Send Message
Shenzhen Olax Technology CO.,Ltd
About Us
Your Professional & Reliable Partner.
Shenzhen OLAX Technology Co.,Ltd , which Located in Shenzhen, China. OLAX Technology established in 2010, It is a leading domestic supplier of wireless communication terminal technology solutions and equipment.Our main products are 4g C P E WIFI routers, USB WIFI dongles, modems. Pocket WIFI hotspot.G S M and C D M A fixed wireless telephones, terminals, Moreover, we support card lock, network lockand SIM card security.We have a core team with more than ten years of experience in R & D, sales ...
Learn More

0

Year Established:

0

Million+
Employees

0

Million+
customers served

0

Million+
Annual Sales:
China Shenzhen Olax Technology CO.,Ltd High quality
Trust Seal, Credit Check, RoSH and Supplier Capability Assessment. company has strictly quality control system and professional test lab.
China Shenzhen Olax Technology CO.,Ltd DEVELOPMENT
Internal professional design team and advanced machinery workshop. We can cooperate to develop the products you need.
China Shenzhen Olax Technology CO.,Ltd MANUFACTURING
Advanced automatic machines, strictly process control system. We can manufacture all the Electrical terminals beyond your demand.
China Shenzhen Olax Technology CO.,Ltd 100% SERVICE
Bulk and customized small packaging, FOB, CIF, DDU and DDP. Let us help you find the best solution for all your concerns.

