Protocol testing platform aids UMTS designers in 3G quest

Tektronix has released a protocol analysis platform that enables telecommunications equipment designers to develop and test...

This Article Covers

Data centre

Tektronix has released a protocol analysis platform that enables telecommunications equipment designers to develop and test Universal Mobile

Telecommunication System (UMTS) network elements - the emerging third generation (3G) mobile communications standard, writes Daniel Thomas.

Tektronix, a provider of test, measurement and monitoring equipment for the computer and telecommunications industries, produced the K1297-G20 protocol analyser to enable users to make use of the combined voice, video and data services supported in the UMTS 3G mobile communication infrastructure.

The protocol tester is a multi-interface, multi-protocol instrument that combines a configurable hardware platform with software that is compliant with Windows. The system implements features ranging from subscriber simulations to endurance tests.

The K1297-G20 is already used for the conformance testing and monitoring of diverse second-generation network equipment and the added UMTS functionality enables mobile network operators to deploy extended features such as global roaming and Internet access.

"Network equipment manufacturers are developing UMTS-based systems now, with the goal of launching products as soon as 2001," said Scott Bausback, vice-president of the communications business unit at Tektronix.

Since its release, the K1297-G20 protocol analyser has already been put to use by the Siemens information and communication mobile division.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Data centre hardware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...