Тёмный
Mpirical
Mpirical
Mpirical
Подписаться
Bringing telecoms training to life since 2002, Mpirical specialise in face-to-face and on-demand video training for telecoms professionals across the globe.

Our RU-vid channel brings a flavour of what students can expect from our quality technology courses, with explainers, tutorials, guides and snippets taken directly from our portfolio of 2G, 3G, 4G and 5G online courses.

If you're looking for learning on the go, our Decoding Telecoms and Telecoms Bytes microlearning series deliver short bursts of information to support your training, even if you're short on time.

With new videos released weekly, we encourage you to follow our channel to be the first to catch a glimpse of our new learning content.

For more details on the services we offer and our telecoms training visit - www.mpirical.com/

Or contact us for further information:

Phone: +44 (0) 1524 844669 Email: enquiries@mpirical.com
ULI - Decoding Telecoms
0:44
День назад
TTP - Decoding Telecoms
0:38
14 дней назад
PRN - Decoding Telecoms
1:02
21 день назад
AMBR - Decoding Telecoms
0:45
28 дней назад
SOC - Decoding Telecoms
0:42
Месяц назад
RSL - Decoding Telecoms
0:51
Месяц назад
PoLP - Decoding Telecoms
0:33
Месяц назад
SGsAP - Decoding Telecoms
0:58
Месяц назад
IAM - Decoding Telecoms
0:42
2 месяца назад
Комментарии
@oluwatobilobaayofe6303
@oluwatobilobaayofe6303 8 дней назад
How do you mean by satellite networks like starlink not being a 3GPP network. I thought satellites is under the umbrella of NTNs?
@Mpirical
@Mpirical 5 дней назад
Thanks for your comment. The term NTN (Non Terrestrial Networks) covers Satellites, Drones, High Altitude Balloons etc. However, there are different satellite systems, some with proprietary solutions. 5G NTN relates to systems that are using the 3GPP 5G standard. Solutions like Starlink, Inmarsat, Iridium, etc. use proprietary solutions. Over time, some of these satellite systems may incorporate 3GPP 5G technology so they can expand their user base and services - however that will be dependant on each system.
@PouryaAlinezhad
@PouryaAlinezhad 23 дня назад
Why screened phone number in roaming is from varsious wrong countries. For example I reside in country B and my Usim is from Country A. When I receive a roaming call from A, the phone dose not show the call initiated number , but a random number from country C. The call is established after I push answer botton but seems some routes are not clean for mirroring phone number.
@Mpirical
@Mpirical 20 дней назад
Interesting question. The fact that the incoming call is on a different number implies the call has been routed via some form of VoIP solution and the breakout phone number may have been in country C, en-route to your device. Alternatively, the CLI (Calling Line Identity) may have been altered incorrectly. However, without knowing the specific scenario, and the technologies utilised for the transmission of the call, it is hard to give a definite answer.
@Tafara_Shumba
@Tafara_Shumba 28 дней назад
Is there likely a life in the future for the traditional MNOs with these eNBs and gNBs now that LEOs are becoming more active? How do you think they should adapt for example with Starlink in play?
@Mpirical
@Mpirical 20 дней назад
LEO based systems won’t have the raw capacity to replace eNB’s and gNB’s, especially in Dense Urban environments. However, they will 100% be used to complement 4G/5G deployments and in some cases the LEO system may be the only method available.
@user-rv3sz7fz5l
@user-rv3sz7fz5l Месяц назад
Thank you so much for your explanation! I want to clear my concept as i am struggling from last 2 days about it... Bandwidth is like the capacity,data rate is the data that is actually transmitted. Frequency band are allocated by providers. And each frequency bands has channels. Like have explain road example. But i am still confusing about frequency, frequency bands, and frequency channel...
