Saturday 30 March 2013

How Cloud Architecture Provides Transparency And Automation

  • The tools allow the user to monitor report and manage the cloud architecture. It also allows them to share the applications using the cloud architecture. 
  • Automation is the key component of cloud architecture as it provides the services to increase the degree of the quality. 
  • It brings the capacity on demand and allows the requirements of the user to be met.

Friday 29 March 2013

Advantages of Cloud Architecture To Businesses

  • Zero infrastructure investment: Cloud architecture provide user to build large scale system with full hardware, machines, routers, backup and other components. So, it reduces the startup cost of the business.


  • Just-in-time Infrastructure: It is very important to scale the infrastructure as the demand rises. This can be done by taking cloud architecture and developing the application in the cloud with dynamic capacity management.


  • More efficient resource utilization: Cloud architecture provides users to use their hardware and resource more efficiently and utilize it in a better way. This can be done only by applications request and relinquish resources only when it is needed (on-demand).

Thursday 28 March 2013

What are the Advantages of Using the Cloud?

  • Cloud architecture uses simple APIs to provide easily accessible services to the user through the internet medium.
  • It provides scale on demand feature to increase the industrial strength.
  • It provides the transparency between the machines so that users don’t have to worry about their data. Users can just perform the functionality without even knowing the complex logics implemented in cloud architecture.
  • It provides highest optimization and utilization in the cloud platform

Tuesday 26 March 2013

Cloud Service Models In Cloud Architecture

There are 4 types of cloud service models available in cloud architecture:
  • Infrastructure as a service: It provides the consumer with hardware, storage, network and other resources on rent. Through this consumer can deploy and run software using dedicated software. This includes the operating system and the applications that are associated with it.


  • Platform as a service: it provides the user to deploy their software and application on the cloud infrastructure using the tools that are available with the operating system.


  • Software as a service: it provides the users the ability to run its application on the cloud infrastructure and can access it from any client device using any interface like web browser.


  • Business Process as a service: it provides any business process that is delivered through cloud service model using the internet and accesses the resources through the web portal.

Monday 25 March 2013

Phases Involved In Cloud Architecture

  • Launch phase: it launches the basic services and makes the system ready for communication and for application building
  • Monitor phase: it monitors the services that is being launched and then manages them so that on demand the user will be able to get what he wants.
  • Shutdown phase: it shutdown the services that are not required first and after all the services gets shutdown, and then it closes the system services.
  • Cleanup phase: it clean up the left out processes and services that is being either broken or didn’t get shutdown correctly.

Sunday 24 March 2013

What is The Difference Between SOA and Cloud Architecture

Service oriented architecture (SOA) is an architectural style that supports service oriented methodology that is being added in the cloud architecture as a mandatory component. Cloud architecture support the use of on-demand access to resources and it provides lots of other facilities that are being found in SOA as well. SOA makes these requirements optional to use. But, to get the full functionality and more performance based efficiency there is a requirement for the mixture of SOA and cloud architecture.

Friday 22 March 2013

What Are The Difference Between Cloud Architecture And The Traditional Architecture

  • Cloud architecture provides the hardware requirement according to the demand. It can run the processes when there is a requirement for it.
  • Cloud architecture is capable of scaling the resources on demand. As, the demand rises it can provide infrastructure and the services to the users.
  • Cloud architecture can manage and handle dynamic workloads without failure. It can recover a machine from failure and always keep the load to a particular machine to minimum.

Thursday 21 March 2013

How Does Cloud Architecture Overcome the Problems Faced By Traditional Architecture

  • Cloud architecture provide large pool of dynamic resources that can be accessed any time whenever there is a requirement, which is not being given by the traditional architecture. 

  • In traditional architecture it is not possible to dynamically associate a machine with the rising demand of infrastructure and the services. 

  • Cloud architecture provides scalable properties to meet the high demand of infrastructure and provide on-demand access to the user.

