5.2 Telemetry System Concept
|
|
|
- Elvin Stewart
- 9 years ago
- Views:
Transcription
1 126 Chapter 5 Traditionally, telemetry transmitted from spacecraft was formatted with a time-division multiplexing (TDM) scheme, where data items were multiplexed into a continuous stream of fixed-length frames based on a predefined multiplexing rule. To design and implement a data system for spacecraft, each mission was forced to develop a unique system because of the lack of established standards in this field. In the early 1980s, the CCSDS developed an international standard for a packet telemetry protocol capable of sending processed telemetry efficiently using a variable-length data unit called the source packet. Source packets generated by various instruments and subsystems on a spacecraft are transmitted from space to the ground in a stream of continuous, fixed-length transfer frames. This standard has been used by many space missions, enabling them to share onboard and ground data-processing equipment. Shortly after packet telemetry, another international standard on telecommand (TC) was developed by the CCSDS based on a similar concept for sending commands to a spacecraft with a data unit known as the TC packet. TC packets destined for various instruments and subsystems on a spacecraft are transmitted from the ground to space in a stream of sporadic, variable-length transfer frames. In the late 1980s, the CCSDS extended the earlier standards to meet the requirements of the advanced orbiting systems (AOSs), such as the International Space Station, and came up with a third international standard. The AOS standard added to the packet telemetry standard services for transmitting various types of online data (such as audio and video data). It can be used for both space-to-ground and ground-to-space links. This standard uses the same packet structure as the packet telemetry standard, but the frame format is slightly different. These three standards (packet telemetry, telecommand, and AOS) were later reorganized by the CCSDS in order to define the protocols in a more-structured and unified way; the following standards replaced the original standards: Space Packet Protocol; 2 TM, TC, and AOS Space Data Link Protocols; 3 5 and TM and TC Synchronization and Channel Coding. 6,7 As an international standard for the radio frequency (RF) signal between a spacecraft and a ground station, the CCSDS developed a standard called Radio Frequency and Modulation Systems. 8 This standard specifies the characteristics of the RF signal used to carry packets and frames. In the 1990s, CCSDS developed another set of protocols collectively known as Space Communications Protocol Specifications (SCPS), which includes the SCPS Network Protocol (SCPS-NP), 9 SCPS Security Protocol (SCPS-SP), 10 SCPS Transport Protocol (SCPS-TP), 11 and SCPS File Protocol (SCPS-FP). 12 The SCPS protocols are generally based on Internet protocols, but modifications
2 Satellite Data Formatting and Packetization 127 and extensions are incorporated in the design of the SCPS protocols to meet the specific needs of space missions. In response to the needs of space missions to transfer files to and from an onboard mass memory, the CCSDS has developed a protocol called the CCSDS File Delivery Protocol (CFDP). 13 This protocol provides the capability to transfer files reliably and efficiently over an unreliable protocol (for example, the Space Packet Protocol). In the area of data compression, the CCSDS has developed a Lossless Data Compression standard, 14 an Image Data Compression standard, 15 and a Lossless Multispectral & Hyperspectral Image Compression 16 standard to either increase the science return or reduce the requirement for onboard memory, station contact time, and data archival volume. The lossless compression standards guarantee full reconstruction of the original data without incurring any distortion in the process, whereas the Image Data Compression standard may be unable to reproduce the original dataset without some distortion due to quantization or other approximations used in the compression process. The CCSDS has recently developed a protocol called Proximity-1 Space Link Protocol to be used over proximity space links. Proximity space links are defined as short-range, bidirectional, fixed or mobile radio links that are generally used to communicate among fixed probes, landers, rovers, orbiting constellations, and orbiting relays. This protocol defines a data link protocol, 19 coding and synchronization methods, 18 and RF and modulation characteristics. 19 Security is of great concern to many space missions. The CCSDS has published a report 20 to provide guidance for missions that wish to use the CCSDS space communications protocols for spacecraft control and data handling but also require a level of security or data protection. 5.2 Telemetry System Concept In the CCSDS space data link protocols, the system design technique layering is a useful tool for transforming the telemetry-system concept into sets of operational and formatting procedures. The layering approach is patterned after the ISO s Open Systems Interconnection layered network model, which is a seven-layer architecture that groups functions logically and provides conventions for connecting functions at each layer. Layering allows a complex procedure, such as delivering the telemetry of spacecraft data to users, to be decomposed into sets of peer functions residing in common architectural strata. Within each layer, the functions exchange data according to the established protocols. Each layer draws upon a well-defined set of services provided by the layer below and provides a similarly well-defined set of services to the layer above. As long as these service interfaces are preserved,
