Friday, November 6, 2009

Osi (network)

Dear http://tedata-adsl.blogspot.com/ Members,
Kindly check this TOPIC (OSI)


International organization for standardization
Iso has designed a reference model called osi reference model
(open system interconnection). It has 7 layers. It says that
Any n/w for comunication needs 7 layers



1.Application layer
The user uses application layer to send the data. The protocols@ this layer are ftp,http,smtp(e-mail) telenet etc.

2.Presentation layer
Presentation layer takes the data from application layer and presentIn different formats for securing reason. The services offered @This layer areCompression – decompressionCoding – decodingEncryption - decryption

3. Session layer

Establishing the session or the conectivity n/w n/w 1 & n/w 2 is doneBy the session layer.It 1. Establishes a session2. maintains it &3. Terminates it b/w the application

4. Transport layer

End-end connectivity during a session b/w two application is doneBy the transport layer. It also decides the type of connection like tcpor udp i.e. connection oriented or connection less.Services:SequencingFlow ctrl, error detection & correctionTransport layer info + data is called segment

5. Netwrok layer

Logical addressing is done at thenetwork layer i.e. source address &destination address are attached to the data.Protocols @network layerRouted protocols routing protocolsEg: ip,ipx eg: rip,igrp,ospfRouted protocols: they always carry the data along with themRouting protocol: they identify the path for routed protocol tocarry the dataAt this layer routers & layer 3 switches forms packets.

6.Data link layer

It has two Sub layersa)MAC{Media access control } b) LLC {logical link control framing of data}Ip address is lik the pincode & MAC address is like house number.Here layer2 switches are used.Wab protocols used at this layer are PPP,HDLC,FP,X.25 etc.Here error checking CRC bits are added to the packetsDLL info+ packets --> frames

7. physical layer

Takes care of physical connectivity i.e connector,cable etc. hereFrames are converted to bits (1’s & 0’s).The devices like hubs, repeaters,cables & connectors are used atthis layer

ping

Ping: is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the network interface card of the computer, or as a speed test. It works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies. Ping does not estimate the round-trip time, as it does not factor in the user's connection speed, but instead is used to record any packet loss, and print a statistical summary when finished.

The word ping is also frequently used as a verb or noun, where it is usually incorrectly used to refer to the round-trip time, or measuring the round-trip time.


History: Mike Muuss wrote the program in December, 1983, as a tool to troubleshoot odd behavior on an IP network. He named it after the pulses of sound made by a sonar, since its operation is analogous to active sonar in submarines, in which an operator issues a pulse of energy at the target, which then bounces from the target and is received by the operator. (The pulse of energy in sonar is analogous to a network packet in ping).

The usefulness of ping in assisting the "diagnosis" of Internet connectivity issues was impaired from late in 2003, when a number of Internet Service Providers began filtering out ICMP Type 8 (echo request) messages at their network boundaries.

This was partly due to the increasing use of ping for target reconnaissance, for example by Internet worms such as Welchia that flood the Internet with ping requests in order to locate new hosts to infect. Not only did the availability of ping responses leak information to an attacker, it added to the overall load on networks, causing problems for routers across the Internet.

Although RFC 1122 prescribes that any host must accept an echo-request and issue an echo-reply in return, this is supposedly a security risk, and thus this standard is frequently not followed on the public Internet.

Click this bar to view the full image.


ICMP packet
Click this bar to view the full image.

Generic composition of an ICMP packet

Header (in blue), with Protocol set to 1 and Type of Service set to 0.
Type of ICMP message (8 bits)
Code (8 bits)
Checksum (16 bits), calculated with the ICMP part of the packet (the header is not used)
The ICMP 'Quench' (32 bits) field, which in this case (ICMP echo request and replies), will be composed of identifier (16 bits) and sequence number (16 bits).
Data load for the different kind of answers (Can be an arbitrary length, left to implementation detail. However must be less than the maximum MTU of the network.

Sample with Windows
Click this bar to view the full image.

Windows appears not to inform the user about duplicated return packets.

Message format
Echo request
The echo request is an ICMP message whose data is expected to be received back in an echo reply ("pong"). The host must respond to all echo requests with an echo reply containing the exact data received in the request message.

Click this bar to view the full image.

