GPON Section Reporter: 王 依 盈
|
|
|
- Horace Edwards
- 9 years ago
- Views:
Transcription
1 GPON Section Reporter: 王 依 盈
2 Outline Security Forward Error Correction OMCI Transport Mechanism
3 Security Basic Threat Model Encryption System Key exchange and switch-over Forward Error Correction OMCI Transport mechanism
4 Basic Threat Model PON is highly directional Any ONU cannot observe the upstream traffic from the other ONUs on the PON Downstream data is broadcast to all ONUs Eavesdropping threat: A malicious user wants to re-program his ONU such that he could listen to all the downstream data Other exotic threats are not considered practically
5 Encryption system Advanced Encryption Standard (AES) 128, 192, and 256 byte keys work with16-byte blocks of data Counter mode: a synchronized crypto-counter that is common to the OLT and all ONUs Counter is 46 bits upper 30 bits as inter-frame counter, lower 16 bits as intra-frame counter Intra-frame counter is reset to 0 at the beginning of downstream frame, and is incremented every 4 Inter-frame counter is the same as the super-frame counter, ONU implements a synchronized counter in case of error
6 Encryption system (con t) In the case of ATM data: 48 = 16 * 3 (blocks) In the case of GEM fragments: the port-id header is not encrypted, the last data block (1-16 in length) is also OK Generation of cipher-text The cipher generates a stream of 16-byte pseudo-random cipher blocks XOR with input text
7 The relationship between cipher block sequence and crypto-counter sequence
8 Key Exchange Initiate by the OLT sending key_request_msg in the PLOAM channel (divided into 2 pieces and sent 3 times) ONU responds by generating, storing, and sending the key All ONU transmissions of a particular key have the same value of Key_index Key_index is incremented for each key that the ONU generates upon request from OLT
9 Switch over Once OLT receives the key, it stores the key in the shadow_key_reg OLT chooses a frame number to be the first frame to use the new key OLT tells ONU the super-frame number of this frame using Key_switching_time msg (sent 3 times) At the beginning of the chosen frame, ONU will copy its shadow_key_reg into the active_key_reg, so OLT and ONU begin using the new key at precisely the same frame
10 Security Forward Error Correction Reed-Solomon (Block based FEC) Downstream FEC Upstream FEC Last Codeword FEC synch and control OMCI Transport mechanism
11 Forward Error Correction Used by the transport layer in communication system Based on transmitting data in encoded format Encoding redundancy can decrease BER FEC results in an increased link budget, so higher bit rate and longer distance can be supported
12 Reed-Solomon RS is a block based code It takes a data block of constant size and adds extra redundant bits at the end Detail is specified in ITU-T Rec. J.81 RS(255,239) Codeword is 255 long, consists of 239 data followed by 16 parity Not efficient for very high BER
13 Downstream FEC The codeword begins with the framing section (PCBd), which is the first byte The next codeword will start after the 255th byte and will be repeated every 255 When FEC is used, less bandwidth is available for user data 9720 TSs PCBd Codeword Codeword Codeword Codeword Codeword Codeword Short codeword D/S frame with FEC
14 D/S FEC code synchronization Frame sync at ONU The Psync field of the PCBd remains unchanged during the encoding process Codeword sync Once frame sync is achieved, codeword sync is also achieved
15 D/S FEC On/Off control The D/S FEC function can be activated/ deactivated at the OLT by operation system FEC indication bit is located in the IDENT field FEC detection at ONU receiver Default value is off. Four consecutive On/Off indication bits will change the FEC status at ONU
