Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles by Bhanu Priya
Page 60 of 106
What are the cellular network bandwidth capabilities and base station?
Wireless communications are particularly valuable for mobile applications, so wireless systems are frequently intended to cover enormous regions by parting them into numerous littler cells.This cellular methodology presents numerous challenges, for example, how to evade obstruction, or how to hand-over start with one cell then onto the next, while keeping up great help quality. Inclusion, capacity, obstruction, and range reuse are significant worries of cellular systems.Bandwidth capabilitiesIn a cellular system the bandwidth capabilities, each voice channel utilizes a 30 kHz frequency channel, these frequencies might be reused by a reused design, the framework is FDMA.The general capacity basically originates from ...
Read MoreWhat are the new developments of cellular networks?
Cellular network is fundamental technology for mobile phones, personal communication systems, wireless networking etc. The technology is planned to replace high power transmitter/receiver systems for cell radio phones. For data transmission, cellular networks use lower capacity, shorter range, and more transmitters.It is not a complete wireless technology because the cellular network refers to a large area of mobile networks that is used for network access.A mobile device is linked to its base station using an air-based interface and also using a physical and link layer protocol.Every base station is connected to the Mobile Switching Centre to help set up a ...
Read MoreWhat is evolutionary process of cellular networks?
Cellular network is fundamental technology for mobile phones, personal communication systems, wireless networking etc. The technology is planned to replace high power transmitter/receiver systems for cell radio phones. For data transmission, cellular networks use lower capacity, shorter range, and more transmitters.EvolutionPrior to the advent of cellular technology, there were few mobile telephone systems in the late 1940s such as car-based telephone systems. The push to talk technique was used here. Later, Mobile Telephone System (MTS) and Improved MTS (IMTS) were introduced to support a larger number of mobile stations.In 1979, the first 1G cellular network was launched in Japan. In ...
Read MoreDifferentiate between 4G and 5G cellular Networks
Cellular network is a fundamental technology for mobile phones, personal communication systems, wireless networking etc. The technology is planned to replace high power transmitter/receiver systems for cell radio phones. For data transmission, cellular networks use lower capacity, shorter range, and more transmitters.4G cellular network4G is referred as the 4th Generation to the cellular network technology which flourished over 3G. It has the International Telecommunication Union (ITU) in International Mobile Telecommunications (IMT) Advanced. This comprises IP telephony, Gaming services, high-definition mobile TV, video calling, Television in 3D etc.5G cellular network5Gs are the wireless network technologies which includes the millimetre wave bands ...
Read MoreWhat is digital certificate and digital signature?
Let us begin by learning about the digital certificate.Digital CertificateIt is basically a certificate issued digitally, issued to verify a user's authenticity i.e., verifying the user sending a message is who he or she claims to be, and also to provide the receiver with the means to encode a reply.Whoever wants to or an individual who wants to send encrypted messages applies for a digital certificate from a Certificate Authority (CA).Need of digital certificateThe digital certificate allows entities to share their public key in an authenticated way. They are used in initializing and establishing secure SSL (Secure Sockets Layer) connections ...
Read MoreWhat is ESP in tunnel and transport mode and the difference between AH and ESP?
Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used to hide the message content against data tampering.IPSec provides an open framework, such as SHA and MD5 for implementing industry standard algorithms.Encryption/decryption allows only the sender and the authorized receiver to make the data to be received in readable form and only after the integrity verification process is complete, the ...
Read MoreWhat is Encapsulating Security Payload(ESP)?
Encapsulating Security Payload (ESP) provides all encryption services in IPSec based on integrity for the payload and not for the IP header, confidentiality and authentication that using encryption, without authentication is strongly discouraged because it is insecure.Any translations in readable message format into an unreadable format are encrypted and used to hide the message content against data tampering.IPSec provides an open framework, such as SHA and MD5 for implementing industry standard algorithms.Encryption/decryption allows only the sender and the authorised receiver to make the data to be received in readable form and only after the integrity verification process is complete, the ...
Read MoreWhat is Authentication Header (AH) format?
Authentication Header (AH) is used to provide integrity and authentication to IP datagrams. Replay protection is also possible. The services are connectionless, that means they work on a per-packet basis.AH is used in two modes as follows −Transport modeTunnel modeAH authenticates are the same as IP datagram. In transport mode, some fields in the IP header change en-route and their value cannot be predicted by the receiver. These fields are called mutable and they are not protected by AH.Mutable IPv4 fieldsThe mutable IPv4 fields are as follows −Type of service (TOS)FlagsFragment offsetTime to live (TTL)Header checksumTo protect these fields, tunnelling ...
Read MoreWhat is a DNS Name Resolution and explain the cache poisoning attack in DNS?
Let us understand what the domain name system (DNS) is.Domain Name SystemAll the web servers connected to the internet have a unique IP address in textual form. Now, the process of translating the textual form into an IP address is called DNS or DOMAIN NAME SERVICE name resolution.Theoretically during the name resolution process the program that wishes for the name translation contacts a DNS server that returns the translated IP address, but in reality the entire translation may not occur at a single DNS server, rather the DNS server contacted first will recursively call upon other DNS servers to complete ...
Read MoreDifferentiate between domain and domain name server and components of DNS
The main difference between domain and domain name server (DNS) is that the domain could be a piece of string that helps to spot a specific web site while the DNS (Domain Name System) could be a server that translates the domain to the corresponding ip address to supply the specified webpage.There are several websites on the globe Wide internet (WWW) as well as education, e-commerce, government, and entertainment sites. It’s necessary for every website to have its own website name. It helps to spot the web site.The domain is exclusive to a specific user and others cannot use that ...
Read More