Main menu

How to setup a Kubernetes cluster

The initial setup constists of a remote server running KVM in which three virtual machines were installed using Ubuntu 16.04. Each virtual machine has one network interface bridged to a physical network interface on the remote server, so that each VM is using a different interface of the server and IP addresses were asigned accordingly. At the end of this tutorial, you will have a kubernetes cluster that consist of one Kubernetes master and two Kubernetes nodes.
Read more...

Kerberos protocol operation

The authentication protocol Kerberos allows a number of computers to prove their identity among them safely over an insecure network. The operation of the protocol is based on the Needham-Schroeder protocol, which defines a ''trusted third party'' called Key Distribution Center (KDC). William Stallings in his book Fundamentals of Network Security: Applications and Standards, Second Edition (p.394) defines a KDC as follows: Authorized system to transmit temporary session key for users. Each session key is transmitted encrypted using a master key that the Key Distribution Center shares with the target user. The KDC can be seen as a set of…
Read more...

Femtocell's access methods

Femtocells are low-power and low-cost base stations that provide residential cellular services, providing a coverage of roughly 10 m [1]. They can integrate with mobile operator through a broadband connection, typically ADSL. In General, femtocell makes that the traffic from the home cellular system, deviates through the broadband connection, releasing the resource consumption of the macrocell. The 3GPP has introduced the concept of Closed Subscriber Group (CSG), which essentially identifies a group of subscribers who have access permission to one or more cells. Femtocells basically have three different operating modes: open access, closed access and a combination of both named…
Read more...

Femto-cells: others challenges in QoS managing

QoS managing An important point with regard to providing QoS is to reduce signaling and interference. With this, operators can properly manage resources without such problems, in order to improve the services provided to users. In this new scenario, the traffic generated from the UE to the eNodeB is deflected by an IP network before reaching the mobile network. The transmission of a information packet over an IP network is susceptible to delays, so the femto-cell may experience problems for obtaining an immune base time to jitter. Operators should ensure the concept of QoS in femto-cells, the parameters of these…
Read more...

What is VoIP?

The development of VoIP (Voice over Internet Protocol) technologies have been widely accepted by companies seeking lower costs for voice communications mainly in SMEs (Small and Medium Enterprises) environments. The term VoIP should not be confused with ToIP (Telephony over IP), VoIP refers to the technology required for voice communication over IP, while ToIP is a telephone service for users, which uses VoIP technology to give such service. VoIP allows voice transmission via an IP network, including those connected to the Internet. It involves digitizing voice signals, via a codec. The bandwidth consumption of such communication is directly related to…
Read more...
Subscribe to this RSS feed

Facebook TwitterRSS