16 Upstream FEC RS(255,239) is used The Preamble and Delimiter fields of the PLOu are not included in the first codeword Prea mble & Deli miter PLOu B IP O NU ONT OH ID I n d PLOAMu PLSu DBRu Payload codeword #1 codeword #2 codeword #3 codeword #4 codeword #5 ONT OH PLOu PLOAMu PLSu DBRu of last codeword #6 Codeword Codeword Codeword Codeword Codeword Codeword U/S frame with FEC
17 Last codeword Pad extra zeros at the end of the last codeword Calculate parity Remove the 0 pad and transmit the codeword While receiving, OLT will reinsert the extra 0 before decode it Following the decoding process, the extra bits are once again removed
18 ONT TX Original window: ONT OH Window before encoder: ONT OH '0' Pad encoded Window: ONT OH '0' Pad Tx ONT window: ONT OH OLT RX Rx window at OLT: ONT OH Window before decoder: ONT OH '0' Pad Decoded window: ONT OH '0' Pad Output window: ONT OH
19 U/S FEC code synchronization Transmission sync The preamble and delimiter fields are received unchanged at the OLT Codeword sync is not needed Framing-word error Up to three or four errored bits are allowed in the delimiter (framing) word, if the delimiter is 16 or 20 bits long, respectively
20 U/S FEC On/Off control The U/S FEC function of the ONU can be activated/deactivated by the operation system via the OLT OLT sets the ONU FEC status using the UseFEC bit in the FLAGS field FEC detection at OLT Same as D/S For all special ONU-activation transmissions, no FEC will be applied
21 Security Forward Error Correction OMCI Transport Mechanism
22 OMCI Transport Mechanism ONU Management and Control Interface Basic framework is given in ITU-T Rec. G OMCI operates on a dedicated bidirectional virtual channel between the management station and the ONU The management station can be the OLT itself or other network element
23 OMCI Transport Mechanism (2) Two transport modes: ATM and GEM OLT and ONU may support both or either one The OMCI primitive data units are 48- in length ATM mode: datagrams are carried in the ATM cell payloads GEM mode: payloads are encapsulated with a GEM header
24 OMCI Transport Mechanism (3) OMCI adapter at the ONU is responsible for In the D/S: filtering and de-encapsulation either cells or frames In the U/S: encapsulating the PDUs OMCI adapter at the control station is responsible for In the D/S: encapsulating the PDUs from control logic to ONU In the U/S: filtering and de-encapsulation cells and frames
ITU-T G.984.3 (03/2008) Gigabit-capable Passive Optical Networks (G-PON): Transmission convergence layer specification
International Telecommunication Union ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU G.984.3 (03/2008) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital sections and
GPON - EPON Comparison
White Paper GPON - EPON Comparison CommScope Solutions Marketing October 2013 Contents Introduction 3 Protocol fundamentals 4 Framing/service adaption 4 Basic operation 5 Service hierarchy 7 Bandwidth
Ajay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
PMD Burst Mode Dynamic Performance Requirement
PMD Burst Mode Dynamic Performance Requirement List of Supporters: Eyal Shraga Frank Effenberger Glen Koziuk Hernando Valencia Meir Bartur Raanan Ivry Rob Carlisle Ron Rundquist Tony Anderson Walt Soto
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
How To Test For 10 Gigabit Ethernet At 10 Gb/S
White Paper Testing Scenarios for Ethernet at 10 Gb/s By Guylain Barlow Introduction As a natural evolution, the typical test concepts borrowed from lower-rate Ethernet apply to 10 Gigabit Ethernet (GigE).
