logo
Send Message
Shenzhen Olax Technology CO.,Ltd
About Us
Your Professional & Reliable Partner.
Shenzhen OLAX Technology Co.,Ltd , which Located in Shenzhen, China. OLAX Technology established in 2010, It is a leading domestic supplier of wireless communication terminal technology solutions and equipment.Our main products are 4g C P E WIFI routers, USB WIFI dongles, modems. Pocket WIFI hotspot.G S M and C D M A fixed wireless telephones, terminals, Moreover, we support card lock, network lockand SIM card security.We have a core team with more than ten years of experience in R & D, sales ...
Learn More

0

Year Established:

0

Million+
Employees

0

Million+
customers served

0

Million+
Annual Sales:
China Shenzhen Olax Technology CO.,Ltd High quality
Trust Seal, Credit Check, RoSH and Supplier Capability Assessment. company has strictly quality control system and professional test lab.
China Shenzhen Olax Technology CO.,Ltd DEVELOPMENT
Internal professional design team and advanced machinery workshop. We can cooperate to develop the products you need.
China Shenzhen Olax Technology CO.,Ltd MANUFACTURING
Advanced automatic machines, strictly process control system. We can manufacture all the Electrical terminals beyond your demand.
China Shenzhen Olax Technology CO.,Ltd 100% SERVICE
Bulk and customized small packaging, FOB, CIF, DDU and DDP. Let us help you find the best solution for all your concerns.

