Apr 14
QoS managing An important point with regard to providing QoS is to reduce signaling and interference. With this, operators can properly manage resources without such problems, in order to improve the services provided to users. In this new scenario, the traffic generated from the UE to the eNodeB is deflected by an IP network before reaching the mobile network. The transmission of a information packet over an IP network is susceptible to delays, so the femto-cell may experience problems for obtaining an immune base time to jitter. Operators should ensure the concept of QoS in femto-cells, the parameters of these…
Feb 24
The development of VoIP (Voice over Internet Protocol) technologies have been widely accepted by companies seeking lower costs for voice communications mainly in SMEs (Small and Medium Enterprises) environments. The term VoIP should not be confused with ToIP (Telephony over IP), VoIP refers to the technology required for voice communication over IP, while ToIP is a telephone service for users, which uses VoIP technology to give such service. VoIP allows voice transmission via an IP network, including those connected to the Internet. It involves digitizing voice signals, via a codec. The bandwidth consumption of such communication is directly related to…
Feb 03
In Part I of the Overview of AES (Advanced Encryption Standard) the most relevant aspects of AES and S-Box was described. Now, we discuss some details of the so-called transformations (ByteSub, ShiftRow, MixColumns and AddRoundKey) and the subkey generation process. To see more details in a more dynamic way the Rijndael Animation application is recommended.   ByteSub This transformation performs a byte-by-byte substitution in each of the state matrix elements, ie, the state matrix [aij] is replaced by the matrix [Sij], Figure # 1 shows this process. Using Rijndael Animation [1] application, it can be seen as the first byte…
Jan 27
The AES (Advanced Encryption Standard) algorithm [1], known as Rijndael, was so-named by its creators Joan Daemen and Vincent Rijmen, it is the current international standard for communications encryption since october 2000. This algorithm is characterized by a symmetric block cipher with variable key length, the default key length is 128 bits but can also be set to 192 or 256 bits.
Dec 30
The telecommunications network of an ISP (Internet Service Provider) is actually an interaction of various networks types, within LTE (4G) can be highlighted as an access network to the end user. The information flow reaches to the user through several infrastructures, on which the ISP carries data traffic, from this perspective, some necessary points will be discussed in order to ensure the Quality of Service (QoS) in such environments. From the point of view of LTE management, it is permitted to define profiles and classes of services, which are key points when negotiating QoS mobile requirements during the communication establishment,…
Page 2 of 4