GPON- Gigabit Passive Optical Network
GPON- Gigabit Passive Optical Network Chelsea Mosser Mississippi State University Bagley College of Engineering, ECE Department Mississippi State, Mississippi 39762 [email protected] Abstract Gigabit
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
PPP (Point-to-Point Protocol)
PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although
Digital Subscriber Line (DSL) Transmission Methods
Digital Subscriber Line (DSL) Transmission Methods 1. Overview... 1 2. SHDSL Transmission Methods... 1 SHDSL Transmission System Versions... 1 SHDSL Transmission Subsystem Structure... 1 SHDSL Modulation
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
1. Overview. 2. F-bit Utilization
1. Overview... 1 2. F-bit Utilization... 1 3. T1 Line Signal... 2 4. T1 Alarm Conditions... 3 5. 64 kbps Channel Characteristics... 3 6. Timeslot Handling... 3 7. Unframed Mode... 4 1. Overview The T1
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
Operator s Requirements for G-PON:
Operator s Requirements for G-PON: Summary Of Work In ITU-T SG15/Q2 GSR Brian Ford BellSouth BellSouth, British Telecom, Deutsche Telekom, France Telecom, NTT, Telecom Italia and SBC Introduction This
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Advanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
Enhancing High-Speed Telecommunications Networks with FEC
White Paper Enhancing High-Speed Telecommunications Networks with FEC As the demand for high-bandwidth telecommunications channels increases, service providers and equipment manufacturers must deliver
Protocol Overhead in IP/ATM Networks
Protocol Overhead in IP/ATM Networks John David Cavanaugh * Minnesota Supercomputer Center, Inc. This paper discusses the sources of protocol overhead in an IP/ATM protocol stack. It quantifies the amount
Gigabit-capable Passive Optical Networks (GPON): General characteristics
Gigabit-capable Passive Optical Networks (GPON): General characteristics SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital sections and digital line system Optical line systems
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Introduce Quality of Service in your IP_to_IP W@N unreliable infrastructure
Introduce Quality of Service in your IP_to_IP W@N unreliable infrastructure QV QoS Proxy server The QV-PROXY supplies two features : introduction of Error Correction mechanism improving the QoS and delivery
AFDX / ARINC 664. Tutorial
AFDX / ARINC 664 Tutorial 700008_TUT-AFDX-EN_1000 29/08/2008 Imprint Document Title AFDX / ARINC 664 Tutorial Document ID 700008_TUT-AFDX-EN_1000 Issue 1000 Classification Public Project AFDX / ARINC 664
Performance Evaluation of Dynamic Bandwidth Allocation Algorithm for XG-PON Using Traffic Monitoring and Intra- Scheduling
, pp. 27-216 http://dx.doi.org/1.14257/ijseia.215.9.8.19 Performance Evaluation of Dynamic Bandwidth Allocation Algorithm for XG-PON Using Traffic Monitoring and Intra- Scheduling Man Soo Han Optical Engineering
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)
Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport
Example: Multiple OFDM Downstream Channels and Examining Backwards Compatibility. Mark Laubach, Avi Kliger Broadcom
Example: Multiple OFDM Downstream Channels and Examining Backwards Compatibility Mark Laubach, Avi Kliger Broadcom 1 Big Fat Downstream Pipe MULTIPLE DOWNSTREAM OFDM CHANNELS 2 Intent of this Presentation
Evaluating GSM A5/1 security on hopping channels
Evaluating GSM A5/1 security on hopping channels Bogdan Diaconescu v1.0 This paper is a practical approach on evaluating A5/1 stream cipher on a GSM hopping network air interface called Um. The end goal
MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a
MPLS Environment Introduction to MPLS Multi-Protocol Label Switching (MPLS) is a highly efficient and flexible routing approach for forwarding packets over packet-switched networks, irrespective of the
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
920-803 - technology standards and protocol for ip telephony solutions
920-803 - technology standards and protocol for ip telephony solutions 1. Which CODEC delivers the greatest compression? A. B. 711 C. D. 723.1 E. F. 726 G. H. 729 I. J. 729A Answer: C 2. To achieve the
Alarms of Stream MultiScreen monitoring system
STREAM LABS Alarms of Stream MultiScreen monitoring system Version 1.0, June 2013. Version history Version Author Comments 1.0 Krupkin V. Initial version of document. Alarms for MPEG2 TS, RTMP, HLS, MMS,
