UEL

UEL

الخدمات والاستشارات في مجال تكنولوجيا المعلومات

ʙᴜɪʟᴅɪɴɢ ᴛʜᴇ ғᴜᴛᴜʀᴇ ᴡɪᴛʜ ᴛᴇᴄʜ!!!

نبذة عنا

Established in 2021 as a general contractor & consultant (Umaima Enterprises) has a consistent record of accomplishment as a key contributor to the development and evolution of the Telecom sector in the Kingdom of Saudi Arabia. We bring local knowledge and global capabilities to our customers, offering innovative solutions, insight into cutting-edge developments and delivering solutions that increase business efficiencies. Our service offering includes consulting, design, deployment, performance and operations and maintenance services.

الموقع الإلكتروني
www.umaimaenterprises.com
المجال المهني
الخدمات والاستشارات في مجال تكنولوجيا المعلومات
حجم الشركة
١١- ٥٠ موظف
المقر الرئيسي
Riyadh
النوع
ملكية ذاتية
تم التأسيس
2021

المواقع الجغرافية

موظفين في UEL

التحديثات

  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    #LetsTalkCyber - Strengthening Cybersecurity Awareness 🚨 Email and Phishing Protection – Why You Should Avoid Storing Personal Information in Web Browsers While storing personal information like passwords and payment details in web browsers might be convenient, it’s crucial to understand the potential risks. Let’s discuss the dangers and explore safer alternatives to protect your sensitive data: ⚠️ Risks of Storing Data in Browsers: • Browser Vulnerabilities: Attackers exploit browser flaws to gain access to stored information. • Malware & Keyloggers: Malicious software can harvest your data directly from browsers. • Physical Access Risks: Unauthorized users with access to your device can retrieve stored information. • Weak Encryption: Browser-based encryption is often not as robust as dedicated password management tools. 🔒 Safer Alternatives: • Use a Password Manager: A secure solution that encrypts your data and generates strong passwords. • Manual Entry: Entering personal information manually minimizes exposure. • Enable Multi-Factor Authentication (MFA): Adds an extra layer of protection to your accounts. ✅ Best Practices for Browser Security: • Disable Autofill for Sensitive Data: Turn off autofill to prevent automatic entry on websites. • Regularly Clear Browsing Data: Deleting cookies, cache, and saved data enhances security. • Keep Browsers Updated: Ensure you install updates to patch known vulnerabilities. • Limit Browser Extensions: Only use trusted extensions, as they can access stored information. Prioritizing security over convenience is essential in today’s digital landscape. Let’s be vigilant and proactive in safeguarding our personal data from cyber threats. Keep learning and stay safe! 🔐 #Cybersecurity #PhishingProtection #DataProtection #CyberAwareness #CybersecurityMonth #PrivacyMatters #CyberResilience