@Mpirical
@Mpirical Месяц назад
Thanks for you comment, we hope this helps answer your question: Each operator has several radio frequencies they can operate on, these are typically called “channels” and are given a “channel number” to identify the centre of each. As an example, in 5G, the NR-ARFCN (New Radio Absolute Radio Frequency Channel Number) is used to represent the channel number. Now this channel will be in a “frequency band”. These are areas of the radio spectrum that have been reserved for 2G-5G operation. To help with bands and channels think about a car FM radio, this operates on one band, however there are a number of channels (radio stations) which you can tune to within the band (a range of frequencies). Cellular networks are the same, there are a number of bands, typically known as: 700MHz, 900MHz, 1800MHz, 24GHz etc. In each of these bands there are a number of channels (like car radio stations). These channels may belong to the same or a different operator. The last concept is bandwidth, each channel can also have a bandwidth (typically 5MHz, 10MHz ,15MHz, 20MHz, 40MHz, 100MHz or more…the greater the bandwidth the greater the capacity and potential throughput! In summary, each operator will have access to specific channels (frequencies), which will be in a frequency band. Other operators may also exist in the same band; however, they would be utilizing a different channel (frequency).
@MichaelRada-INDUSTRY50
@MichaelRada-INDUSTRY50 Месяц назад
Dear MPIRICAL thank you for your interest in INDUSTRY 5.0. My name is Michael Rada, I am the Founder of INDUSTRY 5.0 implementing its principles in companies and businesses since 2013, leading network in 118 countries and a global maritime environment. Let me share with you a keynote delivered to industrial leaders, it is helping to narrow the understanding of INDUSTRY 5.0 principles, origin, and future development. If any questions, feel free to ask ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-luQRihdApRw.html
@lakshanrathnakumara9158
@lakshanrathnakumara9158 Месяц назад
🥰🥰🥰🥰
@HBgv5830
@HBgv5830 Месяц назад
Good talk. Very useful. Thanks for sharing.
@josefranceschiquintero9178
@josefranceschiquintero9178 Месяц назад
Really nice video, thank you and keep them coming
@mohsinahmad2894
@mohsinahmad2894 Месяц назад
nice video very informative
@rajeshbhosale2008
@rajeshbhosale2008 2 месяца назад
Enlightening and informative video 👍🏻 Thanks and keep posting.
@vladone_skm
@vladone_skm 2 месяца назад
Yes..very good content..but make please monthly subscription ..it will be better for all❤
@peppigue
@peppigue 2 месяца назад
one is at the back of the room, else ok sound. quite a few terms and concepts are dished out, a little more clarifying goes a long way. otherwise pretty smooth pilot, plenty light banter without losing the thread. i learned some things, but do struggle to imagine a sustained audience for this. including myself, despite finding it interesting. you touch on what could be useful knowledge for potential customers, namely real world concerns and applications. the only viable framing i see for a continuation of this discussion is 0-10 year business cases for currently available products - investment vs value, greenfield vs brownfield, obvious vs niche uses. scenarios and examples littered with specificity, it has to be easily visualized by the listener.
@Mpirical
@Mpirical 2 месяца назад
Thank you for the feedback! We are incredibly grateful to hear from our listeners - especially with useful comments to help make our podcast series more engaging. Thanks for listening - we hope you tune in again!
@udutiy
@udutiy 2 месяца назад
Very nice lecturer. Such an artistic and articulate speech!
@veemurambi9059
@veemurambi9059 2 месяца назад
Thank you
@fatumaahemed134
@fatumaahemed134 2 месяца назад
so wonderful lecture just one question isn't MGW(media gateway) and GMGW a CS core part?
@Mpirical
@Mpirical 2 месяца назад
That is correct - the CS Core is used by GSM and UMTS for call control, in which you will find MGWs deployed.
@aron.mp4
@aron.mp4 3 месяца назад
Awesome! 🎉
@PeRoPhoto
@PeRoPhoto 3 месяца назад
Very good and understandable explanation. Thank you very much👋
@rohitt21
@rohitt21 3 месяца назад
Very well explained Sir ✌
@WijthaGayan
@WijthaGayan 3 месяца назад
THANK YOU
@WijthaGayan
@WijthaGayan 3 месяца назад
I'M THE FRIST COMMENT ON THIS VIDEO
@dustina8796
@dustina8796 3 месяца назад
🍀 Promo`SM
@ulasXaslan
@ulasXaslan 3 месяца назад
Perfect explanation. Thanks!
