#NetworkAnalysis

20 posts loaded — scroll for more

Text
mitsdedistance
mitsdedistance

Network Analysis in Project Management

Network Analysis in Project Management explains how techniques like PERT and CPM help managers plan, schedule and control projects effectively. By mapping task dependencies and identifying the critical path, it ensures better time management, optimal resource utilization and on-time project delivery.

Text
apekshatelecom
apekshatelecom

Everything You Need to Know About 5G Protocol Testing

Introduction: Why 5G Protocol Testing Is the Backbone of Modern Networks

The global rollout of 5G has completely changed how telecom networks are designed, deployed, and maintained. Unlike earlier generations, 5G is not just a faster radio technology. It is a complex, software-driven ecosystem that supports mission-critical services, massive IoT deployments, autonomous systems, and ultra-low-latency applications. At the center of this ecosystem lies protocol behavior. This is exactly why Everything You Need to Know About 5G Protocol Testing has become one of the most important knowledge areas in the telecom industry today.

Within the first stages of 5G deployment, operators across the world discovered a hard truth. Network failures were rarely caused by hardware faults. Instead, they originated from protocol mismatches, incorrect signaling flows, interoperability issues, or non-compliance with 3GPP standards. These issues often stayed hidden during light traffic and appeared only under real-world load, roaming scenarios, or vendor interworking conditions.

5G protocol testing exists to prevent these failures before customers experience them. It validates not just whether a network works, but whether it works correctly, securely, and consistently under every possible condition. For students, engineers, and professionals, mastering this domain is no longer a niche skill—it is a career-defining capability.

Table of Contents

The Evolution of Telecom Protocols

Understanding 5G Network Architecture

What Is 5G Protocol Testing

Why Protocol Testing Is Critical in 5G

Detailed Breakdown of the 5G Protocol Stack

Control Plane vs User Plane Testing

Types of 5G Protocol Testing

Testing Tools and Environments

Common Protocol Failures in Live Networks

Career Scope and Job Roles

Role of Apeksha Telecom

Importance of Bikas Kumar Singh

Telecom Gurukul and Skill Readiness

Future of Protocol Testing

Conclusion

FAQs

The Evolution of Telecom Protocols: From Hardware to Software

To truly understand protocol testing, you must first understand how telecom protocols evolved.

In 2G and early 3G networks, protocols were tightly coupled with hardware. Network elements were rigid, changes were slow, and testing cycles were predictable. Engineers validated signaling mostly during initial deployment, and networks remained stable for years.

4G LTE introduced packet switching, IP-based transport, and higher signaling complexity. Protocol testing became more important, but networks were still largely hardware-centric.

5G changed everything.

5G networks are:

Cloud-native

Virtualized

Software-defined

Continuously updated

Protocols now operate inside containers, virtual machines, and distributed cloud environments. Updates can happen weekly or even daily. This dynamic nature makes protocol testing a continuous necessity rather than a one-time activity.

 

Understanding the 5G Network Architecture

5G architecture is fundamentally different from legacy networks. It is service-based, modular, and highly flexible.

Key architectural components include:

Radio Access Network (RAN)

5G Core (5GC)

Edge and cloud infrastructure

Network slicing framework

Each component communicates through standardized interfaces defined by 3GPP. These interfaces rely on precise protocol behavior. A single deviation can impact service continuity, security, or performance.

Protocol testing ensures that:

Each network function behaves as expected

Interfaces exchange correct messages

Error handling follows standards

Security procedures are enforced correctly

What Is 5G Protocol Testing? (In Practical Terms)

5G protocol testing is the systematic verification of signaling procedures, message sequences, timers, state transitions, and error scenarios across the 5G protocol stack.

It answers critical questions such as:

Does the UE register successfully under all conditions?

Are authentication and key exchange procedures secure?

Does session management behave correctly during mobility?

How does the network respond to abnormal or unexpected messages?

Unlike generic testing, protocol testing focuses on behavior, not just outcomes. A call that connects successfully may still be protocol-noncompliant. Such hidden issues can later cause widespread failures.

This is why professionals who master Everything You Need to Know About 5G Protocol Testing play a preventive role rather than a corrective one.

Why Protocol Testing Is Critical in 5G Networks

Protocol testing is critical because 5G networks support services where failure is not acceptable.

Consider these scenarios:

A remote surgery application cannot tolerate signaling delays

Autonomous vehicles require uninterrupted connectivity

Industrial IoT systems depend on deterministic behavior

In such cases, even a minor protocol deviation can cause catastrophic consequences.

