Chapter 7 Packet-Switching Networks

Total Page:16

File Type:pdf, Size:1020Kb

Chapter 7 Packet-Switching Networks Chapter 7 Packet-Switching Networks Network Services and Internal Network Operation Packet Network Topology Datagrams and Virtual Circuits Routing in Packet Networks Shortest Path Routing ATM Networks Traffic Management Chapter 7 Packet-Switching Networks Network Services and Internal Network Operation Network Layer z Network Layer: the most complex layer z Requires the coordinated actions of multiple, geographically distributed network elements (switches & routers) z Must be able to deal with very large scales z Billions of users (people & communicating devices) z Biggest Challenges z Addressing: where should information be directed to? z Routing: what path should be used to get information there? Packet Switching t1 t0 Network z Transfer of information as payload in data packets z Packets undergo random delays & possible loss z Different applications impose differing requirements on the transfer of information Network Service Messages Messages Transport Segments Transport layer layer Network Network service service Network Network Network Network layer layer layer layer Data link Data link Data link Data link End End layer layer layer layer system system Physical Physical β α Physical Physical layer layer layer layer z Network layer can offer a variety of services to transport layer z Connection-oriented service or connectionless service z Best-effort or delay/loss guarantees Network Service vs. Operation Network Service Internal Network z Connectionless Operation z Datagram Transfer z Connectionless z Connection-Oriented z IP z Reliable and possibly z Connection-Oriented constant bit rate transfer z Telephone connection z ATM Various combinations are possible z Connection-oriented service over Connectionless operation z Connectionless service over Connection-Oriented operation z Context & requirements determine what makes sense Complexity at the Edge or in the Core? C 1 2 3 2 1 2 2 1 1 End system End system 1 1 1 α 2 2 2 β 4 3 2 1 1 2 3 2 1 1 2 3 2 1 1 2 3 4 Medium 2 A B 1 Network 1 Physical layer entity 3 Network layer entity 3 Network layer entity 2 Data link layer entity 4 Transport layer entity The End-to-End Argument for System Design z An end-to-end function is best implemented at a higher level than at a lower level z End-to-end service requires all intermediate components to work properly z Higher-level better positioned to ensure correct operation z Example: stream transfer service z Establishing an explicit connection for each stream across network requires all network elements (NEs) to be aware of connection; All NEs have to be involved in re- establishment of connections in case of network fault z In connectionless network operation, NEs do not deal with each explicit connection and hence are much simpler in design Network Layer Functions Essential z Routing: mechanisms for determining the set of best paths for routing packets requires the collaboration of network elements z Forwarding: transfer of packets from NE inputs to outputs z Priority & Scheduling: determining order of packet transmission in each NE Optional: congestion control, segmentation & reassembly, security Chapter 7 Packet-Switching Networks Packet Network Topology End-to-End Packet Network z Packet networks very different than telephone networks z Individual packet streams are highly bursty z Statistical multiplexing is used to concentrate streams z User demand can undergo dramatic change z Peer-to-peer applications stimulated huge growth in traffic volumes z Internet structure highly decentralized z Paths traversed by packets can go through many networks controlled by different organizations z No single entity responsible for end-to-end service Access Multiplexing Access MUX To packet network z Packet traffic from users multiplexed at access to network into aggregated streams z DSL traffic multiplexed at DSL Access Mux z Cable modem traffic multiplexed at Cable Modem Termination System Oversubscription z Access Multiplexer r z N subscribers connected @ c bps to mux r z Each subscriber active r/c of time •• • •• •• • •• nc z Mux has C=nc bps to network r z Oversubscription rate: N/n Nr Nc z Find n so that at most 1% overflow probability Feasible oversubscription rate increases with size N r/c n N/n 10 0.01 1 10 10 extremely lightly loaded users 10 0.05 3 3.3 10 very lightly loaded user 10 0.1 4 2.5 10 lightly loaded users 20 0.1 6 3.3 20 lightly loaded users 40 0.1 9 4.4 40 lightly loaded users 100 0.1 18 5.5 100 lightly loaded users Home LANs WiFi Ethernet Home Router To packet network z Home Router z LAN Access using Ethernet or WiFi (IEEE 802.11) z Private IP addresses in Home (192.168.0.x) using Network Address Translation (NAT) z Single global IP address from ISP issued using Dynamic Host Configuration Protocol (DHCP) LAN Concentration Switch / Router zzzzzz zzzzzz z LAN Hubs and switches in the access network also aggregate packet streams that flows into switches and routers Servers have Campus Network redundant connectivity to backbone Organization To Internet or Servers wide area network s s Gateway Backbone R R R S S S Departmental R R Server R s s s OnlyHigh-speed outgoing packetscampus leave s s s s LANbackbone through net s s routerconnects dept routers Connecting to Internet Service Provider Internet service provider Border routers Campus Border routers Network Interdomain level Autonomous system or domain Intradomain level s LAN network administered s s by single organization Internet Backbone National Service Provider A National Service Provider B NAP NAP National Service Provider C Private peering z Network Access Points: set up during original commercialization of Internet to facilitate exchange of traffic z Private Peering Points: two-party inter-ISP agreements to exchange traffic (a) National Service Provider A National Service Provider B NAP NAP National Service Provider C Private peering (b) NAP RA Route RB Server LAN RC Key Role of Routing How to get packet from here to there? z Decentralized nature of Internet makes routing a major challenge z Interior gateway protocols (IGPs) are used to determine routes within a domain z Exterior gateway protocols (EGPs) are used to determine routes across domains z Routes must be consistent & produce stable flows z Scalability required to accommodate growth z Hierarchical structure of IP addresses essential to keeping size of routing tables manageable Chapter 7 Packet-Switching Networks Datagrams and Virtual Circuits The Switching Function z Dynamic interconnection of inputs to outputs z Enables dynamic sharing of transmission resource z Two fundamental approaches: z Connectionless z Connection-Oriented: Call setup control, Connection control Backbone Network Switch Access Network Packet Switching Network Packet switching network User z Transfers packets between users Transmission line z Transmission lines + packet switches Network (routers) Packet switch z Origin in message switching Two modes of operation: z Connectionless z Virtual Circuit Message Switching z Message switching invented for telegraphy Message z Entire messages Message multiplexed onto shared Message lines, stored & forwarded z Headers for source & Source destination addresses Message z Routing at message switches z Connectionless Switches Destination Message Switching Delay Source T t Switch 1 t τ Switch 2 t t Destination Delay Minimum delay = 3τ + 3T Additional queueing delays possible at each link Long Messages vs. Packets 1 Mbit message source dest BER=p=10-6 BER=10-6 How many bits need to be transmitted to deliver message? z Approach 1: send 1 Mbit z Approach 2: send 10 message 100-kbit packets z Probability message z Probability packet arrives arrives correctly correctly −6 106 −10610−6 −1 −6 105 −10510−6 −0.1 Pc = (1−10 ) ≈ e = e ≈1/ 3 Pc′ = (1−10 ) ≈ e = e ≈ 0.9 z On average it takes about z On average it takes about 1.1 transmissions/hop 3 transmissions/hop z Total # bits transmitted ≈ z Total # bits transmitted ≈ 6 Mbits 2.2 Mbits Packet Switching - Datagram z Messages broken into smaller units (packets) z Source & destination addresses in packet header Packet 1 z Connectionless, packets routed independently Packet 1 (datagram) Packet 2 z Packet may arrive out of order z Pipelining of packets across Packet 2 network can reduce delay, increase throughput Packet 2 z Lower delay that message switching, suitable for interactive traffic Packet Switching Delay Assume three packets corresponding to one message traverse same path t 1 2 3 t 1 2 3 t 1 2 3 t Delay Minimum Delay = 3τ + 5(T/3) (single path assumed) Additional queueing delays possible at each link Packet pipelining enables message to arrive sooner Delay for k-Packet Message over L Hops Source t 1 2 3 Switch 1 t τ 1 2 3 Switch 2 t 1 2 3 t Destination 3 hops L hops 3τ + 2(T/3) first bit received Lτ + (L-1)P first bit received 3τ + 3(T/3) first bit released Lτ + LP first bit released 3τ + 5 (T/3) last bit released Lτ + LP + (k-1)P last bit released where T = k P Routing Tables in Datagram Networks Destination Output z Route determined by table address port lookup z Routing decision involves 0785 7 finding next hop in route to given destination 1345 12 z Routing table has an entry for each destination 1566 6 specifying output port that leads to next hop z Size of table becomes impractical for very large number of destinations 2458 12 Example: Internet Routing z Internet protocol uses datagram packet switching across networks z Networks are treated as data links z Hosts have two-port IP address: z Network address + Host address z Routers do table lookup
Recommended publications
  • DE-CIX Academy Handout
    Networking Basics 04 - User Datagram Protocol (UDP) Wolfgang Tremmel [email protected] DE-CIX Management GmbH | Lindleystr. 12 | 60314 Frankfurt | Germany Phone + 49 69 1730 902 0 | [email protected] | www.de-cix.net Networking Basics DE-CIX Academy 01 - Networks, Packets, and Protocols 02 - Ethernet 02a - VLANs 03 - the Internet Protocol (IP) 03a - IP Addresses, Prefixes, and Routing 03b - Global IP routing 04 - User Datagram Protocol (UDP) 05 - TCP ... Layer Name Internet Model 5 Application IP / Internet Layer 4 Transport • Data units are called "Packets" 3 Internet 2 Link Provides source to destination transport • 1 Physical • For this we need addresses • Examples: • IPv4 • IPv6 Layer Name Internet Model 5 Application Transport Layer 4 Transport 3 Internet 2 Link 1 Physical Layer Name Internet Model 5 Application Transport Layer 4 Transport • May provide flow control, reliability, congestion 3 Internet avoidance 2 Link 1 Physical Layer Name Internet Model 5 Application Transport Layer 4 Transport • May provide flow control, reliability, congestion 3 Internet avoidance 2 Link • Examples: 1 Physical • TCP (flow control, reliability, congestion avoidance) • UDP (none of the above) Layer Name Internet Model 5 Application Transport Layer 4 Transport • May provide flow control, reliability, congestion 3 Internet avoidance 2 Link • Examples: 1 Physical • TCP (flow control, reliability, congestion avoidance) • UDP (none of the above) • Also may contain information about the next layer up Encapsulation Packets inside packets • Encapsulation is like Russian dolls Attribution: Fanghong. derivative work: Greyhood https://commons.wikimedia.org/wiki/File:Matryoshka_transparent.png Encapsulation Packets inside packets • Encapsulation is like Russian dolls • IP Packets have a payload Attribution: Fanghong.
    [Show full text]
  • Digital Subscriber Line (DSL) Technologies
    CHAPTER21 Chapter Goals • Identify and discuss different types of digital subscriber line (DSL) technologies. • Discuss the benefits of using xDSL technologies. • Explain how ASDL works. • Explain the basic concepts of signaling and modulation. • Discuss additional DSL technologies (SDSL, HDSL, HDSL-2, G.SHDSL, IDSL, and VDSL). Digital Subscriber Line Introduction Digital Subscriber Line (DSL) technology is a modem technology that uses existing twisted-pair telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers. The term xDSL covers a number of similar yet competing forms of DSL technologies, including ADSL, SDSL, HDSL, HDSL-2, G.SHDL, IDSL, and VDSL. xDSL is drawing significant attention from implementers and service providers because it promises to deliver high-bandwidth data rates to dispersed locations with relatively small changes to the existing telco infrastructure. xDSL services are dedicated, point-to-point, public network access over twisted-pair copper wire on the local loop (last mile) between a network service provider’s (NSP) central office and the customer site, or on local loops created either intrabuilding or intracampus. Currently, most DSL deployments are ADSL, mainly delivered to residential customers. This chapter focus mainly on defining ADSL. Asymmetric Digital Subscriber Line Asymmetric Digital Subscriber Line (ADSL) technology is asymmetric. It allows more bandwidth downstream—from an NSP’s central office to the customer site—than upstream from the subscriber to the central office. This asymmetry, combined with always-on access (which eliminates call setup), makes ADSL ideal for Internet/intranet surfing, video-on-demand, and remote LAN access. Users of these applications typically download much more information than they send.
    [Show full text]
  • A Technology Comparison Adopting Ultra-Wideband for Memsen’S File Sharing and Wireless Marketing Platform
    A Technology Comparison Adopting Ultra-Wideband for Memsen’s file sharing and wireless marketing platform What is Ultra-Wideband Technology? Memsen Corporation 1 of 8 • Ultra-Wideband is a proposed standard for short-range wireless communications that aims to replace Bluetooth technology in near future. • It is an ideal solution for wireless connectivity in the range of 10 to 20 meters between consumer electronics (CE), mobile devices, and PC peripheral devices which provides very high data-rate while consuming very little battery power. It offers the best solution for bandwidth, cost, power consumption, and physical size requirements for next generation consumer electronic devices. • UWB radios can use frequencies from 3.1 GHz to 10.6 GHz, a band more than 7 GHz wide. Each radio channel can have a bandwidth of more than 500 MHz depending upon its center frequency. Due to such a large signal bandwidth, FCC has put severe broadcast power restrictions. By doing so UWB devices can make use of extremely wide frequency band while emitting very less amount of energy to get detected by other narrower band devices. Hence, a UWB device signal can not interfere with other narrower band device signals and because of this reason a UWB device can co-exist with other wireless devices. • UWB is considered as Wireless USB – replacement of standard USB and fire wire (IEEE 1394) solutions due to its higher data-rate compared to USB and fire wire. • UWB signals can co-exists with other short/large range wireless communications signals due to its own nature of being detected as noise to other signals.
    [Show full text]
  • Lesson 1 Key-Terms Meanings: Internet Connectivity Principles
    Lesson 1 Key-Terms Meanings: Internet Connectivity Principles Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 1 Publs.: McGraw-Hill Education Header Words • Header words are placed as per the actions required at succeeding stages during communication from Application layer • Each header word at a layer consists of one or more header fields • The header fields specify the actions as per the protocol used Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 2 Publs.: McGraw-Hill Education Header fields • Fields specify a set of parameters encoded in a header • Parameters and their encoding as per the protocol used at that layer • For example, fourth word header field for 32-bit Source IP address in network layer using IP Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 3 Publs.: McGraw-Hill Education Protocol Header Field Example • Header field means bits in a header word placed at appropriate bit place, for example, place between bit 0 and bit 31 when a word has 32-bits. • First word fields b31-b16 for IP packet length in bytes, b15-b4 Service type and precedence and b3-b0 for IP version • Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 4 Publs.: McGraw-Hill Education IP Header • Header fields consist of parameters and their encodings which are as per the IP protocol • An internet layer protocol at a source or destination in TCP/IP suite of protocols Chapter-4 L01: "Internet of Things " , Raj Kamal, 2017 5 Publs.: McGraw-Hill Education TCP Header • Header fields consist of parameters and their encoding which are as
    [Show full text]
  • Etsi Ts 129 173 V14.0.0 (2017-03)
    ETSI TS 129 173 V14.0.0 (2017-03) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); LTE; Location Services (LCS); Diameter-based SLh interface for Control Plane LCS (3GPP TS 29.173 version 14.0.0 Release 14) 3GPP TS 29.173 version 14.0.0 Release 14 1 ETSI TS 129 173 V14.0.0 (2017-03) Reference RTS/TSGC-0429173ve00 Keywords GSM,LTE,UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • D4.2 – Report on Technical and Quality of Service Viability
    Ref. Ares(2019)1779406 - 18/03/2019 (H2020 730840) D4.2 – Report on Technical and Quality of Service Viability Version 1.2 Published by the MISTRAL Consortium Dissemination Level: Public This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 730840 H2020-S2RJU-2015-01/H2020-S2RJU-OC-2015-01-2 Topic S2R-OC-IP2-03-2015: Technical specifications for a new Adaptable Communication system for all Railways Final Version Document version: 1.2 Submission date: 2019-03-12 MISTRAL D4.2 – Report on Technical and Quality of Service Viability Document control page Document file: D4.2 Report on Technical and Quality of Service Viability Document version: 1.2 Document owner: Alexander Wolf (TUD) Work package: WP4 – Technical Viability Analysis Task: T4.3, T4.4 Deliverable type: R Document status: approved by the document owner for internal review approved for submission to the EC Document history: Version Author(s) Date Summary of changes made 0.1 Alexander Wolf (TUD) 2017-12-27 TOCs and content description 0.4 Alexander Wolf (TUD) 2018-01-31 First draft version 0.5 Carles Artigas (ARD) 2018-02-02 Contribution on LTE Security, Chapter 5 0.8 Alexander Wolf (TUD) 2018-03-31 Second draft version 0.9 Alexander Wolf (TUD) 2018-04-27 Release candidate 1.0 Alexander Wolf (TUD) 2018-04-30 Final version 1.0.1 Alexander Wolf (TUD) 2018-05-02 Formatting corrections 1.0.2 Alexander Wolf (TUD) 2018-05-08 Minor additions on chapter 6 1.1 Alexander Wolf (TUD) 2018-10-29 Minor additions after 3GPP comments 1.2 Alexander Wolf (TUD) 2019-03-12 Revision after Shift2Rail JU comments Internal review history: Reviewed by Date Summary of comments Edoardo Bonetto (ISMB) 2018-04-19 Review, comments and remarks Laura Masullo (SIRTI) 2018-04-19 Review, comments and remarks Laura Masullo (SIRTI) 2018-04-29 Review Document version : 1.2 Page 2 of 88 Submission date: 2019-03-12 MISTRAL D4.2 – Report on Technical and Quality of Service Viability Legal Notice The information in this document is subject to change without notice.
    [Show full text]
  • User Datagram Protocol - Wikipedia, the Free Encyclopedia Página 1 De 6
    User Datagram Protocol - Wikipedia, the free encyclopedia Página 1 de 6 User Datagram Protocol From Wikipedia, the free encyclopedia The five-layer TCP/IP model User Datagram Protocol (UDP) is one of the core 5. Application layer protocols of the Internet protocol suite. Using UDP, programs on networked computers can send short DHCP · DNS · FTP · Gopher · HTTP · messages sometimes known as datagrams (using IMAP4 · IRC · NNTP · XMPP · POP3 · Datagram Sockets) to one another. UDP is sometimes SIP · SMTP · SNMP · SSH · TELNET · called the Universal Datagram Protocol. RPC · RTCP · RTSP · TLS · SDP · UDP does not guarantee reliability or ordering in the SOAP · GTP · STUN · NTP · (more) way that TCP does. Datagrams may arrive out of order, 4. Transport layer appear duplicated, or go missing without notice. TCP · UDP · DCCP · SCTP · RTP · Avoiding the overhead of checking whether every RSVP · IGMP · (more) packet actually arrived makes UDP faster and more 3. Network/Internet layer efficient, at least for applications that do not need IP (IPv4 · IPv6) · OSPF · IS-IS · BGP · guaranteed delivery. Time-sensitive applications often IPsec · ARP · RARP · RIP · ICMP · use UDP because dropped packets are preferable to ICMPv6 · (more) delayed packets. UDP's stateless nature is also useful 2. Data link layer for servers that answer small queries from huge 802.11 · 802.16 · Wi-Fi · WiMAX · numbers of clients. Unlike TCP, UDP supports packet ATM · DTM · Token ring · Ethernet · broadcast (sending to all on local network) and FDDI · Frame Relay · GPRS · EVDO · multicasting (send to all subscribers). HSPA · HDLC · PPP · PPTP · L2TP · ISDN · (more) Common network applications that use UDP include 1.
    [Show full text]
  • (Qos) and Quality of Experience (Qoe) Issues in Video Service Provider Networks ––
    Troubleshooting Quality of Service (QoS) and Quality of Experience (QoE) issues in Video Service Provider Networks –– APPLICATION NOTE Application Note 2 www.tek.com/mpeg-video-test-solution-series/mpeg-analyzer Troubleshooting Quality of Service (QoS) and Quality of Experience (QoE) issues in Broadcast and Cable Networks Video Service Providers deliver TV programs using a variety is critical to have access or test points throughout the facility. of different network architectures. Most of these networks The minimum set of test points in any network should be at include satellite for distribution (ingest), ASI or IP throughout the point of ingest where the signal comes into the facility, the the facility, and often RF to the home or customer premise ASI or IP switch, and finally egress where the signal leaves as (egress). The quality of today’s digital video and audio is IP or RF. With a minimum of these three access points, it is usually quite good, but when audio or video issues appear at now possible to isolate the issue to have originated at either: random, it is usually quite difficult to pinpoint the root cause ingest, facility, or egress. of the problem. The issue might be as simple as an encoder To begin testing a signal that may contain the suspected over-compressing a few pictures during a scene with high issue, two related methods are often used, Quality of Service motion. Or, the problem might be from a random weather (QoS), and Quality of Experience (QoE). Both methods are event (e.g., heavy wind, rain, snow, etc.).