Type must be set to 8.
Code must be set to 0.
The Identifier and Sequence Number can be used by the client to match the reply with the request that caused the reply. In practice, most Linux systems use a unique identifier for every ping process, and sequence number is an increasing number within that process. Windows uses a fixed identifier, which varies between Windows versions, and a sequence number that is only reset at boot time.
The data received by the Echo Request must be entirely included in the Echo Reply.


Echo reply
: The echo reply is an ICMP message generated in response to an echo request, and is mandatory for all hosts and routers.
Click this bar to view the full image.

Type and code must be set to 0.
The identifier and sequence number can be used by the client to determine which echo requests are associated with the echo replies.
The data received in the echo request must be entirely included in the echo reply.


Payload: The payload of the packet is generally filled with letters of the alphabet as this ASCII tcpdump shows

16:24:47.966461 IP (tos 0x0, ttl 128, id 15103, offset 0, flags [none], proto: ICMP (1), length: 60) 192.168.146.22 > 192.168.144.5: ICMP echo request, id 1, seq 38, length 40

Click this bar to view the full image.


References: Wikipedia

طريقة استخدام الأمر Ping


طريقة استخدام الأمر
Ping


start menu/ run/cmd
ولعمل ping وفحص التوصيل بين جهاز حاسب وآخر أو بين جهاز حاسب وجهاز التحويل (Router) أو مع الخادم (server) فإننا نكتب الأمر كالتالي :
ping xxx.xxx.xxx.xxx
مثال :
ping 192.180.239.132
حيث xxx هي رقم تعريف الشبكة للجهاز المراد فحص الاتصال معه كما يمكن استخدام اسم النطاق للحاسب DNS مثال
ping www.yahoo.com
اذا عرض اختبار ping نتيجة الرد فمعنى ذلك أن هناك اتصالاً فعلياً بهذا الجهاز ولكن إذا ظهرت نتيجة الفحص كالتالي :
“Request timed Out"
فهذا يعني عدم وصول رد من الجهاز الذي تم إرسال الحزم له .وهذا يدل على عدة أشياء منها :

الجهاز لايعمل .

-خط التوصيل بين الأجهزة فيه خلل (لايوجد توصيل ).

زمن رد فعل الجهاز الآخر أطول من ثانية.

عدم وجود خط عودة إلى الحاسب الشخصي المستخدم (أي أن التوصيل سليم والجهاز المراد الاتصال به سليم لكن السبب قد يكون في اعدادت الخادم (server) للرد والطريقة المستخدمة للرد.


أمثلة على استخدام
ping
ينبغي مراعاة وضع فراغات بين الأمر ping والمعايير المستخدمة معه وكذلك العنوان المراد الإرسال له .



من النتائج السابقة نستنتج التالي
1-أنه تم إرسال أربعة من حزم البيانات
packets إلى العنوان الوجهة وهو موقع مزاج
2-أن حجم كل
packet مرسل هو 32 bytes وأن كل packet مرسله استغرقت مدة زمنية معينة للوصول إلى الهدف بحيث كان أقصى مدة زمنية استغرقتها إجمالي الـ packets للوصول إلى الهدف هو 1797 ميلي ثانية وأدنى مدة زمنية كانت 1476 ميلي ثانية بينما كان المتوسط لإجمالي الـ packets هو 1639 ميلي ثانية .
3-أن جميع الـ packet أرسلت ولم يُفقد منها شي .

Quality Of Service (Qos)

quality of service (QoS)

refers to resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. For example, a required bit rate, delay, jitter, packet dropping probability and/or bit error rate may be guaranteed. Quality of service guarantees are important if the network capacity is insufficient, especially for real-time streaming multimedia applications such as voice over IP, online games and IP-TV, since these often require fixed bit rate and are delay sensitive, and in networks where the capacity is a limited resource, for example in cellular data communication. In the absence of network congestion, QoS mechanisms are not required.

A network or protocol that supports QoS may agree on a traffic contract with the application software and reserve capacity in the network nodes, for example during a session establishment phase. During the session it may monitor the achieved level of performance, for example the data rate and delay, and dynamically control scheduling priorities in the network nodes.

