Subscribe by Email


Showing posts with label Interface. Show all posts
Showing posts with label Interface. Show all posts

Friday, October 11, 2013

What are advantages and limitations of Wi-Fi?

The Wi-Fi has its own set of advantages and limitations. 

Advantages of WiFi
- WiFi makes the deployment of local Area Networks or LANs quite cheap.  
There are some areas where the cables cannot be installed such as in historical buildings and outdoor areas. 
- But these spaces do not have any problem in hosting a wireless LAN.  
Wireless Network adapters are being built into almost all the laptops by the manufacturers.
A basic level of service is provided at which different brands concerning and client network interfaces access points that are competing with each other can inter-operate. 
- The products that have been certified by Wi-Fi alliance show back word compatibility. 
- A standard device for WiFi will work at any place in the whole world unlike our phones. 
- The WPA2 or the WiFi protected access encryption is secure provided a condition that the pass phrase used is quite strong.  
- The new protocols use for WMM i.e., Quality of service increase the suitability of the Wi-Fi regarding its use in latency - sensitive applications. 
- WMM is a power saving mechanism that is used for extending the life of the battery. 

Limitations of WiFi
Inconsistency of the operation and spectrum assignments poses a problem worldwide.  
- The range all the WiFi networks is limited. 
- A wireless access point typically uses a stock antenna having a range of 100 m outdoors and 25m indoors.
The frequency band is a major factor for producing variations in the range.  
The range of Wi-Fi with a 2.4 ghz frequency block is better when compared with the 5.0 ghz frequency block Wi-Fi. 
- Some wireless routers come with detachable antennas. 
- These antennas can be removed for improving the range. 
- In their place upgraded antennas can be fitted. 
- The benefit of these antennas is that they have high directional gain at the remote devices. 
- The local regulations limit the maximum amount of power that can be transmitted by a Wi-Fi. 
- The power consumption of Wi-Fi is quite higher than the other standards.  
This is so because of the reach requirements of the wireless LAN applications.
- There are technologies available that provide a propagation range that is much shorter. 
- One such technology is Bluetooth and has very low power consumption.  
Other technologies such as zigbee have low power consumption, a long range but provides low data rate. 
- The most commonly used wireless encryption standard is WEP or wired equivalent privacy. 
- Even this standard has been proven to be breakable even if correct configuration is used. 
- This problem was addressed by WPA or Wi-Fi protected access standard to some extent. 
- By default the wireless access points use the encryption free mode. 
- The wireless security is disabled because of which the LAN can be openly accessed. 


Tuesday, October 8, 2013

What are uses of Wifi?

- Routers sometimes act as a Wi-Fi access point incorporating a cable modem or a DSL modem.
- These routers are installed in buildings and homes for providing Internet access and other inter networking services to the devices that in turn are connected to a either through a cable or wireless. 
- Similarly, there are routers that are powered by battery and they consist of a Wi-Fi access point and a mobile Internet radio modem. 
- Today smartphones come with this as a built-in capability.  
- However, this feature is disabled by the carriers. 
- The carriers might charge extra money for this. 
- The standalone facilities are provided by Internet packs. 
- The places where there is no network access, wifi is used. 
- Using Wi-Fi, a direct communication link between two computers can be established.  
- There is no intermediate point.  
- This type of transmission is termed as ad hoc wifi transmission. 
- This network mode is now very popular with the multi-player game consoles. Examples are:
       > Nintendo DS
       > PlayStation portable
       > Digital cameras
       > Other consumer electronic devices.


