This document proposes an architecture for transporting large amounts of satellite data using Synchronous Digital Hierarchy (SDH) technologies. The architecture consists of terrestrial networks, satellites with inter-satellite links, various earth stations, and user terminals that can connect to the satellite links directly or through terrestrial networks using SDH, IP, ATM, or other protocols. Datagrams such as ATM cells and IP packets can be transported over SDH links between satellites in space. The architecture provides flexible access for different types of user terminals.
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
SDH (Synchronous Digital Hierarchy) & Its Architectureijsrd.com
The SDH (Synchronous Digital Hierarchy) tell us about transferring large amount of data over an same optical fiber and this document gives us the information about the structure and architecture of SDH.
The document discusses Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH), which are standardized protocols for transmitting multiple digital signals over fiber optic cables. They were developed to replace older asynchronous systems and allow synchronized transport of data from different sources. Key features include high transmission rates up to 40Gbps, simple addition and removal of low-rate channels, high reliability through automatic backup mechanisms, and future compatibility with new services. The main differences between SONET and SDH are their standardized bit rates which were chosen to integrate existing network technologies.
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyIOSR Journals
This document provides an analytical study of routing protocols for mobile ad hoc networks (MANETs). It begins with definitions of MANETs and discusses their key characteristics including dynamic topology, limited energy/bandwidth, and security vulnerabilities. The document then examines the core functions and categories of MANET routing protocols. It analyzes several table-driven proactive protocols including DSDV and WRP, and on-demand reactive protocols including DSR, AODV, and TORA. Tables compare the protocols on metrics like routing structure, memory overhead, convergence time and advantages/disadvantages. The analysis found that different protocols have tradeoffs between overhead, adaptation to mobility, and scalability.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
IRJET- Viability of Smart City Applications with Lora WANIRJET Journal
This document discusses the viability of using LoRa WAN for smart city applications. It summarizes the LoRa WAN technology, including its long range capabilities and low power consumption. It then describes two case studies of using LoRa WAN for air quality and congestion monitoring in London. The results show that LoRa WAN is a feasible low power solution for these types of smart city applications. Battery lifetimes of several years can be achieved, meeting requirements for monitoring networks. Therefore, LoRa WAN shows potential as an effective technology for implementing IoT in smart cities.
The document contains a list of experiments related to computer networking. It includes 7 experiments covering topics like defining different types of LANs, WANs and MANs; describing network devices and topologies; implementing framing methods like bit stuffing, byte stuffing and character stuffing; and implementing routing algorithms such as simple redundancy check, cyclic redundancy check, checksum, and Hamming code. For each experiment, it provides details about the concepts and includes sample C code programs to demonstrate the techniques.
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEMEIJCNCJournal
This paper proposes a Hybrid Access Scheme (HAS) aiming to convert a future robot’s backend communication system by a finite number of sensors instead of using a lot of wires. To replace this communication, the HAS needs to assure higher reliability within stringent low latency packet transmission. In this paper, the HAS utilizes the packet diversity principle and forward multiple copies of the same packet over the massive number of subcarrier channels. The HAS assigns the random accessing to select a subcarrier channel for general packet transmitting sensors. The audio and video sensors transmit packets over the dedicated channels to avoid collisions. The HAS system allows transmitting audio, video and general sensors simultaneously. The minimum number of subcarriers to satisfy the URLLC reliability requirement of 99.999% is evaluated for different packet duplications over different
arrival condition.The HAS system’s reliability and collision probability are evaluated in MATLAB simulator for different packet duplication over different arrival condition. Moreover, the signal propagation expressions are captured using ANSYS HFSS software for rectangular and circular transmission medium over the 900 MHz, 2.4 GHz, 24 GHz, and 55 GHz frequency bands for different structural configurations.
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
SDH (Synchronous Digital Hierarchy) & Its Architectureijsrd.com
The SDH (Synchronous Digital Hierarchy) tell us about transferring large amount of data over an same optical fiber and this document gives us the information about the structure and architecture of SDH.
The document discusses Synchronous Optical Networking (SONET) and Synchronous Digital Hierarchy (SDH), which are standardized protocols for transmitting multiple digital signals over fiber optic cables. They were developed to replace older asynchronous systems and allow synchronized transport of data from different sources. Key features include high transmission rates up to 40Gbps, simple addition and removal of low-rate channels, high reliability through automatic backup mechanisms, and future compatibility with new services. The main differences between SONET and SDH are their standardized bit rates which were chosen to integrate existing network technologies.
Mobile Adhoc Network (MANET) Routing Protocols Analytical StudyIOSR Journals
This document provides an analytical study of routing protocols for mobile ad hoc networks (MANETs). It begins with definitions of MANETs and discusses their key characteristics including dynamic topology, limited energy/bandwidth, and security vulnerabilities. The document then examines the core functions and categories of MANET routing protocols. It analyzes several table-driven proactive protocols including DSDV and WRP, and on-demand reactive protocols including DSR, AODV, and TORA. Tables compare the protocols on metrics like routing structure, memory overhead, convergence time and advantages/disadvantages. The analysis found that different protocols have tradeoffs between overhead, adaptation to mobility, and scalability.
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
Cognitive IoT is exponentially increased because of various real time and robust applications with sensor networks and big data analysis. Each IoT protocol of network layer can be RPL, COAP and so on based on IETF standards. But still collision problems and security-aware fair transmission on top of scalable IoT devices were not solved enough. In the open wireless LAN system based cognitive IoTs, IoT node that is continuously being stripped of its transmission opportunity will continue to accumulate packets to be sent in the butter and spoofing attacks will not allow the data transfer opportunities to be fair. Therefore, in this paper, we propose a method to reduce the average wait time of all packets in the system by dynamically controlling the contention window (CW) in a wireless LAN based cognitive IoT environment where there are nodes that do not have fair transmission opportunities due to spoofing attacks. Through the performance evaluation, we have proved that the proposed technique improves up to 80% in terms of various performance evaluation than the basic WLAN 802.11 based IoT.
IRJET- Viability of Smart City Applications with Lora WANIRJET Journal
This document discusses the viability of using LoRa WAN for smart city applications. It summarizes the LoRa WAN technology, including its long range capabilities and low power consumption. It then describes two case studies of using LoRa WAN for air quality and congestion monitoring in London. The results show that LoRa WAN is a feasible low power solution for these types of smart city applications. Battery lifetimes of several years can be achieved, meeting requirements for monitoring networks. Therefore, LoRa WAN shows potential as an effective technology for implementing IoT in smart cities.
The document contains a list of experiments related to computer networking. It includes 7 experiments covering topics like defining different types of LANs, WANs and MANs; describing network devices and topologies; implementing framing methods like bit stuffing, byte stuffing and character stuffing; and implementing routing algorithms such as simple redundancy check, cyclic redundancy check, checksum, and Hamming code. For each experiment, it provides details about the concepts and includes sample C code programs to demonstrate the techniques.
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEMEIJCNCJournal
This paper proposes a Hybrid Access Scheme (HAS) aiming to convert a future robot’s backend communication system by a finite number of sensors instead of using a lot of wires. To replace this communication, the HAS needs to assure higher reliability within stringent low latency packet transmission. In this paper, the HAS utilizes the packet diversity principle and forward multiple copies of the same packet over the massive number of subcarrier channels. The HAS assigns the random accessing to select a subcarrier channel for general packet transmitting sensors. The audio and video sensors transmit packets over the dedicated channels to avoid collisions. The HAS system allows transmitting audio, video and general sensors simultaneously. The minimum number of subcarriers to satisfy the URLLC reliability requirement of 99.999% is evaluated for different packet duplications over different
arrival condition.The HAS system’s reliability and collision probability are evaluated in MATLAB simulator for different packet duplication over different arrival condition. Moreover, the signal propagation expressions are captured using ANSYS HFSS software for rectangular and circular transmission medium over the 900 MHz, 2.4 GHz, 24 GHz, and 55 GHz frequency bands for different structural configurations.
Robotic Inner Signal Propagation and Random Access over Hybrid Access SchemeIJCNCJournal
This paper proposes a Hybrid Access Scheme (HAS) aiming to convert a future robot’s backend communication system by a finite number of sensors instead of using a lot of wires. To replace this communication, the HAS needs to assure higher reliability within stringent low latency packet transmission. In this paper, the HAS utilizes the packet diversity principle and forward multiple copies of the same packet over the massive number of subcarrier channels. The HAS assigns the random accessing to select a subcarrier channel for general packet transmitting sensors. The audio and video sensors transmit packets over the dedicated channels to avoid collisions. The HAS system allows transmitting audio, video and general sensors simultaneously. The minimum number of subcarriers to satisfy the URLLC reliability requirement of 99.999% is evaluated for different packet duplications over different arrival condition.The HAS system’s reliability and collision probability are evaluated in MATLAB simulator for different packet duplication over different arrival condition. Moreover, the signal propagation expressions are captured using ANSYS HFSS software for rectangular and circular transmission medium over the 900 MHz, 2.4 GHz, 24 GHz, and 55 GHz frequency bands for different structural configurations.
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
Wireless communication has become a core part of modern communication technology. The Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function DCF does not scale well in such networks. We introduce Point Coordination Function PCF in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Prince Kumar | Rashmi Raj "Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18446.pdf
Consistent Access of Internet in Vehicular NetworksIRJET Journal
This document proposes the SWIM protocol to provide consistent internet access in vehicular networks. It aims to minimize packet transmission delays and improve throughput. The SWIM protocol uses unicast for vehicle-to-roadside communication and broadcast for downlink vehicle-to-vehicle communication. Simulation results show that SWIM maintains higher throughput even at increased speeds compared to existing systems. It also achieves near 100% packet delivery between transmitting and receiving vehicles. The SWIM protocol provides an efficient method of handling disruptions to ensure continuous internet access for users traveling in vehicles.
The document discusses data communication protocols, including the Open Systems Interconnect model and common protocols like Ethernet, TCP/IP, TCP, UDP, and IP. It provides details on each layer of the OSI model and what each protocol handles. Ethernet is described as having collisions when multiple nodes transmit simultaneously on a wired network. TCP/IP was developed for the Department of Defense and became the protocol suite of the Internet. TCP provides guaranteed delivery over IP. UDP is used for applications where delay needs to be minimal. IP routes packets through routers using addresses with four octets separated by dots.
