The document is a lesson on UMTS network introduction from Lucent Technologies. It is proprietary and intended for use pursuant to company instruction. The document contains diagrams and descriptions of UMTS network components such as Node B, RNC, MSC and core network elements. It also includes questions related to the UMTS network topics discussed.
The document provides an overview of UMTS (Universal Mobile Telecommunications System), the 3G mobile communication standard. It discusses trends driving the need for UMTS, including increasing data usage, integration of technologies, and limitations of 2G systems. The document also outlines key demands on UMTS, the standardization process, and the staged development of UMTS from GSM networks to the new UMTS network architecture using W-CDMA and other CDMA technologies over dedicated frequency bands.
This document provides an overview of 3G mobile networks and the evolution to 4G networks. It describes the basic cellular structure and compares network technologies from 1G to 4G. Key aspects of 3G UMTS networks are explained, including the network architecture, mobility management procedures like attach, tracking area update, and detach. Session management procedures like activation and deactivation that enable packet network access are also covered. The presentation concludes with a discussion of how 4G networks evolved from 3G to address limitations and incorporate new technologies.
Here are the answers to the review questions from the document:
1. List at least three significant events in the evolution of CDMA networks:
- 1948 John Pierce describes CDMA Multiplexing
- 1956 "Antimultipath" RAKE receiver patented
- 1970s CDMA used in several military communication and navigation systems
2. List the four main network subsystems of UMTS Release 99:
- UTRAN
- CN
- NMS
- Service Platform
3. Name the four basic air interface access technologies:
- TDMA
- FDMA
- CDMA
- OFDMA
This document discusses considerations for introducing LTE technology into existing GSM-UMTS networks. It will take several years for LTE deployments to reach the scale of existing 2G and 3G networks, so operators need solutions to provide seamless service and mobility between network technologies during the transition. The document outlines various strategies for LTE deployment, including options for data-only, voice and data services. It also examines expectations around subscriber and operator experience, and analyzes potential solutions for interworking LTE with 2G-3G networks to support seamless service continuity.
This document provides an introduction to UMTS (Universal Mobile Telecommunications System). It describes the context and limitations of previous mobile systems that led to the development of 3G systems like UMTS. The goals of UMTS are to provide high-quality wireless multimedia services across converged fixed and mobile networks. The technical overview explains that UMTS uses CDMA to separate users within a cell and has both FDD and TDD duplex modes for frequency division.
UMTS is a 3G mobile communication standard developed by 3GPP to provide improved speed and capacity over existing 2G and 2.5G networks. UMTS uses W-CDMA as its air interface and is divided into the user equipment (UE), the UTRAN network which includes Node B base stations and RNC controllers, and core network. UMTS supports higher data rates up to 2Mbps, provides seamless international roaming, and enables new multimedia services for businesses and consumers.
The document discusses the transition from GSM networks to 3G networks using UMTS (Universal Mobile Telecommunications System) and W-CDMA (Wideband Code Division Multiple Access) technology. It provides an overview of the 3 steps to transition: from current GSM networks to 2.5G networks with GPRS added, to 3G networks using UMTS and W-CDMA. Key aspects of W-CDMA such as its frequencies, multiple access techniques, and spreading codes used are summarized.
The document provides an introduction to the GSM system including:
- A brief history of public wireless communication and the development of GSM over time from 1982 to 2008.
- An overview of key concepts in GSM including the network structure, location areas, public land mobile networks, and cells.
- A description of the main components that make up a GSM network including the network switching subsystem, base station subsystem, and mobile station.
- Details on important interfaces in GSM like Um, Abis, A, Ater and Gb.
- Features of GSM such as improved spectrum efficiency, system capacity, voice quality, open interfaces, and security features like authentication and encryption.
The document provides an overview of UMTS (Universal Mobile Telecommunications System), the 3G mobile communication standard. It discusses trends driving the need for UMTS, including increasing data usage, integration of technologies, and limitations of 2G systems. The document also outlines key demands on UMTS, the standardization process, and the staged development of UMTS from GSM networks to the new UMTS network architecture using W-CDMA and other CDMA technologies over dedicated frequency bands.