- A citywide Wi-Fi plan has been implemented by a number of the cities around the world.  
- In India, the first city to do so was Mysore.  
- The first city in the world was Jerusalem.
- The first city in United States was Sunnyvale in California to offer city-wide wifi. 
- Another type of wifi implementation is campus-wide wifi.  
- A number of colleges in United States have set up this kind of wifi network.  
The first university to have it was Carnegie Mellon University. 
- Using wifi, the local area Network can be deployed in very less cost.  
- There are places where it is not possible for the physical transmission medium such as cables to reach. 
- In such places wifi network is of crucial importance.  
- Also, wifi can be easily deployed in historical buildings and outdoor areas.  
Now, because of the increasing popularity of the Wi-Fi, the manufacturers are developing Wireless Network adapters for most of the notebooks and laptops.  
This eventually led to a fall in the price of the Wi-Fi chip set. 
- Today, the Wi-Fi chip set is economically feasible and is included in most of the devices.  
- There are many brands of client network interfaces and access-points that are competing with each other.  
- These interfaces are able to inter-operate at a basic level. 
- The Wi-Fi certification for the products is issued by wifi alliance. 
- This makes them backwards compatible with each other. 
- A standard Wi-Fi Device is supposed to work anywhere in the world. 
- The encryption standard that is considered secure is the WPA2 or wifi protected access.  
- But, this would work only if the pass phrase that is being used is strong enough. 
- The Wi-Fi has been made more suitable with the use of new protocols such as quality of service.  
- This has made wifi compatible with latency sensitive applications.  
- Nowadays, for extending battery life power saving mechanisms such as WMM are being used.  
- These are the major uses of wifi technology.
- The usage wifi has been limited because of its limited range. 
- Therefore, in order to cover up a large area several intermediate Wi-Fi access-points have to be set up. 
- The variations in the range can be produced by varying the frequency band.  
Wifi with a small frequency block works better than wifi with a larger frequency block.
- Wifi with the larger frequency blocks are optionally used. 
- The power of wifi network can be harnessed by using high gain direction antennas instead of using detachable antennas.  
- Another factor limiting the performance of wifi transmission is the local regulations. 
- Wifi also requires high power to operate upon. 
- This is a cause of concern for the devices' batteries.


Monday, October 7, 2013

What is Wifi technology? How does it work?

- Wifi has emerged as a very popular technology. 
- This technology has enabled the electronic devices to exchange information between them and to share the internet connection without using any cables or wires. 
- It is a wireless technology. 
- This technology works with the help of the radio waves. 
- The Wifi is defined as a WLAN (wireless local area network) product by the wifi alliance that is based on the standards defined by IEEE (802.11 standards). 
Most of the WLANs are based upon these standards only and so this technology has been named as wifi which is the synonymous with the term WLAN. 
- The wifi-certified trademark might be used by only those wifi products which have the complete certification for the wifi alliance inter-operability. 
- A number of devices now use wifi such as the PCs, smart phones, video game consoles, digital cameras, digital audio players, tablet computers and so on. 
- All these devices can connect to the network and access internet by means of a wireless network access point. 
- Such an access point is more commonly known as a ‘hotspot’. 
- The range of an access point is up to 20 m. 
- But it has a much greater range outside.  
- An access point can be installed in a single room or in an area of many square miles. 
- This can be achieved by using a number of overlapping access points. 
However, the security of the wifi is less compared to the wired connections for example Internet.
- This is so because a physical connection is not required by an intruder. 
- The web pages using SSL have security but the intruders can easily access the non-encrypted files on the internet. 
- It is because of this, that the various encryption technologies have been adopted by the wifi. 
- The earlier WEP encryption was weak and so was easy to break.
- Later, came the higher quality protocols such as the WPA2 and WPA. 
- The WPS or the wifi protected set up was an optional feature that was added in the year of 2007. 
- This option a very serious flaw which is that it allowed the recovery of the password of the router by an attacker.
- The certification and the test plan has been updated by the wifi alliance for ensuring that there is resistance against attacks in all the devices that have been newly certified.
- For connecting to a wifi LAN, a wireless network interface controller has to be incorporated in to the computer system.
- This combination of the interface controller and the computer is often called as the station. 
- The same radio frequency communication channel is shared by all the stations.
- Also, all the stations receive any transmission on this channel. 
- Also, the user is not informed of the fact that the data was delivered to the recipient and so is termed as the ‘best–effort delivery mechanism’. 
- For transmitting the data packets, a carrier wave is used. 
- These data packets are commonly known as the ‘Ethernet frames’. 
Each station regularly tunes in to the radio frequency channel for picking up the transmissions that are available. 
- A device that is wifi enabled can connect to the network if it lies in the range of the wireless network. 
- One condition is that the network should have been configured for permitting such a connection. 
- For providing coverage in a large area multiple hotspots are required. 
- For example, wireless mesh networks in London. 
- Through wifi, services can be provided in independent businesses, private homes, public spaces, high street chains and so on. 
- These hotspots have been set up either commercially or free of charge. 
- Free hotspots are provided at hotels, restaurants and airports. 


