Prev

Next

工业路由器NBMA网络转化为点到点的链路 当我们使用点到点子接口将NBMA网络转化为点到点的链路时,整个NBMA网络将产生过多的PVC部分互联或全互联的网状结构,但这将产生一定的负面影响,会使网络中产生大量的LSP泛洪流量。我们都知道,运行IS-IS的工业路由器当接收到一个LSP报文后,会将此LSP从除接收接口以外的所有启用了IS-IS协议的接口泛洪出去,以使网络中的其他工业路由器都可以接收到此LSP。但是这种泛洪机制对于存在大量部分互联或全互联的网络将产生过多冗余的LSP扩散。 所谓全互联或全网状网络拓扑,是指所有工业路由器都与其他工业级无线路由器向连接(通常是点到点子接口)。在这样的一个网络中,当一台路由器从某接口收到邻居泛洪过来的LSP后,由于它并不知道这个LSP是否已经被其他邻居工业4g路由器收到,所以会再从其他接口泛洪出去,即使其他工业级4g路由器的链路状态数据库中已经存在这个LSP。如果网络中有n个全网路由器的话,那么网络中的每台工业级LTE路由器都会扩散n-2条冗余的LSP,这样总共被泛洪的多余的LSP将为(n-1)x(n-2),条而这些LSP的扩散是多余。如果每台工业全网通路由器都刷新一条LSP的话,那么这个数量还将会成倍数的增长,导致了大量带宽资源的浪费。 为了解这种在全互联或高度互联的网络中出现的LSP泛洪的冗余现象,IS-IS提供了一种解决方案——IS-IS全通组,也称作Mesh组。IS-IS全通组在RFC2973中进行了定义。所谓全通组,就是假设所有工业3G路由器之间都是完全互联的,每个工业级全网通路由器都会直接收到其他全网通工业级路由器泛洪的原始的LSP的拷贝。 可以将全网工业路由器的接口加入到某个全通组中,一个全网通工业路由器上可以存在多个全通组,全通组内接口之间的LSP泛洪是受限制的,全通组之间的LSP泛洪是正常的操作,未加入全通组的工业级3G路由器接口与全通组之间也是正常的LSP泛洪操作。全网通路由器 ...

更多文章

工业路由器使用CSNP来保证链路状态数据库的完整性 在广播网络中,工业路由器使用CSNP来保证链路状态数据库的完整性,并且只有DIS才会发送工业全网通路由器CSNP报文,DIS发送CSNP报文的间隔为10s。CSNP报文中描述了DIS的链路状态数据库中所有工业级3G路由器LSP的摘要信息。当其他工业级路由器收到DIS发送的CSNP后,会使用CSNP中的LSP摘要信息与与本地的链路状态数据库中的LSP进行比较,进行比较的目的是确定本地链路状态数据库中的信息是否已经同步和完整。如果工业级4g路由器发现本地数据库中缺少某个LSP条目,那么它将使用PSNP向DIS请求这个缺少的LSP条目。这个PSNP报文中包含就是请求的LSP条目的摘要信息。当DIS收到其他全网路由器发送的PSNP报文后,将会发送一个完整的LSP报文,这个LSP就是其他工业无线路由器所缺少的LSP条目。在广播网络中,DIS使用周期性的CSNP报文向网络中发送同步链路状态数据库的信号,而其他工业4g路由器使用PSNP报文来请求缺少的LSP条目。 在IS-IS的点到点类型的网络中,链路状态数据库同步的操作与广播网络中略有不同,而且工业级全网通路由器发送CSNP与PSNP报文的方式和其作用也有一些差别。 在点到点网络中不存在DIS,工业3G路由器不会周期性的发送CSNP报文,CSNP报文只在链路链路被激活时发送一次,而且链路两端的工业级4g路由器都会发送CSNP报文以描述本地链路状态数据库中所有LSP的摘要信息。当工业路由器发送对端发送的CSNP中含有本地缺少的LSP信息时,也会使用PSNP报文向对端请求LSP。当对端收到PSNP报文后,将向请求方发送包含完整LSP信息的LSP报文,这点上与广播网络中的操作是相同的。但是在点到点链路上,收到LSP报文的工业4g路由器还会向对方再次发送一个PSNP报文以对之前收到的LSP进行确认。可以说,在点到点网络中的LSP交换是可靠的。这点与广播网络不同,在广播网络中工业级无线路由器不使用PSNP报文对收到的LSP进行确认,而是通过DIS周期性地发送CSNP报文以弥补广播网络中不可靠的LSP交换。 在点到点链路上,工业路由器使用PSNP对收到的LSP报文进行确认,所以在点到点链路上是可靠的泛洪机制。 IS-IS路由协议支持两种网络类型:广播链路和点到点链路。默认情况下,全网通工业级路由器IS-IS将广播网络和NBMA网络看作是广播类型。对于封装了PPP或HDCL等协议的链路看作是点到点类型。对于NBMA网络中的主接口和点到多点子接口,IS-IS将其看作是广播类型;对于NBMA网络中的点到点子接口,将其看作是点到点类型。IS-IS不像OSPF那样,提供了对NBMA网络(例如Frame-Relay、ATM)的专门支持。对于NBMA网络,全网通工业路由器IS-IS认为其网络拓扑是PVC全互联(mesh)的,就是把它看作广播网络。但如果实际网络拓扑中并不是PVC全互联的结构时,例如部分互联的结构和Hub-Spoke结构,推荐使用点到点类型网络,即使用点到点子接口,以免造成NBMA网络中的链路状态数据库同步出现问题。无线路由器

