Flexible and Highly Adaptable Macro Cellular Networking
The adoption of FDMA and macro cellular mode enables the ETS450WLL wireless access system to cover an area of radius 20~50km. In addition, the multiple network topologies available with the ETS450WLL Base Station Controller enhance the flexibility and diversity of the ETS450WLL wireless access system.
Support PSTN Various Services
Besides the basic telephony service, the wireless subscribers of the ETS450WLL system also have access to a variety of supplementary services including abbreviated dialing, hot-line, and absent subscriber services. They are also provided with do-not-disturb service, outgoing call barring, malicious calls tracking, alarm call service, call forwarding, call waiting, three party service and conference call etc. ETS450WLL also supports G3 fax and low bit rate data communication via modem.
Support Payphones
The terminals provide reverse polarity or 16 kHz or 12 kHz metering pulses to support payphones.
Voice Privacy
The speech channel of ETS450WLL is analog, and the system adopts encryption to ensure a certain degree of voice privacy.
Common Channel Signaling
The control channel plays an import role in ETS450WLL system. Each Base Station has one control channel to act as the access channel and the paging channel. Any channel in the Base Station can be assigned as a control channel. Control channels are switched over automatically at regular intervals and allow manual instant switchover. When the control channel in service fails, the ETS450WLL system will switch over automatically to other channels available. This increases the system’s reliability.
Convenient Capacity Expansion
The capacity of the Base Station can be expanded in a module building mode by an increment of two channels. Each Base Station supports up to 30 channels. Also, Base Station can be added to the Base Station Controller by an increment of one Base Station at time. A single module BSC can support a maximum of 22 Base Stations.
Powerful and Convenient Administration & Maintenance
All wireless equipment of ETS450WLL can be monitored and maintained with the friendly graphic user interface (GUI).
Apart from setting data such as BS hardware configuration, BS parameters, channel parameters, subscriber data, the state of the boards, channels, subscriber units, and BS working condition in real time can also be supervised through the OMS.
Also, remote maintenance can be implemented on the ETS450WLL system via MODEM, X.25 or DDN.
Service Phone Interface
Via the E1 interface between the local exchange and the BS, a service phone interface is available on the TSL board of the BS. The service phone facilitates the communication between the BS and BSC without taking up wireless channels.
Base Station (BS) Alarming
The BS can monitor its own real-time working state and sends to the BSC alarming information, including transmit antenna Stationary Wave Ratio, the + 5V power state of the BS control frame, control channel state, etc.
BS Testing & Local Maintenance Functionality
ETS450WLL provides a set of procedures to test the radio channel, VSWR of Tx antenna, radiated power and the received signal strength, etc. on the Base Station manually. Also, the same function can be completed on the WLL Maintenance Console of the OMS.
Система радиодоступа ETS450WLL
Гибкое и высоко-адаптируемое макро-сотовое построение сети
Применение FDMA и макро-сотовый режим даёт возможность системе беспроводного доступа ETS450WLL покрывать область в радиусе 20~50 км. К тому же, широкие возможности сетевого построения контроллера базовых станций ETS450WLL (Base Station Controller, BSC) усиливают гибкость и разнообразие системы беспроводного доступа ETS450WLL.
Поддержка различных услуг PSTN
Помимо основных телефонных услуг, беспроводные абоненты системы ETS450WLL также имеют доступ к множеству дополнительных видов обслуживания (ДВО) включая: сокращённый набор, горячая линия и услуги отсутствия абонентов. Она также обеспечивает услугу «не беспокоить», ограничение исходящего вызова, отслеживание злонамеренных вызовов, будильник, переадресация вызова, ожидание вызова, трехсторонние услуги, конференц-связь и так далее. ETS450WLL также поддерживает передачу факсов G3 и низкоскоростную передачу данных по модему.
Поддержка картофонов
Терминалы обеспечивают реверсирование полярности или биллинговые сигналы 16 кГц или 12 кГц для поддержки картофонов.
Безопасность разговоров
Голосовой канал ETS450WLL является аналоговым и система применяет методы криптографии для достижения определённого уровня конфиденциальности разговоров.
Передача служебных сигналов по общему каналу
Контрольный канал играет важную роль в системе ETS450WLL. Каждая базовая станция (Base Station, BS) имеет один контрольный канал для работы в качестве канала доступа и канала поиска. Любой канал в BS может использоваться как контрольный. Контрольные каналы переключаются автоматически через определённые промежутки времени, а также возможно мгновенное ручное переключение. Когда текущий контрольный канал прерывается, система ETS450WLL автоматически переключится на другой свободный канал. Это повышает надёжность системы.