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    Alarm in Transmission Network LOS (Loss of Signal):G.783 Detection Criteria: No signal detected for a predefined period. Meaning: Loss of incoming signal Possible Reasons: Fiber cut, transmitter failure, loose or broken connections. Troubleshooting: Check fiber connections. Verify the transmitter and receiver functionality. Inspect for any physical damage to cables. LOF(Loss of Frame) Located in Byte: A1, A2 (frame alignment bytes) Detection Criteria: Failure to detect the frame alignment pattern within a certain time. Meaning: Device has lost the ability to synchronize to the incoming frame. ITU-T Standard: G.783 Possible Reasons: Signal degradation, frame alignment issue. Troubleshooting: Inspect and test the quality of the signal. Ensure proper frame alignment. OOF (Out of Frame) Located in Byte: A1, A2 (Frame Alignment Bytes) Detection Criteria: A1, A2 bytes errored or not correctly identified for a duration of 625 µs or more Meaning: The device is unable to maintain synchronization with the incoming frame, indicating a loss of frame alignment. ITU-T Standard: G.783 Possible Reasons: Signal degradation, timing issues, or transmission faults. B1 Error (Bit Error): G.783 Located in Byte: B1 byte (Path Overhead) Detection Criteria: Errors in the B1 byte. Meaning: Bit errors detected in the regenerator section. Possible Reasons: Transmission faults, noise in the signal path. Troubleshooting: Check for physical layer issues. Verify transmitter and receiver functionality. RS-TIM (Regenerator Section Trace Identifier Mismatch) : G.783 Located in Byte: J0 (Regenerator Section Trace Identifier byte) Detection Criteria: Mismatch between the expected and received trace identifier. Meaning: Indicates incorrect trace identification. Possible Reasons: Configuration mismatch between sections. Troubleshooting: Verify the trace identifiers on both sides of the link. Correct any configuration discrepancies. AIS (Alarm Indication Signal): G.783 Located in Byte: K2 byte (Path Overhead) Detection Criteria: Continuous stream of '1s' indicating an upstream fault. Meaning: Downstream node is receiving an alarm from the upstream. Possible Reasons: Upstream fault or LOS. Troubleshooting: Check the status of the upstream device. Resolve any LOS or LOF alarms upstream. MS-AIS (Multiplex Section AIS): G.707 Detection Criteria: Continuous stream of '1s' in the multiplex section. Meaning: Alarm indication from an upstream node. Possible Reasons: Fault in upstream multiplex section. Troubleshooting: Diagnose and repair faults in the upstream multiplex section. Alarm: Remote Defect Indication (RDI): G.707 Location: Frame header Detection Criteria: Indication from a remote terminal that a fault has occurred Meaning: A fault has been detected at a remote location, often indicating a problem in the transmission path Reason: Cable cuts, equipment failures, or signal degradation Troubleshooting: Isolate the faulty section using RDI information and perform physical checks.

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    Evolved Packet Core (EPC) is the core network architecture of LTE (Long-Term Evolution) networks. It's designed to provide essential services such as data services, mobility management, and session management for mobile phones and data terminals. The EPC is a critical component in the transition from 4G to 5G networks, facilitating high-speed, low-latency data services. * Basic EPC Architecture Components: * The EPC is an IP-based core network infrastructure that provides packet data services to support the convergence of licensed (2G/3G/4G) and unlicensed (Wi-Fi) radio technologies. * It consists of several essential components: 1. MME (Mobility Management Entity): This is responsible for the management of mobility and security for low-level signaling between mobile devices and the network. 2. SGW (Serving Gateway): It routes and forwards user data packets, while also acting as the mobility anchor for the data bearers when users move between eNodeBs. 3. PGW (PDN Gateway): This provides connectivity from the user equipment (UE) to external packet data networks by being the point of exit and entry of traffic for the UE. 4. HSS (Home Subscriber Server): It's a central database that contains user-related and subscription-related information. 5. PCRF (Policy and Charging Rules Function): This component ensures that appropriate policy rules are applied to the users and provides charging information for billing.