This document provides an overview of 3G mobile networks and the evolution to 4G networks. It describes the basic cellular structure and compares network technologies from 1G to 4G. Key aspects of 3G UMTS networks are explained, including the network architecture, mobility management procedures like attach, tracking area update, and detach. Session management procedures like activation and deactivation that enable packet network access are also covered. The presentation concludes with a discussion of how 4G networks evolved from 3G to address limitations and incorporate new technologies.
Here are the answers to the review questions from the document:
1. List at least three significant events in the evolution of CDMA networks:
- 1948 John Pierce describes CDMA Multiplexing
- 1956 "Antimultipath" RAKE receiver patented
- 1970s CDMA used in several military communication and navigation systems
2. List the four main network subsystems of UMTS Release 99:
- UTRAN
- CN
- NMS
- Service Platform
3. Name the four basic air interface access technologies:
- TDMA
- FDMA
- CDMA
- OFDMA
This document discusses considerations for introducing LTE technology into existing GSM-UMTS networks. It will take several years for LTE deployments to reach the scale of existing 2G and 3G networks, so operators need solutions to provide seamless service and mobility between network technologies during the transition. The document outlines various strategies for LTE deployment, including options for data-only, voice and data services. It also examines expectations around subscriber and operator experience, and analyzes potential solutions for interworking LTE with 2G-3G networks to support seamless service continuity.
This document provides an introduction to UMTS (Universal Mobile Telecommunications System). It describes the context and limitations of previous mobile systems that led to the development of 3G systems like UMTS. The goals of UMTS are to provide high-quality wireless multimedia services across converged fixed and mobile networks. The technical overview explains that UMTS uses CDMA to separate users within a cell and has both FDD and TDD duplex modes for frequency division.
UMTS is a 3G mobile communication standard developed by 3GPP to provide improved speed and capacity over existing 2G and 2.5G networks. UMTS uses W-CDMA as its air interface and is divided into the user equipment (UE), the UTRAN network which includes Node B base stations and RNC controllers, and core network. UMTS supports higher data rates up to 2Mbps, provides seamless international roaming, and enables new multimedia services for businesses and consumers.
The document discusses the transition from GSM networks to 3G networks using UMTS (Universal Mobile Telecommunications System) and W-CDMA (Wideband Code Division Multiple Access) technology. It provides an overview of the 3 steps to transition: from current GSM networks to 2.5G networks with GPRS added, to 3G networks using UMTS and W-CDMA. Key aspects of W-CDMA such as its frequencies, multiple access techniques, and spreading codes used are summarized.
The document provides an introduction to the GSM system including:
- A brief history of public wireless communication and the development of GSM over time from 1982 to 2008.
- An overview of key concepts in GSM including the network structure, location areas, public land mobile networks, and cells.
- A description of the main components that make up a GSM network including the network switching subsystem, base station subsystem, and mobile station.
- Details on important interfaces in GSM like Um, Abis, A, Ater and Gb.
- Features of GSM such as improved spectrum efficiency, system capacity, voice quality, open interfaces, and security features like authentication and encryption.
Problems on understanding old radiomobile technologies? Do you need something fast and useful for refreshing your knowledgs? Have a look on this document! Very easy and customized for everybody...from beginners to advanced engineers!
UMTS ... is 3G technology and concepts. It introduced a new radio access network called UTRAN and a new air interface called WCDMA. The core network was initially based on GSM/GPRS but was expanded with new nodes. UMTS defined four quality of service classes and new protocols were introduced for the user plane and control plane in UTRAN and between network elements. Key concepts included serving and drift RNCs for soft handover, and SRNS relocation for changing the serving RNC.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
The document provides an overview of GSM architecture including:
1. GSM uses a cellular network architecture with base stations, base station controllers, mobile switching centers, and databases to manage subscriber identity and location.
2. The network allows for voice calls and data services including SMS, and provides security through subscriber authentication and encryption.
3. GSM is a global standard that enabled international roaming and continues to evolve to support higher data rates through technologies like GPRS, EDGE, and WCDMA.
The document is a presentation about professional registration with the Institution of Engineering and Technology (IET). It covers:
- The benefits of IET membership and different membership grades.
- The four categories of professional registration (CEng, IEng, EngTech, ICTTech) and their requirements.
- How to demonstrate competence, including underpinning knowledge, skills, and experience.
- Tools like Career Manager that can help plan professional development and record continuing professional development (CPD).
- The application process, including developing competence, applying online, and undergoing peer review including an interview.
This document provides instructions for IET members on how to prepare a professional registration application using the Career Manager online tool. It outlines the 13 step process for completing the registration checklist, uploading supporting documents, adding areas of expertise, having the application verified by supporters, and ultimately submitting it for review. The document also provides tips and links to additional guidance resources throughout the application process.
This document provides guidance for applicants applying for UK-SPEC professional registration. It outlines the application requirements and fees, describes the information needed in each section of the application form, and provides tips on presenting work experience and responsibilities. Supporting documents like education certificates, an accountability diagram, and a development action plan must be included. The application will be assessed against UK-SPEC competence statements and may require an interview.
This document provides performance counters for a 3900 Series Base Station (eNodeB). It includes counters related to radio network measurements, transport network measurements, and hardware platform measurements. The counters are organized into object types, function subsets, and individual counters. For each counter, the document provides details on its ID, name, description, measurement point, related features, and original release. The performance counters can be used to monitor key performance indicators of the base station such as setup success rates for various radio resource control procedures.
This document proposes key performance indicators (KPIs) for measuring radio access network (RAN) performance on a RNC. It defines KPIs in areas such as coverage, accessibility, retainability, mobility, service integrity, availability and traffic. Templates are provided for each KPI, specifying the name, description, measurement scope, calculation formula and associated counters. A total of 38 KPIs are defined and classified into the different performance areas.
This document provides a summary of channel structures and access capabilities for the 3G mobile communication system as specified by 3GPP. It defines various channel types including traffic channels, control channels, and packet data traffic channels. It describes the purpose and characteristics of different channel types and specifies the channel configurations and access capabilities of the base station. The document is intended to standardize the radio interface protocols between the mobile station and base station system.
This document is a 3GPP technical specification that outlines requirements for supporting radio resource management in UMTS FDD networks. It discusses requirements for various idle mode and connected mode mobility tasks, including cell selection, cell reselection, soft handover, hard handover, inter-RAT handover between UMTS FDD and TDD or GSM networks, and cell reselection in CELL_FACH state. It provides requirements for parameters like active set dimensions, handover delays, interruption times, and cell reselection delays. The document also lists definitions, abbreviations, references, and copyright information.
This document describes the 3GPP TS 25.331 technical specification for radio resource control (RRC) protocol. It defines the RRC protocol and RRC operation of user equipment (UE) and UTRAN in UTRA networks. The document provides specifications for RRC functions, services, states and procedures, including the broadcast of system information, RRC connection establishment, and different RRC modes like URA_PCH, CELL_PCH and CELL_DCH.
- The document discusses techniques for detecting wireless LAN MAC address spoofing by attackers. It describes how attackers can spoof MAC addresses to obscure their identity, bypass access controls, or impersonate authorized users.
- The author identifies two methods for detecting spoofing - checking if the MAC address prefix is registered with IEEE, and analyzing patterns in random MAC addresses generated by tools like Wellenreiter that aim to obscure the attacker's presence. Analyzing MAC address changes in traffic can help identify spoofing attacks.
HSPA+ enhances mobile broadband capabilities by doubling the data capacity of HSPA and more than doubling the voice capacity of WCDMA. HSPA+ Release 7 (R7) provides peak downlink data rates of 28 Mbps, while Release 8 (R8) introduces multicarrier capability to double user data rates to 42 Mbps. HSPA+ improves the user experience with lower latency and extended talk time. It also offers a cost-effective upgrade path for operators by leveraging existing HSPA infrastructure and enabling both voice and high-speed data services on the same carrier.
This document analyzes frequency coordination between UMTS900 and GSM900 systems operating at 900 MHz. It summarizes lab tests conducted on commercial UMTS900 and GSM900 equipment to measure interference levels and assess the impact of mutual interference. The limiting factor is found to be interference from GSM mobile stations to UMTS Node B receivers. With a frequency offset of 2.2 MHz or more, satisfactory system performance can be achieved even when as little as 4.2 MHz of GSM spectrum is cleared for UMTS use.
1. Circuit-Switched (CS) Voice Services over HSPA (CSoHS) was introduced to improve voice capacity and utilize improvements from HSPA's shared packet transport, while retaining existing CS core networks.
2. The document discusses the implementation of CSoHS and analyzes its performance via simulations. CSoHS provides significantly higher capacity than CS voice under similar conditions and voice quality.
3. CSoHS carries voice traffic over new HSPA radio channels for higher capacity like VoIP, but unlike VoIP does not carry voice over an IP backbone, requiring only minor changes to the radio access network and user equipment.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Problems on understanding old radiomobile technologies? Do you need something fast and useful for refreshing your knowledgs? Have a look on this document! Very easy and customized for everybody...from beginners to advanced engineers!
UMTS ... is 3G technology and concepts. It introduced a new radio access network called UTRAN and a new air interface called WCDMA. The core network was initially based on GSM/GPRS but was expanded with new nodes. UMTS defined four quality of service classes and new protocols were introduced for the user plane and control plane in UTRAN and between network elements. Key concepts included serving and drift RNCs for soft handover, and SRNS relocation for changing the serving RNC.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
The document provides an overview of GSM architecture including:
1. GSM uses a cellular network architecture with base stations, base station controllers, mobile switching centers, and databases to manage subscriber identity and location.
2. The network allows for voice calls and data services including SMS, and provides security through subscriber authentication and encryption.
3. GSM is a global standard that enabled international roaming and continues to evolve to support higher data rates through technologies like GPRS, EDGE, and WCDMA.
The document is a presentation about professional registration with the Institution of Engineering and Technology (IET). It covers:
- The benefits of IET membership and different membership grades.
- The four categories of professional registration (CEng, IEng, EngTech, ICTTech) and their requirements.
- How to demonstrate competence, including underpinning knowledge, skills, and experience.
- Tools like Career Manager that can help plan professional development and record continuing professional development (CPD).
- The application process, including developing competence, applying online, and undergoing peer review including an interview.
This document provides instructions for IET members on how to prepare a professional registration application using the Career Manager online tool. It outlines the 13 step process for completing the registration checklist, uploading supporting documents, adding areas of expertise, having the application verified by supporters, and ultimately submitting it for review. The document also provides tips and links to additional guidance resources throughout the application process.
This document provides guidance for applicants applying for UK-SPEC professional registration. It outlines the application requirements and fees, describes the information needed in each section of the application form, and provides tips on presenting work experience and responsibilities. Supporting documents like education certificates, an accountability diagram, and a development action plan must be included. The application will be assessed against UK-SPEC competence statements and may require an interview.
This document provides performance counters for a 3900 Series Base Station (eNodeB). It includes counters related to radio network measurements, transport network measurements, and hardware platform measurements. The counters are organized into object types, function subsets, and individual counters. For each counter, the document provides details on its ID, name, description, measurement point, related features, and original release. The performance counters can be used to monitor key performance indicators of the base station such as setup success rates for various radio resource control procedures.
This document proposes key performance indicators (KPIs) for measuring radio access network (RAN) performance on a RNC. It defines KPIs in areas such as coverage, accessibility, retainability, mobility, service integrity, availability and traffic. Templates are provided for each KPI, specifying the name, description, measurement scope, calculation formula and associated counters. A total of 38 KPIs are defined and classified into the different performance areas.
This document provides a summary of channel structures and access capabilities for the 3G mobile communication system as specified by 3GPP. It defines various channel types including traffic channels, control channels, and packet data traffic channels. It describes the purpose and characteristics of different channel types and specifies the channel configurations and access capabilities of the base station. The document is intended to standardize the radio interface protocols between the mobile station and base station system.
This document is a 3GPP technical specification that outlines requirements for supporting radio resource management in UMTS FDD networks. It discusses requirements for various idle mode and connected mode mobility tasks, including cell selection, cell reselection, soft handover, hard handover, inter-RAT handover between UMTS FDD and TDD or GSM networks, and cell reselection in CELL_FACH state. It provides requirements for parameters like active set dimensions, handover delays, interruption times, and cell reselection delays. The document also lists definitions, abbreviations, references, and copyright information.
This document describes the 3GPP TS 25.331 technical specification for radio resource control (RRC) protocol. It defines the RRC protocol and RRC operation of user equipment (UE) and UTRAN in UTRA networks. The document provides specifications for RRC functions, services, states and procedures, including the broadcast of system information, RRC connection establishment, and different RRC modes like URA_PCH, CELL_PCH and CELL_DCH.
