Home | Help     
Prev<< See More Youniverse >>Next
February 2009
 
By The Numbers

In 2007, 650,000 wrote the AIEEE and in 2008 around 8,62,853 a whopping 32% increment, applicants have registered making it one of the largest such admission exams in the world.

Exams alert

All India Pre-Medical / Pre-Dental Entrance Examination -2009 (AIPMT) is conducted by CBSE, Delhi on 5th April 2009 (Preliminary Exam) & followed by Final Exam on 10th May 2009.

Thus Spake

True knowledge exists in knowing that you know nothing.

- Socrates
Interesting Facts  
 
The Comic Opera: The English playwrights Gilbert and Sullivan wrote a musical about the emperor of Japan called the Mikado. Most people think that the Mikado was the name of the Japanese emperor. The Mikado was actually the name of a door! In medieval times, the Japanese were not allowed to say the name of their emperor. Saying his name was considered a sign of disrespect.

The Yangtze River: The River we call the Yangtze is known by many other names in China. Part of the river is called the Kinsha Kiang, or the "river of golden sand". Another part is known as the Chang Kiang, or "Long River," which is the official name of the Yangtze. The name Yangtze is used by the Chinese only for 300 or 400 miles of the river's length, where it passes through a region once known as Yang. But the Chinese often call the Yangtze simply the "Great River."
 
   

Did you know

 
 
Flag: The ball on top of a flagpole is called the truck. The Swiss flag is square. The United Nations flag is the only flag that may fly above an USA flag on an American flagpole. Libya's flag is the only flag which is all one color (green) with no writing or decoration on it. The only place where a flag flies all day, never goes up or comes down, never flies half-mast and does not get saluted, is the moon.

The first credit card was issued by American Express in 1951.
 
 

 

4G Technologies  

4G (also known as Beyond 3G), an abbreviation for Fourth-Generation, is a term used to describe the next complete evolution in wireless communications. A 4G system will be able to provide a comprehensive IP solution where voice, data and streamed multimedia can be given to users on an "Anytime, Anywhere" basis, and at higher data rates than previous generations.

As the second generation was a total replacement of the first generation networks and handsets, and the third generation was a total replacement of second generation networks and handsets, so too the fourth generation cannot be an incremental evolution of current 3G technologies, but rather the total replacement of the current 3G networks and handsets.

 
 
 
Smile Please..!   

Ocean Water

A physicist, biologist and a chemist were going to the ocean for the first time.

The physicist saw the ocean and was fascinated by the waves. He said he wanted to do some research on the fluid dynamics of the waves and walked into the ocean. Obviously he was drowned and never returned.

The biologist said he wanted to do research on the flora and fauna inside the ocean and walked inside the ocean. He too, never returned.

The chemist waited for a long time and afterwards, wrote the observation, "The physicist and the biologist are soluble in ocean water".

----------------------------------------------


The Farmer and the Half-wit

 

A man owned a small farm in South Georgia. The Wage and Hour Department claimed he was not paying proper wages to his help and sent an agent to interview him. "You just give me a list of your employees and tell me how much you pay them".

"All right," said the farmer. "I have a hired man. Been with me for three years. I pay him $600 a week, plus room and board. I have a cook. She's been here six months. She gets $500 a week plus room and board".

"Anybody else?" asked the agent as he scribbled on a note pad. "Yeah," the farmer said. "There's a half-wit here. Works about eighteen hours a day. I pay him ten dollars a week and give him chewing tobacco".

"Aha!" the agent roared. "I want to talk to that half-wit!" .

"You're talking to him now," said the farmer.

----------------------------------------------


The Real Question is .....

 

The chickens in a large hen house started to quarrel, wounded each other and many of them died every day. The upset farmer hurried to a consultant, and asked for a solution to his problem.

"Add baking-powder to the chickens' food," said the consultant, "it will calm them down".

After a week the farmer came back to the consultant and said: "My chickens continue to die. What shall I do?"

"Add strawberry juice to their drinking water that will help for sure".

A week passed, and again the farmer came to the consultant: "My chickens are still quarrelling. Do you have some more advice?"

"I can give you more and more advice," answered the consultant. "The real question is whether you have more chickens".

 
From The Editors Desk
 

Heartiest Greetings!

In this issue of Youniverse, we have presented an article on "4G Technologies".