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    𝐖𝐃𝐌 𝐍𝐞𝐭𝐰𝐨𝐫𝐤 : 𝐂𝐨𝐦𝐦𝐨𝐧 𝐎𝐀 (𝐎𝐩𝐭𝐢𝐜𝐚𝐥 𝐀𝐦𝐩𝐥𝐢𝐟𝐢𝐞𝐫) 𝐓𝐲𝐩𝐞𝐬 According to the working principle and #structure, commonly used amplifiers in WDM systems can be classified into 𝐄𝐃𝐅𝐀 and 𝐑𝐚𝐦𝐚𝐧 amplifiers. E𝐫b𝐢u𝐦-𝐝o𝐩e𝐝 𝐨p𝐭i𝐜a𝐥 𝐟i𝐛e𝐫 𝐚m𝐩l𝐢f𝐢e𝐫 (EDFA): An optical #device that is doped with Erbium in an optical fiber and uses the energy level transition of Erbium ions excited by a pump source to amplify passing optical #signals. The EDFA amplifier was born in the 1990s and is a revolutionary breakthrough in the field of optical fiber #communications. According to the power, EDFA amplifiers can be classified into 𝗰𝗼𝗺𝗺𝗼𝗻 𝗽𝗼𝘄𝗲𝗿 𝗮𝗺𝗽𝗹𝗶𝗳𝗶𝗲𝗿𝘀 and 𝗵𝗶𝗴𝗵 𝗽𝗼𝘄𝗲𝗿 𝗮𝗺𝗽𝗹𝗶𝗳𝗶𝗲𝗿𝘀. Generally, an amplifier with a total power of more than 23 dBm (200 mW) is referred to as a high-power amplifier. High-power amplifiers cause serious nonlinearities, especially in G655 and G653 fibers. 𝗥𝗮𝗺𝗮𝗻 𝗮𝗺𝗽𝗹𝗶𝗳𝗶𝗲𝗿 : It was discovered by Indian physicist Raman in 1928. It works by using the Stimulated Raman Scattering (SRS), a third-order nonlinear effect when strong lasers are transmitted in optical fibers. That is, if a weak signal light and a strong pump light are transmitted in an optical fiber at the same time, the energy of the strong pump light is coupled to the oscillation mode of the optical fiber silicon material through stimulated Raman scattering, and then emitted at a relatively long wavelength, which is the wavelength of the signal light. In this way, weak signal light is amplified to obtain a Raman gain. According to the position of the Raman amplifier on the optical fiber, the Raman amplifier can be classified into 𝗳𝗼𝗿𝘄𝗮𝗿𝗱 𝗥𝗮𝗺𝗮𝗻 𝗮𝗺𝗽𝗹𝗶𝗳𝗶𝗲𝗿 and 𝗯𝗮𝗰𝗸𝘄𝗮𝗿𝗱 𝗥𝗮𝗺𝗮𝗻 𝗮𝗺𝗽𝗹𝗶𝗳𝗶𝗲𝗿. The forward Raman is placed at the transmit end of the optical line, usually behind the high-power EDFA amplifier. The backward Raman is placed at the receive end and must be connected to the EDFA amplifier. #amplifier #raman #EDFA #edfa #wdm #gain #amplication #optical #fiber #structure #roadm #foadm #dwdm #fiberoptic #opticalfiber

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    🛑 **What Happens When You Switch ON Your 5G Mobile Phone?** 📱 When you power on your mobile phone, a series of intriguing processes occur to connect you to the network. Here's a quick overview of what happens on the radio end: 1️⃣ **Initial Access:** Your phone conducts a cell search and acquisition to synchronize with the target cell. The Primary Sync Signal (PSS) and Secondary Sync Signal (SSS) aid in establishing this synchronization with the Downlink (DL). 2️⃣ **Master Information Block (MIB):** The MIB from NR (New Radio) provides your phone with essential information to access the network. It's like receiving the basic instructions needed to move forward! 3️⃣ **System Information Block (SIB):** This block in the DL contains vital configurations such as cell selection, re-selection, random access parameters, PLMN identity, and access class barring list. Once all criteria are satisfied, your phone selects a cell to connect to. 4️⃣ **Random Access Procedure:** The initial access from your phone to NR begins here. The network decodes the preamble, and UL (Uplink) synchronization is completed. 5️⃣ **Radio Resource Control (RRC) & NAS Signaling:** An RRC connection is established, followed by an initial NAS message, creating a signaling connection between your phone and the Access and Mobility Management Function (AMF) in the network. 📎 For a deeper understanding of 5G concepts, explore the full course here: https://lnkd.in/eSYuK9V7 #5G #Telecom #Wireless #Technology #Innovation #itelcotech

