Skip to main content

4G的volte

 
因为4G LTE是个残缺的标准,4G LTE只定义了data,没定义voice,

所以各大公司自己搞了voice over lte标准,以借机树立贸易壁垒,搞准入制度

但是3G有voice,所以你的4G手机果不支持volte的话,以前都是用3G的voice

现在3g要关了,这样你的手机要么支持5G,要么支持4G LTE的VOLTE

否则就不能说话了


4G的volte其实有通用国际标准
但是美国各大电信公司都需要证书才能让你接入volte
否则不让你用,这就是白名单的来由
以前你从中国买的乐phone没有volte证书不让在美国用,
但是准对美国市场卖的一模一样的乐phone有volte证书
在美国用没问题
这样美帝把大量海外手机给彻底block了
这就建立了贸易壁垒
逼着你买美帝的iPhone

目前美国只有tmobile放弃了volte证书,
任何支持4G lte的手机都支持tmobile的volte
因为tmobile本质上是个外国公司

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...