Our regular section on Exam Alerts informs you of the important dates of the upcoming entrance examinations. Section on Complex simplicities provides you an introducion to the concepts of VoIP, DSL, VPN.

More >>

Complex Simplicities  

Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.

VoIP systems usually interface with the traditional public switched telephone network (PSTN) to allow for transparent phone communications worldwide.

Digital subscriber line (DSL)

Digital subscriber line DSL or DSL, is a family of technologies that provides digital data transmission over the wires of a local telephone network. DSL originally stood for digital subscriber loop, although in recent years, the term digital subscriber line has been widely adopted as a more marketing-friendly term for ADSL, which is the most popular version of consumer-ready DSL. DSL can be used at the same time and on the same telephone line with regular telephone, as it uses high frequency, while regular telephone uses low frequency.

Typically, the download speed of consumer DSL services ranges from 256 kilobits per second (kbit/s) to 24,000 kbit/s, depending on DSL technology, line conditions and service level implemented. Typically, upload speed is lower than download speed for Asymmetric Digital Subscriber Line (ADSL) and equal to download speed for the rarer Symmetric Digital Subscriber Line (SDSL).

Virtual private network

A Virtual Private Network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) as opposed to their conduction across a single private network. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
top 
 
 
Interesting Facts
 

The Comic Opera: The English playwrights Gilbert and Sullivan wrote a musical about the emperor of Japan called the Mikado. Most people think that the Mikado was the name of the Japanese emperor. The Mikado was actually the name of a door! In medieval times, the Japanese were not allowed to say the name of their emperor. Saying his name was considered a sign of disrespect.

     
The Yangtze River: The River we call the Yangtze is known by many other names in China. Part of the river is called the Kinsha Kiang, or the "river of golden sand". Another part is known as the Chang Kiang, or "Long River," which is the official name of the Yangtze. The name Yangtze is used by the Chinese only for 300 or 400 miles of the river's length, where it passes through a region once known as Yang. But the Chinese often call the Yangtze simply the "Great River".
 
 
The Biggest Civil Wars in History: Around the middle of the 19th century, much of China was ruled by the Manchus, Mongolian people from northern China. A famine during the 1840s helped turn the peasants of China against the Manchus, and a revolt broke out that came to be called the Tai-Ping, or "Great Peace," Rebellion. The rebellion was led by a man named Hung Hsiu-Chuan, who called himself a brother of Jesus Christ. He declared that he had been called by God to preach a new religion in China. His forces captured much of southern China and remained in control for a decade.
 
 
Spaghetti: China is indeed the world's number-one producer of rice, accounting for about 37 percent of the world crop. But rice is the principal crop only in the southern part of China. In the cooler north, wheat is the main crop, just as it is in much of the American Midwest! In fact, China is the largest wheat producer in Asia, and the third largest producer overall, accounting for about 10 percent of the world's wheat crop.
 
 
Dominoes: Dominoes are rectangular blocks with clots on their faces. They are used to play a number of games. Dominoes first appeared in Europe in the 18th century, in Italy and France, and they were brought to England by French prisoners. But dominoes have been used in China for almost as long as playing cards. Chinese dominoes were probably first designed to represent all the throws of two dice. The Chinese called them "dotted cards."
 
Largest Glacier on Earth: A glacier is a large mass of ice and snow that forms where snow falls at a greater rate than it melts. Glaciers usually move slowly down the slopes of mountains or through valleys. They break up into icebergs when they reach the sea. It shouldn't be surprising that the largest glacier on earth is found in Antarctica, the "frozen continent". There are many large glaciers in Antarctica, some more than 100 miles long. The largest by far is the Lambert Glacier.
 
The Volcano Surrounded by Ice: Mount Erebus is the earth's most southerly volcano. It's located less than 900 miles from the South Pole. It's not really on the continent of Antarctica, but on an island just off the coast of the continent. The ice pack that covers Antarctica connects Mount Erebus's island with the Antarctic mainland.
 
 
 
 
 
   
 
Did you know
 
Flag: The ball on top of a flagpole is called the truck. The Swiss flag is square. The United Nations flag is the only flag that may fly above an USA flag on an American flagpole. Libya's flag is the only flag which is all one color (green) with no writing or decoration on it. The only place where a flag flies all day, never goes up or comes down, never flies half-mast and does not get saluted, is the moon.
 
The first credit card was issued by American Express in 1951.  
 
