
MULTIPLE INPUT MULTIPLE OUTPUT (MIMO) – Understanding Network and Security for Far-Edge Computing
MIMO is a method of increasing the effective capacity of a radio link by deliberately exploiting multipath propagation. This is typically accomplished via the use of multiple transmitters and receivers on both sides 6: 6 Some implementations have a single antenna on one side and multiple antennas on the other. Figure 3.16 – MIMO exploiting
WAVELENGTH – Understanding Network and Security for Far-Edge Computing
Wavelength is the physical length of an entire wave cycle. It is usually represented by the Greek letter lambda (�). It is measured in terms of length such as meters, centimeters, millimeters, nanometers, and so on. You can figure out the wavelength if you know the frequency and vice versa because of the following relationships:
Multiplexing and stream management – Understanding Network and Security for Near-Edge Computing
HTTP/2 introduced multiplexing, allowing multiple streams to be sent concurrently over a single connection. However, managing streams and their dependencies can become complex, leading to suboptimal performance. QUIC improves upon this by providing more efficient multiplexing and stream management. It allows for independent flow control and enables better prioritization of streams, ensuring optimal utilization of
IP geolocation database – Understanding Network and Security for Near-Edge Computing
Several companies maintain databases that map IP ranges to physical locations and update this data at regular intervals. GSLB appliances typically pay for a subscription to these feeds. But where do those companies get their data? When an ISP obtains public IP space or an ASN, it ultimately does so via the Internet Assigned Numbers
Software-defined WAN (SD-WAN) – Understanding Network and Security for Near-Edge Computing
SD-WAN is the application of SDN principles to networks outside your data center or span of control. The problems that SDN solves within your data center are even larger challenges on the internet, where you definitely won’t be given access to modify equipment you don’t own. The general idea is to implement a logical overlay

Multiprotocol Label Switching (MPLS) – Understanding Network and Security for Near-Edge Computing
Whereas IP routing operates at Layer 3 of the OSI model, MPLS operates below that (often called Layer 2.5). Data is forwarded based on labels along predetermined paths, which allows MPLS to offer far more reliable packet delivery than IP routing over the internet can. The trouble with MPLS is bandwidth cost. Because many organizations
TCP RWIN FORMULA – Understanding Network and Security for Near-Edge Computing
Here’s the TCP RWIN formula: Here, we have the following: t is the throughput in megabits per second w is the RWIN in kilobits r is the RTT value in milliseconds When you’re trying to work out the effective throughput of any connection, both calculations must be performed. First, apply both the Mathis equation for
Causes of packet loss on the internet – Understanding Network and Security for Near-Edge Computing
The primary cause of packet loss on the internet is congestion or throttling at a peering point between two Autonomous Systems (ASs). ASs are typically operated by a single large organization such as an ISP, a large technology company, a cloud service provider, a university, or a government agency. Every time traffic crosses the boundary
ROUND-TRIP TIME (RTT) – Understanding Network and Security for Near-Edge Computing
Also known as latency, this represents the amount of time in milliseconds that a packet takes to travel from sender to receiver and back again. Assuming the path between the sender and the receiver is a straight line, there is no way to reduce RTT because it is limited by the speed of light. The
Understanding internet challenges – Understanding Network and Security for Near-Edge Computing
There are two types of edge computing where the cloud is concerned – near the cloud and far from the cloud. Near-edge networking assumes reliable high-speed access and is probably what you are familiar with. Servers connecting from a data center over Multiprotocol Label Switching (MPLS), a laptop in a home worker’s apartment with a
Archives
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- May 2023
- April 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- December 2021
- November 2021
- October 2021
- September 2021
- June 2021
Calendar
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |