Sunday, 31 March 2013
Saturday, 30 March 2013
How Cloud Architecture Provides Transparency And Automation
- The tools allow the user to monitor report and manage the cloud architecture. It also allows them to share the applications using the cloud architecture.
- Automation is the key component of cloud architecture as it provides the services to increase the degree of the quality.
- It brings the capacity on demand and allows the requirements of the user to be met.
Friday, 29 March 2013
Advantages of Cloud Architecture To Businesses
- Zero infrastructure investment: Cloud architecture provide user to build large scale system with full hardware, machines, routers, backup and other components. So, it reduces the startup cost of the business.
- Just-in-time Infrastructure: It is very important to scale the infrastructure as the demand rises. This can be done by taking cloud architecture and developing the application in the cloud with dynamic capacity management.
- More efficient resource utilization: Cloud architecture provides users to use their hardware and resource more efficiently and utilize it in a better way. This can be done only by applications request and relinquish resources only when it is needed (on-demand).
Thursday, 28 March 2013
What are the Advantages of Using the Cloud?
- Cloud architecture uses simple APIs to provide easily accessible services to the user through the internet medium.
- It provides scale on demand feature to increase the industrial strength.
- It provides the transparency between the machines so that users don’t have to worry about their data. Users can just perform the functionality without even knowing the complex logics implemented in cloud architecture.
- It provides highest optimization and utilization in the cloud platform
Wednesday, 27 March 2013
Tuesday, 26 March 2013
Cloud Service Models In Cloud Architecture
- Infrastructure as a service: It provides the consumer with hardware, storage, network and other resources on rent. Through this consumer can deploy and run software using dedicated software. This includes the operating system and the applications that are associated with it.
- Platform as a service: it provides the user to deploy their software and application on the cloud infrastructure using the tools that are available with the operating system.
- Software as a service: it provides the users the ability to run its application on the cloud infrastructure and can access it from any client device using any interface like web browser.
- Business Process as a service: it provides any business process that is delivered through cloud service model using the internet and accesses the resources through the web portal.
Monday, 25 March 2013
Phases Involved In Cloud Architecture
- Launch phase: it launches the basic services and makes the system ready for communication and for application building
- Monitor phase: it monitors the services that is being launched and then manages them so that on demand the user will be able to get what he wants.
- Shutdown phase: it shutdown the services that are not required first and after all the services gets shutdown, and then it closes the system services.
- Cleanup phase: it clean up the left out processes and services that is being either broken or didn’t get shutdown correctly.
Sunday, 24 March 2013
What is The Difference Between SOA and Cloud Architecture
Service oriented architecture (SOA) is an architectural style that supports
service oriented methodology that is being added in the cloud architecture as a
mandatory component. Cloud architecture support the use of on-demand access to
resources and it provides lots of other facilities that are being found in SOA
as well. SOA makes these requirements optional to use. But, to get the full
functionality and more performance based efficiency there is a requirement for
the mixture of SOA and cloud architecture. |
Saturday, 23 March 2013
Friday, 22 March 2013
What Are The Difference Between Cloud Architecture And The Traditional Architecture
- Cloud architecture provides the hardware requirement according to the demand. It can run the processes when there is a requirement for it.
- Cloud architecture is capable of scaling the resources on demand. As, the demand rises it can provide infrastructure and the services to the users.
- Cloud architecture can manage and handle dynamic workloads without failure. It can recover a machine from failure and always keep the load to a particular machine to minimum.
Thursday, 21 March 2013
How Does Cloud Architecture Overcome the Problems Faced By Traditional Architecture
Cloud architecture provide large pool of dynamic resources that can be accessed any time whenever there is a requirement, which is not being given by the traditional architecture.
In traditional architecture it is not possible to dynamically associate a machine with the rising demand of infrastructure and the services.
Cloud architecture provides scalable properties to meet the high demand of infrastructure and provide on-demand access to the user.
Wednesday, 20 March 2013
Define Cloud Architecture
Cloud architecture is a software application that uses on demand services and access pool of resources from the cloud. Cloud architecture act as a platform on which the applications are built. It provides the complete computing infrastructure and provides the resources only when it is required. It is used to elastically scale up or down the resources according to the job that is being performed.
Tuesday, 19 March 2013
Monday, 18 March 2013
Explain CaaS as Used in Cloud Computing
CaaS is a terminology given in telecom industry as Communication as a Service.
The Voice-over-Ip (VoIP) follows a same delivery model.
CaaS can offer the enterprise user features such as desktop call control, presence, unified messaging, and desktop faxing.
In addition to the enterprise features, CaaS also has a set of services for contact center automation that includes IVR, ACD, call recording, multimedia routing (e-mail and text chat), and screen pop integration.
Sunday, 17 March 2013
What are Some of The Reasons for Call Drops?
- Slips occur in media.
- There is some antenna tilting.
- Phone goes out of range.
- Electric and mechanic tilts occur.
- Signal interference occurs.
Saturday, 16 March 2013
What is SNMP in Telecom?
- It stands for Simple Network Management Protocol
- SNMP is one of the UDP-based network protocols.
- Monitoring network-attached devices for various administrative attentions, is the main purpose of SNMP.
- SNMP is one of the protocol suites that are designed by Internet Engineering Task Force.
- It has application layer database schema, protocol, and a group of data objects.
- The basic messages, SET, GET, GET-NEXT, GET-RESPONSE and TRAP are the common messages that communicates between the SNMP manager and the SNMP agent.
Thursday, 14 March 2013
Did you Know that you can Download Wikipedia?
- The Wikipedia schema is at http://www.mediawiki.org/wiki/Manual:Database_layout
- The files are at http://dumps.wikimedia.org/enwiki/latest/ and you can download each table individually.
- More instructions at http://en.wikipedia.org/wiki/Wikipedia:Database_download
What is CMRR?
- It stands for Common Mode Rejection Ratio
- It is the measure of the device's tendency to reject noise from both input signals
Wednesday, 6 March 2013
What Is MTU?
- It stands for Maximum Transmission Unit
- It is used for passing communication protocol for a given protocol
- Network Interface Cards and some serial ports are associated with MTU parameters
- Higher level MTU comes with higher bandwidth efficiency
Tuesday, 5 March 2013
Describe Broadband Communication?
- It is basically High Speed Internet Access
- It is permanently connected unlike Dial-Up connections
- Telephone calls and internet access can occur at the same time
- Modulation is required in Broadband so that the signals are improved
Monday, 4 March 2013
Describe Protocol Testing and The Tools Used
The testing tools include:
- Nethawk- for SS7
- Wireshark- for SS7/IP
- Abacus5000- to test SIP
- Etherpeek- IP Testing
Sunday, 3 March 2013
Describe the Functionality of SS7
- SS7 is a global standard for telecom channel signalling
- The Common Channel Signalling System (SS7/C7) standard defines the various procedures and protocols for PSTN to exchange information over digital signalling network.
- SS7 provides call control and remote network management
- The messages are transformed from signalling points and SS7 signalling transfer points
Saturday, 2 March 2013
What Is VoIP?
- VOIP stands for Voice Over Internet Protocol
- It is commonly referred to as Broadband Telephony
- It is used to route voice conversations over the internet
- The telephonic signals are converted into digital signals
- The voice traffic is transmitted over IP based networks
- It deploys a protocol known as Session Control Protocol for controlling the set up and tear down of calls as well as audio codecs
Friday, 1 March 2013
Describe Synchronous and Asynchronous Transmission
- It does not use start and stop bits hence data transfer rate is quicker.
- It uses clock signals that are built at each component.
- Transmission at sending and receiving ends is sped up to increase synchronization.
- Continuous stream of data is sent between the two nodes
- Resynchronization is used to address lost bits.
- It uses check digits instead of parity bits for ensuring the byte is correctly being interpretted and received.
- It uses start and stop bits to signify the beginning bit of ASCII character that is to be transmitted
- Used to send data intermittently
- Start and stop bits are of opposite polarity
Thursday, 21 February 2013
What is Spectrum in Relations to Telecommunications?
Wireless signals used in telecom travel over space (air). These radio frequencies are what we refer to as spectrum. TV Broadcasts, Radio Broadcasts, GPS devices, mobile/ wireless phones use spectrum to transmit data/ info.
In most countries, there are organizations known as regulators tasked with management and allocation of spectrum to operators. These organizations include FCC (Federal Communications Commission) in the US, and CCK (Communications Commission of Kenya) are examples of regulators.
Wireless operators have to purchase different frequencies from the regulators because they cannot transmit signals over the same frequency in the same region at the same time. This because they will interfere with each other.
Wednesday, 20 February 2013
What is NMS?
NMS stands for Network Management System. It can be described as a combination of both hardware and software used by NOC engineers to monitor and administer a network at the Network Operation Center.
The NOC engineers help recover the alarms shown by the NMS provided that it is a software problem. If the problem is in the field such as in remote places, the NOC engineer communicates with the field engineers so that they can attend to the issues.
NMS->NOC->Field Engineer = Problem Solved
What are the Functions of a NOC Engineer?
The NOC (Network Operation Center) engineer performs a variety of tasks such as:
-Configuring and administering routers.
-Changing, installing and repairing firmware
-Resolving issues with computer networks whenever they are reported.
-They also monitor system conditions in server rooms
-Document any changes made to networks.
-Come up with a procedural manual for handling network related issues.
-Maintaining network security.
Tuesday, 19 February 2013
What is The Difference Between GSM and CDMA?
The main difference between the two technologies is in the way the subscriber accesses the allocated frequency.
In GSM : The frequency band is divided into several parts which are further subdivided into Timeslots which are then made available to the subscriber. This technology uses TDMA (Time Division Multiple Access) to generate the said timeslots which serve as a differentiating factor amongst the several subscribers.
In CDMA : The whole frequency band is available to the users. Each user is allocated a unique code in order to differentiate them hence the name Code Division Multiple Access. This info is decoded at the receiving end.
Monday, 18 February 2013
Modulation Technique used in GSM
What is GMSK Modulation?
Gaussian Minimum Shift Keying, also known as Gaussian filtered Minimum Shift Keying in full is a type of modulation used in a variety of digital radio communications systems.
One major advantage of GMSK is that it is able to carry digital modulation while being able to use the spectrum efficiently. This is not possible in other forms of phase shift keying in that the sidebands extend outwards from the main carriers hence they can cause interference to other radio communications systems using nearby channels.
Due to its efficient use of the spectrum, GMSK modulation has been used in a number of radio communications applications. The most notable one being in GSM Cellular Networks which has billions of subscribers worldwide.
The GMSK basics
GMSK modulation is derived from MSK, which is a type of Continuous-Phase Frequency-Shift Keying. One major disadvantage of PSK is that sidebands extend out from the carrier causing noise in the nearby channels. To overcome this problem, MSK and its derivative GMSK can be used.
GMSK is also known as Continuous Phase Scheme. In GMSK the frequency difference between logical one (1) and logical zero(0) is equal to half the data rate
.
GMSK can be generated through two methods :
a) Through filtering of signals using a Gaussian filter with a modulation index of 0.5. This method is not widely used because it is difficult to obtain a modulation index of exactly 0.5.
b) Another method is where the quadrature modulator is used (phase of the angle is 90° to another). This form is also known as I-Q Modulator since it is dependent on the In phase and quadrature of the signals. This enables the Modulation index to be set to 0.5 exact. The signal thus cannot be distorted since it is not carried in terms of amplitude elements.