quality Portable Wifi Routers & Wireless Wifi Routers manufacturer

Find Products That Better Meet Your Requirements.
Cases & News
The Latest Hot Spots
USIM in 5G (NR) system (1)
1.UE and UICC In the mobile communication system defined by 3GPP (3rd Generation Partnership Project), the user's terminal (UE) device is composed of: ME (mobile equipment) + UICC (Universal Integrated Circuit Card); where UICC is a Physical cards that are tamper-proof and resistant to software and hardware attacks. 2. UICC and USIM UICC can contain multiple applications, one of which is USIM; USIM securely stores and processes all sensitive data related to the user and home network. USIM is under the control of the home network operator; the operator selects the data to be configured in the USIM before issuance and remotely manages the USIM in the user's device through the OTA (over-the-air) mechanism. 3.USIM in 5G 3GPP defines USIM for the 5G system in Rel-15 for access and use in 3GPP and non-3GPP networks, allowing UE (user equipment) external data networks. USIM is defined in Rel-16 as network slice specific authentication. 4.First-time authentication is a mandatory procedure to allow UE (user equipment) to access 3GPP or non-3GPP networks. EAP-AKA' or 5G-AKA are the only authentication methods that allow primary authentication and the subscription credentials are always stored in the USIM when the terminal supports 3GPP access functionality. For primary authentication based on AKA, the mutual authentication performed in the USIM and the generation of the key material (integrity key IK and confidentiality key CK) sent by the USIM to the ME remain unchanged compared to 3G, 4G and Meets 3GPP TS 33.102 specification [3]. Changes in 5G Primary Authentication USIM include storing new security context and additional keying material in USIM (depending on the USIM's configuration). 4.1 5G support If the USIM supports storing 5G parameters, the ME will store the new 5G security context and the new keys defined for the 5G key hierarchy (i.e. KAUSF, KSEAF and KAMF) in the USIM. USIM can store a 5G security context for 3GPP access networks and a 5G security context for non-3GPP access networks. Storing the security context and key material in the USIM ensures faster reconnection when roaming (UICC moves from one ME to another). 4.2 NPN support Authentication in private networks (called independent non-public networks) can rely on the EAP framework supported by the 5G system; user equipment and service networks can support 5G AKA, EAP-AKA' or any other key generation EAP authentication method, where: ·When using AKA-based authentication methods, clause 6.1 of 3PPTS 33501[1] applies. ·When selecting an EAP authentication method other than EAP-AKA', the selected method determines the credentials required in the UE and network. How these credentials for EAP methods other than EAPAKA' are stored and processed within the UE is beyond the scope. But to ensure a high level of security for access to private networks, private network operators may decide to require the presence and use of a UICC containing USIM applications in order to securely store and process subscription credentials for EAP methods such as EAP-AKA' or EAP-TLS . 5. Secondary authentication This is an optional authentication based on EAP, conducted between UE (user equipment) and DN (external data network). Although the choice of EAP authentication method and credentials is beyond the scope of 3GPP, external data networks may decide to protect access to their DN by performing strong authentication thanks to the EAP-AKA' or EAP-TLS authentication method, UICC in the user device The presence of USIM on the DN securely stores and processes the credentials used to access the DN. Network Slice Specific Authentication Using network slice specific authentication between the user device and the AAA (Authentication, Authorization and Accounting) server to access the network slice is optional. Network slice specific authentication is based on the EAP framework and its user ID and credentials are different from the 3GPP subscription credentials. It follows the mandatory primary certification. Stakeholders deploying slices may decide to install USIM on the UICC of user devices to ensure a high level of security to access their slices and prevent the emergence of unauthorized users.
SIM Technology Innovation: An In-Depth Look at eSIM and vSIM
01.eSIM   eSIM, known as Embedded-SIM, or Embedded SIM, is a programmable, electronic SIM card technology whose main feature is that it does not require a physical slot, but rather an embedded chip that is integrated directly into the device's circuit board or inside other devices. Hardware part_     Integrated Circuit (IC) Chip: At the heart of the eSIM is a small IC chip that is built into the device's motherboard, similar to a physical SIM card. It contains the necessary hardware (CPU, ROM, RAM, EEPROM and serial communication unit) for storing and processing SIM data.   Software part_     Operating System (OS): The eSIM chip runs a dedicated operating system, often referred to as eUICC (Embedded Universal Integrated Circuit Card), which manages the SIM's functions, including data storage, secure processing and communication.     eSIM Production Process   ① Chip Manufacturing ② Chip testing ③ Integration into devices ④ Embedded software loading ⑤ Functional testing and verification   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   02.Virtual SIM (vSIM)   Virtual SIM (vSIM) is a SIM card technology without a physical form factor that allows devices to realize communication functions through software, including SoftSIM, CloudSIM, and others.   SoftSIM controls the information written to SoftSIM through the terminal provider, and the user purchases and uses communication services directly through the software without the intervention of the operator, which cuts off the direct connection between the user and the operator.   CloudSIM is a kind of SIM card function realized based on cloud computing technology, where users use network services on their devices through cloud services.   03.SIM service activation process   CloudSIM integrates the traffic resources of each operator into the cloud, selects operators according to the signal and network quality of different regions, and pushes them to the terminals to provide users with the best network services. The inclusion of multiple operators facilitates users to flexibly choose more favorable packages.       Do you want to learn more about SIM cards and other communication topics? We will continue to share more about this! See you in the next issue!
Link Adaptation (LA) in 5G (NR) Networks (Continued)
  In 5G (NR) wireless networks, mobile terminal equipment (UEs) can employ two types of link adaptation: inner-loop link adaptation and outer-loop link adaptation. Their characteristics are as follows: ILLA – Inner-loop link adaptation; OLLA – Outer-loop link adaptation. I. ILLA (Inner-loop Link Adaptive) performs fast and direct adjustments based on the Channel Quality Indicator (CQI) reported by each UE. The UE measures downlink quality (e.g., using CSI-RS). It reports the CQI to the gNB, which maps the CQI (via a static lookup table) to the MCS index for the next transmission. This mapping reflects the link condition estimate for that time slot/TTI. ILLA applies a three-step process as follows:   The UE measures the CSI-RS and reports CQI=11. The gNB maps CQI=11 to MCS=20. The MCS is used to calculate the transport block for the next time slot.   ILLA's advantage lies in its ability to adapt very quickly to channel changes; however, it has limitations in terms of false detections, CQI errors, and noise. Specifically, the BLER target value may shift if the channel is not ideal or the feedback is imperfect.   II. OLLA (Outer Loop Link Adaptive) uses a feedback mechanism to fine-tune the MCS target value to compensate for the actual link performance observed through HARQ ACK/NACK responses. For each transmission, the gNB receives either an ACK (success) or NACK (failure); where: If the BLER is higher than the set target value (e.g., 10%), OLLA adjusts downwards by a correction offset (Δoffset), i.e., reducing the aggressiveness of the MCS. If the BLER is lower than the target value, the offset is adjusted upwards, i.e., increasing the aggressiveness of the MCS. The offset is added to the SINR→CQI mapping in ILLA, thus ensuring that the BLER eventually converges to the target value—even if the input signal is not ideal.   OLLA's advantage lies in its ability to maintain a robust and stable BLER and adapt to slowly changing system errors in the SINR/CQI report. Due to its slower response speed, the optimal setting of the step size (i.e., Δup and Δdown) requires a trade-off between stability and response speed. In the OLLA mechanism, feedback is used to fine-tune the MCS target to compensate for the actual link performance observed through HARQ ACK/NACK responses.   III. Comparison of 4G and 5G Link Adaptation The table below compares 4G and 5G link adaptation.   Feature 5G NR 4G LTE CSI CQI + PMI + RI + CRI Mainly CQI Adaptation Speed Up to 0.125 ms 1 ms Traffic Types eMBB, URLLC, mMTC eMBB mainly MCS Mapping ML-optimized, Vendor-driven Fixed table Beamforming MassiveMIMO,Beam selection Minimal Scheduler Fully integrated & Intelligent Basic CQI, PF                     In 5G (NR) networks, Link Adaptive (LA) plays a crucial role in ensuring high-performance and reliable connectivity. Unlike the slower, fixed-table approach of 4G (LTE), 5G systems employ smarter and faster technologies, including AI/ML and real-time feedback. This enables the network to adapt to changing environments in real time and utilize radio resources more efficiently.