@RaviSutrave
@RaviSutrave 4 месяца назад
I think in 5G networks, SMF also should have been part of the 5G Security Overview - both in the diagram and the discussion. Here are my thoughts. "The security functions and aspects that the Session Management Function (SMF) handles in a 5G call, focusing on its contributions to overall 5G security, as per 3GPP and GSMA standards: 1. Authentication and Access Control: Functionality: SMF plays a crucial role in authenticating users and devices before granting access to the 5G network. It verifies the user's identity and credentials, ensuring that only authorized entities can establish connections. Contributions to Security: By enforcing authentication and access control policies, SMF helps prevent unauthorized access to the network and protects against identity theft and impersonation attacks. 2. Security Context Establishment: Functionality: SMF establishes a secure communication context between the user equipment (UE) and the network, ensuring the confidentiality, integrity, and authenticity of data exchanged during the session. Contributions to Security: By establishing a security context, SMF facilitates secure communication channels and protects against eavesdropping, data tampering, and man-in-the-middle attacks. 3. User Plane Security: Functionality: SMF implements security mechanisms to protect user data transmitted over the user plane, including encryption, integrity protection, and tunneling protocols. Contributions to Security: By securing the user plane, SMF ensures that sensitive user information remains confidential and unaltered during transmission, safeguarding against data interception and manipulation. 4. Policy Enforcement: Functionality: SMF enforces network policies and security rules defined by the network operator or service provider, governing the behavior of user sessions and network resources. Contributions to Security: By enforcing security policies, SMF helps mitigate security risks and ensures compliance with regulatory requirements, such as data protection laws and industry standards. 5. Traffic Management and Filtering: Functionality: SMF monitors and manages network traffic, applying traffic filtering and shaping policies to optimize resource utilization and prioritize critical applications. Contributions to Security: Through traffic management and filtering, SMF mitigates network congestion, denial-of-service (DoS) attacks, and malicious traffic, enhancing network resilience and availability. 6. Session Monitoring and Logging: Functionality: SMF monitors and logs session-related events, transactions, and security incidents for auditing, analysis, and forensic purposes. Contributions to Security: By maintaining detailed logs and audit trails, SMF enables proactive threat detection, incident response, and post-incident analysis, supporting security operations and compliance efforts. 7. Integration with Security Gateways and Firewalls: Functionality: SMF integrates with security gateways and firewalls to provide perimeter defense, intrusion detection, and network segmentation capabilities. Contributions to Security: By collaborating with security gateways and firewalls, SMF strengthens network perimeter defenses, isolates security breaches, and mitigates the impact of cyber threats. In conclusion, SMF plays a critical role in ensuring the security and integrity of 5G network sessions by performing authentication, access control, security context establishment, policy enforcement, traffic management, session monitoring, and integration with security gateways. Its contributions to overall 5G security align with the requirements and guidelines established by 3GPP and GSMA standards, helping to protect against a wide range of security threats and vulnerabilities in 5G networks.
@okhamradio
@okhamradio 4 месяца назад
Why so small amount of comments, guys?
@benjaminlee3669
@benjaminlee3669 4 месяца назад
Cities that are already crowded require this. This will significantly increase connectivity. Results from Mediatek's ATSSS will be positive.
@crashingflamingo3028
@crashingflamingo3028 4 месяца назад
Thank you for all the very informative videos, really helpful for learning about 5G concepts :)
@johansankan
@johansankan 4 месяца назад
Excellent RU-vid video about 5G core components
@cllee83
@cllee83 4 месяца назад
Where you do find the Numerology 60kHz(u=2) which support Extended CP ? Is this in spec?
@Mpirical
@Mpirical 4 месяца назад
The high level information is in 3GPP TS 38.300 specification, See "Table 5.1-1: Supported transmission numerologies". The various physical layer specification mention Normal and Extended CP.
@keziahinchristalone8519
@keziahinchristalone8519 5 месяцев назад
Thank you sir. I got the concept clear. But I have a doubt that Wifi operates in 2.4, 2.5, and 2.5 GHz bands. But why 5GHz band is showing in the example.
@Mpirical
@Mpirical 5 месяцев назад
Hi, thank you for your comment. The supported bands mentioned were “2.4, 5 and 6 Gigahertz”, the 5GHz band is just one example chosen to demonstrate the concept of channels and bandwidths.