Applications requiring QoS

1. streaming multimedia may require guaranteed throughput to ensure that a minimum level of quality is maintained.
2. IPTV offered as a service from a service provider such as AT&T's U-verse
3. IP telephony or Voice over IP (VOIP) may require strict limits on jitter and delay
4. Video Teleconferencing (VTC) requires low jitter and latency
5. Alarm signalling (e.g., Burglar alarm)
6. dedicated link emulation requires both guaranteed throughput and imposes limits on maximum delay and jitter

شرح مفصل للأمر ping


سنتعرف اليوم على أهم أمر بالشبكات لا بل حتى بالانترنت وهو الأمر
PING


الـ ping اختصار لـ packet Internet Groper وهو أداة معروفة لأغلب مهندسي وخبراء تقنية المعلومات ويعتبر أمر من الأوامر المستخدمة في نظام الدوس وذلك لغرض الفحص والتحقق من الاتصال بمستوى IP مع كمبيوتر آخر أو موجه مسار Router أو طابعة أو أي جهاز آخر يستخدم برتوكول TCP/IP , حيث يرسل الأمر ping مجموعة من حزم البيانات إلى جهاز آخر مشترك في نفس الشبكة ويطلب منه الرد بإشارات معينة على هذه الحزم ثم يعرض النتائج بأكملها على الشاشة كالمثال التالي ,افتح ابدأ ومن قائمة تشغيل اكتبcmd ثم اكتب Ping ومسافة Space ثم رقم IP أو اسم موقع :


الشكل العام للأمر ping :
Ping [-t] [-a] [-n] [-l] [-f] [-i] [-v] [-r] [-s] [-w] [-j] targetname

المعايير المستخدمة مع الامر ping
هنالك بعض المعايير الإختيارية والتي توضع مع الأمر ping وهي :

t- استمر بالإرسال للعنوان المطلوب حتى يتوقف عن الإجابة وإذا أردنا مقاطعة الإحصائيات وعرضها نضغط CTRL+Break , ولمقاطعةping وإنهائه نستخدم CTRL+C .
a- اعرض رقم التعريف للعنوان المحدد.
n- عدد رسائل طلب الارتداد المرسلة (حزم البيانات المرسلة) والافتراضي هو 4.
Reply or request …etc
l- حجم حزمة البيانات المرسلة محدداً بالبايتات bytes و الحجم الافتراضي للحزمة هو 32 والأقصى هو 65.527.
f- عدم تجزئة الحزمة المرسلة (Do not fragment) من قبل أجهزة التوجيه في المسار إلى الوجهة المقصودة.
i- المدة الزمنية بين كل حزمة والثانية مقاسة بالميلي ثانية.
v- نوع الخدمة والافتراضي و هو 0 ويتم تحديده كقيمة عشرية تتراوح
من 0 إلى 255.
r- عدد نقاط التحويل أو القفزات في خط الاتصال بالعنوان وعند استخدام هذا المعيار فقد استخدمت Record Route وذلك لتسجيل المسار المتخذ من قبل رسالة الطلب حتى رسالة الإجابة المتوافقة للطلب.
s- الوقت المسجل عند الوصول لكل قفزة أو تحويله (وقت وصول رسالة طلب الارتداد ورسالة الاجابة المتوافقة).
w- مدة الإنتظار لوصول الرد من العنوان بالميلي ثانية وإن لم يتم استلام رسالة الإجابة يتم عرض رسالة إعلام بالخطأ "انقضاء مهلة الطلب " "Request timed out " والمهلة الافتراضية 4000 (4ثواني ).
j- لتحديد عدد من الوجهات التي تمر بها حزمة البيانات خلال مسارها للوصول إلى المقصد والعدد الأقصى لهذه الوجهات
(Intermediate node ) هو 9 وتكتب قائمة المضيفين بعناوين IP مفصولة بفراغات.