  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    ✳VoWiFi Vs VoNR Vs VoLTE✳ ✔ Voice over WiFi (VoWiFi) is an IP technology that requires your mobile phone to connect to a local WiFi network to establish a connection with a mobile network entity, ePDG (Evolved Packet Data Gateway). ePDG works with the mobile core network and IMS to ensure secure communication. ✔ VoNR stands for Voice over New Radio (NR), and it is a packet-switched IP technology that requires your mobile phone to be connected to a 5G radio base station – gNodeB. VoNR requires a 5G mobile core network that can work with another network entity IP Multimedia Subsystem (IMS). ✔ VoLTE stands for Voice over LTE, and it is a packet-switched IP technology that requires your mobile phone to be connected to a 4G radio base station – eNodeB. VoLTE requires the 4G LTE mobile core network (Evolved Packet Core – EPC) to work with another network entity IP Multimedia Subsystem (IMS). #VoNR #VoWifi #VoLTE #3GPP

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    Exploring LTE (4G) Network Architecture Understanding the Long-Term Evolution (LTE) network architecture is essential for professionals navigating the realms of modern connectivity. Within LTE (4G) networks, key nodes play pivotal roles in facilitating seamless connectivity and efficient data transfer for User Equipment (UE). Let's delve into the core components: 🔹 eNodeB (Evolved Node B): Serves as the interface for UE, enabling the radio connection. It consists of the Radio Equipment (RE) and the Radio Frequency (RF) unit. The eNodeB is responsible for functions such as radio resource management, radio bearer control, and handovers. 🔹 MME (Mobility Management Entity): Handles UE authentication, location tracking, and selection of appropriate serving gateways (SGW) and PDN gateways (PGW). The MME also manages mobility aspects such as tracking area updates and handovers. 🔹 SGW (Serving Gateway): Acts as the anchor for user data during UE transitions between eNodeBs, facilitating data forwarding between eNodeBs and PGW. It is responsible for packet routing and mobility anchoring. 🔹 PGW (PDN Gateway): Establishes the link between the LTE network and the Public Data Network. The PGW is responsible for IP address allocation, policy enforcement, and charging functions. 🔹 HSS (Home Subscriber Server): Stores user subscription information for network access and Quality of Service (QoS) management. It also handles authentication and mobility management for subscribers. Understanding the Control Plane vs. User Plane differentiation is critical: 🔹 Control Plane: Handles signaling messages between nodes to manage UE data sessions. Signaling messages include location updates, session establishment, and handover procedures. 🔹 User Plane: Transfers user data between UE and PDN seamlessly. The user plane is responsible for actual data transfer, ensuring low latency and high throughput. Within LTE networks, each node communicates through specific interfaces, each representing distinct communication protocols to ensure smooth data flow and operational efficiency. Please share any insights or experiences related to LTE network architecture to contribute to our collective understanding! #LTE #NetworkArchitecture #TechInsights

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    #SFP #TX_RX Understanding TX/RX Power Range 1️⃣ What is TX/RX Power? TX/RX power, in the context of networking and optical transceivers like SFP modules, refers to transmit (TX) and receive (RX) power levels. 1. TX Power: This represents the strength of the signal emitted by a networking device or optical transceiver, within the transmitter power range. It influences the distance the signal can travel and the quality of communication. 2. RX Power: RX power denotes the strength of the incoming signal received by a device. The device must detect and interpret incoming signals accurately. TX and RX power are essential metrics for maintaining reliable network communication, ensuring optimal performance, and preventing signal degradation. 2️⃣ Factors Affecting TX/RX Power Range: Several factors influence the TX/RX power range, which is crucial for maintaining efficient communication in networking devices and optical transceivers: 1. RX Sensitivity (Receiver Sensitivity): The ability of the receiver to detect and interpret incoming signals influences the RX power range. 2. Optical Power Budget: The difference between TX and RX power levels determines the optical power budget, which is crucial for longer transmission distances. 3. Transmission Distance: Longer distances may require higher TX power and increased RX sensitivity to ensure signal integrity. 4. Fiber Losses and Attenuation: Optical signal losses due to fiber characteristics or environmental factors can impact both TX and RX power ranges. 3️⃣ TX/RX Optical Power Budget Calculation: For calculating optical power, simply use a straightforward formula, where dBm represents decibel milliwatts. Decibel milliwatts are, as the name suggests, measured relative to milliwatts. It is a commonly used measurement for determining the signal strength of SFP modules or other devices. Some vendors may adopt milliwatt (mW) and microwatt (µW) to describe signal power. We should convert them to dBm before calculation. ✅️ For example the TX power for 10GBASE-SR SFP ranges from -7.3 dBm to 1 dBm. The receiver power should be below -11.1 dBm. If the RX sensitivity is -12 dBm or lower, there may be an issue with the cable system. This could result from a bad splice, dirty connector, or other issues causing excessive signal loss. #SFP #Tx_Rx