Saturday, September 21, 2013

What are the services provided to upper layers by transport layer?

In the field of computer networking, the purpose of the 4th layer or the transport layer is to provide services for the end to end communication for the various operating applications. The services are provided within an architectural framework that consists of protocols and the components and is layered. It also offers convenient services such as the following:
Ø  Connection – oriented data stream support
Ø  Reliability
Ø  Flow control
Ø  Multiplexing and so on.

- Both the OSI (open systems interconnection) and TCP/ IP model include the transport layer. 
- The foundation of the internet is based up on the TCP/ IP model whereas for the general networking, the OSI model is followed. 
- However, the transport layer is defined differently in both of these models. Here we shall discuss about the transport layer in the TCP model since it is used for keeping the API (application programming interface) convenient to the internet hosts. 
- This is in contrast with the definition of the transport layer in the OSI model. 
TCP (transmission control protocol) is the most widely used transport protocol and so the internet protocol suite has been named after it i.e., the TCP/ IP. 
- It is a connection-oriented transmission protocol and so it is quite complex. 
This is also because it incorporates reliable data stream and transmission services in to its state-ful design. 
- Not only TCP there are other protocols in the same category such as the SCTP (stream control transmission protocol) and DCCP (datagram congestion control protocol).

Now let us see what all services are provided by the transport layer to its upper layers:
ØConnection-oriented communication: It is quite easy for the application for interpreting the connection as a data stream instead of having to cope up with the connectionless models that underlie it. For example, internet protocol (IP) and the UDP’s datagram protocol.
Ø Byte orientation: Processing the data stream is quite easy when compared with using the communication system format for processing the messages. Because of such simplification, it becomes possible for the applications to work up on message formats that underlie.
Ø  Same order delivery: Usually, it is not guaranteed by the transport layer that the data packets will be received in the same order in which they were sent. But this is one of the desired features of the transport layer. Segment numbering is used for incorporating this feature. The data packets are thus passed on to the receiver in order. Head of line blocking is a consequence of implementing this.
Ø  Reliability: During the transportation some data packets might be lost because of errors and problems such as network congestion. By using error detection mechanism such as CRC (cyclic redundancy check), the data might be checked by the transport protocol for any corruption and for the verification whether the correct reception of the data by either sending a NACK or an ACK signal to the sending host. Some schemes such as the ARR (automatic repeat request) are sometimes used for the retransmission of the corrupted or the lost data.
Ø  Flow control: The rate with which the data is transmitted between two nodes is managed for preventing a sending host with a fast speed from the transmission of data more than what the receiver’s data buffer can take at a time. Otherwise it might cause a buffer overrun.

Ø  Congestion avoidance: Traffic entry in to the network can be controlled by means of congestion control by avoiding congestive collapse. The network might be kept in a state of congestive collapse by automatic repeat requests. 


Tuesday, September 10, 2013

What are the differences between bridges and repeaters?

Bridges and repeaters are both important devices in the field of telecommunications and computer networking. In this article we discuss about these two and differences between them. 
- The repeaters are deployed at the physical layer whereas one can find bridges at the MAC layer. 
- Thus, we called repeaters as the physical layer device. 
- Similarly, bridge is known as the MAC layer device. 
- Bridge is responsible for storing as well forwarding the data packets in an Ethernet.
- Firstly, it examines the header of the data frame, selects few of them and then forwards them to the destination address mentioned in the frame. 
- Bridge uses the CSMA/CD for accessing a segment whenever the data frame has to be forwarded to it.
- Another characteristic of a bridge is that its operation is transparent. 
- This means that the hosts in the network do not know that the bridge is also present in the network. 
- Bridges learn themselves; they do not have to be configured again and again. 
They can be simply plugged in to the network. 
- Installing a bridge causes formation of LAN segments by breaking a LAN. 
Packets are filtered with the help of bridges. 
- The frames that belong to one LAN segment are not sent to the other segments. 
- This implies separate collision domains are formed. 
The bridge maintains a bridge table consisting of the following entries:
  1. LAN address of the node
  2. Bridge interface
  3. Time stamp
  4. Stale table entries

- Bridges themselves learn that which interface can be used for reaching which host. 
- After receiving a frame, it looks for the location of the sending node and records it.
- It keeps the collision domains isolated from one another thus, giving the maximum throughput. 
- It is capable of connecting a number of nodes and offer limitless geographical coverage. 
- Even different types of Ethernet can be connected through it. 
- Even the repeaters are plug and play devices but they do not provide any traffic isolation. 
- Repeaters are used for the purpose of regenerating the incoming signals as they get attenuated with time and distance. 
- If physical media such as the wifi, Ethernet etc. is being used, the signals can travel only for a limited distance and after that their quality starts degrading. 
The work of the repeaters is to increase the extent of the distance over which the signals can travel till they reach their destination. 
- Repeaters also provide strength to the signals so that their integrity can be maintained. 
- Active hubs are an example of the repeaters and they are often known as the multi-port repeaters. 
- Passive hubs do not serve as repeaters. 
- Another example of the repeaters are the access points in a wifi network. 
- But it is only in repeater mode that they function as repeaters. 
- Regenerating signals using repeaters is a way of overcoming the attenuation which occurs because of the cable loss or the electromagnetic field divergence. 
For long distances, a series of repeaters is often used. 
- Also, the unwanted noise that gets added up with the signal is removed by the repeaters. 
- The repeaters can only perceive and restore the digital signals.
- This is not possible with the analog signals. 
- Signal can be amplified with the help of amplifiers but they have a disadvantage which is that on using the amplifiers, the noise is amplified as well. 
- Digital signals are more prone to dissipation when compared to analog signals since they are completely dependent up on the presence of the voltages. 
- This is why they have to be repeated again and again using repeaters. 


Saturday, September 7, 2013

Explain the concept of inter-networking?

- The practice in which one computer network is connected with the other networks is called inter-networking. 
- The networks are connected with the help of gateways. 
- These gateways are used since they offer a common method for routing the data packets across the networks.
- The resulting system in which a number of networks are connected is called the inter-network or more commonly as the internet. 
- The terms “inter” and “networking” combine together to form the term “internet working”.  
- Internet is the best and the most popular example of the inter networking. 
Internet has formed as a result of many networks connected with the help of numerous technologies. 
- Many types of hardware technologies underlie the internet. 
- The internet protocol suite (IP suite) is the inter networking protocol standard responsible for unifying the diverse networks. 
- This protocol is more commonly known as the TCP/ IP. 
- Two computer local area networks (LANs) connected to one another by means of a router form the smallest internet but not the inter network. 
Inter networking is not formed by simply connecting two LANs together via a hub or a switch. 
- This is called expansion of the original local area network. 
Inter networking was started as a means for connecting the disparate networking technologies. 
- Eventually, it gained widespread popularity because of the development needs of connecting many local area networks together through some kind of WAN (wide area network). 
- “Catenet” was the original term that was used for the inter network. 
Inter network includes many types of other networks such as the PAN or personal area network. 
- Gateways were the network elements that were originally used for connecting various networks in predecessor of the internet called the ARPANET. 
Today, these connecting devices are more commonly known as the internet routers. 
- There is a type of interconnection between the various networks at the link layer of the networking model. 
- This layer is particularly known as the hardware centric layer and it lies below the TCP/ IP logical interfaces level. 