Protocol testing ensures:

Standards compliance

Interoperability across vendors

Secure communication

Predictable network behavior

Without rigorous protocol testing, 5G networks would be fast—but unreliable.

Detailed Breakdown of the 5G Protocol Stack

Understanding the stack is essential for effective testing.

Physical Layer (PHY)

The PHY layer manages signal transmission and reception. While much of PHY testing involves RF engineering, protocol testing validates:

Measurement reporting

Power control signaling

Timing alignment procedures

MAC Layer

The MAC layer handles scheduling, prioritization, and resource allocation. Protocol testing ensures:

Correct scheduling decisions

Proper handling of HARQ processes

Latency-sensitive traffic prioritization

RLC Layer

RLC manages segmentation, reassembly, and retransmissions. Errors here often result in throughput degradation or latency spikes.

PDCP Layer

PDCP is security-critical. Protocol testing validates:

Encryption activation

Integrity protection

Header compression logic

RRC Layer

RRC controls connection setup, reconfiguration, and mobility. Most signaling failures are detected at this layer.

NAS Layer

NAS manages registration, authentication, and session management between UE and core network. Any flaw here directly impacts user experience.

Control Plane vs User Plane Protocol Testing

Protocol testing is divided into two major domains.

Control Plane Testing

Focuses on signaling procedures such as:

Registration

Authentication

Session establishment

Mobility management

Failures here result in call drops, registration issues, or service denial.

User Plane Testing

Validates data flow behavior, QoS handling, and traffic steering. Issues here affect throughput and latency.

Both planes must work together seamlessly for a reliable network.

Types of 5G Protocol Testing

Protocol testing is multi-dimensional.

  1. Conformance Testing

Ensures strict adherence to 3GPP specifications. Required for certification and global deployment.

  1. Interoperability Testing

Validates communication between equipment from different vendors. This is critical in real-world networks.

  1. Performance-Related Protocol Testing

Checks signaling efficiency under load and stress conditions.

  1. Security Protocol Testing

Focuses on authentication, encryption, and attack resistance.

Each type addresses a different risk category.

Testing Tools and Environments

Professionals use:

Protocol analyzers

Call flow tracing tools

Message decoders

Virtualized 5G cores

Cloud-based testbeds

Hands-on experience with these tools defines employability.

Common Protocol Failures in Live 5G Networks

Some frequent issues include:

Registration rejection due to timer mismatches

Session drops during handover

Security context synchronization failures

Vendor interoperability mismatches

Protocol testing identifies these issues early.

Career Scope in 5G Protocol Testing

Protocol testing professionals work as:

Protocol Test Engineers

Core Network Validation Engineers

RAN Test Specialists

Interoperability Engineers

Mastering Everything You Need to Know About 5G Protocol Testing provides long-term career stability and growth.

Role of Apeksha Telecom in Building Protocol Testing Careers

In the telecom industry, knowledge alone does not build a career—applied skill does. This is where Apeksha Telecom becomes highly relevant for anyone aiming to work in 5G protocol testing. Many learners struggle because they understand concepts theoretically but fail to apply them when faced with real signaling traces, logs, and failure scenarios. Apeksha Telecom addresses this exact gap.

Apeksha Telecom’s approach focuses on protocol-first learning. Instead of starting with tools blindly, learners are guided to understand why a protocol behaves in a certain way, what message sequence is expected, and how deviations occur in live networks. This mindset is critical in protocol testing roles where engineers must identify root causes, not just symptoms.

Key strengths of Apeksha Telecom include:

Emphasis on real 5G signaling flows

Exposure to live network scenarios

Focus on 3GPP-aligned testing use cases

Career-oriented learning paths

For freshers, this builds confidence. For working professionals, it enables career transitions into protocol testing, validation, and interoperability roles. This practical exposure is what recruiters look for when hiring protocol engineers.

 

Why Bikas Kumar Singh Is Important for Your Career in the Telecom Industry

In telecom, confusion is common. There are too many technologies, too many tools, and too many opinions. What most learners lack is clarity. This is where mentorship matters, and this is why Bikas Kumar Singh is widely respected in the telecom learning ecosystem.

Bikas Kumar Singh is known for simplifying complex telecom concepts without diluting their depth. His mentorship philosophy focuses on:

Strong fundamentals before specialization

Long-term career thinking instead of short-term hype

Real industry expectations, not marketing narratives

For protocol testing aspirants, his guidance helps answer critical questions:

Should I start with RRC, NAS, or core protocols?

How do I move from theory to real logs?

What skills matter most for interviews and projects?

Many professionals credit his mentorship for helping them avoid wrong learning paths and wasted effort. In an industry as deep as telecom, having the right mentor can save years of confusion.

How Telecom Gurukul Bridges the Skill Gap in Protocol Testing

Academic education often teaches what protocols are, but not how they behave in live networks. Telecom Gurukul exists to bridge this exact gap between academia and industry.

Telecom Gurukul focuses on:

Industry-aligned telecom curricula

Mentor-led learning instead of recorded-only content

Career-focused skill progression

For protocol testing learners, Telecom Gurukul helps convert textbook understanding into job-ready capability. Learners gain exposure to real-world call flows, failure analysis, and testing logic that mirrors industry projects.

This ecosystem approach—learning, mentoring, and career alignment—creates professionals who are ready for real telecom roles, not just certifications.

Future of 5G Protocol Testing and the Road to 6G

Protocol testing will become even more critical as networks evolve. The future of telecom is not just about connectivity—it is about intelligence.

Emerging trends include:

AI-driven network optimization

Autonomous network functions

Network slicing at scale

Ultra-low-latency industrial use cases

Each of these introduces new protocol behaviors that must be validated. Testing will no longer focus only on compliance, but also on decision-making logic within the network.

As research into 6G begins, protocol testers will play a role in shaping standards themselves. This makes protocol testing not just a job, but a long-term, future-proof career path.

Understanding Everything You Need to Know About 5G Protocol Testing today prepares professionals for the networks of tomorrow.

FAQs

Q1. Is 5G protocol testing suitable for freshers?

Yes. Freshers with electronics, telecom, IT, or computer science backgrounds can enter protocol testing with structured learning and hands-on exposure.

Q2. Do I need coding skills for protocol testing?

Basic scripting helps, but strong protocol understanding is far more important. Many protocol roles focus on analysis rather than development.

Q3. Which protocols should I learn first for 5G testing?

Start with RRC and NAS, then move to core network protocols. This builds a strong foundation.

Q4. Is protocol testing a long-term career option?

Absolutely. As networks grow more complex, protocol testing demand will continue to rise.

Q5. Why is protocol testing more important in 5G than in 4G?

Because 5G networks are cloud-native, dynamic, and service-based. This increases protocol complexity and risk.

Learning Everything You Need to Know About 5G Protocol Testing gives you a long-term advantage in this evolving industry.

Conclusion: Why 5G Protocol Testing Defines Telecom Careers

Telecom networks may look simple to end users, but behind the scenes, they rely on thousands of protocol interactions working flawlessly. When these interactions fail, services fail. That is why protocol testing is no longer optional—it is foundational.

By mastering Everything You Need to Know About 5G Protocol Testing, you gain the ability to protect networks, ensure reliability, and build a stable, high-growth telecom career. Whether you are a student, a fresher, or a working professional, protocol testing gives you relevance, resilience, and long-term value in the telecom industry.

Now is the time to move beyond theory and start building real protocol expertise.

Suggested Internal Links (www.telecomgurukul.com)

https://www.telecomgurukul.com/5g-training

https://www.telecomgurukul.com/telecom-careers

Suggested External Links (Authoritative Sources)

Text
mitsdedistance
mitsdedistance

Network Analysis in Project Management

Network analysis in project management provides a clear roadmap for project success. By mapping task dependencies, identifying the critical path, and optimizing timelines, it empowers teams to improve efficiency, minimize delays, and achieve project goals with precision.

Text
infosectrain03
infosectrain03
Photo
pulipuli
pulipuli

好,正式確定了社會網路分析取代文字雲的分析價值。

—-

# 脈絡 / Context

最近為了分析學生在課堂的討論內容,我感覺到傳統的文字雲的上限。

文字雲終歸只能呈現出詞頻的數量,但是它不能展現出文字之間的脈絡,也就很難讓人瞭解文本中隱含的模式。

https://blog.pulipuli.info/2017/03/jieba-js-online-chinese-analyzer-jieba.html#postcatajieba-js-online-chinese-analyzer-jieba.html0_anchor4。

於是我改求助於社會網路分析。

我將斷詞後的詞彙視為節點(node),出現在同一個段落的詞彙視為彼此連結的邊(edge)。

詞彙出現的頻率、詞彙與詞彙中連結的頻率,則作為權重設定到節點和邊上。

https://js.cytoscape.org/。

接著使用Cytoscape.js繪製社會網路分析圖,利用fcose力引導排版來繪製網路圖。

結果出乎意外地令人感到滿意。

出現頻率較高的詞彙,因為權重和邊的關係,在力引導排版下很容易出現在網路圖的中間。

加上結合權重調整的文字大小,使得出現頻率較高的詞彙更容易被看見。

這樣一來就已經達到了文字雲可以呈現的效果。

—-

# 社會網路分析 / Social network analysis。

—-

你覺得社會網路分析跟文字探勘結合還可以怎麼用呢?靈感蒐集中!快快留言吧!。

—-

#Cytoscape #JavaScript #NetworkAnalysis

看看網頁版全文 ⇨ 不只文字雲,而是文字網路雲 / Word Network Graph
https://blog.pulipuli.info/2023/02/word-network-graph.html

photo
Photo
fiscogenova
fiscogenova

Il Fisco ora controllerà tutto: ecco chi sono i primi a rischio

Arriva in soccorrso l'intelligenza artificiale ad aiutare l'Agenzia delle Entrate contro gli evasori fiscali: più di 300 verifiche al giorno per 3 anni!!

“Non si assumeranno più fiscalisti ma ingegneri elettronici”… sarà vero?

Da quando il Consiglio dei Ministri ha dato via libera al Recovery plan si vuole “salvaguardare” al meglio il patrimonio investito, 248 MILIARDI di €, contro questi “furbetti fiscali!”

Chi sono i soggetti presi di mira più facilmente?

Si penserebbe a chi movimenta grosse cifre di denaro senza aver fatto alcuna dichiarazione dei redditti per poi comprare beni mobili di lusso… e… invece no…

I primi ad essere messi sotto controllo saranno i cittadini che hanno richiesto ed usufruito dei vari bonus erogati a seguito del blocco totale delle attività!

In campo scenderanno Machine learning e e la network analysis…

Macchine artificiale ok… ma che almeno le Normative siano anche più chiare…

Ma anche per oggi non vi vogliamo tediare ulteriormente.. se volete ulteriori info, contattateci al 3923997758 #fiscogenova #commercialistagenova #sabrinaromano #machine learning #networkanalysis #intelligenzaartificiale #evasorifiscali #fiscofacile #evasionefiscale #agenziaentrate (presso Studio Commercialista Romano Sabrina)
https://www.instagram.com/p/CPBT1zmJUds/?utm_medium=tumblr

photo
Photo
philearning
philearning

Network Analysis and Synthesis - This comprehensive text on Network Analysis and Synthesis is designed for undergraduate students of Electronics and Communication Engineering, Electrical and Electronics Engineering, Electronics and Instrumentation Engineering, Electronics and Computer Engineering and Biomedical Engineering. The book will also be useful to AMIE and IETE students.

Buy Now: https://bit.ly/3hfMVj3
#NetworkAnalysis #Synthesis #Electronics #Engineering #Biomedical #ComputerEngineering
https://www.instagram.com/p/CBVjVLLHJ6S/?igshid=1u4kc5hz3jndl

photo
Video
paulbradshaw
paulbradshaw
Text
cendat
cendat

Análisis de redes en Twitter: tweets con mención a tres candidatos presidenciales en Panamá. 23 de Abril del 2019.

Utilizando el paquete SocialMediaLab de R, se realizó la extracción de los  tweets con mención a alguno de los tres candidatos analizados: @NitoCortizo, @RicardoLombanaG y @romuloroux. Los tweets utilizados, corresponden a los últimos 250 para cada candidato, antes de las 9 am del 23 de abril del 2019.

Por medio de SocialMediaLab se crearon las redes dirigidas para cada uno de los candidatos y por medio del Software Gephi se construyeron los grafos (gráficos de redes con nodos y aristas dirigidas). También con Gephi se calcularon algunas estadísticas de los grafos. Además se utilizó Excel para presentar algunas tablas.

El análisis de redes nos permite visualizar las interacciones de diferentes cuentas de Twitter, así como calcular algunas estadísticas de esas redes y también construir agrupaciones de cuentas (cluster de nodos). Esto permite determinar personas o cuentas influyentes en las redes asociadas a algunos candidatos. Las agrupaciones de cuentas además permite analizar los textos de los tweets enfocados en cada uno de los grupos y determinar “influenciadores” positivos o negativos. Esta última parte la abordaremos en un post posterior. En este analizaremos la topología de las redes y algunos estadísticas.


Para aclarar algunos términos del análisis de redes:

image

Los resultados son:

image

Se observa que la mayor cantidad de nodos la obtiene @RicardoLombanaG, seguido por @romuloroux y luego @NitoCortizo; en aristas, la mayor cantidad es para @romuloroux, seguido por @RicardoLombanaG y finalmente @NitoCortizo. 

Luego revisaremos las mediciones de Modularidad y Longitud Media del Camino.


@NitoCortizo

El gráfico para @NitoCortizo, muestra una amplia influencia de su nodo y varios sub-comunidades con nodos con menor influencia:

image
image

La red se compone de 19 nodos, algunos muy pequeños pero resaltan comunidades “lideradas” por NitoCortizo, RicardoLombanaG, tvnnoticias, DavidSaied, LRCV_Diputado, mendozajulioh27, olivaresfrias, romuloroux, juancanavarro, sembradoresdefu.

image
image


@RicardoLombanaG

La red de RicardoLombanaG, muestra una gran cohesión hacia su persona, con subcomunidades menos dominantes:

image
image

La red de RicardoLombanaG al contener mayor cantidad de nodos, genera más subcomunidades, las más relevantes: TReporta, tvnnoticias, cristal_lawson, eortega9217, bel_cer, informapty507, BlandonJose, asdrubal_ulloa.

image
image
image


@romuloroux

Esta red presenta diferencias con respecto a las dos anteriores: tiene un alto grado de centralidad en romuloroux, pero a la vez presenta dos nodos de gran influencia en la red: su candidato a la vicepresidencia LuisCasis20 y la cuenta de la emisora de radio Oeste985. También de destaca una fuerte presencia del nodo de NitoCortizo.

image
image

A diferencia de las redes de los otros dos candidatos, la red de romuloroux presenta dos nodos de gran relevancia: LuisCasis20, Oeste985, NitoCortizo, CaDemocratico y BlandonJose. Seguidos de otros nodos de fuerte influencia: nexnoticias, gabycarrizoj y JCasis25.


image
image

Aunque la disposición aplica para estudios por muestreo (encuestas), dado que  la Ley de Panamá exige que cualquier publicación relacionada con las próximas elecciones, aclaramos que este NO es un estudio de carácter científico.

Photo
godigitalglobally-blog
godigitalglobally-blog

🤣🤣🤣 Here’s your Saturday’s dose of laughs. Our favorite joke for today!
😈😈😈 When is Saturday evening and you are still in the office working and didn’t find the solution yet….and someone say that you are in a “bad mood”!!!
NO! I’m not in a bad mood,…..I’m in a “Hey, if I get the opportunity to punch someone in the face today, I’m taking it” mood! And being in this mood is much more dangerous than me being in a “bad mood”.
#NetworkAnalysis through #PythonProgrammingLanguage and #GephiTool #GoDigitalCyprus #seocyprus
https://www.instagram.com/p/Bu0KEcAlrIF/?utm_source=ig_tumblr_share&igshid=xhmcgmekoa70

photo
Photo
godigitalglobally-blog
godigitalglobally-blog

🤣🤣🤣 Here’s your Saturday’s dose of laughs. Our favorite joke for today!
😈😈😈 When is Saturday evening and you are still in the office working and didn’t find the solution yet….and someone say that you are in a “bad mood”!!!
NO! I’m not in a bad mood,…..I’m in a “Hey, if I get the opportunity to punch someone in the face today, I’m taking it” mood! And being in this mood is much more dangerous than me being in a “bad mood”.
#NetworkAnalysis through #PythonProgrammingLanguage and #GephiTool #GoDigitalCyprus #seocyprus
https://www.instagram.com/p/Bu0KCSKl-0J/?utm_source=ig_tumblr_share&igshid=mtumpfp0pqt2

photo
Photo
godigitalglobally-blog
godigitalglobally-blog

🤣🤣🤣 Here’s your Saturday’s dose of laughs. Our favorite joke for today!
😈😈😈 When is Saturday evening and you are still in the office working and didn’t find the solution yet….and someone say that you are in a “bad mood”!!!
NO! I’m not in a bad mood,…..I’m in a “Hey, if I get the opportunity to punch someone in the face today, I’m taking it” mood! And being in this mood is much more dangerous than me being in a “bad mood”.
#NetworkAnalysis through #PythonProgrammingLanguage and #GephiTool #GoDigitalCyprus #seocyprus
https://www.instagram.com/p/Bu0J_unl9cg/?utm_source=ig_tumblr_share&igshid=1fij0r234ugee

photo
Text
smartcherryposts
smartcherryposts

Network Security

Network Security

It Is Very Important To Have Security To Your Computer Network. Network Security Is Nothing But Giving Security For The Network To Avoid Unauthorised Access.

Absolute Security (Total Security)


If You Unplug Your Computer From The Network Or If You Switch Off The Power Supply Or If You Lock You’re And Put’s Your Computer In Safe Mode, Your Computer Is Secured.

Absolute Access (Total Access)


A Computer With Absolute Access Is Extremely Convenient To Use: It’s Simply There And Will Do Whatever We Tell To The Computer, Without Questions, Without Authorization, Passwords, Or Any Other Mechanism.

This Is Not Much Practical Either: The Internet Is A Bad Neighbourhood Now If Some Unknown Person Tells Your Computer To Destroy Itself, It Will Do.

So Every Organisation Needs To Decide For Itself Where Between The Two Extremes Of Total Security And Total Access They Need To Be. A Policy Need To Articulate This, And Then Define How That Will Be Enforced With Practices And Such. Everything That Is Done For Security, Then, Must Enforce That Policy Uniformly.

 

 

 

 

 

Read the full article

Text
smartcherryposts
smartcherryposts

Network Works

Network Works

Network Works Using HUB, SWITCH, ROUTER. All These Three Devices Are Similar But There Is A Difference In The Way They Handle Data. So Lets Understand About These Three.

HUB


The Purpose Of A Hub Is To Connect All Of Your Network Devices Together On A Internal Network. It Is A Device That Helps Multiple Ports That Accepts Ethernet Connection From Network Devices. A Hub Is Considered Not To Be Intelligent.

Because It Does Not Filter Any Data Or Has Any Intelligence As To Where The Data Is To Be Sent. The Only Thing A Hub Knows Is If A Device Is Connected To One Of Its Ports So When A Data Packet Arrives To One Of Its Ports It Copies To All Of The Other Ports.

So All The Devices On That HUB Sees That Data Packet.

If The Data Packet Comes To Its One Port, The Data Packet Rebroadcasts That Data To Every Port The Device Connected To It.

 

If The Computer 1 Only Wants To Communicate With Computer 3, The Computer 3 And Computer 4 Receives The Data Same Data Sent To Computer 3.

So When This Happens, It Not Only Creates Security Concerns, It Also Creates Unnecessary Traffic Which Wastes Bandwidth.

 

SWITCH


SWITCH Is Very Similar To A HUB, It Is Also A Device Which Has Multiple Ports That Accepts Ethernet Connection From Network Devices But Unlike A HUB A SWITCH Is Intelligent.

A SWITCH Can Actually Learn The Physical Addresses Of The Devices That Are Connected To It.

And It Stores These Physical Addresses Called MAC Addresses In Its Table.

So When A Data Packet Is Sent To A SWITCH, It Is Only Directed To The Intended Destination Port. Unlike A HUB Were HUB RebraodCast The Data To Every Port.

 

If Computer 1 Wants To Send Data Packet To Computer 3, The Data Packet Arrives At The SWITCH And Switch Will Look At Its Table  MAC Addresses And Matching Ports And Deliver The Data To The Correct Port And The Data Packet Will Go To That Computer.

So That Is The Major Difference Between A HUB And A Switch.

So As A Result SWITCH Is Far More Preferred Over HUBS Because They Reduce Any Unnecessary Traffic On The Network.

 

Difference Between HUB And SWITCH


A HUB Only Detects A Device Is Physically Connected To It.SWITCH Can Detect Specific Devices Connected To It Because It Keeps A Record Of MAC Addresses Of Those Devices.

HUBS And SWITCHES Are Used To Exchange Data Within A Local Area Network.

For Example Such As Your Home Network Or In A Bussiness. They Are Not Used To Exchange Data Outside Their Own Network. Such As Out On The Internet.

Because To Exchange Or Route Data Out Side Their Own Network To The Other Network Such As Out On The Internet.

A Device Needs To Be Able To Read IP Addresses And HUBS And SWITCHES Do Not Read IP Addresses.So Thats Where Teh Router Comes In.

