Pages

Wednesday, July 25, 2012

Difference Between SDH and PDH Transmission


     PDH is Plesiochronous Digital Hierarchy and SDH is Synchronous Digital Hierarchy. Both are used in PCM transmission systems. Both use TDM principles for PCM frames.

      Difference Between SDH and PDH Transmission

PDH
The clock used is not the same throughout the transmission network.
Old system used for only point to point communication and interconnectivity between 
the system is difficult.
Used in 2Mb, 8Mb, 34Mb and 140 Mb systems only.
No world standard on digital format (three incompatible regional standards 
- European,  North American and Japanese).
No world standard for optical interfaces. Networking is impossible at the optical level.


SDH
Synchronous clock is used in the entire Transmission system.
Latest system used in any kind of transmission configuration and interconnectivity
between 
different systems is very easy.
Used in STM-1 (155.52Mbps,STM-(622.08Mbps),STM-16(2.5Gbps) and STM-64
(10G BPS) transmission systems.
World standard on digital format (three incompatible regional standards - European, North American and Japanese).
World standard for optical interfaces. Networking is possible at the optical level.


Next Generation Network (NGN)


   Next-generation network (NGN) is a term used to describe key architectural evolutions in telecommunication core and access networks. The general idea behind the NGN is that one network transports all information and services (voice, data, and all sorts of media such as video) by encapsulating these into packets, similar to those used on the Internet. 

NGNs are commonly built around the Internet Protocol, and therefore the term all IP is also sometimes used to describe the transformation toward NGN. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users and real-time, multi-media communications and it is high-speed access and transport for any medium, anytime, anywhere, and in any volume.

Standards Protocols in Networking & Data Sharing


I. HTTP    : Hypertext Transfer Protocol

It is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a multi-linear set of objects, building a network by using logical links between the nodes. HTTP is the protocol to exchange or transfer hypertext.

II. FTP      : File Transfer Protocol

It is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content,


III. IP         : Internet Protocol

It is the principal communications protocol used for relaying datagrams across an internet work using the Internet Protocol Suite. Responsible for routing packets across network boundaries and has the task of delivering datagrams from the source host to the destination host solely based on the addresses. It is the primary protocol that establishes the Internet.

IV. TCP    : Transmission Control Protocol

It is one of the core protocols of the Internet Protocol Suite. Complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of octets from a program on one computer to another program on another computer. TCP is the protocol used by major Internet applications such as the World Wide Web, email, remote administration and file transfer.

V. POP3   : Post Office Protocol (version 3)

It is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval. Most webmail service providers such as Hotmail, Gmail and Yahoo! Mail also provide IMAP and POP3 service.

VI. SMTP : Simple Mail Transfer Protocol

It is an Internet standard for e-mail transmission across IP networks. While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying.

VII. DNS   : Domain Name System

It is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. A DNS resolves queries for these names into IP addresses for the purpose of locating computer services and devices worldwide. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet.

VIII. Telnet :

It is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the TCP.

IEEE 802 working groups


The 802 portion of the IEEE is responsible for publishing standards on a number of different protocols. The IEEE 802 Standard comprises a family of networking standards that cover the physical layer specifications of technologies from Ethernet to wireless. IEEE 802 is subdivided into 22 parts that cover the physical and data-link aspects of networking. 

All the 802.11 specifications use the Ethernet protocol and Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) for path sharing. The original modulation used in 802.11 was phase-shift keying (PSK). However, other schemes, such as complementary code keying (CCK), are used in some of the newer specifications. The newer modulation methods provide higher data speed and reduced vulnerability to interference.

Working Group
Task & Description
Status



802.1
Higher Layer LAN Protocols Working Group, which develop standards and recommended practices in the areas of 802 LAN/MAN architecture, internetworking among 802 LANs, MANs and other wide area networks, 802 Security, 802 overall network management, and protocol layers above the MAC & LLC layers.
Active
802.2
Logical Link Control Working Group, Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements
Inactive
802.3              
Ethernet Working Group, Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications
Active
802.4              
Token Bus Working Group, this is a network implementing the token ring protocol over a "virtual ring" on a coaxial cable. It is mainly used for industrial applications.
Disbanded
802.5  
Token Ring Working Group, this is a protocol which resides at the data link layer (DLL) of the OSI model.     It uses a special three-byte frame called a token that travels around the ring.
Inactive
802.6              
Metropolitan Area Network Working Group, It is an improvement of an older standard (also created by ANSI) which used the Fiber distributed data interface (FDDI) network structure. This form supports 150 Mbit/s transfer rates
Disbanded
802.7              
Broadband TAG, The working group did issue a recommendation in 1989, but is currently inactive and in hibernation.
Disbanded
802.8  
Fiber Optic TAG, to create a LAN standard for fiber optic media used in token passing computer networks like FDDI.
Disbanded
802.9              
Isochronous LAN Working Group, this is developed standards for integrated voice and data access over existing Category 3 twisted-pair network cable installations. It was developed to provide data and voice/video over the same wire without degradation by fixing the amount of bandwidth assigned to the Ethernet and B-channel sides.
Disbanded
802.10                        
Security Working Group, specifies security association management and key management, as well as access control, data confidentiality and data integrity.
Disbanded
802.11                        
Wireless LAN Working Group, is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands.
Active
802.12                        
Demand Priority Working Group, is a 100 Mbit/s Ethernet standard specified to run over four pairs of category 3 UTP wires.
Inactive
802.14                        
Cable Modem Working Group, it is develop to a standard for cable modem systems and developed for a draft standard, which was ATM-based.
Disbanded
802.15
Wireless Personal Area Network (WPAN) Working Group , which is famous as Bluetooth / ZigBee, Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)
Active
802.16                        
Broadband Wireless Access Working Group, Air Interface for Broadband Wireless Access Systems
Active
802.17                        
Resilient Packet Ring Working Group, is a standard designed for the optimized transport of data traffic over optical fiber ring networks.
Active
802.18
Radio Regulatory TAG, he Radio Regulatory Technical Advisory Group (RR-TAG) .
Active
802.19            
Coexistence TAG, is the Wireless Coexistence Technical Advisory Group (TAG) and The TAG deals with coexistence between unlicensed wireless networks.      
Active
802.20                        
Mobile Broadband Wireless Access (MBWA) Working Group, Air Interface for Mobile Broadband Wireless Access Systems Supporting Vehicular Mobility--Physical and Media Access Control Layer Specification
Active
802.21                        
Media Independent Handoff Working Group, The standard supports algorithms enabling seamless handover between networks and Mobile IP provides handover mechanisms for handover across subnets of different types of networks.
Active
802.22                         Wireless Regional Area Networks, Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands
Active