- The document discusses techniques for detecting wireless LAN MAC address spoofing by attackers. It describes how attackers can spoof MAC addresses to obscure their identity, bypass access controls, or impersonate authorized users.
- The author identifies two methods for detecting spoofing - checking if the MAC address prefix is registered with IEEE, and analyzing patterns in random MAC addresses generated by tools like Wellenreiter that aim to obscure the attacker's presence. Analyzing MAC address changes in traffic can help identify spoofing attacks.
HSPA+ enhances mobile broadband capabilities by doubling the data capacity of HSPA and more than doubling the voice capacity of WCDMA. HSPA+ Release 7 (R7) provides peak downlink data rates of 28 Mbps, while Release 8 (R8) introduces multicarrier capability to double user data rates to 42 Mbps. HSPA+ improves the user experience with lower latency and extended talk time. It also offers a cost-effective upgrade path for operators by leveraging existing HSPA infrastructure and enabling both voice and high-speed data services on the same carrier.
This document analyzes frequency coordination between UMTS900 and GSM900 systems operating at 900 MHz. It summarizes lab tests conducted on commercial UMTS900 and GSM900 equipment to measure interference levels and assess the impact of mutual interference. The limiting factor is found to be interference from GSM mobile stations to UMTS Node B receivers. With a frequency offset of 2.2 MHz or more, satisfactory system performance can be achieved even when as little as 4.2 MHz of GSM spectrum is cleared for UMTS use.
1. Circuit-Switched (CS) Voice Services over HSPA (CSoHS) was introduced to improve voice capacity and utilize improvements from HSPA's shared packet transport, while retaining existing CS core networks.
2. The document discusses the implementation of CSoHS and analyzes its performance via simulations. CSoHS provides significantly higher capacity than CS voice under similar conditions and voice quality.
3. CSoHS carries voice traffic over new HSPA radio channels for higher capacity like VoIP, but unlike VoIP does not carry voice over an IP backbone, requiring only minor changes to the radio access network and user equipment.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Umts super basics
1. 1
Lucent Technologies – Proprietary
Use pursuant to company instruction
UM1911
Lesson 1
UMTS Network Introduction
Lucent Technologies – Proprietary
Use pursuant to company instruction
2. 2
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
3. 3
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
4. 4
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
5. 5
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
6. 6
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
7. 7
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
8. 8
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
9. 9
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
10. 10
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
11. 11
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
12. 12
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
13. 13
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
14. 14
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
15. 15
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
16. 16
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
18. 1
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
19. 2
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
20. 3
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
21. 4
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
22. 5
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
23. 6
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
T1
OC – 3
24. 7
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
25. 8
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
26. 9
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
27. 10
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
28. 11
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
29. 12
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
30. 13
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
Questions
31. 1
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
32. 2
Lucent Technologies – Proprietary
Use pursuant to company instruction
T1
OC3
Lucent Technologies – Proprietary
Use pursuant to company instruction
33. 3
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
34. 4
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
35. 5
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
36. 6
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
37. 7
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
T D U
U C R
F i l t e r
P o w e r
A M P
F i l t e r
P o w e r
A M P
U C R
F i l t e r
P o w e r
A M P
F i l t e r
P o w e r
A M P
T D U
U C R
F i l t e r
P o w e r
A M P
F i l t e r
P o w e r
A M P
5 M H z
5 M H z 5 M H z
5 M H z
5 M H z
5 M H z
S e c t o r 1
A n t e n n a A A n t e n n a B
S e c t o r 2
A n t e n n a A A n t e n n a B
S e c t o r 3
A n t e n n a A A n t e n n a B
C C U / U C U
F o r w a r d T r a f f i c B u s
R e v e r s e T r a f f i c B u s
U R C U R C
U R C
( S p a r e )
I O U
O M
C T U
S y s t e m
T i m i n g
S i g n a l s
G P S I n p u t
S i g n a l
( O p t i o n a l)
C P C
B a c k p l a n e
S u p p l y
R a i l s
P o w e r D i s t r i b u t i o n
B l o c k
+ 2 4 V / - 4 8 V D C S u p p l y
F a c i l it i e s
I n t e r f a c e ( E 1 / T 1 )
I E E E 1 3 9 4 B u s
A R C N E T B u s
M o d u l e
P o w e r
F e e d s
1 2 C a r d s i n a
l o a d s h a r i n g
c o n f i g u r a t i o n
I n t e r - F r a m e
I n t e r f a c e s
I 2 C B u s
i B u t t o n B u s
T D U
38. 8
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
39. 9
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
40. 10
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
41. 11
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