Two devices are mainly used in establishing this interconnection:
Ø  Network switches and
Ø  Network bridges
- Even now this cannot be called as inter networking rather, the system is just a single and large sub-network. 
- Further, for traversing these devices no inter networking protocol is required. 
However, it is possible to convert a single network in to an inter network. 
- This can be done by making various segments out of the network and also making logical divisions of the segment traffic using the routers. 
- The internet protocol suite has been particularly designed for providing a packet service. 
- This packet service offered by the IPS is quite unreliable. 
- The elements that maintain a network state and are intermediate in the network are avoided by the architecture. 
- The focus of the architecture is more on the end points of the active communication session.
- For a reliable transfer of the data, a proper transport layer protocol must be used by the applications. 
- One such protocol is the TCP (transmission control protocol) and it is capable of providing a reliable stream for communication. 
- Sometimes a simpler protocol such as the UDP (user datagram protocol) might be used by the applications. 
- The applications using this protocol carry out only those tasks for which reliable data delivery is not required or for which realtime is required. 

Examples of such tasks include voice chat or watching a video online etc. Inter networking uses two architectural models namely:

  1. OSI or the open system interconnection model: This model comes with 7 layer architecture that covers the hardware and the software interface.
  2. TCP/ IP model: The architecture of this model is somewhat loosely defined when compared with the OSI model. 


Monday, September 2, 2013

Application areas of leaky bucket algorithm and token bucket algorithm

In this article we discuss about the applications of the leaky bucket algorithm and the token bucket algorithm.  

Applications of Leaky Bucket Algorithm
- The leaky bucket algorithm is implemented in different versions. 
- For example, the generic cell rate algorithm is a version of this algorithm which is often implemented in the networks using ATM (asynchronous transfer mode).  
- The algorithm is applied at the user interfaces in the usage/network parameter control in order to provide protection to the network from the problems of congestive collapse or excess traffic. 
- An algorithm equivalent to the generic cell rate algorithm might be used in shaping the transmissions made by the network interface card to a network using ATM. 
There are two major applications of the leaky bucket algorithm. 
- The first is using it as a counter only for checking whether the events or the traffics confirm to the defined limits or not.
- Whenever a packet arrives at the check point, the counter is incremented. 
This is same as adding water to the bucket in an intermittent way. 
- In the same way, the counter is decremented as the water leaks out at a constant rate. 
- Because of this, the conformance of the packet to the burstiness and bandwidth limits is indicated by the value of this counter whenever a packet arrives. 
- Or if an event occurs, the counter checks whether it confirms to the peak and average rate limits. 
- So, when the packets arrive or an event occurs, water is added to the bucket and then leaks out. We call this version of the leaky bucket algorithm as a meter.
- Another application of the leaky bucket algorithm involves its use as queue implemented for controlling the flow of traffic. 
- This queue maintains a direct control over the flow. 
- When the packets arrive, they are put in to the queue. 
- This is same as adding water to the bucket. 
- The packets are then removed in the order they arrived at a constant rate. 
This is same as water leaking out. 
- As a result of this, there is no jitter or burstiness in the traffic flow.

