Monday, October 14, 2013
What are secret-key and public-key signatures?
Posted by
Sunflower
at
10/14/2013 08:07:00 PM
0
comments
Labels: Algorithm, Application, Asymmetric, Authorization, Cryptography, digital, Encrypt, Encryption, Key, Message, Performance, Private, Public-key, Secret-key, Signals, Signature, Symmetric, System
![]() | Subscribe by Email |
|
Wednesday, September 25, 2013
What is meant by multiplexing?
Posted by
Sunflower
at
9/25/2013 02:58:00 PM
0
comments
Labels: Analog, Channels, Communication, Data, Demultiplexing, digital, Frequency, Messages, Multiple, Multiplexing, Multitasking, Networks, Performance, Physical, Process, Resources, Signals, Types
![]() | Subscribe by Email |
|
Monday, September 23, 2013
What is meant by Quality of Service provided by network layer?
Posted by
Sunflower
at
9/23/2013 10:37:00 PM
0
comments
Labels: Applications, Communication, Frequency, Networks, Packets, Parameters, Protocols, QOS, Quality, Quality of Service, Requirements, Services, Signals, Switch, Telecommunication, traffic, Users
![]() | Subscribe by Email |
|
Tuesday, September 10, 2013
What are the differences between bridges and repeaters?
- LAN
address of the node
- Bridge
interface
- Time
stamp
- Stale
table entries
Posted by
Sunflower
at
9/10/2013 03:20:00 PM
0
comments
Labels: Address, Analog, Bridges, Data, Devices, Differences, Forward, Frames, Hosts, Information, Interface, Layers, Network, Networking, Packets, Physical, Repeaters, Signals, Store, Telecommunications
![]() | Subscribe by Email |
|
Thursday, August 29, 2013
How can traffic shaping help in congestion management?
- Feedback
mechanism and
- The
control mechanism
Posted by
Sunflower
at
8/29/2013 06:13:00 PM
0
comments
Labels: Algorithms, Avoidance, Congestion, Control, Feedback, Information, Levels, Load, Management, Network, Operation, Overload, Policies, Signals, States, System, traffic, Traffic shaping, Under-load, User
![]() | Subscribe by Email |
|
Saturday, August 24, 2013
How can the problem of congestion be controlled?
- Exponential back off (used
in CSMA/ CA protocols and Ethernet.)
- Window reduction (used in
TCP)
- Fair queuing (used in
devices such as routers)
- The implementation of the
priority schemes is another way of avoiding the negative effects of this
very common problem. Priority schemes let the network transmit the packets
having higher priority over the others. This way only the effects of the
network congestion can be alleviated for some important transmissions.
Priority schemes alone cannot solve this problem.
- Another method is the
explicit allocation of the resources of the network to certain flows. This
is commonly used in CFTXOPs (contention – free transmission opportunities)
providing very high speed for LAN (local area networks) over the coaxial
cables and phone lines that already exist.
Ways to Classify Congestion Control Algorithm
- Amount as well as type of
feedback: This classification involves judging the algorithm on the basis
of multi-bit or single bit explicit signals, delay, loss and so on.
- The performance aspect taken
for improvement: Includes variable rate links, short flow advantage, fairness,
links that can cause loss etc.
- Incremental deployability: Modification is the need of sender only, modification is required by
receiver and the sender, modification is needed only by the router, and modification
is required by all three i.e., the sender, receiver and the router.
- Fairness criterion being
used: It includes minimum potential delay, max – min, proportional and so
on.
- End to end flow control
mechanism: This mechanism has been designed such that it can respond well
to the congestive collapse and thus behave accordingly.
- Mechanism in routers: This
mechanism is used for dropping or reordering packets under the condition
of overload.
Posted by
Sunflower
at
8/24/2013 11:25:00 PM
0
comments
Labels: Algorithms, Congestion, Congestion control, Control, Flow control, Network Congestion, Networking, Networks, Packets, Performance, Priority, Resources, Signals, Techniques, traffic, transmission, Transmit
![]() | Subscribe by Email |
|
Thursday, July 11, 2013
What properties are common between WDMA and GSM channel access protocols?
- Macro
- Micro
- Pico
- Femto
- Umbrella cells
- The base station of the GSM system and that of the WDMA both are connected to the core network of the GSM system in order to facilitate radio connectivity in the handsets.
- Therefore, the same core network is shared by both the technologies.
- Principles of the cellular radio system form the basis for the two technologies.
- There exists a correspondence between the WDMA radio network controller i.e., RNC and the GSM base station controller or BSC.
- The RBS (radio base station) of GSM system corresponds to the RBS of the WDMA.
- The basis for developing the lu – interface of WDMA was provided by the A-interface of the GSM technology.
- The only difference is of the new additional services that are offered by the WDMA.
- GSM makes use of time division multiplexing along with the radio functionality for the management of the time slots.
- On the other hand, WDMA makes use of the code division multiplexing for the same.
- This implies that the control as well as the hardware functions of both are different
Posted by
Sunflower
at
7/11/2013 01:30:00 PM
0
comments
Labels: Access, Channels, Communication, Global System for Mobile Communications, GSM, Multiplexing, Network, Protocols, Receiver, Sender, Signals, Wavelength, Wavelength Division Multiplexing Access, WDMA
![]() | Subscribe by Email |
|