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    The key differences between DWDM (Dense Wavelength Division Multiplexing) and DF (Dark Fiber) connectivity are: 🎯 1. Underlying Technology📌:   - DWDM is a fiber optic transmission technology that allows multiple wavelengths (channels) to be transmitted simultaneously over a single fiber optic cable, increasing the overall bandwidth capacity.   - DF (Dark Fiber) refers to unutilized fiber optic cable infrastructure that is available for private or leased use, without the need for the service provider to actively manage the transmission equipment. 2. Bandwidth Capacity📍:   - DWDM can provide significantly higher bandwidth capacity by utilizing multiple wavelengths on a single fiber, typically ranging from 10 Gbps to 100 Gbps or more per wavelength.   - DF connectivity provides a dedicated fiber optic link between two locations, but the bandwidth capacity is dependent on the specific equipment and technology used by the end-user. 3. Network Ownership and Control📍:   - DWDM is typically provided and managed by a service provider, who owns and maintains the transmission equipment and infrastructure.   - DF allows the end-user to have full control and ownership of the fiber optic link, as they are responsible for providing and managing the transmission equipment. 4. Flexibility and Scalability📍:   - DWDM offers greater flexibility in terms of bandwidth scalability, as additional wavelengths can be added to the existing fiber infrastructure to increase capacity.   - DF provides a dedicated fiber optic link, which can be more challenging to scale in terms of bandwidth, as it may require the installation of additional fiber optic cables. 💡 In summary, DWDM is a fiber optic transmission technology that enables high-capacity, wavelength-based data transmission, while DF refers to the leasing or private use of dedicated fiber optic infrastructure without the service provider actively managing the transmission equipment.

    • لا يوجد نص بديل لوصف هذه الصورة
  • عرض صفحة منظمة UEL، رسم بياني

    ٣٨ متابع

    Key STEPS of WDM Network Design Process WDM Networking designing flow: 1. INPUT ( Requirement Analysis): Collecting information: Collecting the information Traffic ( Services Matrix, rate, quantity, type ), How the sites will be placed, fiber specifications ( Type, link distance, attenuation, and dispersion),  2. Product Selection: Select the suitable product and Site selection as ROADM/FOADM/OTM/OLA/REG 3. OMS Capacity: Select the required MUX/DeMUX capacity 4. Designing the optical power budget: Plan the optical power budget of each span based on the information about fiber, span distance, and the requirement of fiber redundancy and system margin.  5. Designing the dispersion: Ascertains the DCM specification of each span based on the fiber type, span distance, and dispersion compensation principle. For coherent transmission, the dispersion tolerance is very high and we can bypass this dispersion compensation management step.  6. Designing the span specification: Select the Amplifiers to compensate for the link losses and achieve the desired optical power levels 7. Designing the OSNR budget: Ascertains the OSNR at the receiving side based on the specification of the optical amplifier and the optical power budget. If the OSNR is higher than the set system OSNR, the network planning is completed. If the OSNR is lower than the set system OSNR, it is needed to set electrical REG stations based on the station information and follow procedures 2 to 6 to make the planning once again. 8. Designing service interfaces: Identify the number, type, and protocol of interfaces based on service requirements.     9. Output Network Diagram and Rack layout, etc.   Note: Consider required protection as ASON or ODUk_SNCP, ESC or OSC, FD, OD, Version of equipment, and NCE, Consider non-linear impact during OSNR designing.

    • لا يوجد نص بديل لوصف هذه الصورة

صفحات مشابهة