quality Portable Wifi Routers & Wireless Wifi Routers manufacturer

Find Products That Better Meet Your Requirements.
Cases & News
The Latest Hot Spots
SIM Technology Innovation: An In-Depth Look at eSIM and vSIM
01.eSIM   eSIM, known as Embedded-SIM, or Embedded SIM, is a programmable, electronic SIM card technology whose main feature is that it does not require a physical slot, but rather an embedded chip that is integrated directly into the device's circuit board or inside other devices. Hardware part_     Integrated Circuit (IC) Chip: At the heart of the eSIM is a small IC chip that is built into the device's motherboard, similar to a physical SIM card. It contains the necessary hardware (CPU, ROM, RAM, EEPROM and serial communication unit) for storing and processing SIM data.   Software part_     Operating System (OS): The eSIM chip runs a dedicated operating system, often referred to as eUICC (Embedded Universal Integrated Circuit Card), which manages the SIM's functions, including data storage, secure processing and communication.     eSIM Production Process   ① Chip Manufacturing ② Chip testing ③ Integration into devices ④ Embedded software loading ⑤ Functional testing and verification   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   02.Virtual SIM (vSIM)   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   SoftSIM controls the information written to SoftSIM through the terminal provider, and the user purchases and uses communication services directly through the software without the intervention of the operator, which cuts off the direct connection between the user and the operator.   CloudSIM is a kind of SIM card function realized based on cloud computing technology, where users use network services on their devices through cloud services.   03.SIM service activation process   CloudSIM integrates the traffic resources of each operator into the cloud, selects operators according to the signal and network quality of different regions, and pushes them to the terminals to provide users with the best network services. The inclusion of multiple operators facilitates users to flexibly choose more favorable packages.       Do you want to learn more about SIM cards and other communication topics? We will continue to share more about this! See you in the next issue!
Low-altitude economy theme: satellite communications
As we all know. Our daily life has been closely connected to the Internet All kinds of network devices are connected to each other Together, they build a convenient and efficient network for our lives. So much so that we seldom wonder Are communication networks really everywhere?   Oceans, deserts, jungles, ice fields, etc., are places not covered by mobile communication networks. On the one hand, there are engineering and technical difficulties in the construction and maintenance of base stations, and on the other hand, the construction capital is expensive and the utilization rate and return are too low.   How should the communication needs of these forgotten fringe areas be met? How to build a communication network with global coverage that is not limited by the terrestrial environment? Is there such a program? Perhaps “satellite communications” will give us an answer.   01.Meaning of satellite communications   Satellite communications are communications between radio communication stations on Earth (both on the ground and in the lower atmosphere) using satellites as relays. Compared with traditional cellular network communications, the wireless signals of satellite communications are relayed by satellites, and a single node can cover a larger service area. After completing the laying of the satellite network, communication satellites can complete the process of signal forwarding within the orbit, relaying the information between cellular phones and satellite base stations in a relay manner.   For reasons of time delay, interference and cost, modern civil satellite communications are mainly based on low-orbit satellites.   Compared with communication satellites in other orbits, low-orbit communication satellites have short transmission delays and small path losses, and constellations composed of multiple satellites can realize truly global coverage and more effective frequency reuse; together with point-beam, multiple-access and other technologies, they also provide technical guarantees for mobile communications by low-orbit satellites. Therefore, low-orbit communication satellites are considered to be one of the satellite mobile communication technologies with the most promising applications.   02.Principles of satellite communications   The satellite communication system consists of three parts: the satellite side, the ground side and the user side.   1.Satellite terminal   In the air to play the role of relay station, that is, the ground station sends up the electromagnetic wave amplification and then sent back to another ground station.   2.Ground terminal   It is the interface between the satellite system and the terrestrial public network, and terrestrial users can also form links to and from the satellite system through ground stations.   3.User terminal   That is, they are various user terminals such as computers, cell phones, modems, etc. They communicate with satellite communication systems through ground stations to exchange information at different locations on Earth.   Together, the above three components form a satellite communication system that realizes the purpose of communication via satellite between multiple earth stations.   As users, how do we access the satellite network, other than using a cell phone that can connect to the satellite?   Nowadays, it is mostly through the introduction of a terrestrial receiving device, like the old TV “pot”, to receive communications from the satellite band. After the signals from the satellite are received by the “pot”, they are converted into WiFi signals through a wireless router, and the cell phone can access the Internet through the WiFi signals!   03.Applications and development trends of satellite communications   Satellite communication has the advantages of wide coverage, long transmission distance and strong anti-interference ability, and is widely used in various fields:   Broadcasting and television: Satellite communication is the main means of realizing the dissemination of global broadcasting and television programs, such as CCTV's Spring Festival Gala and the live broadcast of the Olympic Games.   Mobile communications: Satellite communications enable mobile communications on a global scale, such as maritime communications and aeronautical communications.   Military communications: Satellite communications play an important role in the military field and can realize functions such as remote command and battlefield intelligence collection. Internet access: Satellite communications can provide Internet access to remote areas and narrow the digital divide. Disaster rescue: In emergencies such as natural disasters, satellite communications can quickly restore communication facilities and provide strong support for rescue work.     In April 2020, the National Development and Reform Commission (NDRC) for the first time included satellite Internet as a network infrastructure in the scope of “new infrastructure”. 2021, the Ministry of Industry and Information Technology (MIIT) pointed out in the “14th Five-Year Plan” for the development of the information and communications industry that there are shortcomings and weaknesses in China's information and communications industry, such as the imperfect global layout of international submarine cables and satellite communications networks. The Ministry of Industry and Information Technology pointed out in the “14th Five-Year Plan” that there are shortcomings and weaknesses in China's information and communications industry, such as the imperfect globalization layout of international submarine cables and satellite communications networks. According to the plan, by 2025, China's satellite communication network will provide global information network services for all kinds of users on land, at sea, in the air and in the sky.   It is expected that by 2030, broadband satellite communication will form a comprehensive link of high speed and high user density with the sea, land and air, and extend to the Earth-Moon space to support the business link of the whole scenario, realize the real-time response and processing of space information, and form a satellite communication information highway. By then, human cyberspace will leap to a new dimension!      
User data delivery in 5G (NR) in detail (2)
When a 5G user (UE) browses the Internet and downloads web content, the UP (user) side adds IP headers to the data and then hands it over to the UPF for processing, as described below;   I. UPF Processing   After adding the IP header, the user packets will be routed through the IP network to the UPF, which provides an entry point to the 5G core network. the IP network relies on its lower layers to transmit packets between routers; and the Ethernet operable Layer 2 agreement transmits IP packets between routers; The UPF is specifically responsible for mapping TCP/IP packets to specific QoS flows belonging to specific PDU sessions by using packet inspection to extract various header fields, which the UPF compares to a set of SDF (Service Data Flow) templates to identify the appropriate PDU sessions and QoS flows. For example, a unique combination of {source IP address 'X'; destination IP address 'Y'; source port number 'J'; destination port number 'K '} in unique combinations to map packets to specific PDU sessions and QoS flows; in addition, the UPF receives a set of SDF templates from the SMF (Session Management Function) during PDU session setup.   II.Data Forwarding   After identifying the appropriate PDU session and QoS flow, the UPF forwards the data to the gNode B using a GTP-U tunnel (the 5G core network architecture may link multiple UPFs - the first UPF must use a GTP-U tunnel to forward the data to another UPF, which then forwards it to the gNode B). Setting up a GTP-U tunnel for each PDU session implies that the TEID (tunnel endpoint identifier) within the GTP-U header identifies the PDU session but not the QoS flow. The “PDU Session Container” is added to the GTP-U header to provide information to identify the QoS flow. Figure 215 shows the structure of the GTP-U header containing the “PDU Session Container” as specified in 3GPP TS 29.281, and the content of the “PDU Session Container” as specified in 3GPP TS 38.415. III.PDU Session Container   As shown in Figure 216 below, when the value of “PDU Type” is “0”, it means that the PDU is a downlink packet instead of an uplink packet. the PPP (Paging Policy Presence) field indicates whether or not the header contains PPI (Paging Policy Indicator). (Paging Policy Indicator). the UPF may provide PPI to gNode B to provide paging priority that may be triggered by the arrival of a downlink packet - i.e. when the UE is in the RRC Inactive state. the RQI (Reflected QoS Indicator) specifies whether or not Reflected QoS should be applied to this QoS stream.     IV.GTP-U Tunneling   Using the UDP/IP protocol stack, UDP and IP headers are usually added before forwarding packets over the transport network.UDP provides simple connectionless data transfer.The structure of the UDP header is shown in Figure 217 below, where the source and destination ports identify the higher-level application. The higher-level application in this scenario is GTP-U whose registered port number is 2152.   V.GTP-U Headers   Adding IP headers for routing across GTP-U tunnels means that packets now have two IP headers. These are commonly referred to as the internal and external IP headers. Figure 218 shows these two headers; the UPF can use the DSCP field in the external IP header to prioritize packets, and the header associated with the GTP-U tunnel is removed at the far end of the tunnel, that is, at gNode B or, if the core network architecture is using chained UPF, at another UPF.