فوائد الأمر
ping


للتعرف على حالة الشبكة وحالة المستضيف موقع ما أو صفحة
2-لتتبع وعزل الأعطال في القطع والبرامج.
3-لإختبار ومعايرة وإدارة الشبكة.
4-يمكن استخدام الأمر ping لعمل فحص ذاتي للحاسب (loopback) وذلك للتأكد من قدرة الحاسب على إرسال واستقبال المعلومات وفي هذه الحالة لايتم إرسال أي شيء للشبكة إنما فقط من الحاسب إلى نفسه وتستخدم هذه الطريقة للتأكد من عمل بطاقة الشبكة المركبة في الحاسب ونستخدم الأمر في هذه الحالة كالتالي
ping local host أو ping 127.0.0.1
ونحصل على المعلومات التالية في نتيجة الفحص السابق :
1-أنه تم إرسال 4 حزم من البيانات (Packets) ولم يفقد منها شيء.
2-سيتضح الزمن الذي أخذته كل حزمة في الذهاب والعودة بالميلي ثانية.
3-الحجم الأساسي للحزمة الواحدة=32بايت ومدة الإنتظار منذ لحظة الإرسال حتى عودتها هو 1ثانية وعدد الحزم=4 والزمن=صفر لأننا نفحص الحاسب ذاتياً

Universal Serial Bus ( USB )

Universal Serial Bus ( USB )
In information technology, Universal Serial Bus (USB) is a serial bus standard to connect devices to a host computer. USB was designed to allow many peripherals to be connected using a single standardized interface socket and to improve plug and play capabilities by allowing hot swapping; that is, by allowing devices to be connected and disconnected without rebooting the computer or turning off the device. Other convenient features include providing power to low-consumption devices, eliminating the need for an external power supply; and allowing many devices to be used without requiring manufacturer-specific device drivers to be installed.

USB is intended to replace many varieties of serial and parallel ports. USB can connect computer peripherals such as mice, keyboards, PDAs, gamepads and joysticks, scanners, digital cameras, printers, personal media players, flash drives, and external hard drives. For many of those devices, USB has become the standard connection method. USB was designed for personal computers, but it has become commonplace on other devices such as PDAs and video game consoles, and as a power cord between a device and an AC adapter plugged into a wall plug for charging. As of 2008[update], there are about 2 billion USB devices sold per year, and about 6 billion total sold to date.[1]

The design of USB is standardized by the USB Implementers Forum (USB-IF), an industry standards body incorporating leading companies from the computer and electronics industries. Notable members have included Agere (now merged with LSI Corporation), Apple Inc., Hewlett-Packard, Intel, Microsoft and NEC.


History
The USB 1.0 specification was introduced in 1994. USB was created by the core group of companies that consisted of Intel, Compaq, Microsoft, Digital, IBM, and Northern Telecom. Intel produced the UHCI host controller and open software stack; Microsoft produced a USB software stack for Windows and co-authored the OHCI host controller specification with National Semiconductor and Compaq; Philips produced early USB-Audio; and TI produced the most widely used hub chips. USB was intended to replace the multitude of connectors at the back of PCs, as well as to simplify software configuration of communication devices.

The USB 2.0 specification was released in April 2000 and was standardized by the USB-IF at the end of 2001. Hewlett-Packard, Intel, Lucent (now LSI Corporation since its merger with Lucent spinoff Agere Systems (Lucent has been merged with Alcatel, and became Alcatel-Lucent)), Microsoft, NEC, and Philips jointly led the initiative to develop a higher data transfer rate, 480 Mbit/s, than the 1.0 specification of 12 Mbit/s.

The USB 3.0 specification was released on November 17, 2008 by the USB 3.0 Promoter Group. It has a transfer rate of up to 10 times faster than the USB 2.0 version and has been dubbed the SuperSpeed USB.

Equipment conforming with any version of the standard will also work with devices designed to any previous specification (a property known as backward compatibility).


Device classes
USB defines class codes used to identify a device’s functionality and to load a device driver based on that functionality. This enables a device driver writer to support devices from different manufacturers that comply with a given class code.

Device classes include

Click this bar to view the full image.

Note class 0: Use class information in the Interface Descriptors. This base class is defined to be used in Device Descriptors to indicate that class information should be determined from the Interface Descriptors in the device.

Types of USB connector

Click this bar to view the full image.

Click this bar to view the full image.

There are several types of USB connectors, including some that have been added while the specification progressed. The original USB specification detailed Standard-A and Standard-B plugs and receptacles. The first engineering change notice to the USB 2.0 specification added Mini-B plugs and receptacles.

