and 5GHz frequency bands, and can support up to 32 users to connect at the same time, which is very suitable for network environments shared by many people. 5G CPE With the full popularity of 5G, the requirements for home and enterprise networks are getting higher and higher. Our 5G high-performance products are favored and sought after by more and more customers because of their excellent performance. For home users, it can provide high-speed and stable network connections to ensure extremely fast and smooth playback of high-definition videos. In addition, it also tailors high-performance network solutions for small and medium-sized enterprises, equipped with multiple full Gigabit network ports to meet the needs of multi-device access and wired connections, ensuring the stability of the enterprise's internal network, and is suitable for high-definition video conferencing, data transmission and cloud office and other applications. For temporary network needs, such as exhibitions, short-term rentals, outdoor activities, and emergency communications, its plug-and-play characteristics and high-performance performance make it an ideal choice, allowing customers to quickly build an efficient and stable network environment anytime, anywhere.

2024

12/24