The document provides information about basic local area networks (LANs). It defines LANs and wireless LANs, and describes their key characteristics such as topology and protocols. The document also discusses various network hardware including hubs, switches, bridges, routers, and network interface cards. It covers different types of network media like twisted pair, coaxial, fiber optic, and wireless. Finally, the document presents sample LAN implementations for home and business configurations.
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
The document discusses various network services and protocols for multimedia communications. It covers protocol layers, local area networks and access network technologies, Internet technologies and protocols, quality of service for multimedia, and protocols for multimedia transmission and interaction. Specifically, it describes the OSI reference model layers, common LAN standards and technologies like Ethernet, Token Ring, FDDI, and digital subscriber line access networks. It also discusses the TCP/IP protocol suite and key protocols like IP, TCP, and UDP.
Iaetsd bluetooth based smart sensor networksIaetsd Iaetsd
This document discusses Bluetooth-based smart sensor networks. It begins by introducing wireless sensor networks and their components. It then provides background on Bluetooth, describing how it operates using frequency hopping spread spectrum in the 2.4GHz band. The document outlines Bluetooth network structures, including piconets and scatternets. It discusses implementing a smart sensor network with Bluetooth, including smart sensor node architecture and discovery of sensor nodes by the gateway. The document concludes that Bluetooth represents an opportunity for wireless sensor network architectures in industrial and home applications by reducing wiring costs and integrating environments.
Internet 2.0 is a proposed global internetworking system that uses a higher-level protocol called the Transmission Media Adaptation Layer (TMAL) to provide interconnection and internetworking services over both IP data networks and global telephony systems. TMAL enables remote applications to communicate over a variety of interconnected network devices worldwide, either separately or concurrently. Internet 2.0 aims to provide a more secure internetworking environment compared to the current Internet (Internet 1.0) by establishing private, dedicated communication channels using existing telephony systems.
The document discusses Internet of Things (IoT) standards and protocols, focusing on IPv6 routing protocol for low power lossy networks (RPL). It provides an overview of RPL concepts such as destination oriented directed acyclic graph (DODAG) and its maintenance, instances and objective functions. The document also discusses other relevant IoT standards from IETF, 3GPP and ETSI and the need for open standards to support interoperability at large scale for IoT.
JDSU SDH Pocket Guide covering many aspectsssuser813fd2
This document provides an overview of the Synchronous Digital Hierarchy (SDH) network components and frame format. It discusses the SDH layer model, components of a synchronous network including regenerator and multiplex sections, and the STM-1 frame format. It also briefly mentions AU-4 concatenation, differences between SDH and SONET, synchronization, and transmission at higher hierarchy levels.
The transport layer accepts data from the session layer, breaks it into packets, and delivers the packets to the network layer. It provides end-to-end communication and ensures reliable delivery of data. The network interface layer sends and receives TCP/IP packets on the network medium. It encompasses the data link and physical layers of the OSI model. TCP/IP is independent of the specific network technology.
The document describes the LTE protocol stack, which contains a user plane and control plane. It divides the protocol stack into layers for the radio network and transport network. The physical layer transfers data and performs error detection. The MAC sublayer maps transport channels to logical channels and handles scheduling. The RLC layer provides different reliability modes for data transfer. The PDCP layer performs header compression and ciphering. The RRC layer controls handovers, paging, and radio bearer setup. Transport protocols like IP, UDP, and GTP are used in the fixed network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an overview of networking concepts including routing protocols. It begins with an introduction and explanation of common networking terms like routers, switches, servers and IP addressing. The document then focuses on routing protocols, describing different types like static, default, dynamic routing protocols and examples like RIP, EIGRP, OSPF. It provides details on each protocol's functionality and purpose in routing network traffic between devices.
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
This document analyzes the data rate performance of a point-to-multipoint wireless link in the University of Ilorin campus network. It describes using Ubiquiti Rocket M5 Titanium wireless devices located at the Network Operations Center to connect to five access points across campus. Monitoring software recorded transmission rates, reception rates, signal strength, noise, latency, and throughput between the access points. The analyses aimed to evaluate the impact of impairments like interference on network performance and compute regression coefficients to show how packet loss varies between access points.
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
This document discusses routing protocols for mobile ad hoc networks. It analyzes the performance of several routing protocols including OLSR, DSR, AODV, ZRP and LAR using Qualnet simulator 6.1. The protocols are classified as proactive, reactive or hybrid. Proactive protocols maintain up-to-date routing tables while reactive protocols discover routes on demand. The paper evaluates and compares the protocols based on metrics like average jitter, end-to-end delay, and throughput under different numbers of stationary and mobile nodes.