Applications of Token Bucket Algorithm
- The token bucket algorithm finds its application in the telecommunications and packet switched computer networks.
- This algorithm is implemented for checking whether the data transmissions confirm to the burstiness and bandwidth predefined limits. 
- The token bucket algorithm used in traffic policing and traffic shaping. 
- In the former, the packets that are non-conformant are discarded or assigned low priorities. 
- This is done for the management of the downstream traffic. 
- On the other hand, the packets are kept in delay unless they are conformed in traffic shaping. 
- Both of these are used in protecting the network against the burstiness of the traffic. 
- Bursty traffic gives rise to congestion problems. 
- These algorithms help in managing the bandwidth as well congestion of the network. 
- Network interfaces commonly use the traffic shaping process for preventing the discarding of the transmissions by the network’s traffic management functions. 
- This algorithm is based up on the analogy of a bucket with fixed capacity. 
Tokens are added to this bucket at a fixed rate and represent a single packet of a fixed size. 
- When the packet has to be checked whether it confirms to the predefined limits or not, first the bucket is checked if it contains sufficient tokens. 
- If sufficient tokens are there, tokens equal to the number of bytes in the packet are removed and the packet is transmitted. 
- If sufficient tokens are not there, the packet is said to be non-conformant and the number of tokens in the bucket remain unchanged.




Saturday, August 17, 2013

What is reverse path forwarding?

- RPF or reverse path forwarding is a common technique used for ensuring that the multicast packets are forwarded without any loops in the modern routers in multicast routing. 
- This technique is also used for the prevention of the IP address spoofing during the unicast routing.
- Multicast RPF or just RPF is not used alone. 
- Rather, it is used along with some multicast routing protocol. 
- There are various multicast routing protocols such as the PIM – SM, PIM – DM, MSDP and so on. 
- This is for ensuring that no loops are formed in forwarding the multicast packets. 
- Source address is used for deciding whether the traffic has to be forwarded or not in multicast routing. 
- On the other hand in unicast routing, this depends up on the destination address instead of source address. 
- This it achieves either through utilization of either the unicast routing table of the router or a multicast routing table that has been dedicated to the purpose. 
As and when a packet comes to the interface of the router, it searches in the networks list for the networks that can be reached through this interface. 
- This is nothing but the reverse path checking of the multicast packet.  
- If the appropriate routing entry is found for the multicast packet’s source IP address, it is said to pass the RPF check. 
- After this the packet is sent to all the participating interfaces in that particular multicast group.  
- If the packet fails at this RPF check, the packet is simply dropped. 
- Because of this, the packet forwarding has to be decided depending up on its reverse path. 
- Otherwise, the forward path can be used as usual. 
- Only those packets are forwarded by the RPF routers which pass this RPF check. 
- Passing this RPF check means breaking any loop that might otherwise exist. 
This is of critical importance in the multicast topologies that are redundant. 
This is so because it is possible for the same packet to come again and again to the same router through a number of multiple interfaces. 
- The RPF check is an integral part of the decision concerning forwarding of the packets. 
- Consider a router forwarding a packet from first interface to the second interface and also from second interface to the first one. 
- Thus, the same packet is received by the two packets, thus creating a common routing loop. 
- This loop will keep on forwarding the packets until the expiry of their TTLs. 
Even if the TTL expiry is considered, the best thing to do is to avoid the routing loops because they are a main cause of the temporary network degradation.

RPF check has the following underlying assumptions:
  1. The given unicast routing table is converged as well as correct.
  2. There is symmetry between the path that goes from sender to router and the path that comes back from the router to the sender.
- RPF check uses the unicast routing table as the fallback. 
- Therefore, if the first assumption is not satisfied, the check will fail. 
- But in case the second assumption is false, the multicast traffic is rejected by the RPF check save the traffic on the shortest path that exists between the sender and the router. 
- This results in a multicast tree that is non–optimal.
- The reverse path forwarding will not work if there are uni-directional links present in the network.


Unicast RPF: 
- This type of the reverse path forwarding is based up on the concept that the interface which does not originate traffic must not accept it. 
- It is good for the organizations to not allow private address propagation on their network until and unless they are continuously using it. 


Facebook activity