2025

11/28

Link Adaptation (LA) in 5G (NR) Networks
  I. Link Adaptation In mobile communication networks, the wireless environments of any two end users (UEs) are never exactly the same. Some users may be right next to a 5G base station with excellent wireless signal, while others may be deep inside buildings, moving at high speeds, or at the edge of a cell. However, they all expect a fast and stable network experience. To achieve the highest possible throughput and optimal reliable connection, "Link Adaptation" technology was developed. Link adaptation can be viewed as an "automatic mode" of the 5G physical layer, continuously monitoring the wireless environment and adjusting transmission parameters in real time to provide the best data rate while controlling errors.   II. Link Adaptation (AMC) in 5G In 5G networks, link adaptation refers to the process of dynamically adjusting transmission parameters (such as modulation, coding, and transmit power) to optimize the communication link between the base station (gNodeB) and the user equipment (UE). The goal of link adaptation is to maximize spectral efficiency, throughput, and reliability while adapting to constantly changing channel conditions and user needs. Figure 1. 5G Link Adaptive Process   III. Characteristics of 5G Link Adaptive Process   Modulation and Coding Scheme (MCS) Selection:Link adaptive process involves selecting a suitable modulation and coding scheme based on channel conditions, signal-to-noise ratio (SNR), and interference levels. Higher modulation schemes offer higher data rates but are more demanding on channel conditions; lower modulation schemes are more robust under adverse conditions. Transmit Power Control: Link adaptive process also includes adjusting transmit power to optimize signal quality and coverage while minimizing interference and power consumption. Transmit power control helps maintain a balance between signal strength and interference levels, especially in dense network deployments. Channel Quality Feedback: Link adaptive process relies on feedback mechanisms to provide information about channel conditions, such as Channel State Information (CSI), Received Signal Strength Index (RSSI), and Signal-to-Interference-Ratio (SINR). This feedback enables the gNodeB to make informed decisions regarding modulation, coding, and power adjustments. Adaptive Modulation and Coding (AMC): AMC is a key feature of link adaptive process; it dynamically adjusts modulation and coding parameters based on real-time channel conditions. By adapting to changes in channel quality, AMC maximizes data rates and spectral efficiency while ensuring reliable communication. Fast Link Adaptation: In rapidly changing channel environments, such as high-mobility scenarios or fading channels, fast link adaptation technology is used to quickly adjust transmission parameters to cope with channel fluctuations. This helps maintain a stable and reliable communication link under changing channel conditions.   In wireless systems, link adaptation plays a crucial role in optimizing wireless communication system performance by continuously adjusting transmission parameters to match current channel conditions and user needs. By maximizing spectral efficiency and reliability, link adaptation helps achieve high data rates, low latency, and seamless connectivity in 5G networks.

2025

11/27

5G (NR) System Network Functions and Entities
  As 5G (NR) supports increasingly more connections and functions, the number of network functions and entities in the system is also constantly increasing. 3GPP defines network functions and entities in Release 18.5 as follows:   I. Network Function (NF) Units The 5G system includes the following functional units:  AUSF (Authentication Server Function); AMF (Access and Mobility Management Function); DN (Data Network), specifically including: operator services, internet access, or third-party services; UDSF (Unstructured Data Storage Function); NEF (Network Exposure Function); NRF (Network Repository Function); NSACF (Network Slice Admission Control Function); NSSAAF (Network Slice-Specific and SNPN Authentication and Authorization Function); NSSF (Network Slice Selection Function); PCF (Policy Control Function); SMF (Session Management Function); UDM (Unified Data Management); UDR (Unified Data Repository). - UPF (User Plane Functions). UCMF (UE Radio Capability Management Functions). AF (Application Functions). UE (User Equipment). RAN (Radio Access Network). 5G-EIR (5G Device Identity Registration). NWDAF (Network Data Analysis Functions). CHF (Charging Functions). TSN AF (Time-Sensitive Network Adapter). TSCTSF (Time-Sensitive Communications and Time Synchronization Functions). DCCF (Data Collection Coordination Functions). ADRF (Analysis Data Repository Functions). MFAF (Message Frame Adapter Functions). NSWOF (Non-Seamless WLAN Offload Functions). EASDF (Edge Application Server Discovery Functions). *Functions provided by DCCF or ADRF can also be carried by NWDAF.   II. Network Entities The 5G system, supporting connectivity with non-3GPP Wi-Fi, WLAN, and wired access networks, also includes the following entity units in its architecture: SCP (Service Communication Agent). SEPP (Secure Edge Protection Agent). N3IWF (Non-3GPP Interoperability Function). TNGF (Trusted Non-3GPP Gateway Function). W-AGF (Wired Access Gateway Function). TWIF (Trusted WLAN Interoperability Function).

2025

11/26