    [Show full text]
  • Network Connectivity and Transport – Transport
    Idaho Technology Authority (ITA) ENTERPRISE STANDARDS – S3000 NETWORK AND TELECOMMUNICATIONS Category: S3510 – NETWORK CONNECTIVITY AND TRANSPORT – TRANSPORT CONTENTS: I. Definition II. Rationale III. Approved Standard(s) IV. Approved Product(s) V. Justification VI. Technical and Implementation Considerations VII. Emerging Trends and Architectural Directions VIII. Procedure Reference IX. Review Cycle X. Contact Information Revision History I. DEFINITION Transport provides for the transparent transfer of data between different hosts and systems. The two (2) primary transport protocols in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite are the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). II. RATIONALE Idaho State government must be able to easily, reliably, and economically communicate data and information to conduct State business. TCP/IP is the protocol standard used throughout the global Internet and endorsed by ITA Policy 3020 – Connectivity and Transport Protocols, for use in State government networks (LAN and WAN). III. APPROVED STANDARD(S) TCP/IP Transport: 1. Transmission Control Protocol (TCP); and 2. User Datagram Protocol (UDP). IV. APPROVED PRODUCT(S) Standards-based products and architecture S3510 – Network Connectivity and Transport – Transport Page 1 of 2 V. JUSTIFICATION TCP and UDP are the transport standards for critical State applications like electronic mail and World Wide Web services. VI. TECHNICAL AND IMPLEMENTATION CONSIDERATIONS It is also important to carefully consider the security implications of the deployment, administration, and operation of a TCP/IP network. VII. EMERGING TRENDS AND ARCHITECTURAL DIRECTIONS The use of TCP/IP (Internet) protocols and applications continues to increase. Agencies purchasing new systems may want to consider compatibility with the emerging Internet Protocol Version 6 (IPv6), which was designed by the Internet Engineering Task Force to replace IPv4 and will dramatically expand available IP addresses.
    [Show full text]
  • CPON-HFC Light Link Direct® FTTH Node
    ® 969 Horsham Road CPON-HFC Light Link Direct FTTH Node Horsham, Pennsylvania 19044 USA 1 GHz Two Way FTTH Customer Premises Node Description Features The Light Link® Direct CPON-HFC customer Delivers full bandwidth CATV services to 1 GHz. premises optical node for FTTH networks offering The duplex unit is suitable for advanced DOCSIS full bandwidth cable television delivery, plus broad- with Telephony and Internet. band access via DOCSIS cable modems. High-performance optical receiver for CATV deliv- ery over glass (fibre) with 110 NTSC channels or Fiber-to-the-home (FTTH) is a reality today. The 91 PAL channels capacity. CPON-HFC is designed as an economic single port Suitable for transmission of PAL or NTSC ana- PBN CPON-HFC Light Link node customer premise deployment providing sim- logue TV channels as well as DVB-C or DVB-T plex or full duplex RF connectivity. digital television standards. Wide optical input range permits easy installation Employing leading edge designs for optical and without on-site alignment. electronic circuitry inside a die-cast metal housing, Optional return path transmitter to suit DOCSIS the CPON-HFC provides top class services and compliant cable modems and RF based pay-per- permits easy installation in home wiring closets or view systems. other confined spaces. Powered by either a direct coax 11 ~ 16 Vdc feed or DC power port. The core of the CPON-HFC is a high performance The compact and sturdy enclosure fits easily into low-noise optical receiver module for CATV to 1 wiring closets or network termination boxes. GHz, together with an optional return path transmit- ter module.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Research on the System Structure of IPV9 Based on TCP/IP/M
    International Journal of Advanced Network, Monitoring and Controls Volume 04, No.03, 2019 Research on the System Structure of IPV9 Based on TCP/IP/M Wang Jianguo Xie Jianping 1. State and Provincial Joint Engineering Lab. of 1. Chinese Decimal Network Working Group Advanced Network, Monitoring and Control Shanghai, China 2. Xi'an, China Shanghai Decimal System Network Information 2. School of Computer Science and Engineering Technology Ltd. Xi'an Technological University e-mail: [email protected] Xi'an, China e-mail: [email protected] Wang Zhongsheng Zhong Wei 1. School of Computer Science and Engineering 1. Chinese Decimal Network Working Group Xi'an Technological University Shanghai, China Xi'an, China 2. Shanghai Decimal System Network Information 2. State and Provincial Joint Engineering Lab. of Technology Ltd. Advanced Network, Monitoring and Control e-mail: [email protected] Xi'an, China e-mail: [email protected] Abstract—Network system structure is the basis of network theory, which requires the establishment of a link before data communication. The design of network model can change the transmission and the withdrawal of the link after the network structure from the root, solve the deficiency of the transmission is completed. It solves the problem of original network system, and meet the new demand of the high-quality real-time media communication caused by the future network. TCP/IP as the core network technology is integration of three networks (communication network, successful, it has shortcomings but is a reasonable existence, broadcasting network and Internet) from the underlying will continue to play a role. Considering the compatibility with structure of the network, realizes the long-distance and the original network, the new network model needs to be large-traffic data transmission of the future network, and lays compatible with the existing TCP/IP four-layer model, at the a solid foundation for the digital currency and virtual same time; it can provide a better technical system to currency of the Internet.
    [Show full text]