Our social:

Latest Post

Friday, 6 December 2013

Virtual Hosting:How mutiple sites are stored on single server.


How are mutiple domains hosted on single server or how mutiple sites have same IP address.

This Question came to my mind when i wake up today morning. By searching on google and some forums  i found the answer i.e Virtual Hosting.

I thought i should share with others who read my blog or come to my blog by searching on internet.

So,guys  here are the two links which will explain in detail about virtual hosting.

http://en.wikipedia.org/wiki/Virtual_hosting

http://httpd.apache.org/docs/2.2/vhosts/

I was so tired so i posted the links :)
If u still found some problem or have any question in ur mind u can google it, i am sure u will get the answers just like i got!

Thanks!

Monday, 25 November 2013

Who provides internet to ISP??

Question:How do I figure out the Internet's infrastructure?
Let's suppose we don't know about the history of the Internet, nor do we have access to any online resources that explain us this. Then, the only way to learn how the Internet infastructure is built is to go back to the roots. Using existing protocols to discover how our Internet is built.

Specifically, the Internet Control Message Protocol or ICMP defines the Echo request and the Echo reply. By increasing the Time To Live of IP packets by 1 each iteration, you can find each next hop on the path to your target. This allows you to get a list of hops between you and your target, the classic traceroute.

On Windows, you can use tracert; on Linux and Mac OS X, you can use traceroute.

So, let's do a traceroute from Belgium to the United States; Stack Exchange looks like a good target.

Tracing route to stackexchange.com [64.34.119.12] over a maximum of 30 hops:


  5    10 ms    12 ms    12 ms  te-3-3.car2.Brussels1.Level3.net [212.3.237.53]
  6    11 ms    11 ms    15 ms  ae-0-11.bar2.Brussels1.Level3.net [4.69.148.178]
  7    20 ms    13 ms    15 ms  ae-7-7.ebr1.London1.Level3.net [4.69.148.182]
  8    16 ms    16 ms    18 ms  vlan101.ebr2.London1.Level3.net [4.69.143.86]
  9    83 ms    84 ms    87 ms  ae-44-44.ebr1.NewYork1.Level3.net [4.69.137.78]
 10    84 ms    93 ms    97 ms  ae-71-71.csw2.NewYork1.Level3.net [4.69.134.70]
 11    87 ms    96 ms    83 ms  ae-2-70.edge1.NewYork1.Level3.net [4.69.155.78]
 12    84 ms    93 ms    84 ms  gig2-0.nyc-gsr-b.peer1.net [216.187.123.5]
 13    87 ms    84 ms    85 ms  gwny01.stackoverflow.com [64.34.41.58]
 14    87 ms    82 ms    87 ms  stackoverflow.com [64.34.119.12]

Interesting, we now know that Belgium, London and New York are all connected to Level3. Level3 can be seen as an ISP to ISPs, they simply interconnect multiple ISPs. Here is a picture of how it's connected:







Let's go the opposite direction, China! The first thing I could find is the search engine Baidu.

Tracing route to baidu.com [123.125.114.144] over a maximum of 30 hops:


  5    12 ms    10 ms    12 ms  ae0.anr11.ip4.tinet.net [77.67.65.177]
  6   167 ms   167 ms   167 ms  xe-5-1-0.sjc10.ip4.tinet.net [89.149.185.161]
  7   390 ms   388 ms   388 ms  as4837.ip4.tinet.net [77.67.79.150]
  8   397 ms   393 ms   397 ms  219.158.30.41
  9   892 ms     *      392 ms  219.158.97.13
 10   407 ms   403 ms   403 ms  219.158.11.197
 11   452 ms   451 ms   452 ms  219.158.15.5
 12     *      434 ms   434 ms  123.126.0.66
 13   449 ms   450 ms   450 ms  61.148.3.34
 14   432 ms   433 ms   431 ms  202.106.43.66
 15   435 ms   435 ms   436 ms  123.125.114.144

Well, not much information about the Chinese ISPs there but we at least found Tinet. Here is a nice picture of their site that shows how they connect with the various ISPs:



They simply have a cloud of hops spread about the relevant part of the world they serve, and at the end points they connect to the ISPs. The reason they have a cloud of hops is for reliability, for when some hops fall out...

If you repeat this a few times, you can get an idea of how everything is connected.




So, what Network Tiers are there?

The huge networks we found through trace-routing are known as Tier 1 networks.

    Although there is no authority that defines tiers of networks participating in the Internet, the most common definition of a tier 1 network is one that can reach every other network on the Internet without purchasing IP transit or paying settlements.

    By this definition, a tier 1 network is a transit-free network that peers with every other tier-1 network. But not all transit-free networks are tier 1 networks. It is possible to become transit-free by paying for peering or agreeing to settlements.

Common definitions of tier 2 and tier 3 networks:

        Tier 2: A network that peers with some networks, but still purchases IP transit or pays settlements to reach at least some portion of the Internet.

        Tier 3: A network that solely purchases transit from other networks to reach the Internet.

If you click through to Tier 1 networks from the Internet Backbone page you get to a list of the current Tier 1 networks:

        AT&T from USA
        Centurylink (formerly Qwest and Savvis) from USA
        Deutsche Telekom AG from Germany
        Inteliquent (formerly Tinet) from USA
        Verizon Business (formerly UUNET) from USA
        Sprint from USA
        TeliaSonera International Carrier from Sweden
        NTT Communications from Japan
        Level 3 Communications from USA
        Tata Communications from India

It is not known if AOL Transit Data Network (ATDN) is still a Tier 1 network.

Wait, what... What is Peering?

These networks connect to each other through a process known as 'peering'. Most traffic needs to go over at least 2 different top tier networks in order to reach its destination, and the networks are bridged with peering arrangements. The way this usually works is that each party to the agreement will commit to routing x amount of traffic for the other party on their network, and vice-verse. There is usually no money exchanged in these arrangements, unless one side is sending or receiving a lot more data than the other sides.

Large companies can also go out and arrange their own peering relationships. For example Netflix has arranged its own peering and network infrastructure directly with multiple tier-1 networks so that its traffic is both cheaper and closer to end users on each of the popular US broadband ISP's.

Some Reference links to understand network:

https://en.wikipedia.org/wiki/Internet_protocol_suite
https://en.wikipedia.org/wiki/Packet_switching
https://en.wikipedia.org/wiki/End-to-end_principle
https://en.wikipedia.org/wiki/Internet_Protocol#Reliability
https://en.wikipedia.org/wiki/Encapsulation_(networking)
https://en.wikipedia.org/wiki/Connectionless_communication
https://en.wikipedia.org/wiki/Network_topology#Decentralization 









Saturday, 19 October 2013

Files That Can Be Stored In The Cloud Storage




With the virtual disk, you can store files from various extents, in the same way as it does with the physical hd. The difference is that the HD will continue to operate on a virtual platform to which it has remote access from any device with an internet connection. Furthermore, storing files online are completely safe, as there is no risk of losing data due to possible instabilities operating systems or damage to external hardware such as cd, dvd and pen drive.

Possibilities and advantages of saving your files in “cloud data center“

Video Library

Drama, adventure, suspense, horror, comedy, romantic comedy, animations and more varied series. Have your own movie collection and the best possible environment: The virtual hd can be configured on the “cloud”. Using cloud storage services, you can organize all your media files in folders identical to known and daily used by your operating system. Simple and practical.

CD Library

Similarly the video library, compile all music downloads in one place. Stay calm and get your mind free to focus on other more pressing activities. Discographies in mp3 or any other format will be sound and saved online in cloud hd. The library will be always at your fingertips, wherever you are, all your favorite records or those new to hear are separated calmly in a timely manner.

Photo Album

It is not difficult to find beautiful photo albums. However, it is not feasible to carry physical album everywhere and for this, there is a free server and unlimited capacity data storage. Entering your photos into digital albums, photos will never be yellowed with aged appearance or brittle enough to dissolve over long years. The cloud storage will allow unforgettable moments to be always well represented by faithful record of events stored in user memory and virtual memory.

 Library without limits

The regular reader of the great classics of the past, present, and other relics have a contemporary immeasurable space to gather their favorite authors, creating the most diverse collections of books, etc.. Lovers of comics and graphic novels to read and reread rare editions whenever they want and wherever they want.

Games

The advanced games are extremely heavy and consume a lot of CPU resources, memory and hard drive. Therefore, it is increasingly feasible to store a file like this in a conventional hd. Opting to store your games in a virtual disk, it will be convenient to uninstall other games to gain disk space, since the games arcade remain allocated on the server, regardless of the size of each file. That way, you avoid excessive consumption of virtual memory and preserves the common speed processing of your machine – one of the great advantages of storing a file online. Separate any number of games, sorting them by genre, or create custom lists.


source:esds

What will happen with Cloud Computing in the Future?



Every time, analysts, forecasters and experts, forecast the prospects of technology in the coming years. And it is no secret that cloud computing has become the most discussed and the hot topic. Cloud has loudly declared itself in business technology. IT-directors, vendors and analysts as one, trying to have time to determine what is behind it and what leads us. To that end, I have selected some of the predictions which are likely to come true, of course, if this had not already happened. So, the following are the most likely forecast:

1. More Private Cloud Solutions

Such clouds have not completely moved to the site of the customer or consumer, in other words, they are not “on-premises clouds”. But they also are not public. The following years, the tendency was to the formation of an increasing number of private clouds, but driven by someone else, so-called “off-premises clouds”. In addition, such an approach would be cheaper. Only well-protected isolated private clouds can meet all the necessary requirements. The original company’s commitment to its own cloud infrastructure was severely limited and time-consuming with a lot of investment, and while virtual private clouds provide sufficient effective solution for some organizations.

2. Cloud And Mobile Technologies Merge Together

This is an interesting hypothesis. The existence of many projects due to the cloud just need a mobile access to remote data and services. Almost certainly, for each, there is a cloud infrastructure connected to it with a mobile application that can flexibly respond to requests of mobile clients and deal with heavy traffic. By the way, almost every SaaS application currently has a mobile client that is also a proof of the plausibility of this model.

3. New PCs Own Cloud

Experts at Gartner predicts that personal cloud will gradually displace conventional personal computers, taking on the role of content storage, personal information, providing access to services and becoming the center of our virtual life (by the way, they can still retain the name of the personal computer). The emergence and spread of such private custom cloud will entail the creation of entirely new services, trends and interactions that will become the new center of economic relations and activities. Personal clouds should shift the focus from the client devices to the cloud-based services, which, in turn, has to be delivered to a variety of devices.

4. Increasing The Number Of Brokers Of Cloud Services

Gartner predicts that more and more IT-companies will take on the role of internal brokers in cloud services, controlling the redundancy and the use of diverse and always complex cloud services for their internal users and external business partners.

5. The Growing Number Of Specialized Clouds And Community Clouds

One needs only to refer to the cloud infrastructures, created especially for highly specialized areas such as healthcare, core banking, financial markets, retail sales and industry. This kind of clouds will provide each of the areas of specialized protection, processes, and will also meet other special requirements of each industry. The specific requirements of each industry will increasingly be met with community clouds. A striking example can serve the growing demands of the standards of storage and data protection related to health care. Another example – community clouds in the telecommunications industry to ensure compliance with all standards of disaster recovery.

6. Planned A Serious Lack Of Staff And Expertise

IDC warns about an impending shortage of skills and experience that will emerge as the hallmark of innovation, but at the same time, it will limit the introduction of technology in the workplace. Complicating the issue further is the fact that the attraction of cloud computing comes from different lines of business. The inaccessibility of relevant training and experience is also exacerbated by an increase in the needs of different departments in IT. IT-team very soon cease to be a team of system administrators, network managers, developers and database administrators, and will also include the management and service delivery, contract managers, relationship managers (both with clients and with partners) and business analysts.

7. The Disappearance Of The “Cloud” As A Terms

In the end, we stop everything and everyone to call the clouds and begin a more realistic assessment that falls under this concept and what does not. Every company with the word “cloud” in the title will try to change the brand… How many companies with the terms “Internet” and “client / server” in their names you see today? It is ridiculous-sounding names that end in “aaS”, will suffer the same fate. What do you think? How many of these trends are realistic?








source:esds.co.in

Wireless Security Basics



In this lesson, you’ll learn some of the basics of Wi-Fi security. We’ll also share our recommendation on which type you should choose – eliminating the guesswork and helping you keep your network as secure as possible.

WHAT ARE THE TYPES OF WIRELESS SECURITY?


There are several types of wireless security that you’ll come across– here’s a quick rundown on the details.

WEP

Wired Equivalent Privacy, aka WEP, is the grandfather of wireless security types, dating back to 1999 (an eternity in the world of technology!). When a client (like your laptop or iPad) connects to a WEP-protected network, the WEP key is added to some data to create an “initialization vector”, or “IV” for short. For example, a 128-bit hexadecimal key is comprised of 26 characters from the keyboard (totaling 104 bits) combined with a 24-bit IV. When a client goes to connect to an AP, it sends a request to authenticate, which is met with a challenge reply from the AP. The client encrypts the challenge with the key, the AP decrypts it, and if the challenge it receives matches the original one it sent, the AP will authenticate the client.

This may sound secure, but there was room in this scheme for an exploit to be discovered. The risk presents itself when a client sends its request to the access point– the portion containing the IV is transmitted wirelessly in clear-text (not encrypted). In addition, the IV is simple compared to the key, and when there are several clients using the same WEP key on a network, IVs have an increased probability of repeating. In a busy environment, a malicious user wishing to gain access to a network utilizing WEP security can passively eavesdrop and quickly collect IVs. When enough IVs have been collected, the key becomes trivial to decrypt.