ROUTER


Router Does What Exactly What Its Name Implies.A Router Is A Device Which Routes And Forwards Data From One Network To Another Network Based On Their IP Address.

When A Data Packet Is Received From The Router, The Router Inspects The Data’s IP Address And Determines If The Packet Was Meant For Its Own Network Or If It Meant For Another Network.

If The Router Determines That The Data Packet For Its Own Network, It Receives It. But If It is Not Meant For Its Own Network It Sends It Off To Another Network.

So A Router Is Essentially A Gateway Of A Network.



If You Observe The Above Picture Two Computers(A Network) Connected To A Router And Router Receives Different Ip Addresses, The Different Colors(Yellow, Green, Orange, Red) Are IP Addresses.

The Network Is Red, Router Only Receives Red Colored Packets And Sends To Two Computers(Network) From The Internet.

All The Other Colors(IP Addresses) Are Rejected By The Router Because Those Are Not Intended For This Network, The IP Addresses Are Not Meant For This Network.

 



If You See The Above Picture, There Are Four Routers Over The Internet. There Are Four Networks Each Network Receives Different Color Packets.

Different Color Means Different IP Address.

Each Network Is Exchanging Information Within Their Own Network.

If The Red Color Receiving Computer Wants To Send Data To Green Color Receiving Computer, First It The Data Packet Reaches To It Own Router And Then Reaches To Router Of Blue Color And Then Sent To The Computer Or Blue Color.

Hubs And Switches Are Used To Create Networks, Routers Are Used To Connect Networks.

 

BRIDGE


BRIDGES Are Used To Divide A Network Into Separate Collision Domains. For Example, If You Observe The Below Network The Bridge Is Placed In Between And It Separated 3 Computers On Left And 4 Computers On The Right, To Reduce Unnecessary Traffic Between Two Segments(3 Computers And 4 Computers). By Filtering The Data Based On Their MAC Address, The Bridge Only Allows The Data To Cross Over If It Meets The Required MAC Address Of The Destination. Because The BRIDGE Keeps The Record Of All The MAC Addresses Which Are Connected To It.

It Also blocks All Data From Crossing Over If It Fails To Meet This Requirement.



GATEWAYS


A Gateway Can Be Defined As A Device That Joins Two Networks Together. They Interconnect Networks With Different Or Incompatible Communication Protocols.

A Gateway However Doesn’t Change The Data,It Only Changes The Format Of The Data.

So On Simple Terms, The Below Picture Is The Demonstration Show’s How A Gateway Is Transforming A Simple Single Into Something Totally Different.

The Circular Padder Represent One Network And It Goes Through The Gateway And Transforming Into A Wave Pattern Which Represents A Different Network.

 

ARP,RARP,ICMP PROTOCOLS


 Address Resolution Protocol (ARP)

This Is The Protocol That Is Use To Resolve IP Address To MAC Addresses.

Whenever A Computer Needs Communicate With Another Computer On The Network.It Needs The MAC Address Of That Computer.

Computers Use MAC Addresses For Communication Between Each Other.

 

If A Computer Wants To Communicate With Another Computer First It Looks At Its Internal List ARP Cache To See If The Targeted Computer’s IP Address Already Has a Matching MAC Address In Its Table. If It Doesn’t It Will Sent A Broadcast Message Out On The Network Asking Which Computer Has The IP Address.

And The Computer That Has The Matching IP Address Will Respond Back Informing That It Has IP Address Its Looking For.

Then The Original Computer Ask For The MAC Address And Then Once It Receives It, The Communication Will Takes Place Between TWO.

See Below Picture



 

REVERSE ADDRESS RESOLUTION PROTOCOL (RARP)


It Is Just Opposite Of ARP.

RARP Is Used To Resolve MAC Address To IP Address.

 

Internet Control Message Protocol(ICMP)


When Something Unexpected Occurs, The Event Is Reported By ICMP (Internet Control Message Protocol), Which Is Also Used To Test The Internet.

About A Dozen Types Of ICMP Messages Are Defined. The Most Important Ones Are Listed Below.EachEach ICMP Message Type Is Encapsulated In An IP Packet.