The term "smart money" refers to gamblers who have inside information or have arranged a fix, the gambling term for insuring the outcome of an event by illegal methods.
 
The first fax process+ was patented in 1843 by Alexander Bain, but fax machines went into service only in 1964. In 1888, Frank Sprague completed an electric railway, but electric locomotives were introduced only in 1895. Eugene Ely landed a plane on a boat in 1911, but aircraft carriers weren't perfected for another 20 years.
 
In 1865, Frederik Idestam founded a wood-pulp mill in southern Finland, naming it Nokia. It rapidly gained worldwide recognition, attracting a large number of workforce and the town Nokia was born. In 1898, the Finnish Rubber Works company opened in Nokia, taking on the town name in the 1920s. After World War II, the rubber company took a majority shareholding in the Finnish Cable Work. In 1967, the companies consolidated to become the Nokia Group. The recession of the 1990s led the group to focus on the mobile phone market.
 
Traffic jams of New York, San Francisco and Paris are well known - beaten only by those in Seattle where a driver annually spends 59 hours stuck in traffic.
 

The shortest scheduled airline flight is made between the island of Westray to Papa Westray off Scotland. The flight lasts 2 minutes.

 

The oldest continuous trophy in sports is the America's Cup. It started in 1851, with Americans winning for a straight 132 years until Australia took the Cup in 1983.

 
During World War II a cat called Oscar served on the German battleship Bismarck. When the Bismarck was torpedoed Oscar was rescued by a British sailor on board HMS Cossack. Five months later HMS Cossack was sunk but Oscar was rescued by HMS Ark Royal. Only 3 weeks later a German U-boat destroyed Ark Royal and Oscar was rescued again. The naval authorities then decided that Oscar had had enough and posted him on land. According to British naval records, Oscar died peacefully in 1955.

The word celebrity itself comes from the Latin word celebritatem (nom. celebritas) meaning "multitude, fame", from celeber meaning "frequented, populous," stemming from celebro meaning meaning, "to go to a place often." In short, a person becomes a celebrity when he/she has gained the attention of the wider public (and media).

 
 
 
 
4G Technologies
 

Introduction

4G (also known as Beyond 3G), an abbreviation for Fourth-Generation, is a term used to describe the next complete evolution in wireless communications. A 4G system will be able to provide a comprehensive IP solution where voice, data and streamed multimedia can be given to users on an "Anytime, Anywhere" basis, and at higher data rates than previous generations.

As the second generation was a total replacement of the first generation networks and handsets, and the third generation was a total replacement of second generation networks and handsets, so too the fourth generation cannot be an incremental evolution of current 3G technologies, but rather the total replacement of the current 3G networks and handsets. The international telecommunications regulatory and standardization bodies are working for commercial deployment of 4G networks roughly in the 2012-2015 time scale. At that point it is predicted that even with current evolutions of third generation 3G networks, these will tend to be congested.

There is no formal definition for what 4G is; however, there are certain objectives that are projected for 4G. These objectives include: that 4G will be a fully IP-based integrated system. 4G will be capable of providing between 100 Mbit/s and 1 Gbit/s speeds both indoors and outdoors, with premium quality and high security.

Many companies have taken self-serving definitions and distortions about 4G to suggest they have 4G already in existence today, such as several early trials and launches of WiMAX. Other companies have made prototype systems calling those 4G. While it is possible that some currently demonstrated technologies may become part of 4G, until the 4G standard or standards have been defined, it is impossible for any company currently to provide with any certainty wireless solutions that could be called 4G cellular networks that would conform to the eventual international standards for 4G. These confusing statements around "existing" 4G have served to confuse investors and analysts about the wireless industry.

Objectives

4G is being developed to accommodate the quality of service (QoS) and rate requirements set by forthcoming applications like wireless broadband access, Multimedia Messaging Service (MMS), video chat, mobile TV, HDTV content, Digital Video Broadcasting (DVB), minimal service like voice and data, and other streaming services for "anytime-anywhere". The 4G working group has defined the following as objectives of the 4G wireless communication standard:

A spectrally efficient system (in bits/s/Hz and bits/s/Hz/site)
High network capacity: more simultaneous users per cell
A nominal data rate of 100 Mbit/s while the client physically moves at high speeds relative to the station, and 1 Gbit/s while client and station are in relatively fixed positions as defined by the ITU-R
A data rate of at least 100 Mbit/s between any two points in the world
Smooth handoff across heterogeneous networks
Seamless connectivity and global roaming across multiple networks
High quality of service for next generation multimedia support (real time audio, high speed data, HDTV video content, mobile TV, etc)
Interoperability with existing wireless standards
An all IP, packet switched network
4G characteristics include:
Wireless data, voice and video transmission
Packet-centric environment
Multimedia environment
At least several Mb/s rate of transmission (may be asymmetrical) in the mobile environment
Up to 1 Gb/s rate of transmission in the stationary environment
Seamless cell transmission, including in-building and outdoor communications with various technologies.

4G features

According to the 4G working groups, the infrastructure and the terminals of 4G will have almost all the standards from 2G to 4G implemented. Although legacy systems are in place to adopt existing users, the infrastructure for 4G will be only packet-based (all-IP). Some proposals suggest having an open platform where the new innovations and evolutions can fit. The technologies considered to be "pre-4G" include Flash-OFDM, WiMax, WiBro, iBurst, and 3GPP Long Term Evolution. One of the first technology really fulfilling the 4G requirements as set by the ITU-R will be LTE Advanced as currently standardized by 3GPP. LTE Advanced will be an evolution of the 3GPP Long Term Evolution. Higher data rates are for instance achieved by the aggregation of multiple LTE carriers that are currently limited to 20MHz bandwidth.

IPv6

Unlike 3G, which is based on two parallel infrastructures consisting of circuit switched and packet switched network nodes respectively, 4G will be based on packet switching only. This will require low-latency data transmission.

By the time that 4G is deployed, the process of IPv4 address exhaustion is expected to be in its final stages. Therefore, in the context of 4G, IPv6 support is essential in order to support a large number of wireless-enabled devices. By increasing the number of IP addresses, IPv6 removes the need for Network Address Translation (NAT), a method of sharing a limited number of addresses among a larger group of devices.

In the context of 4G, IPv6 also enables a number of applications with better multicast, security, and route optimization capabilities. With the available address space and number of addressing bits in IPv6, many innovative coding schemes can be developed for 4G devices and applications that could aid deployment of 4G networks and services.

Advanced Antenna Systems

The performance of radio communications obviously depends on the advances of an antenna system; refer to smart or intelligent antenna. Recently, multiple antenna technologies are emerging to achieve the goal of 4G systems such as high rate, high reliability, and long range communications. In the early 90s, to cater the growing data rate needs of data communication, many transmission schemes were proposed. One technology, spatial multiplexing, gained importance for its bandwidth conservation and power efficiency. Spatial multiplexing involves deploying multiple antennas at the transmitter and at the receiver. Independent streams can then be transmitted simultaneously from all the antennas. This increases the data rate into multiple folds with the number equal to minimum of the number of transmit and receive antennas. This is called MIMO (as a branch of intelligent antenna). Apart from this, the reliability in transmitting high speed data in the fading channel can be improved by using more antennas at the transmitter or at the receiver. This is called transmit or receive diversity. Both transmit/receive diversity and transmit spatial multiplexing are categorized into the space-time coding techniques, which does not necessarily require the channel knowledge at the transmit. The other category is closed-loop multiple antenna technologies which use the channel knowledge at the transmitter.

Software-Defined Radio (SDR)

SDR is one form of open wireless architecture (OWA). Since 4G is a collection of wireless standards, the final form of a 4G device will constitute various standards. This can be efficiently realized using SDR technology, which is categorized to the area of the radio convergence.

4G Applications and Their Benefits to Public Safety

One of the most notable advanced applications for 4G systems is location based services. 4G location applications would be based on visualized, virtual navigation schemes that would support a remote database containing graphical representations of streets, buildings, and other physical characteristics of a large metropolitan area. This database could be accessed by a subscriber in a moving vehicle equipped with the appropriate wireless device, which would provide the platform on which would appear a virtual representation of the environment ahead. For example, one would be able to see the internal layout of a building during an emergency rescue. This type of application is sometimes referred to as "Telegeoprocessing", which is a combination of Geographical Information Systems (GIS) and Global Positioning Systems (GPS) working in concert over a high-capacity wireless mobile system. Telegeoprocessing over 4G networks will make it possible for the public safety community to have wireless operational functionality and specialized applications for everyday operations, as well as for crisis management.

The emergence of next generation wireless technologies will enhance the effectiveness of the existing methods used by public safety. 3G technologies and beyond could possibly bring the following new features to public safety:

Virtual navigation: As described, a remote database contains the graphical representation of streets, buildings, and physical characteristics of a large metropolis. Blocks of this database are transmitted in rapid sequence to a vehicle, where a rendering program permits the occupants to visualize the environment ahead. They may also "virtually" see the internal layout of buildings to plan an emergency rescue, or to plan to engage hostile elements hidden in the building.

Tele-medicine: A paramedic assisting a victim of a traffic accident in a remote location could access medical records (e.g., x-rays) and establish a video conference so that a remotely based surgeon could provide “on-scene” assistance. In such a circumstance, the paramedic could relay the victim's vital information (recorded locally) back to the hospital in real time, for review by the surgeon.

Crisis-management applications: These arise, for example, as a result of natural disasters where the entire communications infrastructure is in disarray. In such circumstances, restoring communications quickly is essential. With wide band wireless mobile communications, both limited and complete communications capabilities, including Internet and video services, could be set up in a matter of hours. In comparison, it may take days or even weeks to re-establish communications capabilities when a wireline network is rendered inoperable.

At the present rates of 15-30 Mbit/s, 4G is capable of providing users with streaming high-definition television, but the typical cellphone's or smartphone's 2" to 3" screen is a far cry from the big-screen televisions and video monitors that got high-definition resolutions first and which suffer from noticeable pixilation much more than the typical 2" to 3" screen. A cellphone may transmit video to a larger monitor, however. At rates of 100 Mbit/s, the content of a DVD-5 (for example a movie), can be downloaded within about 5 minutes for offline access.

Limitations of 4G

Although the concept of 4G communications shows much promise, there are still limitations that must be addressed. One major limitation is operating area. Although 2G networks are becoming more ubiquitous, there are still many areas not served. Rural areas and many buildings in metropolitan areas are not being served well by existing wireless networks. This limitation of today’s networks will carry over into future generations of wireless systems. The hype that is being created by 3G networks is giving the general public unrealistic expectations of always on, always available, anywhere, anytime communications. The public must realize that although high-speed data communications will be delivered, it will not be equivalent to the wired Internet – at least not at first. If measures are not taken now to correct perception issues, when 3G and later 4G services are deployed, there may be a great deal of disappointment associated with the deployment of the technology, and perceptions could become negative. If this were to happen, neither 3G nor 4G may realize its full potential. Another limitation is cost. The equipment required to implement a next generation network is still very expensive. Carriers and providers have to plan carefully to make sure that expenses are kept realistic. One technique currently being implemented in Asian networks is a Pay-Per-Use model of services. This model will be difficult to implement in the United States, where the public is used to a service-for-free model (e.g., the Internet).

Conclusion

4G networks may eventually deliver on all the promises. At times, it seems that technological advances are being made on a daily basis. These advances will make high speed data/voice-over-Internet-protocol (VoIP) networks a reality. In the meantime, it is important for industry to develop a strong 3G offering that is palatable for the general public. Equally as important, industry must ensure that expectations are realistic and that services meet, exceed those expectations.

 
 
 
Voice over Internet Protocol (VoIP)
Voice over Internet Protocol (VoIP) is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks. Other terms frequently encountered and synonymous with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, and broadband phone.
VoIP systems usually interface with the traditional public switched telephone network (PSTN) to allow for transparent phone communications worldwide.

VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. Codec use is varied between different implementations of VoIP (and often a range of codecs are used); some implementations rely on narrow band and compressed speech, while others support high fidelity stereo codecs.

Operational cost

VoIP can be a benefit for reducing communication and infrastructure costs. Examples include:

Routing phone calls over existing data networks to avoid the need for separate voice and data networks.
Conference calling, IVR, call forwarding, automatic redial, and caller ID features that traditional telecommunication companies (telcos) normally charge extra for are available for free from open source VoIP implementations such as Asterisk.