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
This document discusses and compares several routing protocols for mobile ad hoc networks (MANETs). It evaluates the performance of the Optimized Link State Routing protocol (OLSR), Dynamic Source Routing (DSR), Ad-hoc On-demand Distance Vector routing (AODV), Location Aided Routing (LAR) and Zone Routing Protocol (ZRP) using the Qualnet simulator. The performance is evaluated based on average end-to-end delay, average jitter, and throughput under scenarios with 45 stationary and mobile nodes. The results show that protocols perform differently depending on node mobility, with OLSR and AODV generally having better performance than DSR, LAR and ZRP in terms of lower delay and
This document appears to contain technical commands and instructions related to cybersecurity tools and techniques. It includes references to commands or modules for CEH, recon-ng installation, and a tutorial link for recon-ng. The document seems to be notes related to cybersecurity reconnaissance and information gathering activities.
Service Level Agreements (SLA) are negotiated agreements that create a common understanding about services, priorities, and responsibilities between service providers and their customers. The Iranian regulatory framework establishes SLA requirements for different communication services including communication links, WiMAX internet, and IP links. SLAs define service elements, management elements, and penalties to ensure service quality standards are met. SLAs are reviewed periodically and the regulatory authority resolves any disputes concerning the agreements.
Robotic Inner Signal Propagation and Random Access over Hybrid Access SchemeIJCNCJournal
This paper proposes a Hybrid Access Scheme (HAS) aiming to convert a future robot’s backend communication system by a finite number of sensors instead of using a lot of wires. To replace this communication, the HAS needs to assure higher reliability within stringent low latency packet transmission. In this paper, the HAS utilizes the packet diversity principle and forward multiple copies of the same packet over the massive number of subcarrier channels. The HAS assigns the random accessing to select a subcarrier channel for general packet transmitting sensors. The audio and video sensors transmit packets over the dedicated channels to avoid collisions. The HAS system allows transmitting audio, video and general sensors simultaneously. The minimum number of subcarriers to satisfy the URLLC reliability requirement of 99.999% is evaluated for different packet duplications over different arrival condition.The HAS system’s reliability and collision probability are evaluated in MATLAB simulator for different packet duplication over different arrival condition. Moreover, the signal propagation expressions are captured using ANSYS HFSS software for rectangular and circular transmission medium over the 900 MHz, 2.4 GHz, 24 GHz, and 55 GHz frequency bands for different structural configurations.
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
Wireless communication has become a core part of modern communication technology. The Infrastructure less wireless network, commonly referred to as Ad Hoc networks, has attracted extensive research interest for past 30 years. In this work, the focus is on IEEE 802.11 network performance analysis of Multihop hop Ad Hoc networks under non-saturated network conditions. To meet the increasing demand of multimedia, it is necessary to provide the quality of service in such networks. The current work presents the development of an analytical model for network performance analysis. The medium access mechanism in multihop wireless networks should minimize collisions, and take care of the hidden and exposed node problems. The IEEE 802.11 MAC with Distributed Coordination Function DCF does not scale well in such networks. We introduce Point Coordination Function PCF in the region of high traffic areas, and discuss its effect on network performance. To improve network scalability and throughput, we propose the design of a new MAC called Dual MAC. This work discusses architecture and working of the dual MAC in detail. Performance results of the network using dual MAC are presented, and compared with that of pure DCF operation. Prince Kumar | Rashmi Raj "Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Hoc Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18446.pdf
Consistent Access of Internet in Vehicular NetworksIRJET Journal
This document proposes the SWIM protocol to provide consistent internet access in vehicular networks. It aims to minimize packet transmission delays and improve throughput. The SWIM protocol uses unicast for vehicle-to-roadside communication and broadcast for downlink vehicle-to-vehicle communication. Simulation results show that SWIM maintains higher throughput even at increased speeds compared to existing systems. It also achieves near 100% packet delivery between transmitting and receiving vehicles. The SWIM protocol provides an efficient method of handling disruptions to ensure continuous internet access for users traveling in vehicles.
The document discusses data communication protocols, including the Open Systems Interconnect model and common protocols like Ethernet, TCP/IP, TCP, UDP, and IP. It provides details on each layer of the OSI model and what each protocol handles. Ethernet is described as having collisions when multiple nodes transmit simultaneously on a wired network. TCP/IP was developed for the Department of Defense and became the protocol suite of the Internet. TCP provides guaranteed delivery over IP. UDP is used for applications where delay needs to be minimal. IP routes packets through routers using addresses with four octets separated by dots.
The document provides information about basic local area networks (LANs). It defines LANs and wireless LANs, and describes their key characteristics such as topology and protocols. The document also discusses various network hardware including hubs, switches, bridges, routers, and network interface cards. It covers different types of network media like twisted pair, coaxial, fiber optic, and wireless. Finally, the document presents sample LAN implementations for home and business configurations.
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
The document discusses various network services and protocols for multimedia communications. It covers protocol layers, local area networks and access network technologies, Internet technologies and protocols, quality of service for multimedia, and protocols for multimedia transmission and interaction. Specifically, it describes the OSI reference model layers, common LAN standards and technologies like Ethernet, Token Ring, FDDI, and digital subscriber line access networks. It also discusses the TCP/IP protocol suite and key protocols like IP, TCP, and UDP.
Iaetsd bluetooth based smart sensor networksIaetsd Iaetsd
This document discusses Bluetooth-based smart sensor networks. It begins by introducing wireless sensor networks and their components. It then provides background on Bluetooth, describing how it operates using frequency hopping spread spectrum in the 2.4GHz band. The document outlines Bluetooth network structures, including piconets and scatternets. It discusses implementing a smart sensor network with Bluetooth, including smart sensor node architecture and discovery of sensor nodes by the gateway. The document concludes that Bluetooth represents an opportunity for wireless sensor network architectures in industrial and home applications by reducing wiring costs and integrating environments.
Internet 2.0 is a proposed global internetworking system that uses a higher-level protocol called the Transmission Media Adaptation Layer (TMAL) to provide interconnection and internetworking services over both IP data networks and global telephony systems. TMAL enables remote applications to communicate over a variety of interconnected network devices worldwide, either separately or concurrently. Internet 2.0 aims to provide a more secure internetworking environment compared to the current Internet (Internet 1.0) by establishing private, dedicated communication channels using existing telephony systems.
The document discusses Internet of Things (IoT) standards and protocols, focusing on IPv6 routing protocol for low power lossy networks (RPL). It provides an overview of RPL concepts such as destination oriented directed acyclic graph (DODAG) and its maintenance, instances and objective functions. The document also discusses other relevant IoT standards from IETF, 3GPP and ETSI and the need for open standards to support interoperability at large scale for IoT.
JDSU SDH Pocket Guide covering many aspectsssuser813fd2
This document provides an overview of the Synchronous Digital Hierarchy (SDH) network components and frame format. It discusses the SDH layer model, components of a synchronous network including regenerator and multiplex sections, and the STM-1 frame format. It also briefly mentions AU-4 concatenation, differences between SDH and SONET, synchronization, and transmission at higher hierarchy levels.
The transport layer accepts data from the session layer, breaks it into packets, and delivers the packets to the network layer. It provides end-to-end communication and ensures reliable delivery of data. The network interface layer sends and receives TCP/IP packets on the network medium. It encompasses the data link and physical layers of the OSI model. TCP/IP is independent of the specific network technology.
The document describes the LTE protocol stack, which contains a user plane and control plane. It divides the protocol stack into layers for the radio network and transport network. The physical layer transfers data and performs error detection. The MAC sublayer maps transport channels to logical channels and handles scheduling. The RLC layer provides different reliability modes for data transfer. The PDCP layer performs header compression and ciphering. The RRC layer controls handovers, paging, and radio bearer setup. Transport protocols like IP, UDP, and GTP are used in the fixed network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an overview of networking concepts including routing protocols. It begins with an introduction and explanation of common networking terms like routers, switches, servers and IP addressing. The document then focuses on routing protocols, describing different types like static, default, dynamic routing protocols and examples like RIP, EIGRP, OSPF. It provides details on each protocol's functionality and purpose in routing network traffic between devices.
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
This document discusses dynamic cluster-based adaptive gateway discovery mechanisms for integrating mobile ad hoc networks (MANETs) with the Internet. It begins by introducing the problem and outlines existing solutions. It then proposes a new architecture using dynamic clusters and mobile gateways. Key points of the proposed approach include dynamically adjusting the TTL value and periodicity of gateway advertisements based on network characteristics. The paper evaluates the approach through simulations in NS-2, finding it increases reliability and performance metrics like delivery ratio and delay. In conclusion, dynamic cluster-based gateways help provide reliable Internet access for MANET nodes with varying mobility.
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
This document analyzes the data rate performance of a point-to-multipoint wireless link in the University of Ilorin campus network. It describes using Ubiquiti Rocket M5 Titanium wireless devices located at the Network Operations Center to connect to five access points across campus. Monitoring software recorded transmission rates, reception rates, signal strength, noise, latency, and throughput between the access points. The analyses aimed to evaluate the impact of impairments like interference on network performance and compute regression coefficients to show how packet loss varies between access points.
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
This document discusses routing protocols for mobile ad hoc networks. It analyzes the performance of several routing protocols including OLSR, DSR, AODV, ZRP and LAR using Qualnet simulator 6.1. The protocols are classified as proactive, reactive or hybrid. Proactive protocols maintain up-to-date routing tables while reactive protocols discover routes on demand. The paper evaluates and compares the protocols based on metrics like average jitter, end-to-end delay, and throughput under different numbers of stationary and mobile nodes.
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
This document discusses and compares several routing protocols for mobile ad hoc networks (MANETs). It evaluates the performance of the Optimized Link State Routing protocol (OLSR), Dynamic Source Routing (DSR), Ad-hoc On-demand Distance Vector routing (AODV), Location Aided Routing (LAR) and Zone Routing Protocol (ZRP) using the Qualnet simulator. The performance is evaluated based on average end-to-end delay, average jitter, and throughput under scenarios with 45 stationary and mobile nodes. The results show that protocols perform differently depending on node mobility, with OLSR and AODV generally having better performance than DSR, LAR and ZRP in terms of lower delay and
This document appears to contain technical commands and instructions related to cybersecurity tools and techniques. It includes references to commands or modules for CEH, recon-ng installation, and a tutorial link for recon-ng. The document seems to be notes related to cybersecurity reconnaissance and information gathering activities.
Service Level Agreements (SLA) are negotiated agreements that create a common understanding about services, priorities, and responsibilities between service providers and their customers. The Iranian regulatory framework establishes SLA requirements for different communication services including communication links, WiMAX internet, and IP links. SLAs define service elements, management elements, and penalties to ensure service quality standards are met. SLAs are reviewed periodically and the regulatory authority resolves any disputes concerning the agreements.
The Fresnel zone is an elliptical volume around the line of sight path between an end node and gateway. Any obstacles within this zone, such as buildings, trees or hills, can weaken the transmitted signal even if direct line of sight exists. The size of the Fresnel zone depends on the distance between the nodes and the transmission frequency, and at least 60% of the zone should remain clear for optimal signal strength. The Fresnel zone calculation also needs to account for the curvature of the Earth over long distances. Proper antenna placement and clearance of obstructions are important to maximize radio signal performance in a LoRaWAN network.
Planning is a key process in project management that involves identifying the resources, actions, and means necessary to achieve a project's objectives. It develops the project strategy and management plan, which defines what needs to be done, how it will be accomplished, and how success will be measured. Planning begins during project concept and continues throughout the project life cycle, evolving as understanding increases. The outputs of planning provide critical information for developing the business case and ensuring a project has the greatest chance of success.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Emotional intelligence refers to the ability to identify, use, understand, and manage emotions in positive ways to relieve stress, communicate effectively, empathize with others, overcome challenges, and defuse conflict. It impacts how we manage behavior, navigate social complexities, and make personal decisions that achieve positive results.
This document summarizes Ontario's driver's handbook. It provides information on getting a driver's license in Ontario, including the graduated licensing system for new drivers. Different classes of licenses are described, including what types of vehicles can be driven with each class. Requirements for driving in Ontario are outlined depending on residency status. The process for applying for a license is also summarized.
This document provides an overview of key concepts for planning a microwave radio link, including:
1) The first step is to ensure there is clear line of sight between the antennas as well as at least 60% clearance of the Fresnel zone to avoid signal loss.
2) Performing a system operating margin (SOM) calculation allows you to test different system designs and antenna configurations to determine the reliability margin, or "fade margin", for the link.
3) While a minimum SOM of 20dB is recommended, in practice other factors like noise, interference, and atmospheric conditions can impact link reliability even with an adequate SOM on paper. Verifying acceptable signal-to-noise ratios is also
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
SDH over Sat.pdf
1.
Abstract—A novel architecture for a large amount of satellite
data transport is presented which based on Synchronous Digital
Hierarchy (SDH) technologies. This architecture consisting of
terrestrial networks, satellites with an inter-satellite link (ISL),
fixed earth stations, transportable earth stations, portable and
handheld terminals, and user terminals connecting to satellite
links directly or through terrestrial networks over SDH , over
IP, over ATM or other network protocol. Datagrams such as
ATM (asynchronous transfer mode) cells and IP (internet
protocol) packets can be transported over SDH links between
satellites in space. All kinds of ground terminals can access
satellites directly with IP or ATM protocol or through SDH.
Index Terms—Digital Hierarchy (SDH), inter-satellite link
(ISL), asynchronous transfer mode (ATM), Internet protocol
(IP).
I. INTRODUCTION
Synchronous Digital Hierarchy (SDH) and Synchronous
Optical Network (SONET) are time-division multiplexing
technologies widely used in transport network. It is a
standard for data transmission over telecommunication
networks which are often used for framing and
synchronization at the physical layer. SDH networks can
carry large payloads, but, at the same time, accommodate
lower speed signals packed into elementary transport units.
Services such as videoconferencing, remote database access
and multimedia file transfer require a flexible network with
the availability (on demand) of virtually unlimited bandwidth.
Satellites with SDH links seem highly suitable for globally
delivery of these services. ITU-T has standardized the
Synchronous Digital Hierarchy (SDH) as multiplexing
technique between cross-connect or switches in the network.
The compatibility of satellite with SDH is also analyzed by
ITU-T and ITU-R in order to define the suitable data rates
specified for SDH transmission over satellite systems.
Several papers [1], [2] have addressed these special issues
that SDH used in satellite scenarios. However, these papers
mainly focus on the error performance monitoring defined by
ITU-T and the path integrity from pointer corruption when
busty errors occur.
In this paper a brief description of the SDH satellite
network architectures and related protocol will be presented.
The scheme proposed in his paper, based on SDH, combines
two of popular protocols for satellites communication
networks. It provides flexible access for various user
Manuscript received March 3, 2015; revised October 23, 2016. This work
is supported by the National Natural Foundation of China (No.61372175)
and the National Key Laboratory Foundation of China
(No.9140C530403130C53192).
The authors are with National Key Laboratory of Science and Technology
on Space Microwave, Xian 710100, China (e-mail: Huly39@cast504.com,
zhouq@cast504.com, Lij206@sina.com, cuit81@cast504.com).
terminals such as fixed earth station, portable earth stations or
handheld terminals with SDH interface, ATM interface or IP
interface. Inter-satellite links are standard SDH links, on
which STM-n frames are transported. Datagrams (ATM cells
or IP packets) are encapsulated in STM-n on board.
II. SATELLITE NETWORK ARCHITECTURE BASED ON SDH
Fig. 1 illustrates a satellite SDH network represented by a
ground segment, a space segment, and a network control
center. The ground segment consists of ATM networks, IP
networks that may be further connected to other legacy
networks. The network control center (NCC) performs
various management and resource allocation functions for
the satellite media. Inter-satellite links (ISL), based on SDH,
in the space segment provide seamless global connectivity to
the satellite constellation.
The network allows the transmission of ATM cells, IP
packets or other datagrams encapsulated in STM-16 over
satellite, multiplexes and de-multiplexes STM-16 streams
from uplinks and downlinks, and maintains the QoS
objectives of the various connection types. The
satellite-ATM interface and satellite SDH interface connect
the ATM network and IP network to the satellite system
respectively. The interface device transports ATM cells and
IP packets over the frame based satellite SDH network, and
demultiplexes ATM cells and IP packets from the satellite
frames. This interface is thus responsible for resource
allocation, error control, and traffic control.
ATM cells that transmitted by user terminals connected
through ATM switches and IP packets transmitted by
portable earth station and handheld terminal are encapsulated
on board, while IP packets transmitted by user terminals
connected through IP router are encapsulated by satellite
SDH interface.
The basic SDH multiplexing techniques are described in
ITU-TR Recs G.708 (1) and G.709 (2).The SDH multiplex
hierarchy is based on a level 1 Frame structure (STM-1).
Higher levels are also defined as STM-4 and STM-16 formed
by byte interleaving.
The inter-satellite links are based on high speed STM-16
frame, while these links between earth station and satellite
are based on lower speed STM-4 frame or the basic STM-1
frame.
III. IP OVER SATELLITE SDH NETWORKS
IP is a network layer protocol, whose function is to permit
data traffic to flow seamlessly between different types of
transport mechanisms. IP resides in the terminal devices and
in routers which function as switches in the network, routing
packets towards their destination based on an address field
Architecture and Protocols for Satellite SDH Networks
Yanlang Hu, Quan Zhou, Jun Li, Yi Zhang, Jingling Li, and Tao Cui
International Journal of Future Computer and Communication, Vol. 5, No. 5, October 2016
210
doi: 10.18178/ijfcc.2016.5.5.473
2. contained in the datagram. IP-based applications, such as
WWW and multimedia, have been an essential part of our life,
and there is an ever-increasing demand for accessing
high-speed Internet services anywhere and anytime [3]. In
addition, with its broadcasting nature and global coverage,
satellite systems also play an important role in the Internet.
The proposed architecture in this paper provides access by
user terminals in which IP resides.
Inter- Satellite Link
Satellite SDH Interface
Satellite ATM Interface
Network Control Center
• Performance Mgmt.
• Configuration Mgmt.
• Resource Planning
SDH Link
Fixed earth stations
Fixed earth stations
IP Network
IP Router
ATM Switch
Bridge
Portable earth station
Handheld terminal
Fig. 1. Satellite-SDH network model.
Fig. 2. IP over satellite SDH networks protocol stack diagram
IV. IP OVER SATELLITE SDH NETWORKS
IP is a network layer protocol, whose function is to permit
data traffic to flow seamlessly between different types of
transport mechanisms. IP resides in the terminal devices and
in routers which function as switches in the network, routing
packets towards their destination based on an address field
contained in the datagram. IP-based applications, such as
WWW and multimedia, have been an essential part of our life,
and there is an ever-increasing demand for accessing
high-speed Internet services anywhere and anytime [3]. In
addition, with its broadcasting nature and global coverage,
satellite systems also play an important role in the Internet.
The proposed architecture in this paper provides access by
user terminals in which IP resides.
Fig. 2 shows the protocol stack diagram used in end
systems, ground routers which are parts of ground segment
devices and SDH devices on board. The key points in this
protocol stack is that the upper layer network services, layer 3
and above, operate on an end-to-end basis and are
independent of the various physical media and data link
protocols at layers 1 and 2. The end systems don’t even know
SDH at data link layer is in the path between the end users.
Network systems, such as routers or bridges, between the end
systems operate in only the lower 2 or 3 layers of the protocol
stack and are completely unaware of what upper layer
protocols are passing over them. This layered and modular
approach is what allows the space networks to make changes
and upgrades on some stations without any impact on other
stations.
IP packet encapsulation is an aspect for IP over SDH
network. It is a technique used to encapsulate an IP packet
into the STM-1 frame, so that it is suitable for transmission
over the satellite SDH network. In fact, PPP is the data link
protocol used in IP over SDH. It is a connection-oriented
protocol that enables layer two links over a variety of
different physical layer connections. It was designed to carry
IP traffic but is general enough to allow any type of network
layer datagram to be sent over a PPP connection.
International Journal of Future Computer and Communication, Vol. 5, No. 5, October 2016
211
3. Fig. 3. PPP frame format.
HOST
RF
SDH
RF
SDH
RF
SDH
ATM SWITCH
ATM
Application
TCP/UDP
IP
AAL
ATM
SDH
Physical
HOST
Application
TCP/UDP
IP
AAL
ATM
SDH
Physical
RF
SDH
ATM
ATM SWITCH
Satellite A Satellite B
SDH link
Fig. 4. ATM over SDH protocol stack diagram.
Fig. 3 shows the application of the PPP general frame
format which carries IP data. The value 0x0021 in the
Protocol field indicates this as an IPv4 datagram. Flag field
Indicates the start of a PPP frame. Always has the value
“01111110”binary.Address field has no real meaning. It is
thus always set to “11111111” (0xFF or 255 decimal), which
is equivalent to a broadcast (it means “all stations”).Control
field is used in HDLC for various control purposes, but in
PPP it is set to “00000011” (3 decimal).
In brief, the transmission of IP over SDH is as follows:
first, IP datagrams are encapsulated in PPP frame, then, PPP
frame is mapped into SDH virtual containers (VC) for
transmission.
V. ATM OVER SATELLITE SDH NETWORKS
ATM technology is an ITU-T standard for cell relay
wherein information for multiple service types, such as voice,
video, or data, is conveyed in small, fixed-size cells. ATM
networks are connection oriented. It is a cell-switching and
multiplexing technology that combines the benefits of circuit
switching (guaranteed capacity and constant transmission
delay) with those of packet switching (flexibility and
efficiency for intermittent traffic). It provides scalable
bandwidth from a few megabits per second (Mbps) to many
gigabits per second (Gbps). It is expected to provide quality
of service based networks that support voice, video and data
applications. ATM based satellite networks effectively
provide real time as well as non-real time communications
services to remote areas [4]. The proposed network
architecture based SDH also provides access by ATM
terminals.
As Fig. 4 shows ATM over SDH protocol stack is very
similar to IP over SDH. The key difference is interface
devices that match different datagram into SDH basic frame.
Only SDH protocol is processed on board satellite as
backbone transport link. This approach reduces the
complexity of on board processing, and gains advantages of
ATM in satellite communications.
The ITU-T defined the approach to transmit ATM cells
over SDH. The essential feature of SDH is to keep track of
boundaries of streams that do not really depend on the
particular medium. Although it was originally designed for
transmission over fiber, it can in fact operate over satellite
media. The SDH mode type 1 (STM-1) frame [5], as shown
in Fig. 5 is 155 Mbit/s. The bytes are transmitted across the
medium a row at a time, wrapping to the next row. It takes
nominally 125 microseconds to transmit all nine rows
forming the SDH STM-1 frame. The STM-1 in the
international carrier networks will be the smallest package
available in terms of the SDH.
International Journal of Future Computer and Communication, Vol. 5, No. 5, October 2016
212
4. Fig. 5. Mapping ATM cells in STM-1.
Using the header error check (HEC) of the ATM cell
delineates the cells within the SDH payload (VC-4 container).
The receiver takes five bytes to check if they form a header or
not when it is trying to find the cell boundaries. HEC
calculation, matching against the fifth byte, is done on the
first four bytes. If it matches, the receiver then counts 48
bytes and repeats the calculation again. And if it finds that
calculation correct several times in a row, it can be safely
assumed that the cell boundaries are found. If it fails to match,
it just slides the window by one bit and tries the calculation
again. This kind of process must be used because the user
data would contain these patterns separated by 48 bytes. The
payload in an STM-1 frame is 135,563 Mbit/s, assuming that
the entire cell payload may carry user information.
VI. CONCLUSION
A SDH based satellites network architecture is presented
in this article. In this architecture, only SDH protocol is
processed on board, all other layer 3 and layer 2 protocols is
processed on ground. This approach reduces the complexity
of satellite on board processing greatly, and is expected to
provide quality of service (QoS) based on the architecture
that supports voice, video and data applications. Along with
the architecture, two popular communication protocols,
ATM and IP, over the proposed SDH satellites network are
presented. The two protocol stacks can encapsulate ATM
cells and IP packets in STM-1 frame properly and provide
access for ATM terminals and IP terminals on ground.
REFERENCES
[1] A. Strange, S. L. Arambepola, A. J. FIavin, and A. Stevenson, “SDH
for the fixed satellite service,” The Institution of Electrical Engineers,
1994.
[2] R. C. Lou, “IPv6 networks over DVB-RCS satellite systems,”
International Journal of Satellite Communications and Networking,
2007.
[3] W. D. Ivancic, “NASA's broadband satellite networking research,”
IEEE Communications Magazine, 1999.
[4] Z. L. Sun, “Satellite networking: principles and protocols,” pp.
187-212, 2005.
[5] RFC 1122, “Requirements for internet hosts — Communication
layers,” p. 18, 2010.
Yanlang hu was born in Yan’an of China in 1981. He
received the diploma in communication and system
engineering from China Academy of Space
Technology in 2008. His research interests include
onboard switching techniques, digital image
processing, machine vision, and machine learning.
International Journal of Future Computer and Communication, Vol. 5, No. 5, October 2016
213