Wednesday 20 March 2013

Define Cloud Architecture

Cloud architecture is a software application that uses on demand services and access pool of resources from the cloud. Cloud architecture act as a platform on which the applications are built. It provides the complete computing infrastructure and provides the resources only when it is required. It is used to elastically scale up or down the resources according to the job that is being performed.

Monday 18 March 2013

Explain CaaS as Used in Cloud Computing

  • CaaS is a terminology given in telecom industry as Communication as a Service. 

  •  The Voice-over-Ip (VoIP) follows a same delivery model. 

  • CaaS can offer the enterprise user features such as desktop call control, presence, unified messaging, and desktop faxing. 

  • In addition to the enterprise features, CaaS also has a set of services for contact center automation that includes IVR, ACD, call recording, multimedia routing (e-mail and text chat), and screen pop integration.

Sunday 17 March 2013

What are Some of The Reasons for Call Drops?

A call drop occurs when:
  • Slips occur in media.
  • There is some antenna tilting.
  • Phone goes out of range.
  • Electric and mechanic tilts occur.
  • Signal interference occurs.

Saturday 16 March 2013

What is SNMP in Telecom?

  • It stands for Simple Network Management Protocol 
  • SNMP is one of the UDP-based network protocols.
  •  Monitoring network-attached devices for various administrative attentions, is the main purpose of SNMP.
  • SNMP is one of the protocol suites that are designed by Internet Engineering Task Force.
  • It has application layer database schema, protocol, and a group of data objects.
  • The basic messages, SET, GET, GET-NEXT, GET-RESPONSE and TRAP are the common messages that communicates between the SNMP manager and the SNMP agent.

Thursday 14 March 2013

Did you Know that you can Download Wikipedia?

I have to confess, I didn't know it either. Wikipedia can be downloaded in a relational form and put directly in a database. In fact, to be more precise, you can choose to download only the parts that you require. Check out these links:
Go ahead and try it!                                      

What is CMRR?

  • It stands for Common Mode Rejection Ratio
  • It is the measure of the device's tendency to reject noise from both input signals

Trust Apps to do Anything


Wednesday 6 March 2013

What Is MTU?

  • It stands for Maximum Transmission Unit
  • It is used for passing communication protocol for a given protocol
  • Network Interface Cards and some serial ports are associated with MTU parameters
  • Higher level MTU comes with higher bandwidth efficiency

Tuesday 5 March 2013

Describe Broadband Communication?

  • It is basically High Speed Internet Access
  • It is permanently connected unlike Dial-Up connections
  • Telephone calls and internet access can occur at the same time
  • Modulation is required in Broadband so that the signals are improved

Monday 4 March 2013

Describe Protocol Testing and The Tools Used

Protocol Testing is the testing functionality of the node to some standard message flow for compliance.Usually protocol testing is done by connecting a DUT (device under test) to other devices like routers/switches and configuring the protocol in it, then checking the packet structure of the packets sent by the devices, checking , protocol algorithm ,their performance,scalability.

The testing tools include:
  • Nethawk- for SS7
  • Wireshark- for SS7/IP
  • Abacus5000- to test SIP
  • Etherpeek- IP Testing

Sunday 3 March 2013

Describe the Functionality of SS7

  • SS7 is a global standard for telecom channel signalling
  • The Common Channel Signalling System (SS7/C7) standard defines the various procedures and protocols for PSTN  to exchange information  over digital signalling network.
  • SS7 provides call control and remote network management
  • The messages are transformed from signalling points and SS7 signalling transfer points

Saturday 2 March 2013

What Is VoIP?

  • VOIP stands for Voice Over Internet Protocol
  • It is commonly referred to as  Broadband Telephony
  • It is used to route voice conversations over the internet
  • The telephonic signals are converted into digital signals
  • The voice traffic is transmitted over IP based networks
  • It deploys a protocol known as Session Control Protocol for controlling the set up and tear down of calls as well as audio codecs

Friday 1 March 2013

Describe Synchronous and Asynchronous Transmission

Synchronous Transmission
  • It does not use start and stop bits hence data transfer rate is quicker.
  • It uses clock signals that are built at each component.
  • Transmission at sending and receiving ends is sped up to increase synchronization.
  • Continuous stream of data is sent between the two nodes
  • Resynchronization is used to address lost bits.
  • It uses check digits instead of parity bits for ensuring the byte is correctly being interpretted and received.
Asynchronous Transmission
  • It uses start and stop bits to signify the beginning bit of ASCII character that is to be transmitted
  • Used to send data intermittently
  • Start and stop bits are of opposite polarity

Thursday 21 February 2013

What is Spectrum in Relations to Telecommunications?