Удобное расширение емкости
Ёмкость BS может быть расширена путём модульного построения увеличением каналов на 2. Каждая BS поддерживает до 30 каналов. Также, BS могут подключаться к BSC по одной. Одномодульный BSC может поддерживать до 22 BS.
Мощное и удобное администрирование и поддержка
Все устройства ETS450WLL наблюдаемы и поддерживаемы с помощью дружественного графического интерфейса (Graphic User Interface, GUI).
Кроме ввода данных, таких как конфигурация оборудования BS, параметры BS, параметры каналов, данных об абонентах, состояние плат, каналов, абонентских комплектов и BS, через систему OMS возможен контроль рабочих условий в режиме реального времени.
Также, возможна удалённая поддержка системы ETS450WLL через MODEM, X.25 или DDN.
Интерфейс служебного телефона
Через интерфейс E1 между местной АТС и BS возможно обеспечение интерфейса служебного телефона через плату TSL на BS. Служебный телефон облегчает связь между BS и BSC без занятия беспроводного канала.
Сигнализация BS
BS может наблюдать в реальном времени своё собственное рабочее состояние и посылать в BSC сигнальную информацию, включая коэффициент стоячей волны антенны, информацию о напряжении + 5V для блока контроля BS, состоянии контрольного канала и так далее.
Функции тестирования BS и местной поддержки
ETS450WLL обеспечивает ряд ручных процедур на BS по тестированию радио канала, коэффициента стоячей волны (VSWR) антенны Tx (передающей), мощности излучения и напряжённости принимаемого сигнала и так далее. Также, те же самые функции могут быть осуществлены у консоли поддержки OMS.
Незнакомые слова
Multiple – многократный
Topologies – топология
Enhance – увеличить
Flexibility – гибкость
Subscribers – абоненты
Supplementary – дополнительный
Malicious – злонамеренный
Polarity – полярность
Payphones – таксофоны
Switchover – переключатель
Increases – увеличения
Increment – приращения
Maintenance – техническое обслуживание
Implemented – осуществленный
Facilitates – облегчает
Strength – сила
Грамматическое задание
Выписать предложения с модальными глаголами
Any channel in the Base Station can be assigned as a control channel.
The capacity of the Base Station can be expanded in a module building mode by an increment of two channels.
Also, Base Station can be added to the Base Station Controller by an increment of one Base Station at time.
A single module BSC can support a maximum of 22 Base Stations.
All wireless equipment of ETS450WLL can be monitored and maintained with the friendly graphic user interface (GUI).
Apart from setting data such as BS hardware configuration, BS parameters, channel parameters, subscriber data, the state of the boards, channels, subscriber units, and BS working condition in real time can also be supervised through the OMS.
Also, remote maintenance can be implemented on the ETS450WLL system via MODEM, X.25 or DDN.
The BS can monitor its own real-time working state and sends to the BSC alarming information, including transmit antenna Stationary Wave Ratio, the + 5V power state of the BS control frame, control channel state, etc.
Also, the same function can be completed on the WLL Maintenance Console of the OMS.
Перевод грамматического задания
Любой канал в BS может использоваться как контрольный.
Ёмкость BS может быть расширена путём модульного построения увеличением каналов на 2.
Также, BS могут подключаться к BSC по одной.
Одномодульный BSC может поддерживать до 22 BS.
Все устройства ETS450WLL наблюдаемы и поддерживаемы с помощью дружественного графического интерфейса (Graphic User Interface, GUI).
Кроме ввода данных, таких как конфигурация оборудования BS, параметры BS, параметры каналов, данных об абонентах, состояние плат, каналов, абонентских комплектов и BS, через систему OMS возможен контроль рабочих условий в режиме реального времени.
Также, возможна удалённая поддержка системы ETS450WLL через MODEM, X.25 или DDN.
BS может наблюдать в реальном времени своё собственное рабочее состояние и посылать в BSC сигнальную информацию, включая коэффициент стоячей волны антенны, информацию о напряжении + 5V для блока контроля BS, состоянии контрольного канала и так далее.
Также, те же самые функции могут быть осуществлены у консоли поддержки OMS.
Список литературы
English – Russian Dictionary Compiled by V. K. Muller, S. K. Boynus. Kiev “kannon” 1998.
Communication magazine.
Другие работы по теме:
Wap Essay Research Paper What is WAPWAP
Wap Essay, Research Paper What is WAP? WAP stands for Wireless Application Protocol. The idea has been developed by some of the wireless telecommunications giants such as Nokia and Ericsson.
Xdsl Essay Research Paper Digital Subscriber LinesFast
Xdsl Essay, Research Paper Digital Subscriber Lines Fast and affordable Internet access has become a big issue for private users and small businesses. Today users have many different options concerning Internet access. One can use a 56k/28k modem, cable modem, wireless, Ethernet, an ISDN connection, a T1 or T3 connection, or a DSL connection.