更多文章

工业级路由器LSP校验和(Checksum) 当工业路由器生成一个LSP后,为了保证LSP中信息的完整性,它将对LSP进行校验和计算,然后封装进LSP的LSP校验和字段(checksum)。校验和的计算包括从LSP中的剩余时间字段之后的字段一直到数据包的末尾,由于剩余时间是一个不断变化的字段,所以校验和计算将不包括这部分内容。校验和主要用于检查被破坏的LSP或者还没有从网络中清除的过期LSP。当一台工业4g路由器收到一个LSP,在将该LSP放入到本地链路数据库和将其再泛洪给其他邻接工业3G路由器之前,会重新计算LSP的校验和,如果校验和与LSP中携带的校验和不一致,则说明此全网通工业级路由器LSP传输过程中已经被破坏。 当工业路由器收到了一个被破坏的LSP后,会采取一个清除的操作。它将该LSP的剩余时间设置为0然后再泛洪到网络中。当网络中的其他工业LTE路由器收到这个剩余时间被置为0的LSP后,会将其本地链路状态数据库中相应的LSP清除。当产生这个被破坏的LSP的源双卡路由器收到这个剩余时间被置为0的LSP并发现这个LSP是自己生成的后,会重新生成一个正确的LSP然后泛洪到网络中。 IS-IS的这种LSP清除操作虽然可以有效的清除网络中被破坏的LSP,给运行工业级4G路由器IS-IS路由协议的网络提供了一种自动修复的能力,但是它也带来了一种负面的影响。如果网络中的介质存在问题,就有可能产生LSP被连续破坏的现象。这些被破坏的LSP会被路由器不断的清除,同时源工业无线路由器也会不断的重新生成新的LSP,这种现象被称为LSP破坏风暴。LSP破坏风暴将消耗大量的网络资源。我们可以对工业级无线路由器进行配置,使其在收到被破坏的LSP后忽略它,即丢弃被破坏的LSP,从而启动清除操作。在后续工业级全网通路由器IS-IS配置章节中将介绍具体的配置方法。 标签:4g路由器...

更多文章

伊林思:中间系统类型工业4G路由器(ISType) 在LSP报头中最后一个字节的中间系统类型(ISType)位占2bit,工业4G路由器的类型。该字段表示了此LSP是来自L1工业路由器还是L2工业级路由器。这也表示了收到此LSP的工业路由器将把这个LSP放到L1链路状态数据库还是L2链路状态数据库。该2bit中01表示L1;11表示L2;00与10未使用。 DIS和伪节点【4g路由器】 LSPID中包括一部分称为伪节点标识符(PseudonodeID),用来标识此LSP是否是由网络中的指定中间系统(DIS,DesignatedIntermediateSystem)为网络产生的伪节点LSP。 在广播类型的网络(LAN)中,IS-IS需要为每个网段选择一个指定中间系统DIS,这里的指定中间系统DIS的作用与OSPF中的指定工业级路由器DR的非常相似。在OSPF网络中,DR用来负责将链路状态信息泛洪到每个非DR工业路由器,并且帮助其进行链路状态数据库的同步。在IS-IS中也是如此,为了使链路状态信息更加准确和实时的同步给网络中的所有全网路由器,并且要减小带宽的利用率和路由器的处理开销,IS-IS也要在广播网络中选举出一个工业级无线路由器(DIS)来达到这个目的。 在IS-IS中选举DIS的过程也是非常简单的。每个运行IS-IS协议的全网通路由器的接口都拥有一个优先级(Priority),默认的优先级为64,同样也可以通过命令手工修改默认的优先级。工业4g路由器之间发送的HelloPDU中将携带接口的优先级信息。每个工业LTE路由器收到网络中其他工业级LTE路由器发送的HelloPDU后,通过比较优先级来进行DIS的选举。优先级数值越大的工业全网路由器将被选举为此网段的DIS。这里与OSPF不同的是,在OSPF中,如果接口的优先级为0,那么这台工业级全网通路由器将被认为没有资格成为此网段的DR。在IS-IS中,如果接口的优先级为0,这仅仅表示最低的优先级,但是此工业级4G路由器还拥有成为DIS的资格。当两台工业全网通路由器的接口优先级相同时,那么拥有更大的SNPA(在LAN中通常为MAC地址)的接口的工业级全网通路由器将成为DIS。在OSPF中如果优先级相同将比较RouterID。 在OSPF中,选举完DR后,还将选举出一个备份DR,BDR(BackupDR),以用来在原先DR出现故障时接替新的DR角色,并重新选举出BDR。但在IS-IS中,将不进行备份DIS的选举。如果DIS出现故障了,其他全网通工业路由器将会重新选举出一个DIS。其次,在OSPF中,DR和BDR的选举是非抢占模式的,也就是说当有更优优先级的路由器加入到现有网络中后,也不会抢占原先DR和BDR的角色。从某种意义上来讲,在OSPF网络中,第一台启动的双卡路由器将成为网络的DR,第二台启动的双路路由器将将成为BDR。与OSPF相比,DIS的选举是抢占的,即当有更优DIS资格双路路由器加入网络后,它会成为网络中新的DIS。这样,每次DIS的变更必须泛洪一组新的LSP。 默认情况下,运行IS-IS的双卡路由器将以每10s的间隔发送HelloPDU。但是对于一个DIS来说,由于它在网络中起到重要的作用,所以它发送HelloPDU的间隔的频率将是其他路由器的3倍,也就是说DIS以每3.3s的间隔发送HelloPDU。这样其他全网通工业路由器可以迅速检测出DIS出现故障并开始新的选举过程,增加了网络的收敛速度。无线路由器

更多文章

用于工业路由器指定策略的路由映射 Route Redistribution redistribute routing-process process-id [tag|metric|metic-type|subnets|route-map] *routing-process:BGP EGP Connected EIGRP IGRP ISIS ISO-IGRP Mobile ODR OSPF RIP and Static *ospf-metric:BGP缺省重分布度量 1 其他协议为20 *tag-value:附加到重分布工业路由器路由的一个32位的值,OSPF没有使用工业级无线路由器路由标记, 可以在用于指定策略的路由映射中引用,缺省标记为0 利用route-map控制重分布,并修改metric值,并做标记 如上图,基于标签来控制工业级路由器路由的重分布 Controlling...

更多文章

twitter

IoT Applications

Category : 其他, 技术相关

According to Gartner, Inc. (a technology research and advisory corporation), there will be nearly 20.8 billion devices on the Internet of things by 2020. ABI Research estimates that more than 30 billion devices will be wirelessly connected to the Internet of things by 2020. As per a 2014 survey and study done by Pew Research Internet Project, a large majority of the technology experts and engaged Internet users who responded—83 percent—agreed with the notion that the Internet/Cloud of Things, embedded and wearable computing (and the corresponding dynamic systems) will have widespread and beneficial effects by 2025. As such, it is clear that the IoT will consist of a very large number of devices being connected to the Internet. In an active move to accommodate new and emerging technological innovation, the UK Government, in their 2015 budget, allocated £40,000,000 towards research into the Internet of things. The former British Chancellor of the Exchequer George Osborne, posited that the Internet of things is the next stage of the information revolution and referenced the inter-connectivity of everything from urban transport to medical devices to household appliances.

Integration with the Internet implies that devices will use an IP address as a unique identifier. However, due to thelimited address space of IPv4 (which allows for 4.3 billion unique addresses), objects in the IoT will have to use IPv6to accommodate the extremely large address space required. Objects in the IoT will not only be devices with sensory capabilities, but also provide actuation capabilities (e.g., bulbs or locks controlled over the Internet). To a large extent, the future of the Internet of things will not be possible without the support of IPv6; and consequently the global adoption of IPv6 in the coming years will be critical for the successful development of the IoT in the future.

The ability to network embedded devices with limited CPU, memory and power resources means that IoT finds applications in nearly every field. Such systems could be in charge of collecting information in settings ranging from natural ecosystems to buildings and factories, thereby finding applications in fields of environmental sensing and urban planning.

On the other hand, IoT systems could also be responsible for performing actions, not just sensing things. Intelligent shopping systems, for example, could monitor specific users’ purchasing habits in a store by tracking their specific mobile phones. These users could then be provided with special offers on their favorite products, or even location of items that they need, which their fridge has automatically conveyed to the phone. Additional examples of sensing and actuating are reflected in applications that deal with heat, electricity and energy management, as well as cruise-assisting transportation systems. Other applications that the Internet of things can provide is enabling extended home security features and home automation. The concept of an “Internet of living things” has been proposed to describe networks of biological sensorsthat could use cloud-based analyses to allow users to study DNA or other molecules.

However, the application of the IoT is not only restricted to these areas. Other specialized use cases of the IoT may also exist. An overview of some of the most prominent application areas is provided here. Based on the application domain, IoT products can be classified broadly into five different categories: smart wearable, smart home, smart city, smart environment, and smart enterprise. The IoT products and solutions in each of these markets have different characteristics.

 

Differences between industrial class and SOHO class for Router / Modem

Category : 其他, 技术相关

As we know, the devices mainly cover three classes, that is SOHO class, Industrial class and Military class.  Each class has its own application requirement. The SOHO class modem and router don’t meet the requirements of the industrial environment and standard entirely because of it is designed for office automation. Mainly differences are the below,

1. Control
The SOHO class is simple design for internet use. People no need control it very often.
The industrial class is designed mainly for industry applications. People need control it quite often, even 7*24 hours.

2. Stable, reliable and robust
SOHO class features are simply. It is mainly used for internet surfing, which is installed in house. People can check and assist it in time. With cost requirement, SOHO class design and development will not care too much for the stability and reliability. The industrial class cares the stability and reliability very much because it’s mainly installed under people’ touch. In another world, it should be working for 7*24 hours without people assist. So the industrial class must have good reliability, recoverability, and maintainability in the production environment at the same time. It is a guarantee that it will not lead the collapse of applications, operating system even the network when any component failure occurs in a network system.

3. The security issues
Lots of fields exist inflammable, explosive or toxic gases inevitably in the process of industrial production, and there must have some certain explosion-proof technology for the intelligent devices and communication equipment which can ensure the safety of industrial field. It is much more practical to add explosion-proof and explosion-proof measures in the Ethernet system under the condition of current technology, namely the ignition energy which caused by the devices problem will not leak through increasing explosion-proof measures to the Ethernet field devices, which can ensure the safety of running system. For those dangerous situation where is no strict safety requirements, you can not consider complex explosion-proof measures.

The network safety of industrial system is another security issue must be considered at the industrial Ethernet applications. Industrial Ethernet can make the traditional three layers of the network system, namely, information management layer, process monitoring layer and field equipment layer, an organic whole, which make the faster data transfer, higher real-time and it can integrate with the Internet seamlessly, it realizes data sharing and improves the operational efficiency of the factory. But there is a series of network security problems at the same time, industrial network may under the threat of virus infection, hackers and illegal operation.

4. The vehicle power supply issues
The vehicle power supply refers to the cable connected to the field devices not only to transmit data signals, but also provide equipment working power supply on-site. The Ethernet hasn’t considered this issue from the design at the beginning, while there are a lot of bus power supply requirements on the industrial site. Because of the above problems, the ordinary commercial Ethernet cannot be applied to the control of industrial field directly. And the industrial Ethernet is produced to solve these problems.

 

5. Features and performance
The industrial class owns much more features and SOHO class, such as connection alive monitor and keeping, Dual Sim connection, multi-line redundancy, GPS, Serial ports, VPN networks, high gain and special antenna replacement, etc.

E-Lins 4G Wireless Router: Solutions for Transport

Category : 其他, 技术相关

Traffic Data Acquisition Application
Traffic Data Acquisition is among one important tasks in ITS. All the on-line or historical data are vital for the design and planning for the traffic management strategy. The traffic data acquisition device normal consists of two parts: the sensor and the controller. The controller links with the central through wire-line connection and send back the data collected from the sensor. However, installation of the wire-line relates to huge engineering efforts and the maintenance of fixed lines has always been difficult. There will be more problems to get wire-line connection in remote areas. When

the communication line goes down, data is lost unless a data Logger is further installed.

In this application, wireless module links with the Traffic Data Acquisition device using RS485 interface. The raw data from the detector is further analyzed by the data protocol analysis mechanism provided by the wireless module and sorted data is transmitted to the central Traffic Control Centre through GPRS network and Internet in TCP/IP packet. Data can be temporarily stored in the memory buffer when GPRS is disconnected. From the system integrator”s point of view, all the integration on the terminal wireless

connection is achieved by the plug & play of wireless module and no change is necessary on the original detecting device. And only simple application is required at the central to access the terminal data. The total system implementation is accomplished within 3 weeks.

High Gain Antenna–Yagi-Uda Antenna

Category : 产品文章, 伊林思产品FAQ, 其他

Today, we are talking about high gain antennas. Here I want to introduce a strong one. A Yagi–Uda antenna, commonly known as a Yagi antenna, is a directional antenna consisting of multiple parallel elements in a line, usually half-wave dipoles made of metal rods.

Yagi–Uda antennas consist of a single driven element connected to the transmitter or receiver with a transmission line, and additional “parasitic elements” which are not connected to the transmitter or receiver: a so-called reflector and one or more directors.

The Yagi–Uda antenna consists of a number of parallel thin rod elements in a line, usually half-wave long, typically supported on a perpendicular crossbar or “boom” along their centers. There is a single driven element driven in the center (consisting of two rods each connected to one side of the transmission line), and a variable number of parasitic elements, a single reflector on one side and optionally one or more directors on the other side. The parasitic elements are not electrically connected to the transmitter or receiver, and serve as passive radiators, reradiating the radio waves to modify the radiation pattern. Typical spacings between elements vary from about  110 to ¼ of a wavelength, depending on the specific design. The directors are slightly shorter than the driven element, while the reflector(s) are slightly longer. The radiation pattern is unidirectional, with the main lobe along the axis perpendicular to the elements in the plane of the elements, off the end with the directors.

It’s also a good choice for you when you use E-Lins routers in rural area. This antenna will gain better reception than standard antennas for routers.

E-Lins New Product H820q —— 5 Powerful Wifi Antenna Assembling

Category : 产品文章, 伊林思产品FAQ, 其他

Best way to assemble H820Q wifi antenna

WiFi1—to 5Ghz Main;

WiFi2–to 5Ghz Aux

WiFi3–to 5Ghz Aux2(for special wifi module)

 

WiFi4–to 2.4Ghz Main

WiFi5–to 2.4Ghz Aux

 

 

IoT WORLD FORUM 2017

Category : 产品文章, 伊林思产品FAQ, 其他

Conference information:

IoT WORLD FORUM 2017 will be held in London, November 15-16 – 2017

IoT WORLD FORUM, 2017 is the world’s leading Internet of Things Conference 2017 focusing on IoT applications, IoT Solutions and IoT Companies for all verticals including automotive, healthcare, asset and fleet management, manufacturing, security, retail point of sales, smart grid, smart metering, smart home and consumer electronics industry.

For more information, please visit the event site here: http://iotinternetofthingsconference.com

E-LINS Router FAQ – - Config

Category : 产品文章, 伊林思产品FAQ, 其他

Q: If we have your routers how do we monitor them?
A: ythere are several types for monitor.
1) Web (local and remote)
2) SMS
3) SNMP
4) Telnet/SSH/CLI
5) Centre monitor server with E-Lins ODM software

The Development of 5G Network

Category : 产品文章, 伊林思产品FAQ, 其他

5G is the trend of the whole world, today I would like to share you the development of 5G network.
In 2008, the South Korean IT R&D program of “5G mobile communication systems based on beam-division multiple access and relays with group cooperation” was formed.
In 2012, the UK Government announced the establishment of a 5G Innovation Centre at the University of Surrey – the world’s first research centre set up specifically for 5G mobile research.
In 2012, NYU WIRELESS was established as a multidisciplinary research centre, with a focus on 5G wireless research, as well as its use in the medical and computer-science fields. The centre is funded by the National Science Foundation and a board of 10 major wireless companies (as of July 2014) that serve on the Industrial Affiliates board of the centre. NYU WIRELESS has conducted and published channel measurements that show that millimeter wave frequencies will be viable for multi-gigabit-per-second data rates for future 5G networks.
In 2012, the European Commission, under the lead of Neelie Kroes, committed 50 million euros for research to deliver 5G mobile technology by 2020. In particular, The METIS 2020 Project was the flagship project that allowed reaching a worldwide consensus on the requirements and key technology components of the 5G. Driven by several telecommunication companies, the METIS overall technical goal was to provide a system concept that supports 1,000 times higher mobile system spectral efficiency, compared to current LTE deployments. In addition, in 2013, another project has started, called 5GrEEn, linked to project METIS and focusing on the design of green 5G mobile networks. Here the goal is to develop guidelines for the definition of a new-generation network with particular emphasis on energy efficiency, sustainability and affordability.
In November 2012, a research project funded by the European Union under the ICT Programme FP7 was launched under the coordination of IMDEA Networks Institute (Madrid, Spain): i-JOIN (Interworking and JOINt Design of an Open Access and Backhaul Network Architecture for Small Cells based on Cloud Networks). iJOIN introduces the novel concept of the radio access network (RAN) as a service (RANaaS), where RAN functionality is flexibly centralized through an open IT platform based on a cloud infrastructure. iJOIN aims for a joint design and optimization of access and backhaul, operation and management algorithms, and architectural elements, integrating small cells, heterogeneous backhaul and centralized processing. Additionally to the development of technology candidates across PHY, MAC, and the network layer, iJOIN will study the requirements, constraints and implications for existing mobile networks, specifically 3GPP LTE-A.
In January 2013, a new EU project named CROWD (Connectivity management for eneRgy Optimised Wireless Dense networks) was launched under the technical supervision of IMDEA Networks Institute, to design sustainable networking and software solutions for the deployment of very dense, heterogeneous wireless networks. The project targets sustainability targeted in terms of cost effectiveness and energy efficiency. Very high density means 1000x higher than current density (users per square meter). Heterogeneity involves multiple dimensions, from coverage radius to technologies (4G/LTE vs. Wi-Fi), to deployments (planned vs. unplanned distribution of radio base stations and hot spots).
In September 2013, the Cyber-Physical System (CPS) Lab at Rutgers University, NJ, started to work on dynamic provisioning and allocation under the emerging cloud radio-access network (C-RAN). They have shown that the dynamic demand-aware provisioning in the cloud will decrease the energy consumption while increasing the resource utilization. They also have implemented a test bed for feasibility of C-RAN and developed new cloud-based techniques for interference cancellation. Their project is funded by the National Science Foundation.
In November 2013, Chinese telecom equipment vendor Huawei said it will invest $600 million in research for 5G technologies in the next five years. The company’s 5G research initiative does not include investment to productize 5G technologies for global telecom operators. Huawei will be testing 5G technology in Malta.
In 2015, Huawei and Ericsson are testing 5G-related technologies in rural areas in northern Netherlands.
In July 2015, the METIS-II and 5GNORMA European projects were launched. The METIS-II project builds on the successful METIS project and will develop the overall 5G radio access network design and to provide the technical enablers needed for an efficient integration and use of the various 5G technologies and components currently developed. METIS-II will also provide the 5G collaboration framework within 5G-PPP for a common evaluation of 5G radio access network concepts and prepare concerted action towards regulatory and standardization bodies. On the other hand, the key objective of 5G NORMA is to develop a conceptually novel, adaptive and future-proof 5G mobile network architecture. The architecture is enabling unprecedented levels of network customizability, ensuring stringent performance, security, cost and energy requirements to be met; as well as providing an API-driven architectural openness, fuelling economic growth through over-the-top innovation. With 5G NORMA, leading players in the mobile ecosystem aim to underpin Europe’s leadership position in 5G.
Additionally, in July 2015, the European research project mmMAGIC was launched. The mmMAGIC project will develop new concepts for mobile radio access technology (RAT) for mmwave band deployment. This is a key component in the 5G multi-RAT ecosystem and will be used as a foundation for global standardization. The project will enable ultra fast mobile broadband services for mobile users, supporting UHD/3D streaming, immersive applications and ultra-responsive cloud services. A new radio interface, including novel network management functions and architecture components will be designed taking as guidance 5G PPP’s KPI and exploiting the use of novel adaptive and cooperative beam-forming and tracking techniques to address the specific challenges of mm-wave mobile propagation. The ambition of the project is to pave the way for a European head start in 5G standards and to strengthen European competitiveness. The consortium brings together major infrastructure vendors, major European operators, leading research institutes and universities, measurement equipment vendors and one SME. mmMAGIC is led and coordinated by Samsung. Ericsson acts as technical manager while Intel, Fraunhofer HHI, Nokia, Huawei and Samsung will each lead one of the five technical work packages of the project.
In July 2015, IMDEA Networks launched the Xhaul project, as part of the European H2020 5G Public-Private Partnership (5G PPP). Xhaul will develop an adaptive, sharable, cost-efficient 5G transport network solution integrating the fronthaul and backhaul segments of the network. This transport network will flexibly interconnect distributed 5G radio access and core network functions, hosted on in-network cloud nodes. Xhaul will greatly simplify network operations despite growing technological diversity. It will hence enable system-wide optimisation of Quality of Service (QoS) and energy usage as well as network-aware application development. The Xhaul consortium comprises 21 partners including leading telecom industry vendors, operators, IT companies, small and medium-sized enterprises and academic institutions.
In July 2015, the European 5G research project Flex5Gware was launched. The objective of Flex5Gware is to deliver highly reconfigurable hardware (HW) platforms together with HW-agnostic software (SW) platforms targeting both network elements and devices and taking into account increased capacity, reduced energy footprint, as well as scalability and modularity, to enable a smooth transition from 4G mobile wireless systems to 5G. This will enable that 5G HW/SW platforms can meet the requirements imposed by the anticipated exponential growth in mobile data traffic (1000 fold increase) together with the large diversity of applications (from low bit-rate/power for M2M to interactive and high resolution applications).
In July 2015, the SUPERFLUIDITY project, part of the European H2020 Public-Private Partnership (5G PPP) and led by CNIT, an Italian inter-university consortium, was started. The SUPERFLUIDITY consortium comprises telcos and IT players for a total of 18 partners. In physics, superfluidity is a state in which matter behaves like a fluid with zero viscosity. The SUPERFLUIDITY project aims at achieving superfluidity in the Internet: the ability to instantiate services on-the-fly, run them anywhere in the network (core, aggregation, edge) and shift them transparently to different locations. The project tackles crucial shortcomings in today’s networks: long provisioning times, with wasteful over-provisioning used to meet variable demand; reliance on rigid and cost-ineffective hardware devices; daunting complexity emerging from three forms of heterogeneity: heterogeneous traffic and sources; heterogeneous services and needs; and heterogeneous access technologies, with multi-vendor network components. SUPERFLUIDITY will provide a converged cloud-based 5G concept that will enable innovative use cases in the mobile edge, empower new business models, and reduce investment and operational costs.
In September 2016, China’s Ministry of Industry and Information Technology announced that the government-led 5G Phase-1 test of key wireless technologies for future 5G networks were completed with satisfactory results. The tests were carried out in 100 cities and involved seven companies – Datang Telecom, Ericsson, Huawei, Intel, Nokia Shanghai Bell, Samsung and ZTE. The next step in 5G technology development involving trials is under way, with planned commercial deployment in 2022 or 2023. In April 2017 Huawei announced that it jointly with Telenor conducted successful 5G tests with speeds up to 70 Gbit/s in a controlled lab environment in Norway. The E-band multi-user MIMO can provide a 20 Gbit/s speed rate for a single user. Working as a supplementary low-frequency band, the E-band improves the user experience of enhanced mobile broadband (eMBB).
(from Wikipedia)

A Quick Understanding of FTP/SFTP/FTPS/TFTP

Category : 伊林思产品FAQ, 其他, 技术相关

File Transfer Protocol (FTP)

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files from a server to a client using the Client–server model on a computer network.

FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS). SSH File Transfer Protocol (SFTP) is sometimes also used instead; it is technologically different.

 

SSH File Transfer Protocol(SFTP)

The SSH file transfer protocol (chronologically the second of the two protocols abbreviated SFTP) transfers files and has a similar command set for users, but uses the Secure Shell protocol (SSH) to transfer files. Unlike FTP, it encrypts both commands and data, preventing passwords and sensitive information from being transmitted openly over the network. It cannot interoperate with FTP software.

In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities. The IETF Internet Draft states that, even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications.

This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol.

Simple File Transfer Protocol

Simple File Transfer Protocol (the first protocol abbreviated SFTP), as defined by RFC 913, was proposed as an (unsecured) file transfer protocol with a level of complexity intermediate between TFTP and FTP. It was never widely accepted on the Internet, and is now assigned Historic status by the IETF. It runs through port 115, and often receives the initialism of SFTP. It has a command set of 11 commands and support three types of data transmission: ASCII, binary and continuous. For systems with a word size that is a multiple of 8 bits, the implementation of binary and continuous is the same. The protocol also supports login with user ID and password, hierarchical folders and file management (including rename, delete, upload, download, download with overwrite, and download with append).

FTPS

Explicit FTPS is an extension to the FTP standard that allows clients to request FTP sessions to be encrypted. This is done by sending the “AUTH TLS” command. The server has the option of allowing or denying connections that do not request TLS. This protocol extension is defined in RFC 4217. Implicit FTPS is an outdated standard for FTP that required the use of a SSL or TLS connection. It was specified to use different ports than plain FTP.

Trivial File Transfer Protocol(TFTP)

Trivial File Transfer Protocol (TFTP) is a simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of booting from a local area network, because TFTP is very simple to implement. TFTP lacks security and most of the advanced features offered by more robust file transfer protocols such as File Transfer Protocol. TFTP was first standardized in 1981 and the current specification for the protocol can be found in RFC 1350.

 

 (Information collected from Wekipedia)

E-Lins Antenna Catalog

Category : 产品文章, 其他

Usually magnetic antenna is used for our 3G/4G routers. It has 3dbi, 5dbi, 7dbi, 9dbi and 11dbi. 3dbi is in standard packing, if router will be applied in rural place, high gain antenna is for optional.

 

wifi吸盘1

Sometimes, you don’t want this long antenna with cable, you also can choose rubber antenna, which is small and powerful.

rubber-antenna1

We also have wall mounted antenna, panel antenna, glass fiber antenna and so on, for further information, please check:

http://www.e-lins.com/EN/download/E-Lins_Antenna_Catalog.pdf