3 128 Chapter 5 the internal operations within a layer are unconstrained and transparent to other layers. Therefore, an entire layer within a system may be removed and replaced by a user or technological requirements without destroying the integrity of the rest of the system. Furthermore, as long as the appropriate interface protocol is satisfied, the user can interact with the system/service at any of the component layers. Layering is therefore a powerful tool for designing structured systems that change due to the evolution of requirements or technology. A companion standardization technique that is conceptually simple yet very robust is the encapsulation of data within an envelope. The header contains the identifying information needed of the layer to provide service while maintaining the integrity of the envelope contents Packetization layer Within packet telemetry, spacecraft-generated application data is formatted into end-to-end transportable data units called telemetry source packets. This data is encapsulated with a primary header that contains identification, sequence control and packet length information, and an optional trailing-error control field. A telemetry source packet is the basic data unit acquired by the spacecraft that generally contains a meaningful quantity of related measurements from a particular source Transfer frame layer The telemetry transfer frame is used to reliably transport source packets through the telemetry channel to the receiving telecommunications network. As the heart of the CCSDS telemetry system, the telemetry transfer frame protocols offer a range of delivery service options. An example of such a service option is the multiplexing of telemetry transfer frames into virtual channels (VCs). The telementry transfer frame is a fixed-length unit that was chosen to improve the ability to synchronize the frame with weak signals such as those found in space ground links, and for compatibility with certain blockoriented channel coding schemes. The primary header contains frame identification, channel frame-count information, and frame datafield status information. The telementry transfer frame begins with an attached frame synchronization marker and is followed by a primary header. The transfer-frame datafield may be followed by an optional trailer containing an operational control field and/or a frame error-control field. The first of these fields provides a standard mechanism for incorporating a small number of real-time functions, such as TC verification or spacecraft clock calibration. The error control field provides the capability for detecting errors
4 Satellite Data Formatting and Packetization 129 that may have been introduced into the frame during the data handling process. The delivery of transfer frames requires the services provided by the lower layers (e.g., carrier, modulation/detection, and coding/decoding) to accomplish its role Channel coding layer Because error-free delivery is a basic system requirement of the telementry transfer frames, telemetry channel coding is used to protect the transfer frames against telemetry-channel noise-induced errors. The CCSDS standard for telemetry channel coding is described in CCSDS B-2. 6 This standard includes specification of a convolutional code, a Reed Solomon blockoriented code, a concatenated coding system consisting of a convolutional inner code and a Reed Solomon outer code, and of turbo codes. The basic data units of the CCSDS telemetry channel coding that interface with the layer below are the channel symbols output by the convolutional encoder; these are the information bits representing one or more transfer frames as parity-protected channel symbols. The RF channel physically modulates the channel symbols into RF signal patterns interpretable as bit representations. Within the error-detecting and correcting capability of the channel code chosen, errors that occur as a result of the physical transmission process may be detected and corrected by the receiving entity. The full potential of all CCSDS Telemetry System services could be realized if a mission complied with all CCSDS standards. Alternatively, missions can interface with any layer of the telemetry system as long as they meet the interface requirements specified in the standards Space Packet Concept Space packetization represents an evolutionary step from the traditional TDM method of transmitting scientific applications and engineering data from spacecraft sources to users located in space or on Earth. The space packet process conceptually involves: 1. Encapsulating observational data (to which ancillary data may be added to subsequently interpret the observational data) at the source, thus forming an autonomous packet of information in real time on the spacecraft. 2. Providing a standardized mechanism whereby autonomous packets from multiple data sources on the spacecraft can be inserted into a common frame structure for transfer to another space vehicle or to Earth through