Wireless Communications Vs Land Line Essay Research
Paper In recent years there have been numerous articles written on the subject of telecommunications. There has been many jobs that have been created, there has been legislation that has passed through congress in order to preserve the rights of the consumer, there have been countless lives saved because of the emergency services provided by the telephone.
Future Of Wireless Networking Essay Research Paper
For each of the past five years, industry pundits have been convinced it would be the year of wireless data in the wide-area environment. And every year it was for a different reason: support for IP protocols; phones with microbrowsers; support from industry giants, such as Microsoft and IBM; and new platforms, such as handheld computers.
Nds Security Essay Research Paper NDS Object
Nds Security Essay, Research Paper NDS Object and Property Rights NDS security is similar in many ways the file system security. The file system security is controlled through access rights given through trustee assignments to directories and through directory and file attributes. NDS security uses an Access Control List (ACL) to give trustee assignments to objects on the NDS tree.
Proposal Essay Research Paper zOverviewImplementation of the
Proposal Essay, Research Paper Overview Implementation of the proposed electronic security system began on Monday, April 10, 2000.This first phase will be completed by the 31st of May 2000 at a cost of approximately 1.8 million Jamaican dollars.
Book Report At Large By David
H. Freeman And Charles C. Mann Essay, Research Paper At Large is a non-fiction novel. The true story of Matt Singer (obviously not his real name), who is mentally retarded in reality, but leads a second life as the hacker, Phantomd and Infomaster . The story takes place from March 1991 to January 1993, and traces the events surrounding Phantomd s escapades as he breaks into one computer system after another.
Privacy In The Information Age Essay Research
Paper Privacy in the Information Age: I N T R O D U C T I O N ———————————————————————— The world is changing rapidly. There used to be a time when we could be confident that no one could learn too much about our personal lives. There used to be a time when information was merely a way of keeping records. That time is gone and with it went a large amount of what we might call our personal privacy.
NT Model Essay Research Paper When Windows
NT Model Essay, Research Paper When Windows NT was developed the designers ensured that security features were built in unlike when for example when MS Dos was developed. By default NT
Do The Print Media Have Power In
The British Political System, Or Essay, Research Paper The influence of the mass media on the electoral process in the western democracies, specially the television in the last years, can get to crush the daily life during the electoral period. Some maintain that the selection are won or are lost based on the performance of a party in the television and print media and, to a lesser extent, in the radio.
Computer Hackers Essay Research Paper The meaning
Computer Hackers Essay, Research Paper The meaning of Hacker is one who accesses a computer which is supposably not able to be accessed to non authorised people of the community. Hackers may use any type of system to access this information
E911 Essay Research Paper The FCC E911
E911 Essay, Research Paper The FCC E911 Regulation is Essential for Consumers and Telecommunications Industry In June of 1996, the FCC proposed a mandate for E-911 services. The wireless E911 order provides value-added service for all cellular phone users and consumers.
Health Care Ethics Essay Research Paper Improving
Health Care Ethics Essay, Research Paper Improving Access to Health Care for the Uninsured For decades, the American system of health care has relied primarily on employer-sponsored insurance programs as a gateway through which individual s access health care services. Gaps have been filled in through public insurance programs such as Medicare, Medicaid, the State Children s Health Insurance Program (SCHIP) and other more locally-based programs to cover elderly, disabled and certain low income populations who cannot access the employer-based market.
Market Power In The Deregulation Of Electicity
Essay, Research Paper Market power, which is at the heart of the debate over ownership and control of the electricity transmission network, has been identified by the FERC (Federal Energy Regulatory Commission) as a potential impediment to the development of an unencumbered competitive market for electricity.
Wireless Application Protocol Essay Research Paper Wireless
Wireless Application Protocol Essay, Research Paper Wireless Application Protocol (WAP) Background Market study has shown that the number of mobile users is exceeding the number of PC users. Some of the industry leaders have created a forum to evolve an industry standard for providing internet access to users over wireless access.
Computer In Buisness Essay Research Paper The
Computer In Buisness Essay, Research Paper The personal computer has changed the way the world does business. Through the possibility of customers being able to access the Internet, They
Cable Essay Research Paper CableRoad RunnerRoad Runner
Cable Essay, Research Paper Cable-Road Runner Road Runner is a software program that works for cable. The first commercial broadband online service was delivered to customers through a broadband fiber coaxial cable network in 1996. After 15 months after these initial launches, Time Warner Inc. and MediaOne announced their intention to create the nations largest broadband online business.
Competition Among The Telecommunications Industry Essay Research
There are currently 807 companies in the TIA (Telecommunications Industry Association) database of companies. Of the 807 companies, 251 of them currently offer wireless services. Also 281 offer broadband services, of those offering broadband 160 of them offer cable, 72 offer DSL (Digital Subscriber Line), and 49 offer T-Carriers.
