Friday, April 22, 2011

VIRUS PROBLEM


Beam telecom customers are facing this Virus problem CCDRIVE32.EXE, and this virus was changing filename frequently every few weeks, Presently Virus name is GHDRIVE32.exe.
Location C:\Windows\ghdrive32.exe
Registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | Microsoft Driver Setup
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run | Microsoft Driver Setup
May be it will change after some time but --drive32.exe will be there.I think Every one who visit the Customer place already face this problem internet will work for 5-10 Min after restarting the computer then again it will get disconnect.

After infecting by --DRIVE32.EXE virus others viruses will get easily entered
And the Big problem is this Our Antivirus Symantec Endpoint Protection was not able to detect it.

This Image was taken from Customers PC its showing Antivirus is up to date but still virus is there.



What --DRIVE32.EXE will do after entering on your computer?

Opens several TCP ports, connects to remote hosts, Connects to remote IRC server, this virus installer may download more harmful files from the internet. And within 5-10 minutes your internet will get disconnected, it will show connected but you will not be able to Browse it. If --DRIVE32.EXE virus will entered in the computer in the 90% cases this virus is also there CSRSC.EXE.
Make sure that CSRSS.EXE is not a virus its a computer file only 1 letter Difference.
CSRSC.EXE is a process which is registered as W32.Spybot.CF Virus. This Trojan allows attackers to access a computer from remote locations, stealing passwords, Internet banking and personal data. So we need to take care of this type of files.
It just takes 2 minutes to verified.


How to Verify you are infected with this particular virus ?

i)

1) You can find out if a process appearing in your task manager, by going to Task Manager. how to open Task Manager
a) Right Click on the task bar and click on the task manager
b) Press ALT+CTRL+DEL
this will open the task manager.
2) Click on the Processes then click on image name it will arrange all exe files by names.
3) Then Find out the virus file --DRIVE32.EXE or CSRSC.EXE.

ii)

If Task Manager has been disabled then u can find out through prompt also
Click on start run type CMD click on ok
in the command prompt type TASKLIST
this will show u the running processes in the task manager then u have to find out the virus file

iii)

go to run type MSCONFIG
click on startup
this will shows the startup running programs
here also u will find --DRIVE32.EXE Microsoft driver setup.

And in the startup u can also disable the startup items which we don't to use it every-time like messengers, media players etc. Just Un select it from the startup items and click on OK.

How to Removed this virus?
You Already have the Antivirus and it is up to date and scanning as per your schedule but our Symantec antivirus was not removing.


  • Download MalwareBytes Anti-malware (MBAM). free version 7 MB file
  • Close all programs and Windows on your computer.
  • Double Click mbam-setup.exe to install the application. When the installation begins, keep following the prompts in order to continue with the installation process. Do not make any changes to default settings and when the program has finished installing, make sure a checkmark is placed next to Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware, then click Finish.
  • If an update is found, it will download and install the latest version. update file is 6 MB
  • Once the program has loaded, select “Perform Quick Scan”, then click Scan.
  • The scan may take 5-10 Minutes time to finish,so please be patient
  • When the scan is complete, click OK, then Show Results to view the results.
  • Make sure that everything is checked, and click Remove Selected.
  • When disinfection is completed, a log will open in Notepad and you may be prompted to Restart.


After Restarting the Computer verified once again still this viruses are running or not.

This image was taken after scanning with malwarebytes results.
As you can see there is so many viruses was detected, in the Scanning as i mention above --DRIVE32.EXE will download harmful files. u can see here.


For offline use.
Sometimes we will not be able to download or UPDATE might slow internet or its getting disconnected in middle.

U have write down in a CD or You can have a dump in the pendrive.

I have uploaded in this website http://drive32.4shared.com malwarbytes download

There are 2 files First Run the Mbam-Setup file installed it remove the 2 check box before clicking finish.
Then Run MBAM-RULES. its last updated on 20 March 2011.

Downloading Instructions
1) click  on download now 


2) wait for given time


3) Click on download file now



Sunday, April 3, 2011

IPTV


IPTV (Internet Protocol Television) delivers television programming to households via a broadband connection using Internet protocols. It requires a subscription and IPTV set-top box, and offers key advantages over existing TV cable and satellite technologies. IPTV is typically bundled with other services like Video on Demand (VOD), voice over IP (VOIP) or digital phone, and Web access, collectively referred to as Triple Play.

Because IPTV arrives over telephone lines, telephone companies are in a prime position to offer IPTV services initially, but it is expected that other carriers will offer the technology in the future. IPTV promises more efficient streaming than present technologies, and therefore theoretically reduced prices to operators and subscribers alike. However, it also adds many advantages that may play into market pricing.

One of the advantages of IPTV is the ability for digital video recorders (DVRs) to record multiple broadcasts at once. According to Alcatel, one leading provider, it will also be easier to find favorite programs by using "custom view guides." IPTV even allows for picture-in-picture viewing without the need for multiple tuners. You can watch one show, while using picture-in-picture to channel surf!

IPTV viewers will have full control over functionality such as rewind, fast-forward, pause, and so on. Using a cell phone or PDA, a subscriber might even utilize remote programming for IPTV. For example, if a dinner function runs longer than expected, you don't have to miss your favorite program. Just call home and remotely set the IPTV box to record it.

However, the real advantage of IPTV is that it uses Internet protocols to provide two-way communication for interactive television. One application might be in game shows in which the studio audience is asked to participate by helping a contestant choose between answers. IPTV opens the door to real-time participation from people watching at home. Another application would be the ability to turn on multiple angles of an event, such as a touchdown, and watch it from dual angles simultaneously using picture-in-picture viewing.

One can also receive Web service notifications while watching IPTV for things such as incoming email and instant messages. If you IPTV is packaged with digital phone, Caller ID might pop up on screen as your telephone rings.

IPTV is already growing in the international market, with providers in many countries including Japan, Hong Kong, Italy, France, Spain, Ireland, and the United Kingdom. In the United States SBC, reportedly purchased a software delivery system for IPTV services from Microsoft in 2004 for $400 million dollars. Alcatel is working with Microsoft to develop a "global solution" for IPTV services, and Verizon has also made a deal with Microsoft for IPTV software.


Also referred to as IPTV, Internet protocol television is a process in which television programming is provided by way of a connection to the Internet. This type of Internet television encompasses many different strategies, including some proprietary methods that involve simultaneously broadcasting programming online, via cable and satellite, and over the air. At other times, Internet protocol television provides the means whereby individual stations receive feeds from larger networks and in turn make that programming available to viewers in various forms.

Internet protocol television makes use of online capabilities to provide viewers with both the audio and the visual components of the programming. In some cases, the ability to view television programming online is possible only after that programming has been transmitted via more traditional means. For example, a television program may be broadcast over the air, and transmitted to cable and satellite subscribers first, then made available via the Internet. With this approach, viewers can access the program later the same evening, the next day, or for as long as online access to that program is maintained. Providing the programming in several different formats, including the delayed webcast, is often referred to as a multicast.

A second approach involves streaming media over the Internet at the same time that the programming is provided over the air, via cable, or through a satellite service. This method is known as a simulcast, since the programming is being provided in multiple formats simultaneously. As the concept of web television has gained in popularity, a number of television stations have made use of this approach, making it possible for people to enjoy at least some of their favorite programs via handheld devices or laptops while others are watching the same programming using more traditional means.

Today, a number of web sites provide Internet protocol television that includes a mixture of classic television programming along with new programs that are either shown live or with a short delay. Some of these online sites make use of public domain archives, allowing viewers to enjoy episodes of television programs that are now in the public domain. Thanks to the development of equipment that makes it possible to connect a computer with an active Internet connection to a standard television, viewers who are unhappy with cable or satellite services can now augment local over the air programming with Internet protocol television fare. Doing so makes it possible to still enjoy access to a wide range of program selections, and involves relatively little expense in comparison to other methods.

Television is changing

Over the last decade, the growth of satellite service, the rise of digital cable, and the birth of HDTV have all left their mark on the television landscape. Now, a new delivery method threatens to shake things up even more powerfully. Internet Protocol Television (IPTV) has arrived, and backed by the deep pockets of the telecommunications industry, it's poised to offer more interactivity and bring a hefty dose of competition to the business of selling TV.

IPTV describes a system capable of receiving and displaying a video stream encoded as a series of Internet Protocol packets. If you've ever watched a video clip on your computer, you've used an IPTV system in its broadest sense. When most people discuss IPTV, though, they're talking about watching traditional channels on your television, where people demand a smooth, high-resolution, lag-free picture, and it's the telcos that are jumping headfirst into this market. Once known only as phone companies, the telcos now want to turn a "triple play" of voice, data, and video that will retire the side and put them securely in the batter's box.

In this primer, we'll explain how IPTV works and what the future holds for the technology. Though IP can (and will) be used to deliver video over all sorts of networks, including cable systems, we'll focus in this article on the telcos, which are the most aggressive players in the game. They're pumping billions into new fiber rollouts and backend infrastructure (AT&T alone inked a US$400 million deal for Microsoft's IPTV Edition software last year, for instance, and a US$1.7 billion deal with hardware maker Alcatel). Why the sudden enthusiasm for the TV business? Because the telcos see that the stakes are far higher than just some television: companies that offer the triple play want to become your household's sole communications link, and IPTV is a major part of that strategy.

How it works

First things first: the venerable set-top box, on its way out in the cable world, will make a resurgence in IPTV systems. The box will connect to the home DSL line and is responsible for reassembling the packets into a coherent video stream and then decoding the contents. Your computer could do the same job, but most people still don't have an always-on PC sitting beside the TV, so the box will make a comeback. Where will the box pull its picture from? To answer that question, let's start at the source.

Most video enters the system at the telco's national headend, where network feeds are pulled from satellites and encoded if necessary (often in MPEG-2, though H.264 and Windows Media are also possibilities). The video stream is broken up into IP packets and dumped into the telco's core network, which is a massive IP network that handles all sorts of other traffic (data, voice, etc.) in addition to the video. Here the advantages of owning the entire network from stem to stern (as the telcos do) really come into play, since quality of service (QoS) tools can prioritize the video traffic to prevent delay or fragmentation of the signal. Without control of the network, this would be dicey, since QoS requests are not often recognized between operators. With end-to-end control, the telcos can guarantee enough bandwidth for their signal at all times, which is key to providing the "just works" reliability consumers have come to expect from their television sets.

The video streams are received by a local office, which has the job of getting them out to the folks on the couch. This office is the place that local content (such as TV stations, advertising, and video on demand) is added to the mix, but it's also the spot where the IPTV middleware is housed. This software stack handles user authentication, channel change requests, billing, VoD requests, etc.—basically, all of the boring but necessary infrastructure.

All the channels in the lineup are multicast from the national headend to local offices at the same time, but at the local office, a bottleneck becomes apparent. That bottleneck is the local DSL loop, which has nowhere near the capacity to stream all of the channels at once. Cable systems can do this, since their bandwidth can be in the neighborhood of 4.5Gbps, but even the newest ADSL2+ technology tops out at around 25Mbps (and this speed drops quickly as distance from the DSLAM [DSL Access Multiplier] grows).

So how do you send hundreds of channels out to an IPTV subscriber with a DSL line? Simple: you only send a few at a time. When a user changes the channel on their set-top box, the box does not "tune" a channel like a cable system. (There is in fact no such thing as "tuning" anymore—the box is simply an IP receiver.) What happens instead is that the box switches channels by using the IP Group Membership Protocol (IGMP) v2 to join a new multicast group. When the local office receives this request, it checks to make sure that the user is authorized to view the new channel, then directs the routers in the local office to add that particular user to the channel's distribution list. In this way, only signals that are currently being watched are actually being sent from the local office to the DSLAM and on to the user.

No matter how well-designed a network may be or how rigorous its QoS controls are, there is always the possibility of errors creeping into the video stream. For unicast streams, this is less of an issue; the set-top box can simply request that the server resend lost or corrupted packets. With multicast streams, it is much more important to ensure that the network is well-engineered from beginning to end, as the user's set-top box only subscribes to the stream—it can make no requests for additional information. To overcome this problem, multicast streams incorporate a variety of error correction measures such as forward error correction (FEC), in which redundant packets are transmitted as part of the stream. Again, this is a case where owning the entire network is important since it allows a company to do everything in its power to guarantee the safe delivery of streams from one end of the network to the other without relying on third parties or the public Internet.

Though multicast technology provides the answer to the problem of pumping the same content out to millions of subscribers at the same time, it does not help with features such as video on demand, which require a unique stream to the user's home. To support VoD and other services, the local office can also generate a unicast stream that targets a particular home and draws from the content on the local VoD server. This stream is typically controlled by the Real Time Streaming Protocol (RTSP), which enables DVD-style control over a multimedia stream and allows users to play, pause, and stop the program they are watching.

The actual number of simultaneous video streams sent from the local office to the consumer varies by network, but is rarely more than four. The reason is bandwidth. A Windows Media-encoded stream, for instance, takes up 1.0 to 1.5Mbps for SDTV, which is no problem; ten channels could be sent at once with bandwidth left over for voice and data. But when HDTV enters the picture, it's a different story, and the 20-25Mbps capacity of the line gets eaten up fast. At 1080i, HDTV bit rates using Windows Media are in the 7 to 8 Mbps range (rates for H.264 are similar). A quick calculation tells you that a couple of channels are all that can be supported.

The bandwidth situation is even worse when you consider MPEG-2, which has lower compression ratios. MPEG-2 streams will require almost twice the space (3.5 Mbps for SDTV, 18-20 Mbps for HDTV), and the increased compression found in the newer codecs is one reason that AT&T will not use MPEG-2 in the rollout of its IPTV service dubbed "U-verse."

Simultaneous delivery of channels is necessary to keep IPTV competitive with cable. Obviously, multiple streams are needed to support picture-in-picture, but they're also needed by DVRs, which can record one show while a user is watching another. For IPTV to become a viable whole-house solution, it will also need to support enough simultaneous channels to allow televisions in different rooms to display different content, and juggling resulting bandwidth issues is one of the trickiest parts of implementing an IPTV network that will be attractive to consumers.


What's in it for me?

If IPTV was simply a way for telcos to enter the video delivery game, it would be an attractive service just for the increased competition. A recent FCC study showed that cable rates increased at more than 3.5 times the rate of inflation between 1998 and 2003—but in the few places where cable faces competition from another wireline provider, prices are substantially lower than the average. The increased competition provided by the telcos will no doubt drive prices down further, as has already happened in Texas (where several telco TV projects are undergoing trials).

Apart from the effect on the competitive landscape, though, IPTV has the potential to deliver more interactivity than cable. An all-IP solution is switched digital by nature, does not depend on shared bandwidth, and uses well-known Internet technology, which should make for some interesting applications. Expect to see caller ID information displayed on the screen when your phone rings, for instance, or alerts when you receive new e-mail. Because IPTV does not require expensive tuners, multiple picture-in-picture applications will become a reality, and DVRs will be able to record multiple shows at once without upping the cost of the unit (the main constraint will be bandwidth). An interactive program guide, pay-per-view functionality, and video on demand will all be standard features, and channel changes should be much quicker.

Because the set-top boxes will use Ethernet and IP, they should be simple to integrate into the existing home network, which includes a user's computer. STBs will be able to pull video and pictures from a home PC and display them on the television, and will also be able to easily network with other STBs on other televisions throughout the house. This will allow a user to own a single DVR that can be controlled from any set in any room.

IPTV: (Almost) here at last

The promise of IPTV has been, well, promised for some time now, but it really is just around the corner. In the US, AT&T (formerly SBC) is in the midst of its Project Lightspeed, a 40,000-mile fiber rollout. The company is dropping US$4 billion on upgrading its network, though unlike Version's FiOS service, the fiber will generally not run all the way to the home. As the rollout continues, the company will introduce its U-verse IPTV service, which is currently undergoing live trials in Texas.

Speaking of Verizon, they already offer 300+ channels of television service. It's not delivered over DSL, but by fiber strung directly to the home. They are also in the process of a multi-billion dollar network upgrade and have the jump on AT&T, having already laid fiber to three million homes at the end of 2005. Running fiber to the home gives them incredible bandwidth and allows them to stream all channels at once; out of the 4.5Gbps available on the fiber, only 3.5Gbps are taken up with TV. (Though they plan to transition to a full-IP network in the future, FiOS TV is currently RF [radio frequency] based, except for video on demand, which uses IP.)

Prior to being acquired by AT&T, BellSouth had jumped on the fiber train early and has already rolled out more than five million miles of the stuff while preparing its own IPTV trials. Like both AT&T and Verizon, BellSouth was testing Microsoft's IPTV software; with AT&T swallowing up BellSouth, it looks as though the software giant may become the main provider of IPTV backend software in the US.

One potential roadblock to these rollouts could be franchise agreements, the licenses that most companies need from a municipality to offer television service. Cable companies have had decades of negotiating practice with cities, but it's a new world for the telcos, who have found the process to be excruciatingly slow (and costly). Verizon, for instance, calls the agreements "a major barrier to entering the video market on a wide scale" and claims that the cable industry has done its best to use franchise agreements to trip up the telcos.

The telcos have lobbied both the FCC and state legislatures to make changes to the rules governing these agreements, and it appears that some states, at least, are cooperating. Texas recently passed a law allowing the telcos to negotiate a franchise agreement with the entire state at once instead of with every separate community, and Verizon told the FCC that this had provided extra incentive for the company to conduct some trials in the state. AT&T, for its part, has publicly taken the stance that they don't actually need a franchise license since they are essentially delivering an IP-based data service, not a video signal, and thus are not subject to the franchising rules. This could be a costly decision if the FCC thinks differently, but it could also save them a lot to time, money, and energy if their strategy gets an official thumbs-up.

The big loser here could be satellite, which has been providing the video portion of the telcos' offerings for nearly a decade. With the telcos going into the TV business for themselves, satellite will need to find a compelling way to offer both VoIP and data services along with its traditional video signal in order to remain competitive. (DirectTV, in particular, has been mulling a move to WiMAX technology to remain competitive.) Fortunately for them, satellite companies currently control just over 30 percent of the pay TV market, which should give them some breathing room when the telcos deploy IPTV systems in force.

Another approach to IP-based video comes from web companies who do not necessarily own the complete network infrastructure, but who plan to offer IPTV services over the public Internet. AOL has already announced its plan for a service dubbed In2TV that will stream ad-supported programming to users over the 'Net, and companies like Apple and Google already offer what are essentially IP-based video on demand services. Though such efforts typically rely on a computer to display the content, it would definitely be possible to roll out set-top boxes so that consumers could watch the programming on their own televisions. The idea's not quite as crazy as it sounds—Atlanta-based Dave.tv is currently in the process of producing its own box and plans to offer TV services right over the Internet. Such a move could leapfrog the traditional networks, but it faces problems.

The obvious challenge to this business model comes from being a "broadcaster" without a network, which means that users need to bring their own access and that content is delivered over networks owned by the telcos or cable providers (in most cases). Both groups have begun making noise about "tiered pricing" schemes, and you can expect them to push the idea even harder as increased amounts of video stream through "their pipes." Any company serious about providing their own IPTV service would no doubt ante up, since consumers are unlikely to subscribe to a TV service that suffers from bandwidth bottlenecks or other inconsistencies.

Time for a triple play

How big will the IPTV market be? Multimedia Research Group estimates that IPTV subscribers will balloon from 3.7 million in 2005 to 36.9 million by 2009 (worldwide), with Europe leading the market. The industry's revenues could reach nearly US$10 billion by that time—no small chunk of change. Still, the battle is for more than just your television; it's a struggle for the single entry point into your home.

The so-called "triple play" of voice, video, and data is currently a holy grail for the telcos, who need to compete with the cable companies, which already offer all three services. With both telcos and cable providers offering the triple play, it's likely that consumers will soon need only a single data pipe flowing into their home (and bundle discounts will ensure that this is the cheapest way to do things). Whichever pipe that turns out to be—cable or telephone line—will mean big money for the company that owns it.

IPTV provides the missing piece that the telcos need, but the cable companies, for their part, are talking tough. "AT&T is spending years and billions of dollars to imitate a network that Comcast has already built," said spokesman Andrew Johnson. "We've seen nothing... that we can't exceed." Despite the posturing, both industries see this as an important transition time during which they need to sell customers on the merits of one-stop shopping for their communication and entertainment needs. Hopefully, the battle of words will soon give way to the price war that satellite could not fully spark, in which case IPTV, if it does nothing else, will have succeeded.

TCP IP PROTOCOLS

The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks. The Internet, an international Wide Area Network, uses TCP/IP to connect government and educational institutions across the world. TCP/IP is also in widespread use on commercial and private networks. The TCP/IP suite includes the following protocols.

TCP/IP Networking Protocols

The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. It is also widely used on many organizational networks due to its flexiblity and wide array of functionality provided. Microsoft who had originally developed their own set of protocols now is more widely using TCP/IP, at first for transport and now to support other services.

TCP/IP by Layer

Link Layer
  • SLIP - Serial Line Internet Protocol. This protocol places data packets into data frames in preparation for transport across network hardware media. This protocol is used for sending data across serial lines. There is no error correction, addressing or packet identification. There is no authentication or negotiation capabilities with SLIP. SLIP will only support transport of IP packets.
  • CSLIP - Compressed SLIP is essentially data compression of the SLIP protocol. It uses Van Jacobson compression to drastically reduce the overhead of packet overhead. This may also be used with PPP and called CPPP.
  • PPP - Point to Point Protocol is a form of serial line data encapsulation that is an improvement over SLIP which provides serial bi-directional communication. It is much like SLIP but can support AppleTalk, IPX, TCP/IP, and NetBEUI along with TCP/IP which is supported by SLIP. It can negociate connection parameters such as speed along with the ability to support PAP and CHAP user authentication.
  • Ethernet - Ethernet is not really called a protocol. There are also many types of ethernet. The most common ethernet which is used to control the handling of data at the lowest layer of the network model is 802.3 ethernet. 802.3 ethernet privides a means of encapsulating data frames to be sent between computers. It specifies how network data collisions are handled along with hardware addressing of network cards.

Network Layer

  • ARP - Address Resolution Protocol enables the packaging of IP data into ethernet packages. It is the system and messaging protocol that is used to find the ethernet (hardware) address from a specific IP number. Without this protocol, the ethernet package could not be generated from the IP package, because the ethernet address could not be determined.
  • IP - Internet Protocol. Except for ARP and RARP all protocols' data packets will be packaged into an IP data packet. IP provides the mechanism to use software to address and manage data packets being sent to computers.
  • RARP - Reverse address resolution protocol is used to allow a computer without a local permanent data storage media to determine its IP address from its ethernet address.

Transport Layer

  • TCP - A reliable connection oriented protocol used to control the management of application level services between computers. It is used for transport by some applications.
  • UDP - An unreliable connection less protocol used to control the management of application level services between computers. It is used for transport by some applications which must provide their own reliability.
  • ICMP - Internet control message protocol (ICMP) provides management and error reporting to help manage the process of sending data between computers. (Management). This protocol is used to report connection status back to computers that are trying to connect other computers. For example, it may report that a destination host is not reachable.
  • IGMP - Internet Group Management Protocol used to support multicasting. IGMP messages are used by multicast routers to track group memberships on each of its networks.

Application Layer

  • FTP - File Transfer Protocol allows file transfer between two computers with login required.
  • TFTP - Trivial File Transfer Protocol allows file transfer between two computers with no login required. It is limited, and is intended for diskless stations.
  • NFS - Network File System is a protocol that allows UNIX and Linux systems remotely mount each other's file systems.
  • SNMP - Simple Network Management Protocol is used to manage all types of network elements based on various data sent and received.
  • SMTP - Simple Mail Transfer Protocol is used to transport mail. Simple Mail Transport Protocol is used on the internet, it is not a transport layer protocol but is an application layer protocol.
  • HTTP - Hypertext Transfer Protocol is used to transport HTML pages from web servers to web browsers. The protocol used to communicate between web servers and web browser software clients.
  • BOOTP - Bootstrap protocol is used to assign an IP address to diskless computers and tell it what server and file to load which will provide it with an operating system.
  • DHCP - Dynamic host configuration protocol is a method of assigning and controlling the IP addresses of computers on a given network. It is a server based service that automatically assigns IP numbers when a computer boots. This way the IP address of a computer does not need to be assigned manually. This makes changing networks easier to manage. DHCP can perform all the functions of BOOTP.
  • BGP - Border Gateway Protocol. When two systems are using BGP, they establish a TCP connection, then send each other their BGP routing tables. BGP uses distance vectoring. It detects failures by sending periodic keep alive messages to its neighbors every 30 seconds. It exchanges information about reachable networks with other BGP systems including the full path of systems that are between them. Described by RFC 1267, 1268, and 1497.
  • EGP - Exterior Gateway Protocol is used between routers of different systems.
  • IGP - Interior Gateway Protocol. The name used to describe the fact that each system on the internet can choose its own routing protocol. RIP and OSPF are interior gateway protocols.
  • RIP - Routing Information Protocol is used to dynamically update router tables on WANs or the internet. A distance-vector algorithm is used to calculate the best route for a packet. RFC 1058, 1388 (RIP2).
  • OSPF - Open Shortest Path First dynamic routing protocol. A link state protocol rather than a distance vector protocol. It tests the status of its link to each of its neighbors and sends the acquired information to them.
  • POP3 - Post Office Protocol version 3 is used by clients to access an internet mail server to get mail. It is not a transport layer protocol.
  • IMAP4 - Internet Mail Access Protocol version 4 is the replacement for POP3.
  • Telnet is used to remotely open a session on another computer. It relies on TCP for transport and is defined by RFC854.

Bandwidth Control

  • BAP - Bandwidth Allocation Protocol is a bandwidth control protocol for PPP connections. It works with BACP.
  • BACP - Bandwidth Allocation Control Protocol.

TCP/IP by Function

Packaging and Low Level

  • IP - Internet Protocol. Except for ARP and RARP all protocols' data packets will be packaged into an IP data packet. IP provides the mechanism to use software to address and manage data packets being sent to computers.
  • SLIP - Serial Line Internet Protocol. This protocol places data packets into data frames in preparation for transport across network hardware media. This protocol is used for sending data across serial lines. There is no error correction, addressing or packet identification. There is no authentication or negotiation capabilities with SLIP. SLIP will only support transport of IP packets.
  • CSLIP - Compressed SLIP is essentially data compression of the SLIP protocol. It uses Van Jacobson compression to drastically reduce the overhead of packet overhead. This may also be used with PPP and called CPPP.
  • PPP - Point to Point Protocol is a form of serial line data encapsulation that is an improvement over SLIP which provides serial bi-directional communication. It is much like SLIP but can support AppleTalk, IPX, TCP/IP, and NetBEUI along with TCP/IP which is supported by SLIP. It can negociate connection parameters such as speed along with the ability to support PAP and CHAP user authentication.
  • Ethernet - Ethernet is not really called a protocol. There are also many types of ethernet. The most common ethernet which is used to control the handling of data at the lowest layer of the network model is 802.3 ethernet. 802.3 ethernet privides a means of encapsulating data frames to be sent between computers. It specifies how network data collisions are handled along with hardware addressing of network cards.

Transport and Basic Functions

  • TCP - A reliable connection oriented protocol used to control the management of application level services between computers. It is used for transport by some applications.
  • UDP - An unreliable connection less protocol used to control the management of application level services between computers. It is used for transport by some applications which must provide their own reliability.

Network Management

  • SNMP - Simple Network Management Protocol is used to manage all types of network elements based on various data sent and received.
  • ICMP - Internet control message protocol provides management and error reporting to help manage the process of sending data between computers. (Management). This protocol is used to report connection status back to computers that are trying to connect other computers. For example, it may report that a destination host is not reachable. This protocol is required for basic TCP/IP operations.
  • ARP - Address Resolution Protocol enables the packaging of IP data into ethernet packages. It is the system and messaging protocol that is used to find the ethernet (hardware) address from a specific IP number. Without this protocol, the ethernet package could not be generated from the IP package, because the ethernet address could not be determined. protocol is used to report connection status back to computers that are trying to connect other computers. For example, it may report that a destination host is not reachable. This protocol is required for basic TCP/IP operations.

Host Management

  • BOOTP - Bootstrap protocol is used to assign an IP address to diskless computers and tell it what server and file to load which will provide it with an operating system.
  • DHCP - Dynamic host configuration protocol is a method of assigning and controlling the IP addresses of computers on a given network. It is a server based service that automatically assigns IP numbers when a computer boots. This way the IP address of a computer does not need to be assigned manually. This makes changing networks easier to manage. DHCP can perform all the functions of BOOTP.
  • RARP - Reverse address resolution protocol is used to allow a computer without a local permanent data storage media to determine its IP address from its ethernet address.

Mail Protocols

  • SMTP - Simple Mail Transfer Protocol is used to transport mail. Simple Mail Transport Protocol is used on the internet, it is not a transport layer protocol but is an application layer protocol.
  • POP3 - Post Office Protocol version 3 is used by clients to access an internet mail server to get mail. It is not a transport layer protocol.
  • IMAP4 - Internet Mail Access Protocol version 4 is the replacement for POP3.

Multicasting Protocols

  • IGMP - Internet Group Management Protocol used to support multicasting. IGMP messages are used by multicast routers to track group memberships on each of its networks.

Routing Protocols

  • BGP - Border Gateway Protocol. When two systems are using BGP, they establish a TCP connection, then send each other their BGP routing tables. BGP uses distance vectoring. It detects failures by sending periodic keep alive messages to its neighbors every 30 seconds. It exchanges information about reachable networks with other BGP systems including the full path of systems that are between them. Described by RFC 1267, 1268, and 1497
  • EGP - Exterior Gateway Protocol is used between routers of different systems.
  • IGP - Interior Gateway Protocol. The name used to describe the fact that each system on the internet can choose its own routing protocol. RIP and OSPF are interior gateway protocols.
  • RIP - Routing Information Protocol is used to dynamically update router tables on WANs or the internet.
  • OSPF - Open Shortest Path First dynamic routing protocol. A link state protocol rather than a distance vector protocol. It tests the status of its link to each of its neighbors and sends the acquired information to them.


GPON

Gigabit Passive Optical Network (GPON) is a high bandwidth shared fiber access technology that is used around the world for Fiber to the Home (FTTH) and, at least in North America, is thought by many to be the successor to BPON. GPON technology is especially popular with large US-based telcos, especially Verizon, though it is used by the MSOs as well (often for serving business customers as a complement to their Hybrid Fiber Coax (HFC) networks). 10G GPON is a higher speed version of GPON that has yet to be standardized by the ITU-T. EPON, 10G EPON, WDM PON, and BPON are Passive Optical Network (PON) technologies that are also vying for carrier attention.

GPON is standardized by the ITU-T in its G.984 series (see end of this article for details), but widespread interoperability between different vendors’ equipment has not materialized. Basic data transmission is readily achievable. Managing a multi-vendor GPON solution is quite an operational challenge, however.

GPON Architectures

There are three main components in a GPON access network (other than the fiber itself). The GPON Optical Line Terminal (OLT) is the network concentrator, usually installed in a Central Office (CO). The splitter (or splitters) allows a single fiber from the CO to be shared among a number of subscribers. The Optical Network Terminal (ONT) serves a single residence, converting optical signals to electrical signals that can be used within the home. Note that the ITU standards call the subscriber device an Optical Network Unit (ONU), and many use ONU to mean an ONT serving several subscribers, which would be common in an installation serving a number of apartments in the same building.

GPON is specified to be a single or dual fiber system, but almost all GPON systems are single fiber like virtually all popular FTTH technologies. There is little reason to use dual fibers, although this option is indeed allowed in the standard.

G.984 allows for 60km maximum reach with 20km differential reach and up to 128 subscribers on a single GPON network. However, GPON systems typically provide only 0-20km reach owing to the cost of the optics. G.984.6 is a new ITU-T specification that provides for a Mid-Span Extender that can increase the reach of GPON beyond 20km to as much as 60km.

Many carriers use a maximum of 32 subscribers on a single GPON segment. B+ optics provide for 32x split with 20km reach. C+ optics, newly available and expensive, provide for 64x split with the same 20km reach. GPON wavelengths are 1490 nm down and 1310 nm up. RF Overlay is carried downstream on 1550nm. Forward Error Correction (FEC) potentially allows for cheaper optical transceivers, though this cost advantage in the optics comes at the cost of extra complexity and overhead (almost 10% extra overhead) to support FEC.

A GPON network can have two, three, or four wavelengths in use. Two and three wavelength systems are covered below. See my article on RFoG for a description and diagram of a four wavelength system combining GPON and RFoG.

Two Wavelength System

The following diagram shows the architecture of a basic two wavelength GPON network, which is probably the most common implementation. The downstream wavelength is 1490nm and transmits data at 2.488 Gbps. The upstream wavelength is 1310nm and transmits data at 1.244 Gbps.

GPON Network Diagram

GPON Network Diagram (Two Wavelengths)

The GPON Optical Line Terminal (OLT) is typically installed in a Central Office (CO), though it could be installed elsewhere. The optical splitter is installed somewhere between the CO and the subscribers. And a GPON Optical Network Terminal (ONT) is installed at each subscriber’s home. Voice, video, and data traffic must all be delivered across the single GPON downstream wavelength. A nice facet of GPON for IP video support is that its downstream is naturally a broadcast medium, and it is very efficient for delivering multicast traffic.

The optics in the GPON ONT for a two wavelength implementation is called a diplexer. See the diplexer diagram below. Diplexers can be implemented with a three dimension bulk optic design (discrete components aligned and welded together manually) or with a Planar Lightwave Circuit (PLC) design (link to a good article by Enablence explaining bulk optics and PLCs). A PLC puts all its optical components on a silicon substrate for a two dimension design, eliminates all the complexity of dealing with a third dimension, and allows for low-cost automated manufacturing.

GPON Diplexer

GPON Diplexer

Three Wavelength System

The architecture of a GPON three wavelength system is identical to that of a two wavelength system with the addition of a third downstream video wavelength on the fiber and the equipment to insert this signal into the fiber. The following diagram shows the architecture of a three wavelength RF Overlay GPON network.

GPON RF Overlay Network Diagram

GPON RF Overlay Network Diagram

Note that only up to 32 GPON ONTs are indicated for a single GPON OLT port. This is because of the RF Overlay video signal and not the GPON signal. For 20km reach and 32 subscribers on a single network, the maximum amount of light that a fiber will accept (20 dBm or 100 mW) must be inserted into the fiber by the RF Overlay video equipment, and any additional optical power is just wasted. New C+ optics allow for 64x splits and 20km reach for the GPON signal, but this is no help for the RF Overlay video signal. The RF Overlay transmit signal is already at maximum for 32x split and 20km and only the receiver sensitivity can be improved. This may come in time.

The transceiver in the GPON ONT for a GPON RF Overlay video implementation is called a triplexer (see diagram below). Triplexers are more expensive than diplexers and generally are implemented with a three dimensional bulk optic design (discrete components aligned and welded together manually). PLC circuits not as common for triplexer implementations though Enablence describes a PLC triplexer.

GPON Triplexer

GPON Triplexer

The OLT does nothing with the third RF Overlay wavelength other than filter it out. The ONTs merely convert the 1550nm optical signal to an electrical signal for delivery throughout the home over 75 ohm coax. The thorniest issue to solve with a three wavelength signal is how to get the upstream data for controlling the RF Overlay signal to the headend. One option is to convert the traffic into IP and send it upstream on the 1310nm upstream wavelength, though this method has some limitations. A more robust (and more expensive) option is RFoG, which is described in my article on RFoG.

Transmission

The ITU GPON standard allows up to 2.488Gbps symmetric transmission, but almost all GPON systems are 2.488Gbps down/1.244Gbps up. Both downstream and upstream bandwidth is shared although in different ways.

Downstream from the OLT to the ONTs is broadcast with an ONT grabbing only traffic addressed to it. Upstream is Time Division Multiple Access (TDMA) with each ONT transmitting in turn (with perhaps multiple turns per ONT). A single ONT can have multiple upstream timeslots, and each timeslot can be a different size. Additionally, Dynamic Bandwidth Assignment (DBA) allows for real-time changes in upstream timeslot sizes to accommodate varying traffic conditions. A typical implementation has one upstream timeslot for management, one for voice, and one for data traffic for each ONT. A GPON network with 32 ONTs may have about 100 upstream timeslots in use.

GPON natively supports Ethernet (GFP), ATM, and TDM, but most systems run just Ethernet (sort of like a souped up EPON). Upstream and downstream frames are transmitted 8000 per second (the downstream frame is twice the size of the upstream frame), which provides a nice 8 kHz signal to the ONTs for POTS service (required for good fax speeds).

OMCI

ONT Management and Control Interface (OMCI) is the management protocol used between the OLT and the ONTs. With OMCI, external management systems do not have to communicate directly with the ONTs. OMCI allows a single IP address to be used to manage an OLT and, through OMCI, all of its associated ONTs. This is very efficient for IP address conservation, and it reduces the load on a management system, but it does require the implementation of a technology-specific management protocol. If there is a VoIP implementation in the ONTs, it is likely they will require separate management and IP addresses anyway. Owing to the popularity of VoIP in these systems, IP address conservation with OMCI is of dubious benefit in many GPON implementations.

Standards

GPON is standardized by the ITU-T in its G.984 series. The list below provides links to the relevant ITU-T GPON standards.

  • G.984.1, General characteristics, [A general overview. Easy reading.]
  • G.984.2, Physical Media Dependent (PMD) layer specification, [Optics, mostly irrelevant.]
  • G.984.3, Transmission convergence layer specification, [The protocols. Pretty darn technical.]
    • G.Imp.984.3, Implementators’ Guide for ITU-T Rec. G.984.3,
  • G.984.4, ONT management and control interface specification, [OMCI. Yawn.]
    • G.Imp.984.4, Implementor’s Guide for ITU-T Rec. G.984.4,
  • G.984.5, Enhancement band, [Next generation PON compatibility.]
  • G.984.6, Reach extension. [Increased range using an active mid-span extender.]

OSI MODELS

OSI 7 Layers Reference Model For Network Communication

Open Systems Interconnection (OSI) model is a reference model developed by ISO (International Organization for Standardization) in 1984, as a conceptual framework of standards for communication in the network across different equipment and applications by different vendors. It is now considered the primary architectural model for inter-computing and internetworking communications. Most of the network communication protocols used today have a structure based on the OSI model. The OSI model defines the communications process into 7 layers, which divides the tasks involved with moving information between networked computers into seven smaller, more manageable task groups. A task or group of tasks is then assigned to each of the seven OSI layers. Each layer is reasonably self-contained so that the tasks assigned to each layer can be implemented independently. This enables the solutions offered by one layer to be updated without adversely affecting the other layers.

The OSI 7 layers model has clear characteristics. Layers 7 through 4 deal with end to end communications between data source and destinations. Layers 3 to 1 deal with communications between network devices.

On the other hand, the seven layers of the OSI model can be divided into two groups: upper layers (layers 7, 6 & 5) and lower layers (layers 4, 3, 2, 1). The upper layers of the OSI model deal with application issues and generally are implemented only in software. The highest layer, the application layer, is closest to the end user. The lower layers of the OSI model handle data transport issues. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.


The specific description for each layer is as follows:

Layer 7:Application Layer

Defines interface to user processes for communication and data transfer in network

Provides standardized services such as virtual terminal, file and job transfer and operations

Layer 6:Presentation Layer

Masks the differences of data formats between dissimilar systems

Specifies architecture-independent data transfer format

Encodes and decodes data; Encrypts and decrypts data; Compresses and decompresses data

Layer 5:Session Layer

Manages user sessions and dialogues

Controls establishment and termination of logic links between users

Reports upper layer errors

Layer 4:Transport Layer

Manages end-to-end message delivery in network

Provides reliable and sequential packet delivery through error recovery and flow control mechanisms

Provides connectionless oriented packet delivery

Layer 3:Network Layer

Determines how data are transferred between network devices

Routes packets according to unique network device addresses

Provides flow and congestion control to prevent network resource depletion

Layer 2:Data Link Layer

Defines procedures for operating the communication links

Frames packets

Detects and corrects packets transmit errors

Layer 1:Physical Layer

Defines physical means of sending data over network devices

Interfaces between network medium and devices

Defines optical, electrical and mechanical characteristics