The document provides an overview of 3G packet data technologies including cdma2000 and 1x EV-DV. It summarizes the network elements, architectures, and call flows for cdma2000 packet data. It also describes the motivation and design goals of 1x EV-DV which aims to increase data rates and optimize radio resource allocation to better support high-speed integrated data and voice. Next steps are outlined to further enhance reverse link speeds and provide common services across different network access technologies.
This document discusses IPv6 transition strategies for service providers. It begins by noting that the IANA pool of IPv4 addresses has been exhausted and regional registries will soon run out as well. While existing IPv4 networks will continue to function, many devices and applications only support IPv4, creating an "IPv4 long tail" that will be challenging to transition to IPv6. The document then evaluates options for service providers, including dual-stack, translators, and tunnels. It provides more detail on implementing a dual-stack infrastructure in the core network using protocols like IS-IS, OSPF, and BGP. 6PE and 6VPE are introduced as options to provide IPv6 connectivity over an IPv4 MPLS
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
The document discusses Layer 2 VPN over MPLS, including concepts of Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS). It covers characteristics of Layer 3 and Layer 2 VPNs and concepts of L2 VPN signaling using protocols like LDP and BGP. The document also provides examples of encapsulation and data flow for Ethernet over MPLS (EoMPLS) and Frame Relay over MPLS (FRoMPLS) L2 VPN services.
VoIP allows users to make phone calls using an internet connection instead of a regular phone line. It works by converting voice signals from phones into digital data packets that can be transmitted over the internet or broadband connection. Common VoIP protocols include SIP, H.323, and IAX. VoIP has benefits like lower call costs, integration of voice and data, and added features like video calling. It has applications in agriculture by providing communication for remote farmers through initiatives like the Caribbean Farmers Network and the Timbaktu Collective project in India.
The document discusses establishing point-to-point serial connections using HDLC and PPP encapsulation protocols, including configuring PAP and CHAP authentication on PPP connections. It provides details on HDLC and PPP frame formats and describes how to configure HDLC, PPP, and authentication on Cisco routers to establish serial connections between sites. The document also includes examples of debugging PPP authentication to verify proper configuration and establishment of the point-to-point link.
Voice over MPLS (VoMPLS) allows multiple voice calls to be transported efficiently over a single MPLS label switched path (LSP) by reducing header overhead. There are three modes of carrying voice in MPLS networks, depending on requirements. VoMPLS uses LSPs to provide predictable quality of service for voice packets by multiplexing multiple calls into primary and control subframes that are transmitted together within an MPLS frame. This provides an efficient mechanism for voice transport that reduces costs compared to traditional circuit-switched networks.
This document discusses data center interconnect and virtual private LAN service (VPLS) technologies. It provides an overview of data center edge functions, collapsed WAN and aggregation solutions, data center LAN configurations, and layer 2 loop detection capabilities. It also covers multi-chassis link aggregation, data center WAN connectivity options using IP/MPLS or VPLS, and the advantages of Ethernet VPN (EVPN) over VPLS. Finally, it discusses challenges and solutions related to virtual machine mobility and provides a comparison analysis of PBB-EVPN versus EVPN.
This document provides an overview of Virtual Private LAN Service (VPLS) and the emergence of Metro Ethernet services. It discusses how Metro Ethernet has evolved from legacy networks utilizing technologies like SONET/SDH and ATM to new optical Ethernet and MPLS-based services. VPLS allows enterprises to connect multiple LAN sites over a shared infrastructure using Ethernet interfaces while maintaining privacy and security. The document also examines trends in residential broadband access and IP/broadcast convergence using Metro Ethernet.
This document discusses IPv6 transition strategies for service providers. It begins by noting that the IANA pool of IPv4 addresses has been exhausted and regional registries will soon run out as well. While existing IPv4 networks will continue to function, many devices and applications only support IPv4, creating an "IPv4 long tail" that will be challenging to transition to IPv6. The document then evaluates options for service providers, including dual-stack, translators, and tunnels. It provides more detail on implementing a dual-stack infrastructure in the core network using protocols like IS-IS, OSPF, and BGP. 6PE and 6VPE are introduced as options to provide IPv6 connectivity over an IPv4 MPLS
The document is a tutorial on L2VPN (Layer 2 Virtual Private Networks) that provides an agenda covering introductions, concepts, transports, services, pseudowire stitching, QoS, and demonstrations. It defines L2VPN as providing an end-to-end layer 2 connection across a service provider's MPLS or IP core, allowing legacy services like Frame Relay and ATM to be migrated to an MPLS/IP infrastructure. It also describes the need for L2VPN, models like VPLS and VPWS, basic building blocks of pseudowires, and control plane requirements.
The document discusses Layer 2 VPN over MPLS, including concepts of Virtual Private Wire Service (VPWS) and Virtual Private LAN Service (VPLS). It covers characteristics of Layer 3 and Layer 2 VPNs and concepts of L2 VPN signaling using protocols like LDP and BGP. The document also provides examples of encapsulation and data flow for Ethernet over MPLS (EoMPLS) and Frame Relay over MPLS (FRoMPLS) L2 VPN services.
VoIP allows users to make phone calls using an internet connection instead of a regular phone line. It works by converting voice signals from phones into digital data packets that can be transmitted over the internet or broadband connection. Common VoIP protocols include SIP, H.323, and IAX. VoIP has benefits like lower call costs, integration of voice and data, and added features like video calling. It has applications in agriculture by providing communication for remote farmers through initiatives like the Caribbean Farmers Network and the Timbaktu Collective project in India.
The document discusses establishing point-to-point serial connections using HDLC and PPP encapsulation protocols, including configuring PAP and CHAP authentication on PPP connections. It provides details on HDLC and PPP frame formats and describes how to configure HDLC, PPP, and authentication on Cisco routers to establish serial connections between sites. The document also includes examples of debugging PPP authentication to verify proper configuration and establishment of the point-to-point link.
Voice over MPLS (VoMPLS) allows multiple voice calls to be transported efficiently over a single MPLS label switched path (LSP) by reducing header overhead. There are three modes of carrying voice in MPLS networks, depending on requirements. VoMPLS uses LSPs to provide predictable quality of service for voice packets by multiplexing multiple calls into primary and control subframes that are transmitted together within an MPLS frame. This provides an efficient mechanism for voice transport that reduces costs compared to traditional circuit-switched networks.
This document discusses data center interconnect and virtual private LAN service (VPLS) technologies. It provides an overview of data center edge functions, collapsed WAN and aggregation solutions, data center LAN configurations, and layer 2 loop detection capabilities. It also covers multi-chassis link aggregation, data center WAN connectivity options using IP/MPLS or VPLS, and the advantages of Ethernet VPN (EVPN) over VPLS. Finally, it discusses challenges and solutions related to virtual machine mobility and provides a comparison analysis of PBB-EVPN versus EVPN.
This document provides an overview of Virtual Private LAN Service (VPLS) and the emergence of Metro Ethernet services. It discusses how Metro Ethernet has evolved from legacy networks utilizing technologies like SONET/SDH and ATM to new optical Ethernet and MPLS-based services. VPLS allows enterprises to connect multiple LAN sites over a shared infrastructure using Ethernet interfaces while maintaining privacy and security. The document also examines trends in residential broadband access and IP/broadcast convergence using Metro Ethernet.
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
The document discusses the business case for Layer 2 MPLS VPNs. It outlines how MPLS L2VPNs allow service providers to leverage their IP infrastructure while continuing to offer Frame Relay and ATM services to customers. MPLS L2VPNs provide Layer 2 connectivity and allow for a gradual migration to Ethernet and IP-based networks. The key benefits are reducing costs by consolidating services on a single IP infrastructure while maintaining revenue from existing Frame Relay/ATM customers.
Rajesh Kumar Sundararajan, Assistant VP of Product Management at Aricent, gave a talk about TRILL and Datacenter technologies at the Interop Show in Las Vegas, May 2012.
The document discusses the evolution of networks towards Next Generation Networks (NGNs) and describes some of the key components of NGN architectures including IP services, control plane architectures, VoIP, mobility support, QoS, IPv6 migration, and potential local and core network topologies. Reference network architectures are presented for traditional IP networks and the introduction of NGN services in circuit-switched and packet-switched domains.
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
The document provides an overview and comparison of TRILL and SPB technologies. It discusses updates to PBB and PBB-TE standards and implementations. TRILL and SPB were both developed to provide optimal forwarding of unicast and multicast traffic with fast convergence compared to spanning tree. The document compares aspects of TRILL and SPB such as control plane protocols, routing, and loop mitigation techniques.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Introduction to Diameter: The Evolution of SignalingPT
As telecommunications networks have advanced, so have the signaling procedures. This introduction to Diameter gives you an overview of the evolution of signaling.
This document provides an overview of softswitch technology and VoIP over cable networks. It discusses drivers like cost reduction and creating an open platform. Key points discussed include defining demarcation points between internal and external networks, constraints like compatibility issues, and case studies on convergence over cable. The document also covers PacketCable specifications and an evolving view of softswitches moving functions to the edge to create an intelligent network and service platform while protecting existing investments.
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) BP Tiwari
This document discusses the physical layer design of LTE-Advanced. It describes the downlink and uplink physical layer designs, including the use of OFDMA in the downlink and SC-FDMA in the uplink. It also discusses support for time division duplexing and half-duplex frequency division duplexing. Enhancements to user equipment categories and the physical layer for LTE-Advanced are also covered.
The document outlines competencies in mobile and wireless communications including network architectures, network protocols from layers 1-5, the physical layer, and cross-layer design. It provides examples of network architectures like access networks, mesh networks, and sensor networks. It also discusses topics in network protocols, the physical layer including signal propagation and radio technologies, and cross-layer optimization across the protocol stack.
New 3G Industrial Cellular Router from R&S TopexBogdan Calin, PMP
This document summarizes the features of the Topex Bytton ICR industrial cellular router. It provides high-speed data transfer over 3G+ networks, supports dual SIM cards, remote monitoring and control, and rugged housing suitable for extreme environments. Key features include HSPA+ speeds up to 42 Mbps, wireless and Ethernet interfaces, VPN connectivity, and support for industrial applications like telemetry.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
The document discusses Virtual Private LAN Service (VPLS), which allows different sites to communicate as if they are connected to the same LAN over a service provider's IP/MPLS network. There are two implementations of VPLS supported by IETF - one using BGP signaling and one using LDP signaling. Juniper Networks' VPLS solution implements both standards. The document concludes that the BGP-based implementation provides the highest level of automation and operational efficiency for service providers offering VPLS.
The document proposes a solution for scaling LDP-based pseudowire (PW) services across multiple regions. It uses LDP signaling for setting up intra-region PWs and BGP for inter-region stitching and routing. The solution allows PW services to extend across autonomous systems and areas without requiring protocols like BGP on terminating provider edges (T-PEs). Provisioning and signaling are simplified through the use of attachment identifiers and route targets. Existing T-PE capabilities are largely reused through minor extensions to FEC-128/129 signaling over LDP. BGP routing between switching provider edges (S-PEs) avoids a full mesh of LDP sessions to improve scaling as the number of T-
This document discusses MPLS VPN technology. It provides an overview of MPLS VPN concepts including how MPLS VPN works, key terminology, the connection model, forwarding mechanisms, and configuration. The connection model section describes how VPNs are implemented using MPLS, with PE routers maintaining separate routing instances (VRFs) for each VPN and exchanging routing information between VPN sites using MP-BGP. Core P routers are unaware of VPNs and switch packets using MPLS labels.
The document discusses several topics related to business-to-business (B2B) models and technology infrastructure. It describes common B2B models including types of business webs, agora, aggregation, value chains, and alliances. It also covers computer networking protocols, internet infrastructure, domain name resolution, and application protocols like HTTP, SMTP, and how computers communicate over the internet.
This document provides an overview of MPLS L2VPN (VLL) technology:
- MPLS L2VPN uses MPLS to provide VPN services and establish Layer 2 connections between customer sites, seen as a single Layer 2 switched network.
- It has two modes: VPLS for point-to-multipoint and VLL for point-to-point networking. This document focuses on VLL.
- The MPLS L2VPN model consists of customer edge (CE) devices managed by customers and provider edge (PE) and provider (P) devices managed by the service provider.
The document proposes Ethernet VPN (E-VPN) as a solution to overcome scaling challenges with the existing Virtual Private LAN Service (VPLS) technology. E-VPN uses MPLS and BGP to transport layer 2 connectivity between data centers. It treats MAC addresses as routable addresses and uses MP-iBGP to distribute customer MAC addresses between edge routers. This allows for remote MAC learning and helps scale to thousands of MAC addresses. The document also describes how E-VPN uses Ethernet Segment IDs and split horizon labels to avoid layer 2 loops in multi-homing scenarios.
Our integrated communications campaign aims to make Snapple relevant again during its 45th anniversary year. The campaign objectives are to grow Snapple's brand relevance nationally, increase television presence, use public relations, and grow purchase frequency. The campaign mission is to have consumers associate Snapple with positive life experiences they will continuously thirst for by creating scenarios where consumers step out of their comfort zone and experience favorable outcomes tailored to their desires. This will increase sales, maintain brand loyalty in core markets, and increase loyalty nationally.
The document summarizes a presentation on the Play! web application framework. It discusses Play!'s stateless and scalable architecture, support for WebSockets and CoffeeScript, highly productive development cycles, automated deployment to cloud platforms like Heroku, and conclusion that Play! is a productive framework for internet and cloud applications despite some limitations for enterprise applications.
This document discusses error-tolerant search, which allows users to retrieve intended search results even if they misspell terms. It is useful when users do not know how to correctly spell what they are looking for, such as names from non-Indo-European languages. The document provides examples of how error-tolerant search could be applied within an iPhone application's phonebook, buildings search, and events search. It also gives examples of common spelling mistakes and variations in names that error-tolerant search would be helpful for.
This document describes a presentation on designing MPLS Layer 3 VPN networks, covering MPLS VPN technology overview, configuration, services such as multihoming and hub-and-spoke, and best practices. The presentation discusses how MPLS VPNs use VRFs, MP-BGP, and label switching to provide scalable VPN services to enterprises by separating routing and forwarding tables for each customer VPN. Sample MPLS VPN configurations for PE, P, and route reflector routers are also provided.
The document discusses the business case for Layer 2 MPLS VPNs. It outlines how MPLS L2VPNs allow service providers to leverage their IP infrastructure while continuing to offer Frame Relay and ATM services to customers. MPLS L2VPNs provide Layer 2 connectivity and allow for a gradual migration to Ethernet and IP-based networks. The key benefits are reducing costs by consolidating services on a single IP infrastructure while maintaining revenue from existing Frame Relay/ATM customers.
Rajesh Kumar Sundararajan, Assistant VP of Product Management at Aricent, gave a talk about TRILL and Datacenter technologies at the Interop Show in Las Vegas, May 2012.
The document discusses the evolution of networks towards Next Generation Networks (NGNs) and describes some of the key components of NGN architectures including IP services, control plane architectures, VoIP, mobility support, QoS, IPv6 migration, and potential local and core network topologies. Reference network architectures are presented for traditional IP networks and the introduction of NGN services in circuit-switched and packet-switched domains.
Implementation of isp mpls backbone network on i pv6 using 6 pe routers main PPTSatish Kumar
MINI PPT
IPv6 (Internet Protocol version 6) is a revision of the Internet Protocol (IP) developed by the Internet Engineering Task Force (IETF). IPv6 is intended to succeed IPv4.
IPv6 implements a new addressing system that allows for far more addresses to be assigned than with Ipv4.
Multiprotocol Label Switching (MPLS) is deployed by many service providers for establishing their backbone networks.
The Cisco implementation of IPv6 provider edge router over MPLS is called 6PE,and it enables IPv6 sites to communicate with each other over an MPLS IPv4 core network using MPLS label switched paths.
The document provides an overview and comparison of TRILL and SPB technologies. It discusses updates to PBB and PBB-TE standards and implementations. TRILL and SPB were both developed to provide optimal forwarding of unicast and multicast traffic with fast convergence compared to spanning tree. The document compares aspects of TRILL and SPB such as control plane protocols, routing, and loop mitigation techniques.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
Introduction to Diameter: The Evolution of SignalingPT
As telecommunications networks have advanced, so have the signaling procedures. This introduction to Diameter gives you an overview of the evolution of signaling.
This document provides an overview of softswitch technology and VoIP over cable networks. It discusses drivers like cost reduction and creating an open platform. Key points discussed include defining demarcation points between internal and external networks, constraints like compatibility issues, and case studies on convergence over cable. The document also covers PacketCable specifications and an evolving view of softswitches moving functions to the edge to create an intelligent network and service platform while protecting existing investments.
Physical layer aspects (Matthew Baker: RAN WG1 Chair, Alcatel-Lucent) BP Tiwari
This document discusses the physical layer design of LTE-Advanced. It describes the downlink and uplink physical layer designs, including the use of OFDMA in the downlink and SC-FDMA in the uplink. It also discusses support for time division duplexing and half-duplex frequency division duplexing. Enhancements to user equipment categories and the physical layer for LTE-Advanced are also covered.
The document outlines competencies in mobile and wireless communications including network architectures, network protocols from layers 1-5, the physical layer, and cross-layer design. It provides examples of network architectures like access networks, mesh networks, and sensor networks. It also discusses topics in network protocols, the physical layer including signal propagation and radio technologies, and cross-layer optimization across the protocol stack.
New 3G Industrial Cellular Router from R&S TopexBogdan Calin, PMP
This document summarizes the features of the Topex Bytton ICR industrial cellular router. It provides high-speed data transfer over 3G+ networks, supports dual SIM cards, remote monitoring and control, and rugged housing suitable for extreme environments. Key features include HSPA+ speeds up to 42 Mbps, wireless and Ethernet interfaces, VPN connectivity, and support for industrial applications like telemetry.
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
This document discusses deploying MPLS L3VPN. It begins with an overview of MPLS and VPN terminology. It then covers the MPLS reference architecture and different node types. It describes how IP/VPN technologies use separate routing tables at provider edge (PE) routers to provide independent virtual routing and forwarding (VRF) instances for each VPN customer. The control plane uses multiprotocol BGP (MP-BGP) to distribute VPN routes between PE routers using route distinguisher (RD), route target (RT), and labels. The forwarding plane uses these labels to encapsulate and transport customer IP packets across the MPLS core. The document then discusses various IP/VPN services including load sharing, hub-and-spoke
The document discusses Virtual Private LAN Service (VPLS), which allows different sites to communicate as if they are connected to the same LAN over a service provider's IP/MPLS network. There are two implementations of VPLS supported by IETF - one using BGP signaling and one using LDP signaling. Juniper Networks' VPLS solution implements both standards. The document concludes that the BGP-based implementation provides the highest level of automation and operational efficiency for service providers offering VPLS.
The document proposes a solution for scaling LDP-based pseudowire (PW) services across multiple regions. It uses LDP signaling for setting up intra-region PWs and BGP for inter-region stitching and routing. The solution allows PW services to extend across autonomous systems and areas without requiring protocols like BGP on terminating provider edges (T-PEs). Provisioning and signaling are simplified through the use of attachment identifiers and route targets. Existing T-PE capabilities are largely reused through minor extensions to FEC-128/129 signaling over LDP. BGP routing between switching provider edges (S-PEs) avoids a full mesh of LDP sessions to improve scaling as the number of T-
This document discusses MPLS VPN technology. It provides an overview of MPLS VPN concepts including how MPLS VPN works, key terminology, the connection model, forwarding mechanisms, and configuration. The connection model section describes how VPNs are implemented using MPLS, with PE routers maintaining separate routing instances (VRFs) for each VPN and exchanging routing information between VPN sites using MP-BGP. Core P routers are unaware of VPNs and switch packets using MPLS labels.
The document discusses several topics related to business-to-business (B2B) models and technology infrastructure. It describes common B2B models including types of business webs, agora, aggregation, value chains, and alliances. It also covers computer networking protocols, internet infrastructure, domain name resolution, and application protocols like HTTP, SMTP, and how computers communicate over the internet.
This document provides an overview of MPLS L2VPN (VLL) technology:
- MPLS L2VPN uses MPLS to provide VPN services and establish Layer 2 connections between customer sites, seen as a single Layer 2 switched network.
- It has two modes: VPLS for point-to-multipoint and VLL for point-to-point networking. This document focuses on VLL.
- The MPLS L2VPN model consists of customer edge (CE) devices managed by customers and provider edge (PE) and provider (P) devices managed by the service provider.
The document proposes Ethernet VPN (E-VPN) as a solution to overcome scaling challenges with the existing Virtual Private LAN Service (VPLS) technology. E-VPN uses MPLS and BGP to transport layer 2 connectivity between data centers. It treats MAC addresses as routable addresses and uses MP-iBGP to distribute customer MAC addresses between edge routers. This allows for remote MAC learning and helps scale to thousands of MAC addresses. The document also describes how E-VPN uses Ethernet Segment IDs and split horizon labels to avoid layer 2 loops in multi-homing scenarios.
Our integrated communications campaign aims to make Snapple relevant again during its 45th anniversary year. The campaign objectives are to grow Snapple's brand relevance nationally, increase television presence, use public relations, and grow purchase frequency. The campaign mission is to have consumers associate Snapple with positive life experiences they will continuously thirst for by creating scenarios where consumers step out of their comfort zone and experience favorable outcomes tailored to their desires. This will increase sales, maintain brand loyalty in core markets, and increase loyalty nationally.
The document summarizes a presentation on the Play! web application framework. It discusses Play!'s stateless and scalable architecture, support for WebSockets and CoffeeScript, highly productive development cycles, automated deployment to cloud platforms like Heroku, and conclusion that Play! is a productive framework for internet and cloud applications despite some limitations for enterprise applications.
This document discusses error-tolerant search, which allows users to retrieve intended search results even if they misspell terms. It is useful when users do not know how to correctly spell what they are looking for, such as names from non-Indo-European languages. The document provides examples of how error-tolerant search could be applied within an iPhone application's phonebook, buildings search, and events search. It also gives examples of common spelling mistakes and variations in names that error-tolerant search would be helpful for.
This newsletter discusses big data and its applications. It provides summaries of articles about big data needing large storage solutions, forecasts for the big data market, analyzing hype around big data technologies, using big data in medical science and graphics, and an algorithm that can identify cities based on architectural characteristics. The newsletter is from the UK Business Analytics Team and invites feedback.
Poverty is defined as the lack of income and resources to meet basic needs. Over 1 billion people live in absolute poverty according to the World Bank, with large populations in India and China. Poverty can be caused by lack of education, which limits job prospects, and overspending beyond one's means. Organizations like CARE aim to alleviate poverty by providing emergency aid, increasing economic opportunities through job training and loans, and improving access to clean water and sanitation. Poverty in other countries can negatively impact global trade and resources if disasters occur.
This document discusses factors for why a Dependent Eligibility Verification Audit (DEVA) is the best option for Secova. It provides details on Secova's timeline and process for conducting their DEVA from June 2012 to February 2013. The audit results show that 90.05% of dependents were confirmed eligible, with an overall 9.73% non-verification rate. Conducting the DEVA allowed Secova to reduce benefit costs while fulfilling fiduciary duty, and focused delivery and project management helped minimize the time commitment.
Dokumen ini memberikan panduan untuk memperbaharui buku pinjaman secara dalam talian melalui laman web perpustakaan dengan menyediakan langkah-langkah seperti login dengan menggunakan nombor barcode dan pin, melihat butiran buku yang dipinjam, dan menyambung tarikh pinjaman buku yang dipilih.
Parse é um PaaS (platform as a service) que foi criado para auxiliar desenvolvedores a criarem seus aplicativos sem a necessidade de criar um web service para gerenciamento dos dados. Através de sua API, é possível gerenciar dados através de um banco com interface visual (Parse Data), configurar o envio de push notifications (Parse Push), integrar contas de redes sociais (Parse Social) e ainda escrever código para customização e tratamento de seus dados na nuvem (Cloud Code).
Parse is a PaaS (platform as a service) which was created to support developers to build their mobile apps without a web service managing the data. Through its API, it is possible to manage data through a database using a visual interface (Parse Data), configure push notifications (Parse Push), integrate social networks accounts (Parse Social) and write code to customize your requests in the cloud (Cloud Code).
The document discusses the benefits of meditation for reducing stress and anxiety. Regular meditation practice can help calm the mind and body by lowering heart rate and blood pressure. Studies have shown that meditating for just 10-20 minutes per day can have significant positive impacts on both mental and physical health over time.
This presentation does require a narrative, and was designed for a 90 minute 'Lunch & Learn' environment. It showcases some of the opportunities that integrated digital marketing planning can address.
Pragya Pandey is seeking a position that allows her to utilize her skills and contribute creatively to an organization's growth. She has a Bachelor of Engineering degree in Electronics and Telecommunication with good grades. She has experience using MATLAB through internships and projects, including vehicle number plate recognition and video watermarking. Pragya has participated in technical competitions and holds an Institution of Engineers membership. She is proficient in software like MATLAB, XILINX, and MS Office.
Hercules, also known as Heracles, was a hero of Greek mythology known for his immense strength and for undertaking 12 near-impossible tasks, known as the Labors of Hercules. The document describes each of the 12 Labors in detail, including capturing the Nemean Lion, slaying the Hydra, cleaning the Augean stables, and capturing Cerberus from the Underworld. It also provides background on Hercules' birth to the god Zeus and mortal woman, his madness and killing of his children, and his eventual deification as a god after his death from Hydra venom poisoning.
This document summarizes Boots' haircare sales promotion options. The objectives are to attract lower-value brand consumers and build brand equity while considering competitors. The options considered are: 3 for 2 promotion, receive a gift with purchase (GWP), and on-pack 50% off coupon. A quantitative analysis estimates the 3 for 2 promotion would increase sales 300% but have high costs, GWP would increase sales 170% but be easily imitated, and the coupon would have the lowest estimated sales growth at 150% but also be the lowest cost and risk option.
The AP-NR5000 is a high-performance network DVR server solution from AddPac Technology. It provides fault tolerant and scalable network video recording and streaming capabilities. The system utilizes redundant hardware components and embedded APOS networking software to ensure stability and reliability. The AP-NR5000 can integrate with various network cameras and live video display units to deploy security and surveillance solutions over IP networks.
Acme Packet Presentation Materials for VUC June 18th 2010Michael Graves
1) The document discusses Acme Packet's enterprise session border controller (SBC) solutions which control four IP network borders, including SIP trunking, private networks, public internet, and hosted services.
2) It provides an overview of Acme Packet's SBC product portfolio including the Net-Net product family and their session capacity, throughput, and features for securing SIP trunking and enabling interoperability.
3) The SBC helps secure SIP trunking by acting as an application layer gateway, providing dynamic port control, full SIP firewalling, and DDOS protection to establish a "defense in depth" security model for SIP trunk traffic.
This document discusses advanced VPLS techniques including:
1. Using P2MP LSPs to improve VPLS scaling by distributing replication across the network instead of concentrating it on the first hop link.
2. Interworking between BGP and LDP signaling to allow for both manual and automated VPLS provisioning.
3. Employing mesh groups to interconnect LDP and BGP VPLS domains and control flooding between them.
The document provides an overview of GSM protocols:
- It describes the 7 layers of the OSI model and how they relate to network support layers (physical and data link layers) and user support layers (session, presentation, and application layers).
- It explains key GSM protocol layers including the physical layer, data link layer, and signaling layers used for call setup and termination between mobile devices and the core network.
- It also discusses common protocols used in telephone networks like ISDN, SS7, and how protocols like SCCP, TCAP, MAP, and INAP are used to support services like roaming and calling card transactions.
The document provides an overview of TCP/IP and its implementation on the LPC2300/LPC2400 family microcontrollers. It discusses the similarities between blocks across the LPC2000 family, including the Ethernet controller and other peripherals. It then describes the TCP/IP network stack layers and protocols like IP, TCP, UDP. Examples are given of open source and commercial TCP/IP stacks that can be used on these devices, including NicheLite, NicheStack, Keil's RTX TCP/IP suite. Recommendations are made for further reading materials on Ethernet specifications.
Everything you wanted to know about iSCSI, but were afraid to ask. Presneted by David Black PhD who was a fundamental influence on the development of the protocol. This presentation is really fantastic!
The document discusses evolving transport networks from SONET/SDH TDM to packet-based transport using MPLS-TP. It provides an overview of MPLS-TP technologies and use case scenarios. Some key points include: MPLS-TP addresses bandwidth growth needs while satisfying carriers' requirements for reliability, flexibility and lower costs. Standards are being developed jointly by IETF and ITU-T. Draft specifications target implementation of OAM, protection schemes, and other aspects. Potential deployment scenarios include aggregation/access networks, mobile backhaul, and transport of Ethernet or IP/MPLS services networks.
The document discusses the evolution of transport networks from SONET/SDH TDM technologies to packet switching using MPLS-TP. It provides an overview of MPLS-TP, including its fundamentals, architecture, and key technologies. It also outlines several potential deployment scenarios for MPLS-TP, such as in aggregation and access networks, mobile backhaul, and for carrier Ethernet. Finally, it reviews the status of MPLS-TP standardization efforts in the IETF and ITU-T.
PLNOG16: Kreowanie usług przez operatorów – SP IWAN, Krzysztof KonkowskiPROIDEA
The document discusses an SP-IWAN (Service Provider Intelligent WAN) architecture that can be offered by network operators. It proposes separating the transport and service layers, using DMVPN as an overlay and allowing applications to flow freely between MPLS and internet links using PfR. It also discusses using virtual network functions and orchestration to automate service provisioning and deliver application-aware services like monitoring, optimization and security. The architecture is meant to help operators deliver new cloud services, optimize application performance across networks and generate new revenue streams.
Presentation from SIEPON Seminar on 20 April in Czech Republic, sponsored by IEEE-SA & CAG. Opinions presented by the speakers in this presentation are their own, and not necessarily those of their employers or of IEEE.
PLNOG 13: Jeff Tantsura: Programmable and Application aware IP/MPLS networkingPROIDEA
Jeff Tantsura – Head of Technology Strategy Routing at Ericsson & WG Chair of RTGWG at IETF. Jeff has over 20 years of experience in the design and implementation of complex internet products and solutions, as well as 7+ years in Product Management. Skill set includes an expert level of knowledge of IP/MPLS networking and SDN solutions as well as ability to monetize it. More than 10 patents/applications – mostly in IP Routing Fast Convergence area, some L2 (SPB/EVPN). Active contributor to the IETF (chairing Routing Area Working Group): authoring/co-authoring 20+ IETF documents: routing, MPLS, MULTICAST, L2VPN and PCE WG’s. Frequent speaker at internal and public events.
Topic of Presentation: Programmable and Application aware IP/MPLS networking
Language: English
Abstract: The session will cover the topic of controlling and managing IP / MPLS architecture using SDN. The concept of Segment Routing (SR) will be presented as this is currently a subject of IETF standardization. The Segment Routing protocol extends the existing set of IP / MPLS-oriented mechanisms to control network using the SDN controller. The concept of support for Segment Routing based on Open Daylight architecture will be shown. Jeff will present examples of Segment Routing applications such as: optimization of the network in near real-time, network applications optimized angle and multi-tenant environment, segment routing and packet optical networks. Jeff Tantsura (speaker) is the co-author of emerging standardization documents relating to Segment Routing.
Virtualization Forum 2015, Praha, 7.10.2015
sál Juniper Networks
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf.
The document discusses various networking protocols and standards related to professional media over IP, including:
- SMPTE ST 2110 standards that define carriage of uncompressed video, audio, and data over IP networks as separate elementary streams.
- AES67, which enables high-performance audio-over-IP streaming interoperability between different IP audio networking products.
- Other relevant standards and protocols like SMPTE ST 2022, AIMS recommendations, Video Services Forum TR-03/04, RTP, SDP, PTP, and IGMP.
- Considerations for designing IP infrastructures for media networks, including capacity, connectivity, timing, control, and redundancy.
This document discusses IP addressing, subnet masks, default gateways, and the organizations that manage IP addresses. It describes public and private IP addresses and the different IP address classes. It also provides an overview of the 7-layer OSI model and describes each layer's function. Finally, it mentions some common protocol port numbers and introduces Cisco routers and switches.
This document discusses EVPN solutions and applications for data center (DC) and service provider (SP) segments. It provides an overview of EVPN, including its capabilities for multi-homing, fast convergence, and load balancing. The document outlines various IETF drafts related to EVPN for applications like DC fabrics, inter-route bridging (IRB), and inter-DC connectivity. It compares EVPN to other layer 2 VPN solutions and discusses uses of EVPN for VPWS, E-Tree, and in conjunction with Provider Backbone Bridging (PBB-EVPN).
This document discusses interworking in a train network. It describes the use of Mobile IP (MIP) and Mobile Multi-Path SCTP (MMP-SCTP) for handover protocols between different wireless networks in a moving train. MMP-SCTP provides multihoming and built-in reliability, while MIP has a lower overhead but no multihoming. A policy decision function determines which interfaces to use based on factors like signal quality, location, and load balancing. Quality of service classes are mapped to outgoing links to prioritize applications like voice calls and crew communications.
The document discusses MPLS VPN and class of service capabilities for meeting demands on corporate networks. MPLS VPN uses label switching to create private networks over shared infrastructure. It allows flexibility, scalability, security and quality of service. Class of service differentiation and traffic prioritization help optimize application performance for voice, video and data.
The L2 NID based architecture for vCPE/NFV deployments faces several challenges:
1) It can cause MAC address scale issues in the NFV data center switching infrastructure as thousands of customer MAC addresses may need to be learned.
2) It extends customer layer 2 domains to the NFV data center, increasing security risks from misconfigured customer networks.
3) There is a potential risk of layer 2 loops occurring between customer networks and the service provider infrastructure without proper demarcation and loop prevention.
4) Achieving high availability between redundant vCPE instances requires reliable tracking of the connectivity between the L2 NID and vCPE, which adds complexity.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
2. Outline
cdma2000 packet data
architecture and network elements
Simple IP/Mobile IP
Packet Network Nodes
State Machines
MAC Layer
Packet Data Call Flows
1x EV-DV (1xRTT Evolution for high-speed
integrated Data and Voice)
Motivation, goals and basic principles
2
3. Packet Data Architecture
SS7 HLR
Network
Telephon
VLR MSC PSTN e Network
AAA
Packet
BSC PCF PDSN Network
Home Home
Agent AAA
3
4. Simple IP vs. Mobile IP
Mobile station’s IP address will be changed
as the subscriber moves to different cells
Mobile station will be able to use a constant
IP even when moving across different cells
Packet
BSC PCF PDSN
Network PDSN
PCF
BSC
4
5. Mobile IP Registration
PDSN Packet
BSS Network Home Agent
(FA)
MIP-RRQ Mobile registers
MIP-RRQ its care of
address
MIP-RRP HA replies with
MIP-RRP lifetime
5
Packet Data Tunnel (UDP over IP)
6. Packet Network Nodes
PCF (Packet Control Function)
A required IP element in cdma2000 networks
Provides relay to mobile from PDSN
Keeps track of registration lifetime expiration and ensures
that the sessions are renewed as necessary
Controls the available radio resources
Buffers data received from PDSN until radio resources
becomes available
Controls dormancy
PDSN (Packet Data Serving Node)
PPP datalink layer to mobile is terminated
Interfaces with PCF
IP packets are routed
In MIP network acts as a FA
6
7. Packet Network Nodes
AAA (Authentication, Authorization, and
Accounting)
Stores accounting information and
authenticates/authorizes mobiles
Provides security to FA and Foreign AAA.
HA (Home Agent)
Establishes a secure packet-data tunnel with
the FA to provide MIP services and routes the
packets destined to the mobile to the FA
Authenticates MIP registrations
7
8. Mobile Originated Packet Data Call
UCSD Ericsson ///
MSC
BSC / PCF PDSN
Origination
Base Station Ack
CMServReq
SCCP-CC
Assign Request
TCH Setup
A11-RRQ
A8 /A10
A11-RRP
setup
Assign Complete
PPP Link Establishment and Mobile IP Registration
Packet
User Packet Data Network
8
9. Control Plane – Signaling
A11 A11
UDP UDP
IP IP
Link Link
Phys Phys
BSC/PCF PDSN
9
10. User Plane – Relay Mode
IP IP IP IP
PPP PPP
GRE GRE
RLP RLP Link Link
RS-232
RS-232
IP IP
AIR AIR Link Link
Inter- Inter-
face face Phys Phys Phys Phys
End
BSC/PCF PDSN
Host
A10
10
11. User Plane – Network Mode
IP IP IP IP IP IP
SLIP or SLIP or
PPP PPP PPP PPP
GRE GRE
RLP RLP Link Link
RS-232
RS-232
IP IP
AIR AIR Link Link
Inter- Inter-
face face Phys Phys Phys Phys
End
BSC/PCF PDSN
Host
A10
11
12. MAC States (1/3)
Active Mode and DTX
Data traffic flows
Reverse pilot is not gated
MS and BS can discontinue traffic for 10-20
frames (~200ms) without tearing down traffic
channel
Active
SCH
millisecond
Active
Control/Hold Dormant
FCH
second minute
12
13. MAC States (2/3)
Control Hold
Triggered when the data traffic is idle ~1-2 seconds
Signaling only
Power control is maintained
Reverse pilot can be gated
MS Stores radio information
Active
SCH
millisecond
Active
Control/Hold Dormant
FCH
second minute
13
14. MAC States (3/3)
Dormancy
Triggered when data traffic is idle ~1-2 minutes
Traffic channels and A8 (BSC-PCF) connection is
released
A10 (PCF-PDSN) connection and PPP is maintained
Active
SCH
millisecond
Active
Control/Hold Dormant
FCH
second minute
14
15. Dormant Mode
Initiation
BSC initiates when inactivity timer is expired or RF failure
occurred
MS initiates when inactivity timer is expired or TCH is
released
Reactivation
Initiated when network or MS has data to send
Since PPP is maintained no extra control plane signaling
required
User data is exchanged after reactivation
15
16. Inter BSC – Intra PDSN HHO
Source Target
MSC PDSN
BSC/PCF BSC/PCF
User Packet Data
HO Required
HO Request
Null Fwd Traffic
HO Request ACK
HO Command
HO Direction Msg
Rev Traffic
HO Commenced
HCM
Tear Down Channels
Clear Command A11 RRQ
A11 RRP
Clear Complete
Handoff Complete
A11 RRQ (Lifetime = 0)
User Packet Data
A11 RRP
16
17. Quality of Service
Still standardization is continuing
Air interface is bottleneck for an end-to-end
QoS
Some parameters are defined such as
User’s priority level (14 possible levels)
Minimum acceptable data rate (2x, 4x, …)
Acceptable FER (1%, 2%, 5%, 10%)
17
19. Motivation
CDMA 1x supplemental channel scheduling is
slow (~2-4 secs) and data rate is not
satisfactory (~144 kbps)
Forward link has priority due to asymmetric
nature of the data applications
Flexibility against short term and long term
voice and data demands
19
20. Design Goals
Backward compatibility with cdma2000 1x
cdma2000 1x features, applications and
services and voice/data capabilities are
maintained
Minimal effect on the terminals and
infrastructure for cdma2000 1x customers
increase battery life as a side goal
20
21. Design Requirements
FL peak data rate > 2.4 Mbps
RL peak data rate > 1.25 Mbps
Average throughput in FL and RL > 600 kbps
Peak data rate and average throughput is at
least as much as 1X EV-DO
21
22. What’s needed?
Radio resources should be optimally used
Radio link control & resource allocation must
be optimized
22
23. How is it achieved? (1/3)
100%
Residual power for 1x EV-DV
Base Station Power
1xEV-DV
overhead
Power for 1x voice and data
1x overhead
Time
Packet Data Common Channel is introduced
23
24. How is it achieved? (2/3)
Left-over power is used, hence no power
control
Rate control (higher order modulation and
coding) is used to maintained link quality
Optimally schedule delay tolerant data
Favor the user with good channel quality
Serve users both in parallel (CDM) and serial
(TDM) while TDM is preferred if possible
24
25. How is it achieved? (3/3)
Fast sector switching
Fast channel quality indicator send by MS
Fast physical layer ARQ (Automatic Repeat
Request) which also provides error correction
25
26. What’s next?
Reverse link data enhancements are
necessary to meet the requirements, i.e. 1.25
Mbps
Common services and mobility with different
type of network access technologies, such as
Wireless LANs, DSL, satellites etc.
26
27. 4G
Higher data rates ~2-20 Mbps
New air interface needs to be developed
Potential candidate OFDM
Smart antennas can form directed beams to
increase strength of the desired signal
A new spectrum needs to be assigned
Software radio can transmit over different air
interface technologies
All-IP vision: base stations become an access
router
27
Editor's Notes
Salih Ergut is a full-time employee at Ericsson Wireless Communication Inc. (San Diego, CA) and pursuing his PhD part-time at ECE Department of UCSD. E-mails: [email_address] [email_address]
The mobile station shall maintain a packet data inactivity timer. The value of this timer shall not be less than 20 seconds