42. 12
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
43. 13
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
44. 14
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
45. 15
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
46. 16
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
47. 17
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
48. 18
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
49. 19
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
50. 20
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
51. 21
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
52. 22
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
53. 23
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
54. 24
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
55. 25
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
56. 26
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
57. 27
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
58. 28
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
59. 29
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
60. 30
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
61. 31
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
62. 32
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
63. 33
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
64. 34
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
65. 35
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
67. 1
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
68. 2
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
69. 3
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
70. 4
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
71. 5
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
72. 6
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
73. 7
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
74. 8
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
75. 9
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
76. 10
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
77. 11
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
78. 12
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
79. 13
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
80. 14
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
81. 15
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
82. 16
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
83. 17
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
84. 18
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
85. 19
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
86. 20
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
87. 21
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
88. 22
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
89. 23
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
90. 24
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
91. 25
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
Questions
93. 1
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
94. 2
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
95. 3
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
96. 4
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
97. 5
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
98. 6
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
99. 7
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
100. 8
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
101. 9
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
102. 10
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
103. 11
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
104. 12
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
105. 13
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
106. 14
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
107. 15
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
108. 16
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
109. 17
Lucent Technologies – Proprietary
Use pursuant to company instruction
Questions ?
Lucent Technologies – Proprietary
Use pursuant to company instruction
110. 18
Lucent Technologies – Proprietary
Use pursuant to company instruction
Lucent Technologies – Proprietary
Use pursuant to company instruction
111. 1
Additional Information
UMTS Hardware Overview
UM1911
9/9/2005
Lucent Technologies - Proprietary
2
UMTS High Level Architecture Overview
Circuit
Switched network
Packet
Switched network
Packet Switched
Domain
Circuit Switched
Domain
CORE
NETWORK
MGW GGSN
SGSNLSS
SDHLR
RNC RNC
Node B Node B Node B Node B
UTRAN
Iur
IubIub
Iu-psIu-cs
OMC-U
OMC-HOMC-CN OMC-PS
113. 3
9/9/2005
Lucent Technologies - Proprietary
5
UMTS Network Element Function Overview
9/9/2005
Lucent Technologies - Proprietary
6
Node B – Logical Signal FlowNode B – Logical Signal Flow
NIU/
DSX
IOU URC UCU
64
P2PAM
Avail slots 1 3 12 6 4 p/sector
Using 3.01 1 1 2 or 3* 3 (1 p/sector) 1 p/sector
MCR
1900
DDPLX Filters
3 total
1 p/sector
TTLNA
TTLNA
NIU/DSX panel – Location where telco drops T-1s to local facility
Input/Output Unit (IOU) – Physical termination of T1s.
Universal Radio Controller (URC) – Electrical Termination of up to 8 T1s. Contains the LIU and MC,
Overall control of the NodeB, Line Interface Unit (LIU) – Performs CSU functions, Routing of
information to/fm T1 and UMTS Channel Unit Cards. Master Controller (MC) – Overall control of the BTS,
routes user traffic and OAM signaling to/fm RNC
UMTS Channel Unit 64 (UCU64) – Performs coding and decoding of user traffic. Also used for Overhead channels.
Multi-Carrier Radio (MCR) – 15 Mhz radio used to modulate and demodulate user traffic on/off RF carrier. Performs RX diversity, CLGC, Ant Tests, and EDPD
P2PAM – Power Amplifier used to amplify TX signal to it final power level. 40W max power output, can be lower based on site design.
Dual Diversity Duplex Filters – Provides filtering of the TX and RX signals. Powers TTLNAs.
TX
J8
Rx div0
Rx div1
Rx J6
Rx J26
TX1
RF outRF in
RX1
RX2
PAF1 PAF2
TX
J28
114. 4
9/9/2005
Lucent Technologies - Proprietary
7
TX carriers F1
RX Div 0
PAF 1
PAF 2
PAF 3
TX carriers F1
RX Div 0
TX carriers F1
RX Div 0
Antenna Configuration
TX carriers
F1 = 5Mhz Carrier
RX Div1
RX Div1
RX Div1
Node B – Antenna ConfigurationNode B – Antenna Configuration
1 2 3
S2D1 S3D0S2D0S1D1S1D0 S3D1
Back of Cabinet
J8 J28J7
J4
J5
J6
J24
J25
J26
J22-CJ2-C
J41
J31J11
J8 J28J7
J4
J5
J6
J24
J25
J26
LNALNA
TTLNATTLNA
RF ONRF ON
J22-CJ2-C
J41
J31J11
J8 J28J7
J4
J5
J6
J24
J25
J26
LNA
TTLNA
RF ON
J22-CJ2-C
J41
J31J11
LNA
TTLNA
RF ON
LNA
TTLNA
RF ON
LNA
TTLNA
RF ON
9/9/2005
Lucent Technologies - Proprietary
8
MCR RF Connectivity – Dual Duplexers (No TDU)MCR RF Connectivity – Dual Duplexers (No TDU)
Reflected M onitor
Incident M onitor Point
A ntenna A
1:2
Reflected M onitor
Incident M onitor Point
A ntenna B
1:3
1:2
1:3
ED PD
Coupler
DU A L
FIL TE R
PAN E L
(Low Loss)
RF Sw itches
E DPD
Coupler
-40dB
D X 0 E D PD
test coupler
(J11)
D X1 ED PD
test coupler
(J31)
D X0 & DX 1
Incident &
Reflected T est
Coupler(IRTC)
(J41)
J24 J25 J26J8 J28J4 J5 J6
MCR
P2PAM
XMIT 1
115. 5
9/9/2005
Lucent Technologies - Proprietary
9
TTLNA
TTLNA
Node B – Antenna TestNode B – Antenna Test
NIU/
DSX
IOU URC UCU
64
P2PAM
MCR
1900
DDPLX Filters
3 total
1 p/sector
NIU/
DSX
IOU URC UCU
64
P2PAM
MCR
1900
DDPLX Filters
3 total
1 p/sector
Incident Tone
Reflected Tone
9/9/2005
Lucent Technologies - Proprietary
10
NIU/
DSX
IOU URC UCU
64
P2PAM
MCR
1900
TTLNA
TTLNA
DDPLX Filters
3 total
1 p/sector
Node B – Closed Loop Gain ControlNode B – Closed Loop Gain Control
116. 6
9/9/2005
Lucent Technologies - Proprietary
11
NIU/
DSX
IOU URC UCU
64
P2PAM
MCR
1900
TTLNA
TTLNA
DDPLX Filters
3 total
1 p/sector
Node B – Enhanced Digital Pre-DistortionNode B – Enhanced Digital Pre-Distortion
9/9/2005
Lucent Technologies - Proprietary
12
MCR MCR MCR
117. 7
9/9/2005
Lucent Technologies - Proprietary
13
Node B – Macro Cabinet LayoutNode B – Macro Cabinet Layout
Outdoor Cabinet
W/ integrated pwr
Indoor or Outdoor Cabinet
9/9/2005
Lucent Technologies - Proprietary
14
Node B – Micro Cell Cabinet LayoutNode B – Micro Cell Cabinet Layout
118. 8
9/9/2005
Lucent Technologies - Proprietary
15
URC (3 slots)
Universal Radio Controller
• Controller Card
• Provides Iub Interface
• 2+1 Redundancy
UCU (6 slots)
UMTS Channel Unit
• Baseband Processing
• Pooled CE Resource
• N+K Redundancy
CTU (2 slots)
Common Timing Unit
• 1 Redundant Unit
• Clock Distribution
• Input from OMR/OMQ
CPC (8 slots)
Common Power Converter
• Input VDC to 3/5 VDC
• N+1 Redundancy
OMR & OMQ
Oscillator Module Rubidium
Oscillator Module Quartz
• Primary Rubidium
• Secondary Quartz
• Connection to CTU
I/O Panel
• Iub Connection
• Alarm Connection
• RMT – Remote Maintenance
Terminal
UCR (6 slots)
UMTS CDMA Radio
• Baseband to RF
conversion
UCU (6 slots)
UMTS Channel Unit
• Baseband Processing
• Pooled CE Resource
• N+K Redundancy
Node B – Digital Shelf LayoutNode B – Digital Shelf Layout
9/9/2005
Lucent Technologies - Proprietary
23
UMTS Acronyms