The data connectors in the A - Plug are actually recessed in the plug as compared to the outside power connectors. This permits the power to connect first which prevents data errors by allowing the device to power up first and then transfer the data. Some devices will operate in different modes depending on whether the data connection is made. This difference in connection can be exploited by inserting the connector only partially. For example, some battery-powered MP3 players switch into file transfer mode (and cannot play MP3 files) while a USB plug is fully inserted, but can be operated in MP3 playback mode using USB power by inserting the plug only part way so that the power slots make contact while the data slots do not. This enables those devices to be operated in MP3 playback mode while getting power from the cable

USB-A
The Standard-A type of USB connector takes on the appearance of a flattened rectangle that plugs into downstream-port sockets on the USB host or a hub and receives power. This kind of connector is most frequently seen on cables that are permanently attached to a device, such as one on a cable that connects a keyboard or mouse to the computer.

USB-B
Standard-B connectors—which have a square shape with beveled exterior corners—typically plug into upstream sockets on devices that use a removable cable, e.g. between a hub and a printer. Type B plugs deliver power and are therefore analogous to a power socket. This two-connector scheme prevents a user from accidentally creating a loop.

Mini and micro
Various connectors have been used for smaller devices such as PDAs, mobile phones or digital cameras. These include the now-deprecated[12] (but standardized) Mini-A and the current standard Mini-B, Micro-A, and Micro-B connectors. The Mini-A and Mini-B plugs are approximately 3 by 7 mm, while the Micro plugs have a similar width but approximately half the thickness, enabling their integration into thinner portable devices.

The Micro-USB connector was announced by the USB-IF on January 4, 2007 and the Mini-USB connectors were withdrawn[citation needed]. As of February 2009[update], most available devices and cables still use Mini plugs, but the newer Micro connectors are becoming more widely adopted. The thinner Micro connectors are intended to replace the Mini plugs in new devices including smartphones and personal digital assistants. The Micro plug design is rated for 10,000 connect-disconnect cycles. The Universal Serial Bus Micro-USB Cables and Connectors Specification details the mechanical characteristics of Micro-A plugs, Micro-AB receptacles, and Micro-B plugs and receptacles, along with a Standard-A receptacle to Micro-A plug adapter. The carrier-led Open Mobile Terminal Platform (OMTP) group have recently endorsed micro-USB as the standard connector for data and power on mobile devices.[14] These include various types of battery chargers, allowing Micro-USB to be the single external cable link needed by some devices.


USB OTG Sockets: Mini-AB, Micro-AB
Except for special standard-to-Mini-A and standard-to-Micro-A adapters, USB cables always have an A-connector and a B-connector, on opposite ends. A-connectors can always connect to A-sockets; B-connectors can always connect B-sockets. These sockets all come in standard, mini, and micro versions.

For USB On-The-Go (or 'OTG') support for another socket type is defined: the AB, in both mini and micro versions. It can accept both A and B connector, through careful mechanical design. OTG software detects the difference by use of the ID pin, which is grounded in A-connectors and is otherwise floating. When an A-connector is connected to an AB socket, the socket supplies VBUS power to the cable and starts in the host role. When a B-connector is used, the socket consumes VBUS power and starts in the peripheral or device role. OTG allows those two roles to be switched by software, as needed for the task at hand.


Version history
Prereleases
USB 0.7: Released in November 1994.
USB 0.8: Released in December 1994.
USB 0.9: Released in April 1995.
USB 0.99: Released in August 1995.
USB 1.0 Release Candidate: Released in November 1995.


USB 1.0
USB 1.0: Released in January 1996.
Specified data rates of 1.5 Mbit/s (Low-Speed) and 12 Mbit/s (Full-Speed). Does not allow for extension cables or pass-through monitors (due to timing and power limitations). Few such devices actually made it to market.
USB 1.1: Released in September 1998.
Fixed problems identified in 1.0, mostly relating to hubs. Earliest revision to be widely adopted.