@gingarrison104
@gingarrison104 5 месяцев назад
HaHa, ideas in 1:59 has become true
@user-kz8bj2qv5l
@user-kz8bj2qv5l 5 месяцев назад
Great explanation
@czpanama
@czpanama 6 месяцев назад
Love how the music cuts you off in the end.
@sedighehkhorramdastjerdi7186
@sedighehkhorramdastjerdi7186 6 месяцев назад
what is th MZ ?
@Mpirical
@Mpirical 6 месяцев назад
The IMSI is the International Mobile Subscriber Identity which is a unique subscriber identity that anyone using the mobile network will need.
@Masudur_Rahman803
@Masudur_Rahman803 6 месяцев назад
Thanks. Now concept is clear.
@user-rv9tw8ym5m
@user-rv9tw8ym5m 7 месяцев назад
Super
@nicolescumircea4758
@nicolescumircea4758 7 месяцев назад
This is just what I needed. Thank you!
@RaviSutrave
@RaviSutrave 7 месяцев назад
Wow! an excellent product, not only it has the architecture maps, the call flows and network procedures are also way too good! Kudos to the team! Wish there was also a smaller or shorter version for free
@Mpirical
@Mpirical 7 месяцев назад
Thanks for the great feedback! We are constantly developing and enhancing our products, so watch this space!
@ola-fq4hv
@ola-fq4hv 7 месяцев назад
Very well explained the frequency used thanks so much)
@shanmugavallik784
@shanmugavallik784 8 месяцев назад
Nice presentation
@tony997
@tony997 8 месяцев назад
Thanks brit
@mukiamos8371
@mukiamos8371 8 месяцев назад
Wow!!! The content is great!!! Keep up the good work. I have a question: What makes GPRS to have a higher bit rate than GSM even thought GPRS is just an extension of GSM.?
@Mpirical
@Mpirical 8 месяцев назад
Great question. GPRS enabled the aggregation / bonding of multiple “GSM timeslots” to increase the total data rate. So effectively, a GPRS user could use the equivalent of up to 8 voice calls (8 GSM timeslots)! In addition, GPRS can use a mechanism called “Adaptive Coding or Coding Schemes” - this adapts the data rate when the radio connection signal (bars on your phone) is stronger. Stronger signal = higher potential rate. It is also worth noting that GPRS has now been enhanced to include EDGE (Enhanced Date for Global Evolution). This included a new radio modulation scheme, which is three times faster than GPRS, that enables more data to be carried. Again, this benefit is more related to when the radio connection signal is stronger.
@mukiamos8371
@mukiamos8371 8 месяцев назад
Thank you sir.🙏 Well explained.
@crazycsa
@crazycsa 8 месяцев назад
Easiest and best explanation of DSS 😃
@juanpablobustamanteluna9999
@juanpablobustamanteluna9999 8 месяцев назад
The best video which explain with more clarity about 5G components and concepts. Thank you.
@James_Knott
@James_Knott 9 месяцев назад
It would have been nice to see a bit more on the technical side. For example, with WiFi calling, the call is encrypted in IPSec as mentioned, but also encapsulated in UDP. This enables the traffic to pass through NAT, etc. My understanding is VoLTE calls are also encrypted, at least over the radio link, but I don't recall mention of that. One other thing that was hinted at, but not mentioned is this travels over IPv6, at least in the IPSec tunnel. I believe IPv6 is mandatory for 4G & 5G. My own phone is IPv6 only and uses 464XLAT to access IPv4 only sites.
@pzkoldone423
@pzkoldone423 9 месяцев назад
Nice video. Concise.
@anuragdh
@anuragdh 9 месяцев назад
Once a user shifts to 2G/3G for making/attending a CSFB call, does it remain attached to the 2G/3G network or it re-attaches to the LTE network after the call is over? If it remains attached to 2G/3G, when does it shift back to LTE network?
@Mpirical
@Mpirical 9 месяцев назад
After completing the voice call on the 2G/3G network the device will typically return to the 2G/3G Idle state. At this point, the cell reselection procedure is typically “weighted” to ensure the devices re-selects the 4G LTE network, i.e. 4G cells have a higher priority. Once reselection to 4G is performed the device performs a 4G Tracking Area Update procedure. This process is usually very fast.