Message Type Description

The DESTINATION UNREACHABLE Message Is Used When The Subnet Or A Router Cannot Locate The Destination Or When A Packet With The DF Bit Cannot Be Delivered Because A “small-packet” Network Stands In The Way.
The TIME EXCEEDED Message Is Sent When A Packet Is Dropped Because Its Counter Has Reached Zero.
The PARAMETER PROBLEM Message Indicates That An Illegal Value Has Been Detected In A Header Field.This Problem Indicates A Bug In The Sending Host’s IP Software Or Possibly In The Software Of A Router Transited.
The SOURCE QUENCH Message Was Formerly Used To Throttle Hosts That Were Sending Too Many Packets. When A Host Received This Message, It Was Expected To Slow Down.
The REDIRECT Message Is Used When A Router Notices That A Packet Seems To Be Routed Wrong.It Is Used By The Router To Tell The Sending Host About The Problem Error.
The ECHO And ECHO REPLY Messages Are Used To See If A Given Destination Is Reachable And Alive.
Upon Receiving The ECHO Message, The Destination Is Expected To Send An ECHO REPLY Message Back.
The TIMESTAMP REQUEST And TIMESTAMP REPLY Messages Are Similar, Except That The

 

 

Read the full article

Text
smartcherryposts
smartcherryposts

Network Architecture

Network Architecture

Network Architecture



Network Architecture Refers To The Layout Of The Network, Consisting Of The Hardware, Software, Connectivity, Communication Protocols And More Of Transmission (i.e Wired Or Wireless).
Network Architecture Is Logical And Structural Layout Of The Network, Consisting Of Transmission Equipment, Software And Communication Protocols And Infrastructure (i.e Wired And Wireless) Transmission Of Data And Connectivity Between Components.

There Are Two Types Of Computer Network Architecture, They Are

Peer To Peer Architecture
Client/Server Architecture

Peer To Peer Architecture



In Peer To Peer Network, The Task In Allocated To All The Computers In The Network.



All The Computers Are Considered Equally.
A Peer To Peer Network Will Not Use Central Computer Which Controls The Network Activity, Instead, Every Computer In The Network Has A Special Software Running That Allows Communication Between All Computers.
Peer To Peer Is Mostly Used For File Sharing



Once Computer User Make Files In The Hard Disk Available For Sharing, Information Of These Files Will Be Made To Available For Rest Of The Computers Users, So They Can Decide To Download One Or More Than One Files.
Once The Second Computer Downloads The Files, This Can Be Made Available For Rest Of The Computers.
So There Are Two Possible Sources To Download Same File, This Is How Files Can Be Spread To Thousands Of Users(Computers).
Peer To Peer Network Is Generally Simpler And Less Expensive But They Do Not Offer The Same Performance Under Heavy Loads.

Client-Server Architecture



In Client-Server Architecture There Are Two Types.


2 Tier Architecture - In Two-Tier Architecture Where Computers(Clients) Communicate With Server Directly.



 

 

2. 3 Tier Architecture - In 3 Tier Architecture, A Middleware Is Used.



The Computer(Client) Requests The Server, The Server Checks The Request Sent By The Computer(Client) In The Data Source.
For Example, If Your Computer Requests Server For Burger, The Server Check In The Data Source Wheather The Burger Is There Or Not In  The Store It Stored.
If Burger Is There In The Data Source, Then Sever Gives Responds To The Computer By Saying That Yes Burger Is There And Take It.
Computer Requests Application Server And Application Server Checks The Request In The Data Source Wheather It Is There Or Not, Corresponding To That It Responds To The Computer(Client).
In This There A Middleware, So It Is Called As 3 Tier Architecture.

This Is About The Computer Network Architecture And The Types Of Computer Network Architecture If You Like This Explanation Please Subscribe To My Youtube Channel By Click Here(https://www.youtube.com/channel/UCTsUa56qMWYdy3U_FqKSDXA?view_as=subscriber).

Thanks,

Smart CSE.

 

 

 

 

 

 

 

Read the full article

Photo
paulbradshaw
paulbradshaw
photo
Photo
paulbradshaw
paulbradshaw
Photo
paulbradshaw
paulbradshaw

“Our goal was to find out how much we could learn from someone’s browsing history or, to rephrase it, what others can learn by exploiting data from our own browsing history.”

(via Browsing Histories – SHARE LAB)

photo
Photo
sarahcampbella-blog
sarahcampbella-blog

Approach to Predictive Analytics based on Regression analysis, Choice modeling, Rule induction, Network/Link Analysis.

https://eluminoustechnologies.com/blog/2018/01/approach-to-predictive-analytics/

photo
Photo
paulbradshaw
paulbradshaw