5 130 Chapter 5 noisy data channels, and delivered to facilities where the packets may be extracted for delivery to the user. The space packet process has the conceptual attributes of: 1. Facilitating the acquisition and transmission of instrument data at a rate appropriate for the phenomenon being observed. 2. Defining a logical interface and protocol between an instrument and its associated ground support equipment that remains constant throughout the lifecycle of the instrument (bench test, integration, flight, and possible reuse). 3. Simplifying the overall system design by allowing microprocessor-based symmetric design of the instrument control and data paths ( TC packets in, telemetry packets out ) compatible with commercially available components and interconnection protocol standards. 4. Eliminating the need for mission-dependent hardware and/or software at intermediate points within the distribution networks through which space data flows; in particular, enabling the multimission components of these networks to be designed and operated in highly automated fashion, with consequent cost and performance advantages. 5. Facilitating interoperability of spacecraft whose telemetry interfaces conform to CCSDS guidelines, i.e., allowing very simple cross-strapping of spacecraft and network capabilities between space agencies. 6. Enabling the delivery of high-quality data products to the user community in a mode that is faster and less expensive than would be possible with conventional telemetry. 5.4 Space Packet Structures A space packet is a variable-length, delimited, octet-aligned data unit that encapsulates a block of observational data that may include ancillary data and may be directly interpreted by the receiving-end-application process. A space packet consists of octets (bytes). Detailed discussion of the format specification for the telemetry source packet is specified in CCSDS B-1. 2 As shown in Fig. 5.1, a space packet encompasses the two major fields positioned contiguously in the following sequence: 1. Packet primary header (fixed at 6 octets, mandatory), and 2. Packet datafield (variable from 1 to octets, mandatory). This field contains a mandatory user datafield and an optional packet secondary header. The maximum packet length allowed by a particular spacecraft or ground implementation can be less than the maximum value (65536 octets).
6 Satellite Data Formatting and Packetization 131 Figure 5.1 Space packet structural components (image courtesy of CCSDS) Packet primary header The packet primary header is mandatory in the CCSDS standard and consists of four fields positioned contiguously in the following sequence: 1. Packet version number (3 bits), 2. Packet identification field (13 bits), 3. Packet sequence control field (16 bits), and 4. Packet data length (16 bits). The format of the packet primary header is shown in Fig Packet version number The packet version number indicates the version of the formatted packet (its length of three bits allows eight different versions to be identified). The number is used to reserve the possibility of introducing other packet structures. The Space Packet Protocol standard 2 defines a version-1 CCSDS packet whose binary encoded version number is 000. Figure 5.2 Space packet primary header (image courtesy of CCSDS).
7 132 Chapter Packet identification field The packet identification field contains three subfields: the packet type (1 bit), the secondary header flag (1 bit), and the application process identifier (11 bits). The packet type is used to distinguish packets used for telemetry or for TC. For a telemetry packet, this bit is set to 0; for a TC packet, this bit is set to 1. The secondary header flag indicates the presence or absence of the packet secondary header within this space packet. It is set to 1 if a packet secondary header is present; otherwise, it is set to 0 if a packet secondary header is not present. The application process identifier provides the naming mechanism for the logical data path, which is the path from the source user application to the destination user applications through the subnetworks. This subfield can uniquely identify the individual sending or receiving an application process within a particular space vehicle. A space packet that contains idle data in its packet datafield is referred to as an idle packet. For idle packets, this subfield is set to all ones, i.e., Packet sequence control field The packet sequence control field contains two subfields: sequence flags (2 bits) and packet sequence count or packet name (14 bits). Sequence flags indicate that the user data contained within the space packet is a segment of a larger set of application data. These flags identify whether the packet datafield contains the first, continuing, or last segment of a packet, or whether it contains no segment (meaning it contains a complete set of user data). The sequence flags are set to the following values: 00 if the space packet contains a continuation segment of user data, 01 if the space packet contains the first segment of user data, 10 if the space packet contains the last segment of user data, or 11 if the space packet contains unsegmented user data. Packet sequence count is used to order