There are three common methods of connecting to VoIP service providers:

An Analog Telephone Adapter (ATA) may be connected between an IP network (such as a broadband connection) and an existing telephone jack in order to provide service nearly indistinguishable from PSTN providers on all the other telephone jacks in the residence. This type of service, which is fixed to one location, is generally offered by broadband Internet providers such as cable companies and telephone companies as a cheaper flat-rate traditional phone service.
Dedicated VoIP phones are phones that allow VoIP calls without the use of a computer. Instead they connect directly to the IP network (using technologies such as Wi-Fi or Ethernet). In order to connect to the PSTN they usually require service from a VoIP service provider therefore most people also use them in conjunction with a paid service plan.
A softphone (also known as an Internet phone or Digital phone) is a piece of software that can be installed on a computer that allows VoIP calling without dedicated hardware. An advantage of using a softphone with a VoIP service provider is the ability of having a fixed phone number which you can move to any country or location (This is also possible with ATAs and VoIP phones, however requires the physical relocation of the hardware).
 
 
 
Digital Subscriber Line (DSL)

Digital subscriber line DSL or DSL, is a family of technologies that provides digital data transmission over the wires of a local telephone network. DSL originally stood for digital subscriber loop, although in recent years, the term digital subscriber line has been widely adopted as a more marketing-friendly term for ADSL, which is the most popular version of consumer-ready DSL. DSL can be used at the same time and on the same telephone line with regular telephone, as it uses high frequency, while regular telephone uses low frequency.

Typically, the download speed of consumer DSL services ranges from 256 kilobits per second (kbit/s) to 24,000 kbit/s, depending on DSL technology, line conditions and service level implemented. Typically, upload speed is lower than download speed for Asymmetric Digital Subscriber Line (ADSL) and equal to download speed for the rarer Symmetric Digital Subscriber Line (SDSL).

Voice and data: DSL (VDSL) typically works by dividing the frequencies used in a single phone line into two primary "bands". The ISP data is carried over the high-frequency band (25 kHz and above) whereas the voice is carried over the lower-frequency band (4 kHz and below). The user typically installs a DSL filter on each phone. This filters out the high frequencies from the phone line, so that the phone only sends or receives the lower frequencies (the human voice). The DSL modem and the normal telephone equipment can be used simultaneously on the line without interference from each other.

The local loop of the public switched telephone network (PSTN) was initially designed to carry POTS voice communication and signaling, since the concept of data communications as we know it today did not exist. For reasons of economy, the phone system nominally passes audio between 300 and 3,400 Hz, which is regarded as the range required for human speech to be.

Most residential and small-office DSL implementations reserve low frequencies for POTS service, so that (with suitable filters and/or splitters) the existing voice service continues to operate independent of the DSL service. Thus POTS-based communications, including fax machines and analog modems, can share the wires with DSL. Only one DSL "modem" can use the subscriber line at a time. The standard way to let multiple computers share a DSL connection is to use a router that establishes a connection between the DSL modem and a local Ethernet, Powerline, or Wi-Fi network on the customer's premises.

Typical setup and connection procedures

The first step is the physical connection. On the customer side, the DSL Transceiver, or ATU-R, or more commonly known as a DSL modem, is hooked up to a phone line. (Modems actually modulate and demodulate a signal, whereas the DSL Transceiver is a radio-signal transmit and receive unit.) The telephone company (telco) connects the other end of the line to a DSLAM, which concentrates a large number of individual DSL connections into a single box. The location of the DSLAM depends on the telco, but it cannot be located too far from the user because of attenuation, the loss of data due to the large amount of electrical resistance encountered as the data moves between the DSLAM and the user's DSL modem. It is common for a few residential blocks to be connected to one DSLAM.

When the DSL modem is powered up, it goes through a sync procedure. The actual process varies from modem to modem but can be generally described as:

The DSL Transceiver does a self-test.
The DSL Transceiver checks the connection between the DSL Transceiver and the computer. For residential variations of DSL, this is usually the Ethernet (RJ-45) port or a USB port; in rare models, a FireWire port is used. Older DSL modems sported a native ATM interface (usually, a 25 Mbit serial interface). Also, some variations of DSL (such as SDSL) use synchronous serial connections.
The DSL Transceiver then attempts to synchronize with the DSLAM. Data can only come into the computer when the DSLAM and the modem are synchronized. The synchronization process is relatively quick (in the range of seconds) but is very complex, involving extensive tests that allow both sides of the connection to optimize the performance according to the characteristics of the line in use. External, or stand-alone modem units have an indicator labeled "CD", "DSL", or "LINK", which can be used to tell if the modem is synchronized. During synchronization the light flashes; when synchronized, the light stays lit, usually with a green color.

Modern DSL gateways have more functionality and usually go through an initialization procedure that is very similar to a PC starting up. The system image is loaded from the flash memory; the system boots, synchronizes the DSL connection and establishes the IP connection between the local network and the service provider, using protocols such as DHCP or PPPoE. The system image can usually be updated to correct bugs, or to add new functionality.

DSL technologies

The line length limitations from telephone exchange to subscriber are more restrictive for higher data transmission rates. Technologies such as VDSL provide very high speed, short-range links as a method of delivering "triple play" services (typically implemented in fiber to the curb network architectures). Technologies likes GDSL can further increase the data rate of DSL.

Transmission methods

Transmission methods vary by market, region, carrier, and equipment.

2B1Q: Two-binary, one-quaternary, used for IDSL and HDSL
CAP: Carrier less Amplitude Phase Modulation - deprecated in 1996 for ADSL, used for HDSL
DMT: Discrete multitone modulation, the most numerous kind, also known as OFDM (Orthogonal frequency-division multiplexing)
 
 
 
Virtual Private Network

A Virtual Private Network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) as opposed to their conduction across a single private network. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.

A VPN allows computer users to access a network via an IP address other than the one that actually connects their computer to the Internet.

Routing

Tunneling protocols can be used in a point-to-point topology that would generally not be considered a VPN, because a VPN is expected to support arbitrary and changing sets of network nodes. Since most router implementations support software-defined tunnel interface, customer-provisioned VPNs are often simply a set of tunnels over which conventional routing protocols run. PPVPNs, however, need to support the coexistence of multiple VPNs, hidden from one another, but operated by the same service provider.

Authentication before VPN connection

A known trusted user, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users. Servers may also need to authenticate themselves to join the VPN.

There are a wide variety of authentication mechanisms, which may be implemented in devices including firewalls, access gateways, and other devices. They may use passwords, biometrics, or cryptographic methods. Strong authentication involves combining cryptography with another authentication mechanism. The authentication mechanism may require explicit user action, or may be embedded in the VPN client or the workstation.

Trusted delivery networks

Trusted VPNs (sometimes referred to APNs - Actual Private Networks) do not use cryptographic tunneling, and instead rely on the security of a single provider's network to protect the traffic. In a sense, these are an elaboration of traditional network and system administration work.

Multi-Protocol Label Switching (MPLS) is often used to overlay VPNs, often with quality of service control over a trusted delivery network.
Layer 2 Tunneling Protocol (L2TP) which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Cisco's Layer 2 Forwarding (L2F) (now obsolete) and Microsoft's Point-to-Point Tunneling Protocol (PPTP).
Security mechanisms

Secure VPNs use cryptographic tunneling protocols to provide the intended confidentiality (blocking snooping and thus Packet sniffing), sender authentication (blocking identity spoofing), and message integrity (blocking message alteration) to achieve privacy. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks.

Security and mobility

Mobile VPNs are VPNs designed for mobile and wireless users. They integrate standards-based authentication and encryption technologies to secure data transmissions to and from devices and to protect networks from unauthorized users. Designed for wireless environments, Mobile VPNs are designed as an access solution for users that are on the move and require secure access to information and applications over a variety of wired and wireless networks. Mobile VPNs allow users to roam seamlessly across IP-based networks and in and out of wireless coverage areas without losing application sessions or dropping the secure VPN session. For instance, highway patrol officers require access to mission-critical applications in order to perform their jobs as they travel across different subnets of a mobile network, much as a cellular radio has to hand off its link to repeaters at different cell towers.

Host Identity Protocol (HIP) is an IETF protocol supporting mobile VPN using Bound End-to-End Tunnel (BEET) mode for IPsec.

 
 
 
From The Editors Desk
 
Kayalvizhi
Email - kayal@mindlogicx.com
 
Heartiest Greetings!

In this issue of Youniverse, we have presented an article on "4G Technologies".

Our regular section on Exam Alerts informs you of the important dates of the upcoming entrance examinations. Section on Complex simplicities provides you an introducion to the concepts of VoIP, DSL, VPN

We hope that you would find the information presented in this issue of Youniverse interesting and useful.

We welcome your thought, views, comments & suggestions to share information as knowledge.

 
Editor
 
 
Feedback
 
Please provide us with your feedback on how you feel about the Youniverse newsletter.You can also send us your queries on the VEDAS services.
top
Email to info@vedaslive.com
 
 
 
     Terms of use       Sitemap    Contact us
©Mindlogicx Infratec Limited.