Computer Fundamentals Essay Research Paper The very
Computer Fundamentals Essay, Research Paper The very first operating system used on the earliest IBM PCs was called simply the Disk Operating System, abbreviated DOS. There are few PC users who have not heard of DOS; at one time it was used on pretty much every PC, and it is still around today in many different forms.
Expert Systems In Health Care Essay Research
Paper A case referring to the beneficial use of the expert systems in the health sector was the attempt of the LDS Hospital in Salt Lake city,Utah to build the most complex artificial intelligence system ever created according to the words of DR David Classen.Its name was AIC or Antibiotic Computer Consultant and it was part of HELP(Health Evaluation through Logical Processing), which was LDS s hospital information system.
Metric System Essay Research Paper Metric SystemThe
Metric System Essay, Research Paper Metric System The Metric System, also known as the System Internationale (SI) was developed in France in 1799. The Metric System was created because the French and English were not in agreement politically, therefore the French did not want anything to do with the English including their system of measurements.
Cdpd In Latin America Essay Research Paper
MOBILE WIRELESS DATA: A key success factor for business development in Latin American Seven years ago cell phones technologies arrived to the Latin American countries and brought wireless voice communications, with that the develop of a new value-added service like CDPD emerge bringing wireless data transfer.
Wireless Communications Essay Research Paper INTRODUCTION
Wireless Communications Essay, Research Paper INTRODUCTION Wireless communications are becoming increasingly popular in today?s fast paced world. Mobility, portability, and instant access (via the Internet) to unlimited information have become the mantra of businesses and individuals alike. The evolution of wireless communications has been incredibly quick and the future of this technology is unlimited.
Design Structure Essay Research Paper Basic ideas
Design Structure Essay, Research Paper Basic ideas and Concepts of Software DesignAn Interface to the End-UserThe Project Management System was designed with the goal that the end-user can handle the system on his own.The interactive user interface is based on the Windows interface.The interface programs use standard software of the market like Visual Basic, Microsoft Access and Crystal Reports.DocumentationThe software should be documented.
Wireless Internet Essay Research Paper Wireless InternetBy
Wireless Internet Essay, Research Paper Wireless Internet By 2004, the wireless subscriber base worldwide is expected to reach 1.4 billion users, and approximately 300 million users will be accessing the Internet from some form of wireless appliance. The race is on, and Nortel Networks have first-mover advantage.
The First Wireless Network Sta Essay Research
Paper The First Wireless Network Protocol: 802.11 Approval of the IEEE 802.11 standard for wireless local area networking (WLAN) and rapid progress made toward higher data rates have put the promise of truly mobile computing within reach. While wired LANs have been a mainstream technology for at least fifteen years, WLANs are uncharted territory for most networking professionals.
WIRELESS LOCAL AREA NETWORK WLAN Essay Research
Paper WIRELESS LOCAL AREA NETWORK (WLAN) 1.Introduction. A wireless LAN (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative for, a wired LAN within a building or campus. Using electromagnetic waves, WLANs transmit and receive data over the air, minimizing the need for wired connections.
Pbs Essay Research Paper PROCESS BASED SECURITY
Pbs Essay, Research Paper PROCESS BASED SECURITY, WHAT IS IT AND HOW IT WILL CHANGE YOUR COMPUTER?S LIFE This note is for the purpose of explaining a new way to implement operating system security called process-based security. First, an explanation of traditional operating system security is given. Next, an explanation of process-based security is given.
Cellular Phone Tracking Essay Research Paper On
Cellular Phone Tracking Essay, Research Paper On April 9th of last year, Ellen Kirk from San Jose, California had a tragic car accident, slamming her into tree. Bleeding profusely, she reached into here purse, grabbed her cell phone, and called 911 and tried to give her location as best as possible. She waited, and waited, and waited.
Network Security And Firewalls Essay Research Paper
Network, in computer science, techniques, physical connections, and computer programs used to link two or more computers. Network users are able to share files, printers, and other resources; send electronic messages; and run programs on other computers.
Cellular Radio Isdn Networks And Satellite Communications
Essay, Research Paper Introduction In describing Cellular Radio, ISDN (Integrated Services Digital Network) and Satellite Communications we must first have a general understanding of the meaning of these forms of Telecommunications. After a brief explanation of the different forms, they will be described in more detail.
Technology Revolution Essay Research Paper The technology
Technology Revolution Essay, Research Paper The technology revolution is upon us. In recent years there have been many triumphs in technology. Now more than ever, people are able to communicate over thousands of miles with the greatest of ease. Wireless communication is much to thank for the ease of communication.