each packet with other packets generated by the same user application, even though their order may be disturbed during transport from the sending user to the receiving user. For a telemetry packet (i.e., the packet type set to 0 ), this field contains the packet sequence count. For a TC packet (i.e., the packet type set to 1 ), this field contains either the packet sequence count or packet name. The packet sequence count provides the sequential binary count of each space packet generated by the user application identified by the application process identifier. The packet sequence count is continuous modulo The packet sequence count can be used in conjunction with a time code to provide unambiguous ordering; it is therefore essential that the resolution of the time code is sufficient for this code to increase at least once between
8 Satellite Data Formatting and Packetization 133 successive recyclings of the packet sequence count. The packet name allows a particular packet to be identified with respect to others occurring within the same communications session. There are no restrictions on binary encoding of the packet name. That is, the packet name can be any 14-bit binary pattern Packet data length The last field of the primary header delimits the boundaries of the space packet. It is a count of the number of octets in the packet datafield beginning with the first octet after the 6-octet (48-bit) primary header and ending with the last octet of the packet. This 2-octet (16-bit) field allows packet lengths up to 65,536 octets (not counting the 48-bit primary header). This packet limit was a compromise between the majority of users (who produce medium-size packets) and the few users who may produce exceptionally long packets. Placing a reasonable limit on packet size helps avoid the flow control problems associated with very large packets and eliminates the overhead penalty of a larger length field for the majority of packet producers Packet datafield As indicated in Fig. 5.1, the packet datafield consists of at least one of the following two fields, positioned contiguously, in the following sequence: packet secondary header (variable length) followed by user datafield (variable length). The packet datafield contains at least one octet and a maximum of octets Packet secondary header The format of the packet secondary header is shown in Fig The purpose of the packet secondary header is to allow a CCSDS-defined means for consistently placing ancillary data (time, internal datafield format, spacecraft position/attitude, etc.) in the same location within a space packet. The packet secondary header is optional and is mandatory only if the user datafield is empty. The presence or absence of a packet secondary header is signaled by the secondary header flag within the packet identification field in the packet primary header. Figure 5.3 Space-packet secondary header (image courtesy of CCSDS).
9 134 Chapter 5 The contents of the packet secondary header are specified by the source end user for each path ID and reported to the destination end users by management. If present, the packet secondary header consists of an integral number of octets of a time code field (variable length) only, an ancillary datafield (variable length) only, or a time code field followed by an ancillary datafield. The time code field consists of one of the CCSDS segmented binary or unsegmented binary time codes specified in CCSDS B The time codes defined therein consist of an optional preamble field, which identifies the time code and its characteristics, and a mandatory time field. Examples of time codes are the CCSDS unsegmented time code and the CCSDS daysegmented time code. Examples of characteristics include ambiguity period, epoch, length, and resolution. The ancillary datafield may contain any ancillary information necessary for the interpretation of the information contained within the user datafield of the space packet User datafield The user datafield follows either the packet secondary header (if a packet secondary header is present) or the packet primary header (if a packet secondary header is not present). The user datafield contains application data supplied by the sending user. It is mandatory if a packet secondary header is not present, otherwise it is optional. 5.5 Telemetry Transfer Frame The space packet data structures described in Section 5.4 are unsuitable for transmission directly through the space communication links that connect the spacecraft and data capture element in space or on Earth. They must be embedded within a data transfer structure that provides reliable, errorcontrolled transfer through the media. The CCSDS has developed such a data structure, referred to as transfer frame, which has a fixed length for a given mission or spacecraft. This section describes the transfer and the attributes of the transfer frame. Figure 5.4 illustrates the telementry transfer frame format. A telemetry transfer frame encompasses five of the major fields positioned contiguously in the following sequence: 1. Transfer frame primary header (6 octets, mandatory), 2. Transfer frame secondary header (up to 64 octets, optional), 3. Transfer frame datafield (integral number of octets, mandatory), 4. Operational control field (4 octets, optional), and 5. Frame error control field (2 octets, optional).
