
MULTIPLE INPUT MULTIPLE OUTPUT (MIMO) – Understanding Network and Security for Far-Edge Computing
MIMO is a method of increasing the effective capacity of a radio link by deliberately exploiting multipath propagation. This is typically accomplished via the use of multiple transmitters and receivers on both sides 6: 6 Some implementations have a single antenna on one side and multiple antennas on the other. Figure 3.16 – MIMO exploiting

TIME-DIVISION DUPLEXING (TDD) – Understanding Network and Security for Far-Edge Computing
TDD is a half-duplex technique that simulates full-duplex by switching between uplink and downlink phases on the same frequency at regular intervals: Figure 3.12 – TDD The main advantage TDD has is that it halves the frequency range required versus FDD. However, it brings a couple of disadvantages with it. It requires precise time synchronization
Modulation – Understanding Network and Security for Far-Edge Computing
To transmit information using a radio wave, we need to modify that wave somehow to encode our data. There are three aspects of a signal that can be modulated: Amplitude-shift keying (ASK): Modulation is based on the power or intensity of the signal. AM radio uses this method: Figure 3.8 – Amplitude modulation Frequency-shift keying
Circular – Understanding Network and Security for Far-Edge Computing
Sometimes, the antennas do not remain in a fixed orientation and rotate continually – sometimes at random. This is also known as the Faraday rotation. It is a common problem when communicating with satellites in space. Circular polarization is a method that can be used to overcome it: Figure 3.5 – Circular polarization of a
Antennas– Understanding Network and Security for Far-Edge Computing
To know more about antennas we will cover the size, polarization, and types of antennas. We’ll look at these three in detail in the following sub sections. Size An antenna’s size is directly related to the wavelength of the signal involved – which, as you’ll recall, is inversely proportional to the frequency. Higher frequency signals
WAVELENGTH – Understanding Network and Security for Far-Edge Computing
Wavelength is the physical length of an entire wave cycle. It is usually represented by the Greek letter lambda (�). It is measured in terms of length such as meters, centimeters, millimeters, nanometers, and so on. You can figure out the wavelength if you know the frequency and vice versa because of the following relationships:
Introduction to radio frequency (RF) communications – Understanding Network and Security for Far-Edge Computing
Edge computing in situations where reliable, high-speed internet access is not a given due to location or the nature of the devices involved are known as far-edge use cases. Examples include a mobile data center for disaster response, remote sensors for smart agriculture, a pilot station for a military UAV, or content delivery onboard a
Network segmentation – Understanding Network and Security for Near-Edge Computing
Implement network segmentation to isolate and protect critical edge computing resources. Use Virtual LANs (VLANs) or Software-Defined Networking (SDN) techniques to create separate network segments for different types of devices and services. This helps contain potential security breaches and limit the lateral movement of threats within the network. Monitoring and logging Implement comprehensive monitoring and
Security considerations – Understanding Network and Security for Near-Edge Computing
The inbuilt encryption makes it more difficult to inspect network traffic for security purposes, such as intrusion detection or deep packet inspection. Network administrators and security professionals may need to adapt their monitoring and security practices to accommodate the encrypted nature of HTTP/3 and QUIC. Increased complexity for troubleshooting The layered nature of these protocols
Multiplexing and stream management – Understanding Network and Security for Near-Edge Computing
HTTP/2 introduced multiplexing, allowing multiple streams to be sent concurrently over a single connection. However, managing streams and their dependencies can become complex, leading to suboptimal performance. QUIC improves upon this by providing more efficient multiplexing and stream management. It allows for independent flow control and enables better prioritization of streams, ensuring optimal utilization of
Archives
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- May 2023
- April 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- December 2021
- November 2021
- October 2021
- September 2021
- June 2021
Calendar
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |