Sunday, January 17, 2010

E-1 Carrier

In digital telecommunications, where a single physical wire pair can be used to carry many simultaneous voice conversations, worldwide standards have been created and deployed. The European Conference of Postal and Telecommunications Administrations (CEPT) originally standardized the E-carrier system, which revised and improved the earlier American T-carrier technology, and this has now been adopted by the International Telecommunication Union Telecommunication Standardization Sector (ITU-T). This is now widely used in almost all countries outside the USA, Canada and Japan.

An E1 carrier operates over two separate sets of wires, usually twisted pair cable. A nominal 3 Volt peak signal is encoded with pulses using a method that avoids long periods without polarity changes. The line data rate is 2.048 Mbit/s (full duplex, i.e. 2.048 Mbit/s downstream and 2.048 Mbit/s upstream) which is split into 32 timeslots, each being allocated 8 bits in turn. Thus each timeslot sends and receives an 8-bit sample 8000 times per second (8 x 8000 x 32 = 2,048,000). This is ideal for voice telephone calls where the voice is sampled into an 8 bit number at that data rate and reconstructed at the other end. The timeslots are numbered from 0 to 31.

One timeslot (TS0) is reserved for framing purposes, and alternately transmits a fixed pattern. This allows the receiver to lock onto the start of each frame and match up each channel in turn. The standards allow for a full Cyclic Redundancy Check to be performed across all bits transmitted in each frame, to detect if the circuit is losing bits (information), but this is not always used.

E1 carries signals at 2 Mbps (32 channels at 64Kbps, with 2 channels reserved for signaling and controlling), versus the T1, which carries signals at 1.544 Mbps (24 channels at 64Kbps). E1 and T1 lines may be interconnected for international use.

Similar to the North American T-1, E1 is the European format for digital transmission.

T-1 Carrier

T-1 carrier (also known as DS1) dedicated phone connection supporting data rates of 1.544Mbits per second. A T-1 line actually consists of 24 individual channels, each of which supports 64Kbits per second. Each 64Kbit/second channel can be configured to carry voice or data traffic. Most telephone companies allow you to buy just some of these individual channels, known as fractional T-1 access. T-1 lines are a popular leased line option for businesses connecting to the Internet and for Internet Service Providers (ISPs) connecting to the Internet backbone.

Digital Signalling Level Three(DS3)

A DS3 line (also known as a T-3) is an ultra high-speed connection capable of transmitting data at rates up to 45 Mbps. A DS3 line is equal to approximately 672 regular voice-grade telephone lines, which is fast enough to transmit full-motion, real-time video, and very large databases over a busy network. A DS3 line is typically installed as a major networking artery for large corporations and universities with high-volume network traffic. Other example applications include large call centers, enterprise wide VoIP and IP PBX systems, Internet service providers, research labs, video conference centers and software development companies. A DS3 is the second fastest, non optical connection offered in North America. A DS3 line is comprised of 28 T1 lines, each operating at total signaling rate of 1.544 Mbps.

DS3 circuits provide businesses and Internet Service Providers (ISPs) with up to 45 Mb/s of dedicated Internet connectivity. This is an ideal solution for users who have outgrown their T1 connections and are in search of unlimited, high-capacity access. A DS3 line actually consists of 672 individual channels, each of which supports 64 Kb/s. DS3 lines are extremely high bandwidth connections into a carrier's backbone. They typically include SLAs (Service Level Agreements) that guarantee uptime and performance.

The DS3 signal itself is composed of 28 DS1 signals and is constructed using a two-step multiplexing process. First, the 28 DS1 signals are multiplexed into seven DS2 signals. Second, the seven DS2 signals are multiplexed into one DS3 signal. Each multiplexing step uses bit stuffing to handle the different input frequencies. Overhead bits provide alignment, error checking, in-band communications, and bit stuffing control information.

Digital Signalling Level Zero (DS0) and it's bandwidth

The DS0 is the basic rate of 64Kbps used to transmit individual telephone calls; it is the building block of the telco's voice and data structure. Actual available bandwidth depends on the signal-encoding standard used. (Some signal-encoding technologies, for example, allow multiple bits per baud, which can give a higher overall bit rate.)

The DS0 is different from those faster versions in that it doesn't use a framing format. Anything above 56Kbps is usually a fractional or full T1.

What is proxy server?

A proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.

A proxy server has many potential purposes, including:

  • To keep machines behind it anonymous (mainly for security).
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
  • To apply access policy to network services or content, e.g. to block undesired sites.
  • To log / audit usage, i.e. to provide company employee Internet usage reporting.
  • To bypass security/ parental controls.
  • To scan transmitted content for malware before delivery.
  • To scan outbound content, e.g., for data leak protection.
  • To circumvent regional restrictions.
Proxy servers have two main purposes:
  • Improve Perf
  • ormance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as America Online, MSN and Yahoo, for example, employ an array of proxy servers. Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.

  • A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

    A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.

    Wednesday, November 25, 2009

    Juniper routers



    The Juniper Networks Secure Services Gateway 5 (SSG 5) and Secure Services Gateway 20 (SSG 20) are purpose-built security appliances that deliver a perfect blend of performance, security, routing and LAN/WAN connectivity for small branch office and small business deployments. Traffic flowing in and out of the branch office can be protected from worms, Spyware, Trojans, and malware by a complete set of Unified Threat Management (UTM) security features including Stateful firewall, IPSec VPN, IPS, Antivirus (includes Anti-Spyware, Anti-Adware, Anti-Phishing), Anti- Spam, and Web Filtering. The rich set of UTM security features allows the SSG 5 and SSG 20 to be deployed as a stand alone network protection device. With its robust routing engine, the SSG 5 and SSG 20 can also be deployed as a traditional branch office router or as a combination security and routing device to help reduce IT capital and operational expenditures.

    Canopy Antenna




    is a wireless networking system designed for WISP (wireless internet service providers) available in point-to-point and point-to-multipoint configurations. It includes both the original Motorola-designed products using the Canopy protocol and the PtP backhuals that were rebranded from Orthogon System which Motorola acquired in 2006.