Wireless signals used in telecom travel over space (air). These radio frequencies are what we refer to as spectrum. TV Broadcasts, Radio Broadcasts, GPS devices, mobile/ wireless phones use spectrum to transmit data/ info.

In most countries, there are organizations known as regulators tasked with management and allocation of spectrum to operators. These organizations include FCC (Federal Communications Commission) in the US, and CCK (Communications Commission of Kenya) are examples of regulators.

Wireless operators have to purchase different frequencies from the regulators because they cannot transmit signals over the same frequency in the same region at the same time. This because they will interfere with each other.

Wednesday 20 February 2013

What is NMS?

NMS stands for Network Management System. It can be described as a combination of both hardware and software used by NOC engineers to monitor and administer a network at the Network Operation Center.

The NOC engineers help recover the alarms shown by the NMS provided that it is a software problem. If the problem is in the field such as in remote places, the NOC engineer communicates with the field engineers so that they can attend to the issues.

NMS->NOC->Field Engineer = Problem Solved

What are the Functions of a NOC Engineer?

The NOC (Network Operation Center) engineer performs a variety of tasks such as:

-Configuring and administering routers.
-Changing, installing and repairing firmware
-Resolving issues with computer networks whenever they are reported.
-They also monitor system conditions in server rooms
-Document any changes made to networks.
-Come up with a procedural manual for handling network related issues. 
-Maintaining network security.

Tuesday 19 February 2013

What is The Difference Between GSM and CDMA?


The main difference between the two technologies is in the way the subscriber accesses the allocated frequency.

In GSM : The frequency band is divided into several parts which are further subdivided into Timeslots which are then made available to the subscriber. This technology uses TDMA (Time Division Multiple Access) to generate the said timeslots which serve as a differentiating factor amongst the several subscribers.

In CDMA : The whole frequency band is available to the users. Each user is allocated a unique code in order to differentiate them hence the name Code Division Multiple Access. This info is decoded at the receiving end.

Monday 18 February 2013

Modulation Technique used in GSM

GSM uses a form of Modulation known as GMSK.
What is GMSK Modulation?
 
Gaussian Minimum Shift Keying, also known as Gaussian filtered Minimum Shift Keying in full is a type of modulation used in a variety of digital radio communications systems.

One major advantage of GMSK is that it is able to carry digital modulation while being able to use the spectrum efficiently. This is not possible in other forms of phase shift keying in that the sidebands extend outwards from the main carriers hence they can cause interference to other radio communications systems using nearby channels.

Due to its efficient use of the spectrum, GMSK modulation has been used in a number of radio communications applications. The most notable one being in GSM Cellular Networks which has billions of subscribers worldwide.

The GMSK basics

GMSK modulation is derived from MSK, which is a type of Continuous-Phase Frequency-Shift Keying. One major disadvantage of PSK is that sidebands extend out from the carrier causing noise in the nearby channels. To overcome this problem, MSK and its derivative GMSK can be used.

GMSK is also known as Continuous Phase Scheme. In GMSK the frequency difference between logical one (1) and logical zero(0) is equal to half the data rate
.
GMSK can be generated through two methods :

a) Through filtering of signals using a Gaussian filter with a modulation index of 0.5. This method is not widely used because it is difficult  to obtain a modulation index of exactly 0.5.
b) Another method is where the quadrature modulator is used (phase of the angle is 90° to another). This form is also known as I-Q Modulator since it is dependent on the In phase and quadrature of the signals. This enables the Modulation index to be set to 0.5 exact. The signal thus cannot be distorted since it is not carried in terms of amplitude elements.