USB 2.0
Hi-Speed USB LogoUSB 2.0: Released in April 2000.
Added higher maximum speed of 480 Mbit/s (now called Hi-Speed). Further modifications to the USB specification have been done via Engineering Change Notices (ECN). The most important of these ECNs are included into the USB 2.0 specification package available from USB.org:
Mini-B Connector ECN: Released in October 2000.
Specifications for Mini-B plug and receptacle. These should not be confused with Micro-B plug and receptacle.
Errata as of December 2000: Released in December 2000.
Pull-up/Pull-down Resistors ECN: Released in May 2002.
Errata as of May 2002: Released in May 2002.
Interface Associations ECN: Released in May 2003.
New standard descriptor was added that allows multiple interfaces to be associated with a single device function.
Rounded Chamfer ECN: Released in October 2003.
A recommended, compatible change to Mini-B plugs that results in longer lasting connectors.
Unicode ECN: Released in February 2005.
This ECN specifies that strings are encoded using UTF-16LE. USB 2.0 did specify that Unicode is to be used but it did not specify the encoding.
Inter-Chip USB Supplement: Released in March 2006.
On-The-Go Supplement 1.3: Released in December 2006.
USB On-The-Go makes it possible for two USB devices to communicate with each other without requiring a separate USB host. In practice, one of the USB devices acts as a host for the other device.
Battery Charging Specification 1.0: Released in March 2007.
Adds support for dedicated chargers (power supplies with USB connectors), host chargers (USB hosts that can act as chargers) and the No Dead Battery provision which allows devices to temporarily draw 100 mA current after they have been attached. If a USB device is connected to dedicated charger, maximum current drawn by the device may be as high as 1.8A. (Note that this document is not distributed with USB 2.0 specification package.)
Micro-USB Cables and Connectors Specification 1.01: Released in April 2007.
Link Power Management Addendum ECN: Released in July 2007.
This adds a new power state between enabled and suspended states. Device in this state is not required to reduce its power consumption. However, switching between enabled and sleep states is much faster than switching between enabled and suspended states, which allows devices to sleep while idle.
High-Speed Inter-Chip USB Electrical Specification Revision 1.0: Released in September 2007.


USB 3.0
On September 18, 2007, Pat Gelsinger demonstrated USB 3.0 at the Intel Developer Forum. The USB 3.0 Promoter Group announced on November 17, 2008, that version 1.0 of the specification has been completed and is transitioned to the USB Implementers Forum (USB-IF), the managing body of USB specifications.[34] This move effectively opens the spec to hardware developers for implementation in future products.

Availability

Consumer products are expected to become available in 2010. Commercial controllers are expected to enter into volume production no later than the first quarter of 2010.[38] NEC is aiming to produce its first USB controller in June 2009, initially priced at USD 15.00

Windows 7 drivers are under development but no public releases have been made available as of May 2009. The Linux Kernel supports USB 3.0 as of version 2.6.30.


Reference: Wikipedia

Blu-ray Disc


Blu-ray Disc (also known as Blu-ray or BD) is an optical disc storage medium designed by Sony to supersede the standard DVD format. Its main uses are high-definition video and data storage with 50GB per disc. The disc has the same physical dimensions as standard DVDs and CDs.

The name Blu-ray Disc is derived from the blue laser (violet-colored) used to read and write to this type of disc. In part because of the shorter wavelength (405 nanometres), substantially more data (almost 6 times more) can be stored on a Blu-ray Disc than on a standard DVD, which uses a red (650 nm) laser.

During the format war over high-definition optical discs, Blu-ray Disc competed with the HD DVD format. In February 2008, Toshiba—the main company supporting HD DVD— ceded and effectively ended the format war.

Blu-ray Disc is developed by the Blu-ray Disc Association, a group representing makers of consumer electronics, computer hardware, and motion pictures. As of January 2009, more than 890 Blu-ray disc titles are available in Australia, 720 in Japan, 1,140 in the United Kingdom, and 1,500 in the United States.


History
Commercial HDTV sets began to appear in the consumer market around 1998, but there was no commonly-accepted, inexpensive way to record or play HD content. In fact, there was no medium with the storage required to accommodate HD codecs, except JVC's Digital VHS and Sony's HDCAM.[6] Nevertheless, it was well known that using lasers with shorter wavelengths would enable optical storage with higher density. When Shuji Nakamura invented practical blue laser diodes, it was a sensation, although a lengthy patent lawsuit delayed commercial introduction.

Blu-ray Disc format finalized
The Blu-ray Disc physical specifications were finished in 2004. In January 2005, TDK announced that they had developed a hard coating polymer for Blu-ray Discs. The cartridges, no longer necessary, were scrapped. The BD-ROM specifications were finalized in early 2006. AACS LA, a consortium founded in 2004, had been developing the DRM platform that could be used to securely distribute movies to consumers. However, the final AACS standard was delayed, and then delayed again when an important member of the Blu-ray Disc group voiced concerns. At the request of the initial hardware manufacturers, including Toshiba, Pioneer and Samsung, an interim standard was published which did not include some features, like managed copy.