OVERVIEW OF SPACE COMMUNICATIONS PROTOCOLS
Report Concerning Space Data System Standards OVERVIEW OF SPACE COMMUNICATIONS PROTOCOLS INFORMATIONAL REPORT CCSDS 130.0-G-3 GREEN BOOK July 2014 Report Concerning Space Data System Standards OVERVIEW
Consultative Committee for Space Data Systems REPORT CONCERNING SPACE DATA SYSTEM STANDARDS TELECOMMAND SUMMARY OF CONCEPT AND RATIONALE
Consultative Committee for Space Data Systems REPORT CONCERNING SPACE DATA SYSTEM STANDARDS TELECOMMAND SUMMARY OF CONCEPT AND RATIONALE CCSDS 200.0-G-6 GREEN BOOK JANUARY 1987 AUTHORITY * * * * * * *
SPACE PACKET PROTOCOL
Consultative Committee for Space Data Systems RECOMMENDATION FOR SPACE DATA SYSTEM STANDARDS SPACE PACKET PROTOCOL CCSDS 133.0-Pink 0.B to Blue-1 BLUE BOOK September 2003 AUTHORITY Issue: Blue Book, Issue
ATV Data Link Simulator: A Development based on a CCSDS Layers Framework
SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2089 ATV Data Link Simulator: A Development based on a CCSDS
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Satellite Telemetry, Tracking and Control Subsystems
Satellite Telemetry, Tracking and Control Subsystems Col John E. Keesee 1 Overview The telemetry, tracking and control subsystem provides vital communication to and from the spacecraft TT&C is the only
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
BROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO MUTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link INTRODUCTION
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
LRIT TRANSMITTER SPECIFICATION
LRIT TRANSMITTER SPECIFICATION 1.0 Introduction The National Oceanic and Atmospheric Administration (NOAA) Low Rate Information System (LRIT broadcast system is an imagery and environmental products delivery
AIAA-2004-5820 Distributed Operation of a Military Research Micro Satellite Using the Internet
AIAA-2004-5820 Distributed Operation of a Military Research Micro Satellite Using the Internet Chris Jackson * Surrey Satellite Technology Ltd., Guildford, England, GU2 7XH, UK Major Timothy J. Lawrence,
How To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
CONTROL MICROSYSTEMS DNP3. User and Reference Manual
DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
MPEG-2 Transport vs. Program Stream
MPEG-2 Transport vs. Program Stream White Paper What is the difference between Program Stream and Transport Stream, and why do we currently only support the Transport Stream format? Well, this topic is
It explains the differences between the Plesiochronous Digital Hierarchy and the Synchronous Digital Hierarchy.
TECHNICAL TUTORIAL Subject: SDH Date: October, 00 Prepared by: John Rumsey SDH Synchronous Digital Hierarchy. Introduction. The Plesiochronous Digital Hierarchy (PDH). The Synchronous Digital Hierarchy
Zarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
5. Security in the IPN
1. Introduction 2. Inter-Internet Dialogs 3. Building a stable Backbone for the IPN 4. IPN Nodes 5. Security in the IPN 6. Deployed Internets in the IPN 7. Working conclusions 5. Security 5.1. Introduction
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
OSI Reference Model: An Overview
OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
Asynchronous Transfer Mode
CHAPTER 15 Asynchronous Transfer Mode Background Asynchronous Transfer Mode (ATM) technology is based on the efforts of the International Telecommunication Union Telecommunication Standardization Sector
ITU-T RECOMMENDATION J.122, SECOND-GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES IP CABLE MODEMS
ORGANIZATION OF AMERICAN STATES INTER-AMERICAN TELECOMMUNICATION COMMISSION PERMANENT CONSULTATIVE COMMITTEE I: TELECOMMUNICATION STANDARDIZATION Standards Coordination Document Nr. 10: ITU-T RECOMMENDATION
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.
SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing
Course 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions.
Course 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions. 1. General view on the fixed telephone network Communication network dedicated to voice transmission;
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Computers Are Your Future. 2006 Prentice-Hall, Inc.
Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
Multiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.
Multiplexing Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium. The following two factors in data communications lead to
Software Defined Radio Architecture for NASA s Space Communications
From July 2007 High Frequency Electronics Copyright 2007 Summit Technical Media Software Defined Radio Architecture for NASA s Space Communications By Maximilian C. Scardelletti, Richard C. Reinhart, Monty
High-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Lecture 12 Transport Networks (SONET) and circuit-switched networks
CS4/MSc Computer Networking Lecture 1 Transport Networks (SONET) and circuit-switched networks Computer Networking, Copyright University of Edinburgh 005 Transport Networks and SONET/SDH In most cases
Whitepaper. 802.11n The Next Generation in Wireless Technology
Whitepaper 802.11n The Next Generation in Wireless Technology Introduction Wireless technology continues to evolve and add value with its inherent characteristics. First came 802.11, then a & b, followed
Introduction to Networks
www.eazynotes.com Maninder Kaur [Page No. 1] Introduction to Networks Short Answer Type Questions Q-1. Which Technologies of this age had led to the emergence of computer network? Ans: The technologies
TIMED Mission System Engineering and System Architecture
TIMED Mission System Engineering and System Architecture David Y. Kusnierkiewicz Aspace mission consists of more than just a spacecraft and scientific instruments. It also includes a ground system to support
ESPA 4.4.4 Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION
PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION 2.1 CHARACTER STRUCTURE 2.2 THE CHARACTER SET 2.3 CONTROL CHARACTERS 2.3.1 Transmission control
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Configuration Guide. T.38 Protocol in AOS. 61950851L1-29.1D September 2011
61950851L1-29.1D September 2011 Configuration Guide This configuration guide describes the T.38 fax protocol and its use on ADTRAN Operating System (AOS) voice products including a protocol overview, common
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION
TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION (Please read appropriate parts of Section 2.5.2 in book) 1. VOICE DIGITIZATION IN THE PSTN The frequencies contained in telephone-quality
The OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
FILE MANAGEMENT AND FILE TRANSFER CNES VIEWS. Christian POULIQUEN
FILE MANAGEMENT AND FILE TRANSFER CNES VIEWS Christian POULIQUEN 1 SOMMAIRE INTRODUCTION NEEDS AND OPS CONCEPT STANDARDS OVERVIEW CNES MISSION STATUS OPEN POINTS 2 FILES IN SPACE - SHORT INTRODUCTION Many
Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage
Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through
Switch Fabric Implementation Using Shared Memory
Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today
Appendix B RCS11 Remote Communications
Appendix B RCS11 Remote Communications B.1 Host Computer Remote Communications Control and status messages are conveyed between the RCS11 and the host computer using packetized message blocks in accordance
IFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
Implementing an In-Service, Non- Intrusive Measurement Device in Telecommunication Networks Using the TMS320C31
Disclaimer: This document was part of the First European DSP Education and Research Conference. It may have been written by someone whose native language is not English. TI assumes no liability for the
Layered Architectures and Applications
1 Layered Architectures and Applications Required reading: Garcia 2.1, 2.2, 2.3 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Why Layering?! 3 Montreal London Paris Alice wants to send a mail to Bob and
A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH)
677 A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) Olabenjo Babatunde 1, Salim Mbarouk 2 1 (Department of Information Systems Engineering, Cyprus International
An Interpretation of MIL-STD-1553B
Overview 1 An Interpretation of MIL-STD-1553B Overview 0. Introduction This document provides an explanation of each part of MIL-STD-1553 on clause-byclause basis. Each clause of the Standard is presented
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
PPP (Point-to-Point Protocol)
PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Module 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Quectel Cellular Engine
Cellular Engine GSM Multiplexer Application Notes GSM_MUX_AN_V1.00 Document Title GSM Multiplexer Application Notes Version 1.00 Date 2009-06-27 Status Document Control ID Release GSM_MUX_AN_V1.00 General
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
PCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
Data Communication Networks
Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Module 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus
EnOcean Radio Protocol 2. September 26, 2013 SPECIFICATION V1.0. Subject to modifications EnOcean Radio Protocol 2 V1.0 Page 1/19
SPECIFICATION V1.0 EnOcean Radio Protocol 2 September 26, 2013 EnOcean GmbH Kolpingring 18a 82041 Oberhaching Germany Phone +49.89.67 34 689-0 Fax +49.89.67 34 689-50 [email protected] www.enocean.com Subject
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking Learning Objectives Upon completion of this chapter, you should be able to: Describe the
Technical Specifications for KD5HIO Software
Technical Specifications for KD5HIO Software Version 0.2 12/12/2000 by Glen Hansen, KD5HIO HamScope Forward Error Correction Algorithms HamScope is a terminal program designed to support multi-mode digital
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
TM SYNCHRONIZATION AND CHANNEL CODING
Recommendation for Space Data System Standards TM SYNCHRONIZATION AND CHANNEL CODING RECOMMENDED STANDARD CCSDS 3.-B-2 BLUE BOOK August 2 Recommendation for Space Data System Standards TM SYNCHRONIZATION
Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
What s The Difference Between Bit Rate And Baud Rate?
What s The Difference Between Bit Rate And Baud Rate? Apr. 27, 2012 Lou Frenzel Electronic Design Serial-data speed is usually stated in terms of bit rate. However, another oftquoted measure of speed is
IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c
EDTECH 552 (SP11) Susan Ferdon Notes Odom, Chapter 4 Flashcards Set: http://www.flashcardmachine.com/1162711/b41c telco Leased Line CSU/DSU Local Telephone Company Owns the cables and has right of way
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