2024

09/30

User data transmission in 5G (NR) in detail
I. Network and Agreement Stack In SA (Independent Networking) 5G (NR) wireless network is usually divided into CU (Centralized Unit) and DU (Distributed Unit), where: DU (Distributed Unit) hosts the RLC, MAC, and PHY (Physical) layers, and CU (Centralised Unit) hosts the SDAP and PDCP layers; the user side of the network. The protocol stack is shown in the figure below:   II. the user data transfer to the end user (UE) to browse the Internet and download Web page content, for example, Internet browsers in the application layer using HTTP (Hypertext Transfer) protocol; assuming that the end user (UE) to host the Web page to be downloaded to the server to send the HTTP GET command, the application server will continue to use the TCP / IP (Transmission Control Protocol / Internet Protocol) packets to begin downloading the web content to the end user; the following header additions are required;   2.1 TCP Header Addition As shown in Figure 213, the TCP layer header is added with a standard header size of 20 bytes, but the size may be larger when optional header fields are included.The TCP header specifies the source and destination ports to identify higher-level applications. By default HTTP uses port number 80. the header also includes a sequence number to allow for reordering and packet loss detection at the receiver. The acknowledgement number provides a mechanism for acknowledging the packet, while the data offset defines the size of the header. The window size specifies the number of bytes the sender is willing to receive. Checksums allow for error bit detection in the header and payload. Emergency pointers can be used to indicate that certain data needs to be processed with high priority   2.2 IP Layer Header Addition Assuming IPv4 is used, the standard size of the header added at the IP layer, as shown in Figure 214, is 20 bytes (but the size may be larger when the optional header field is included).The IP header specifies the source IP address and the destination IP address, and the router uses the destination IP address to forward the packet in the appropriate direction. The version header field has a value of 4 when using IPv4, where the HDR (header) length field specifies the size of the header and the total length field specifies the size of the packet; DSCP (Differential Service Code Point) can be used to prioritize packets, and ECN (Explicit Congestion Notification) can be used to indicate network congestion. The agreement field specifies the type of content within the packet payload; TCP uses protocol number 6 for identification.  

2024

09/29

How are CM-Idle and CM-Connected 5G terminals different?
Whenever a terminal (UE) is ready to make a call or transmit data in a mobile communication system, it needs to connect with the core network first, which is due to the fact that the system temporarily removes the connection between the UR and the core network after the first time it is powered on or in an idle state for a period of time; the connection and management of the access connection between the terminal (UE) and the core network (5GC) in 5G (NR) is handled by the AMF unit, whose connection management (CM) is used to establish and release the control plane signaling connection between the UE and the AMF.   I. CM State Describes the signaling connection management (CM) state between the terminal (UE) and the AMF, which is mainly used for transmitting NAS signaling messages; for this purpose 3GPP defines two connection management states for the UE and the AMF respectively: CM-Idle (Connection Management in Idle state) CM-Connected (Connected state connection management)   CM-Idle and CM-Connected states are maintained by UE and AMF through NAS layer;   II.CM Characteristics Depending on the connection between the UE and the AMF. where: CM-Idle state the mobile equipment (UE) has not entered the signaling transmission state (RRC-Idle) with the core node (AMF). when the UE is in CM-Idle state it can move between different cells through mobile control according to the cell reselection principle. CM-Connected state the UE establishes a signaling connection (RRC-Connected and RRC-Inactive) with the AMF. the UE and the AMF can establish a connection based on the N1 (logical) interface will enter the CM-Connected state for the following intra interactions: RRC signaling between the UE and the gNB N2-AP signaling between the gNB and the AMF.   III.CM state transition The connected state of UE and AMF can be initiated by UE or AMF respectively, as shown in the following figure:   3.1 UE Initiated State Transition Once the RRC connection is established the UE state will enter CM-Connected; within the AMF once the established N2 context is received the UE state will enter CM-Connected; this can be performed by a registration request and a service request; where: When the UE is powered on for the first time, it selects the best gNB according to the cell selection process and sends a registration request to initiate the RRC connection setup signaling to the gNB and sends the N2 signaling to the AMF. The registration request triggers the transition from CM-Idle to CM-Connected. When the UE is in CM-Idle state and must send uplink data, the UE triggers a Service Request NAS message to the AMF and changes the CM-Idle to CM-Connected.   3.2 Network initiated state transition When there is downlink data to be transmitted to the CM-Idle UE, the network MUST use paging to initiate the state transition process. Paging triggers the UE to establish an RRC connection and send a Request NAS message to the AMF. The request triggers the N2 signaling connection to move the UE to CM-Connected.   When the signaling connection is released or the signaling connection fails, the UE can move from CM-Connected to CM-Idle.

2024

09/27