Technical specifications
Click this bar to view the full image.

High-definition video may be stored on Blu-ray ROM discs with up to 1920x1080 pixel resolution at up to 60 frames per second interlaced or 24 frames per second progressive
Click this bar to view the full image.


Recording speed

On August 8, 2008, Japanese electronics company Buffalo announced that it will ship the first 8x Blu-ray burners in Japan starting from September 2008. On September 22, 2008, Buffalo announced one internal and one external 8x Blu-ray burners for the United States, to be released the same month.[53] The following day Sony announced the BWU-300S, an internal 8x Blu-ray burner for the United States.

** Theoretical

AACS
Advanced Access Content System (AACS) is a standard for content distribution and digital rights management. It is developed by AS Licensing Administrator, LLC (AACS LA), a consortium that includes Disney, Intel, Microsoft, Matsushita (Panasonic), Warner Bros., IBM, Toshiba and Sony.

Since appearing in devices in 2006, several successful attacks have been made on the format. The first known attack relied on the trusted client problem. In addition, decryption keys have been extracted from a weakly protected player (WinDVD). Since keys can be revoked in newer releases,[71] this is only a temporary attack and new keys must continually be discovered in order to decrypt the latest discs. This cat-and-mouse game has gone through several cycles and as of August 2008 all current AACS decryption keys are available on the Internet.

Click this bar to view the full image.


Software standards
Codecs
The BD-ROM specification mandates certain codec compatibilities for both hardware decoders (players) and the movie-software (content). For video, all players are required to support MPEG-2, H.264/MPEG-4 AVC, and SMPTE VC-1.[55] MPEG-2 is the codec used on regular DVDs, which allows backwards compatibility. MPEG-4 AVC was developed by MPEG and VCEG. VC-1 is a codec that was mainly developed by Microsoft. BD-ROM titles with video must store video using one of the three mandatory codecs. Multiple codecs on a single title are allowed.

The choice of codecs affects the producer's licensing/royalty costs, as well as the title's maximum runtime, due to differences in compression efficiency. Discs encoded in MPEG-2 video typically limit content producers to around two hours of high-definition content on a single-layer (25 GB) BD-ROM. The more advanced video codecs (VC-1 and MPEG-4 AVC) typically achieve a video runtime twice that of MPEG-2, with comparable quality.

MPEG-2 was used by many studios, including Paramount Pictures (which initially used the VC-1 codec for HD DVD releases) for the first series of Blu-ray discs that were launched throughout 2006. Modern releases are now often encoded in either MPEG-4 AVC or VC-1, allowing film studios to place all content on one disc, reducing costs and improving ease of use. Using these codecs will also free many GBs of space for storage of bonus content in HD (1080i/p) as opposed to the SD (480i/p) typically used for most titles. Some studios (such as Warner Bros.) have released bonus content on discs encoded in a different codec than the main feature title; for example the Blu-ray Disc release of Superman Returns uses VC-1 for the feature film and MPEG-2 for bonus content (presumably because it is simply ported from the DVD release).[citation needed]

For audio, BD-ROM players are required to support Dolby Digital, DTS, and linear PCM. Players may optionally support Dolby Digital Plus and DTS-HD High Resolution Audio, as well as lossless formats Dolby TrueHD and DTS-HD Master Audio. BD-ROM titles must use one of the mandatory schemes for the primary soundtrack. A secondary audiotrack, if present, may use any of the mandatory or optional codecs.

For users recording digital television programming, the recordable Blu-ray Disc standard's initial data rate of 36 Mbit/s is more than adequate to record high-definition broadcasts from any source (IPTV, cable/satellite, or terrestrial). BD-Video movies have a maximum data transfer rate of 54 Mbit/s, a maximum AV bitrate of 48 Mbit/s (for both audio and video data), and a maximum video bitrate of 40 Mbit/s. This compares to HD DVD movies which have a maximum data transfer rate of 36 Mbit/s, a maximum AV bitrate of 30.24 Mbit/s, and a maximum video bitrate of 29.4 Mbit/s


References: Wikipedia