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Monitoring Network Traffic Using SPAN
CHAPTER 60 This chapter describes the Switched Port Analyzer (SPAN) features provided in switches in the Cisco MDS 9000 Family. It includes the following sections: About SPAN, page 60-1 SPAN Sources, page
The OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996
CS 294-7: Cellular Digital Packet Data (CDPD) Prof. Randy H. Katz CS Division University of California, Berkeley Berkeley, CA 94720-1776 1996 1 Cellular Digital Packet Data IBM, McCaw Cellular Data network
OLT LTP-8X_v3.20.2.3056. Appendix to Operation Manual OLT LTP-8X Quick Configuration Guide Central Office Node Terminal
OLT LTP-8X_v3.20.2.3056 Appendix to Operation Manual Central Office Node Terminal TABLE OF CONTENTS 1 SUMMARY... 3 2 CONNECTION TO COMMAND LINE INTERFACE (CLI)... 4 2.1 Connection to Telnet/SSH... 4 2.2
Raj Jain. The Ohio State University Columbus, OH 43210 [email protected] These slides are available on-line at:
IP Over SONET The Ohio State University Columbus, OH 43210 [email protected] These slides are available on-line at: http://www.cis.ohio-state.edu/~jain/cis788-99/h_bipsn.htm 1 Overview IP over SONET:
MPEG-2 Transport vs. Program Stream
MPEG-2 Transport vs. Program Stream White Paper What is the difference between Program Stream and Transport Stream, and why do we currently only support the Transport Stream format? Well, this topic is
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Technical Bulletin. Enabling Arista Advanced Monitoring. Overview
Technical Bulletin Enabling Arista Advanced Monitoring Overview Highlights: Independent observation networks are costly and can t keep pace with the production network speed increase EOS eapi allows programmatic
It explains the differences between the Plesiochronous Digital Hierarchy and the Synchronous Digital Hierarchy.
TECHNICAL TUTORIAL Subject: SDH Date: October, 00 Prepared by: John Rumsey SDH Synchronous Digital Hierarchy. Introduction. The Plesiochronous Digital Hierarchy (PDH). The Synchronous Digital Hierarchy
Digital Satellite Broadcasting and HDTV Services in Japan
Digital Satellite Broadcasting and HDTV Services in Japan Masafumi Saito Science and Technical Research Laboratories NHK (Japan Broadcasting Corporation) Contents Present situation of satellite broadcasting
Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri
Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is an unacknowledged connectionless service? What is an acknowledged
EnOcean Radio Protocol 2. September 26, 2013 SPECIFICATION V1.0. Subject to modifications EnOcean Radio Protocol 2 V1.0 Page 1/19
SPECIFICATION V1.0 EnOcean Radio Protocol 2 September 26, 2013 EnOcean GmbH Kolpingring 18a 82041 Oberhaching Germany Phone +49.89.67 34 689-0 Fax +49.89.67 34 689-50 [email protected] www.enocean.com Subject
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
GSM Channels. Physical & Logical Channels. Traffic and Control Mutltiframing. Frame Structure
GSM Channels Physical & Logical Channels Traffic and Control Mutltiframing Frame Structure Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Radio Interface The radio interface
SRX 210 Services Gateway T1/E1 Mini-Physical Interface Module
SRX 210 Services Gateway T1/E1 Mini-Physical Interface Module The T1/E1 Mini-PIM provides the physical connection to T1 or E1 network media types and also performs T1 or E1 framing and line-speed signaling.
Computer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
ADSL TUTORIAL. Figure 1: Typical DSL system.
ADSL TUTORIAL Matthew J. Langlois, University of New Hampshire InterOperability Laboratory 121 Technology Drive, Suite 2, Durham, NH 03824 USA. Extracted from the Introduction and Chapter 1 of A G.hs Handshaking
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Technical Specifications for KD5HIO Software
Technical Specifications for KD5HIO Software Version 0.2 12/12/2000 by Glen Hansen, KD5HIO HamScope Forward Error Correction Algorithms HamScope is a terminal program designed to support multi-mode digital
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Chapter 4 T1 Interface Card
Chapter 4 T1 Interface Card GENERAL This chapter describes DTE interface options that may be required if application requirements change. It also describes software configuration for the T1 interface card.
