Autoplay
Autocomplete
Previous Lesson
Complete and Continue
TETRA system for Mobile Wireless Communications
TETRA Technology introduction
1.1 Trunked radio system (6:12)
1.2 Trunked radio system operation (4:27)
1.3 TETRA technology (6:28)
1.4 TETRA advantages and disadvantages (7:34)
1.5 TETRA features (7:45)
1.6 TETRA services (3:24)
1.7 TETRA in WMN (5:55)
1.8 Group communications (2:27)
1.9 TETRA bursts (3:31)
TETRA Radio Interface
2.1 TETRA radio aspects part 1 (3:48)
2.2 TETRA radio aspects part_2 (5:25)
2.3 TETRA direct mode (5:07)
2.4 TETRA TDMA frame structure (5:12)
2.5 TETRA network interfaces (6:43)
2.6 TETRA VD air interface (4:07)
2.7 VD AI protocol stalk (7:07)
2.8 DM AI protocol stalk (2:24)
2.9 TETRA PEI ISI (4:27)
2.10 TETRA channels (6:19)
TETRA Network
3.1 TETRA Infrastructure (6:19)
3.2 TETRA network switch (4:07)
3.3 TETRA base station (4:44)
3.4 TETRA control room (3:40)
3.5 TETRA Gateways repeaters (4:54)
3.6 TMO DMO in TETRA (4:54)
3.7 Gateways Repeaters applications (6:17)
3.8 TETRA SDS (4:03)
3.9 IP TETRA network (6:02)
3.10 Control room network mgt (4:24)
TETRA Numbering
4.1 TETRA dialing numbering addressing (3:39)
4.2 TETRA identity (3:29)
4.3 TETRA numbering dailing (4:59)
4.4 TETRA IP MMI (4:00)
4.5 TEDS (3:27)
TETRA Security
5.1 TETRA Authentication (5:59)
5.2 TETRA security threats classes (6:06)
5.3 TETRA Security countermeasures (3:22)
5.4 Air interface encryption protection (4:56)
5.5 OTAR (2:41)
5.6 TETRA Security keys (5:10)
5.7 Disabling of terminals (3:25)
5.8 Standard AI algorithms (2:22)
5.9 E2E encryption (4:00)
5.10 E2E encryption algorithms (3:44)
1.6 TETRA services
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock