Friday, August 24, 2012

The report of Cell Phone Jammers if Cell Phone Jammers is qualified

In order to clearly separate these two functions, the former CCITT turn NT into NT1 and NT2. NT1 is responsible for the physical connection with the subscriber line, to achieve transmission lines, maintenance, performance monitoring, and timing, feed, interface and other functions. NT2 line with the exchange and collection functions, ISDN users can physically switch, hub or LAN (users can not install the NT2). Terminal Equipment (TE): ISDN allows two types of terminal access networks. TE1 to meet the ISDN user / network interface standards for devices such as digital phones, fax machines and other four categories; TE2 do not meet the ISDN user / network interface standards for terminal equipment, such as X-series or V series of data terminals, analog phones and so on. Terminal adapter (TA): TA is the function of non-standard ISDN terminal adapter ISDN terminal. Required to support different protocol router network interface and configure a modular interface, the user can configure the network interfaces on demand.  The L3 data network (IP network) with a single TCP / IP communication protocol and packet structure, the whole network using the IP address of a unified format, for the non-uniform node device connected to the router. For ease of understanding, we can understand the L3 data network to build a simple data network platform in the L2 router on a network. The factory inspection and acceptance personnel should sign the report of Cell Phone Jammers if Cell Phone Jammers is qualified.
Here we look at Figure 5, the IP network is how to report a data sent from the source host to host. (1) on the source host, the application layer will need to send the datagram bytes sent popular TCP / IP layer. (2) In TCP / IP layer of the first data reported under the TCP protocol will cut into the TCP byte stream segments, plus TCP header, and then before the IP protocol in the TCP header contains the IP source address with the destination address and the IP header, which generated IP packets. (3) the source host IP packet destination address based routing table lookup to find which subnet (1) A first-hop router's physical address, and then generate a physical address with the purpose of the data frame is sent to Router A. (4) A first implementation in the router link-layer unpacking operation, remove the IP packet in the destination IP address, subnet to the routing table lookup (2) in the second hop router B's physical address, and then in the IP packet before Router B with a physical address with the data sent to the subnet after the header (2). If the subnet (1) and (2) is a heterogeneous subnet, the router need to complete two subnets A second layer protocol conversion (or data frame format conversion). The workshop is training more workers to try to finish the order of Cell Phone Jammers in advance.
(5) through several by-hop router, the host receives the last data frame in which the subnet protocol, in the implementation of link layer, network layer removed after unpacking operation TCP segment, TCP segment by the TCP protocol for error check code and sequence number, if any errors or missing required source host retransmission; if correct, TCP protocol with the TCP segments in order to send a byte stream into packets the host application layer. Figure 5 is not the subject of the next IP packet routers and subnets for the router and the subnet has not been due to non-IP protocol for connection, coupled with the network load distribution is dynamic, so each packet all the IP packets from the source host to host does not go down the same path.

No comments:

Post a Comment