8B/10B Coding 64B/66B Coding
8B/10B Coding 64B/66B Coding 1. Transmission Systems 2. 8B/10B Coding 3. 64B/66B Coding 4. CIP Demonstrator Test Setup PeterJ Slide 1 Transmission system General Data Clock D C Flip Flop Q @ 1 Gbps = 1
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage
Lecture 3: Signaling and Clock Recovery CSE 123: Computer Networks Stefan Savage Last time Protocols and layering Application Presentation Session Transport Network Datalink Physical Application Transport
LIN (Local Interconnect Network):
LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,
Next Generation Access Network (in)security
P0 Next Generation Access Network (in)security Security proposal for NGN standardization 4 th ETSI Security Workshop Sophia Antipolis, France 13-14 January 2009 Paolo DE LUTIIS, Roberta D AMICO, Luciana
SSH Secure Shell. What is SSH?
Security, like correctness, is not an add-on feature. -- Andrew S. Tanenbaum SSH Secure Shell - - Binary Packet Protocol - key exchange - server authentication - - SSH Connection Protocol What is SSH?
GigE Triple Play PIM. Comprehensive prioritization support including VLAN Q-in-Q, layer 3 IP ToS and Cisco DSCP
AnaCise GigE Triple Play PIM is an advanced ergonomic CSA Platform Interface Module (PIM) capable of testing 10/100/1000Mbps Ethernet network, providing field demanding functions conforming to the latest
Quectel Cellular Engine
Cellular Engine GSM Multiplexer Application Notes GSM_MUX_AN_V1.00 Document Title GSM Multiplexer Application Notes Version 1.00 Date 2009-06-27 Status Document Control ID Release GSM_MUX_AN_V1.00 General
An architecture for the delivery. of DVB services over IP networks Rennes, January 2007 INTRODUCTION DIGITAL VIDEO TRANSPORT
An architecture for the delivery Datasheet User guide White paper þ of DVB services over IP networks Rennes, January 2007 INTRODUCTION Present paper proposes to look around technologies used today for
www.huawei.com Layer 2 Openflow Authors: Wenle Yang; Ruobin Zheng, Hesham ElBakoury Version: 1.0 HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com Layer 2 Openflow Authors: Wenle Yang; Ruobin Zheng, Hesham ElBakoury Version: 1.0 HUAWEI TECHNOLOGIES CO., LTD. Introduction to OpenFlow openflow-spec-v1.3.3 OpenFlow Channel connects each
Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs
Channel Bonding in DOCSIS 3.0 Greg White Lead Architect Broadband Access CableLabs Agenda DS Channel Bonding Protocol Receive Channel Profiles US Channel Bonding Protocol HFC Plant Topologies & Resolution
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
A DNP3 Protocol Primer
A Protocol Primer Introduction This is a primer for people who want a quick understanding of without having to comb through the tedious details of a complex specification. The writing style is meant to
Overview of EnOcean Security features EXPLANATION OF ENCEOAN SECURITY IN APPLICATIONS
Overview of EnOcean Security features EXPLANATION OF ENCEOAN SECURITY IN APPLICATIONS EnOcean www.enocean.com Author (eo_fusszeile) September 2013 Page 1/ 23 Table of contents 1. INTRODUCTION... 3 1.1.
DATA COMMUNICATIONS AND NETWORKING. Solved Examples
Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following
Lecture 12 Transport Networks (SONET) and circuit-switched networks
CS4/MSc Computer Networking Lecture 1 Transport Networks (SONET) and circuit-switched networks Computer Networking, Copyright University of Edinburgh 005 Transport Networks and SONET/SDH In most cases
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement
PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement This feature module describes the PA-MC-T3 Multi-Channel T3 port adapter (PA-MC-T3 [=]), which can now be configured as either customer
Local Interconnect Network Training. Local Interconnect Network Training. Overview
Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended
E1+Jitter+Wander+Data
testing +Jitter+Wander+Data PDH worldwide T-Carrier US and Canada Japan E4 13964 kbps x3 9778 kbps Kbps x3 E3 34368 kbps Kbps T3 44736 kbps 3064 kbps x7 x5 E 8448 kbps Kbps T 631 kbps Kbps x J x3 T1c 315
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