Clearly, WEP is not the correct choice for securing your network, and in light of this, other types of wireless security were created.  

WPA

Wi-FI Protected Access (WPA) was ratified by the Wi-Fi Alliance in 2003 as a response to the insecurities that were discovered in WEP. This new security standard, the Temporal Key Integrity Protocol (TKIP), included several enhancements over WEP, including a new message integrity check nicknamed “Michael.”

While Michael offered a great deal of improvement over the old way of securing networks, there was still some worry about some security issues with using a similar (though much stronger) implementation.

WPA2

The concerns about Michael led to WPA2’s introduction in 2004. At the center of WPA2 is its use of a security protocol based on Advanced Encryption Standard (AES), the U.S. Government’s preferred choice of encryption.

As it stands now, the only people who should still be using TKIP on a wireless network are those who are dealing with hardware that is rated for 802.11g only.

WPS

In 2007, a new security method – Wi-Fi Protected Setup (WPS) – began to show up on wireless access points. With this type of security, a user is able to add new devices to their network by simply pushing a button (within administration software or physically on the router) and then typing in an 8-digit PIN number on the client device. The PIN feature acts as a sort of shortcut for entering in a longer WPA (Wi-Fi Protected Access) key. The basic idea behind WPS is that having physical access to the AP to hit a button and reading a sticker would provide a more secure implementation of Wi-Fi authentication. Everything was well and good in the WPS world, until last winter, when a security researcher discovered the Achilles Heel in the implementation. Here’s how it works:

The eighth and final digit of the PIN number is a checksum, which is used to make sure the 7 digits that matter don’t get corrupted. From these 7 digits, we can see that there are 10,000,000 possibilities (since each of the 7 digits can be 0-9, with repeats allowed). This is still a pretty huge amount of possibilities, and alone could arguably still be considered quite safe — but there’s a flaw in the checking process. When a PIN is being examined by the AP, the first 4 digits (10,000 possibilities) are checked separately from the last 3 digits (1,000 possibilities). This translates into a malicious user only needing to make at most 11,000 guesses, which a computer can handle in a matter of hours!

As you can see, if you or someone you know is currently using WPS on an access point, you should disable the feature ASAP.

OUR RECOMMENDATION

If your access point or clients are only capable of using WEP, it’s time for you to look at upgrading your technology, for the sake of increased security– not to mention increased throughput speeds on newer devices.

Right now, the best security for your Wi-Fi network is WPA2 with WPS disabled. Using this security combination provides the most secure Wi-Fi network possible today, and gives you the peace of mind you need to “set it and forget it.”

Besides, do you really want to trust a single button to provide all the security for your network? If WPA2 with WPS disabled ever becomes vulnerable, we’ll be sure and keep you updated on the adjustments you should make to remain secure.

Source: metageek

Saturday, 22 June 2013

CLOUD COMPUTING: BASIC CONCEPTS


-->

Cloud Computing – The technology of distributed data processing in which some scalable information resources and capacities are provided as a service to multiple external customers through Internet technology.

Cloud computing concept includes all of the following concepts:

IaaS (Infrastructure as a Service) – A computer infrastructure, typically presented in the form of virtualization. Is a service within the concept of cloud computing.

PaaS (Platform as a Service) – An integrated platform for the development, deployment, testing and support of web-applications. Presented as a service on the basis of the concept of “cloud hosting“. 

SaaS (Software as a service) – Is the business model of software license, which involves the development and support of the software vendor. Customers also have the opportunity of paid use of it, usually through the Internet.

DaaS (Desktop as a Service) – Another business model license the software, which is a slightly improved model of SaaS, mostly involving the use of multiple services at the same time necessary to complete the work. Was first introduced in the early 2000s.

In addition to the above within the concept of cloud computing there are also common notion Data as a service and Everything as a service respectively. Both concepts show that, through the World Wide Web using Cloud Computing, can meet any requirements in the processing of information. This is the main advantage of cloud computing in the IT-based business solutions.


Sunday, 16 June 2013

What is Intrusion Detection System? How it works ?

This is a post which i stared learning recently so sharing my little knowledge so intrusion detection system (IDS) is basically used for monitoring the network, it detects intruders; that is, unexpected, unwanted or unauthorized people or programs on network.



An intrusion detection system has a number of sensors that is used to detect unwanted or unexpected flow of network traffic, the major sensors as follows:



  • A sensor monitor log files

  • A sensor monitor TCP ingoing or outgoing connections


    How Intrusion Detection System Works?

    Intrusion detection system works by collecting information and then examining it.IDS collects data from it sensors and analyze this data to give notice to the system administrator about malicious activity on the network.

  • An intrusion detection system can be run manually but most IT administrators find it easier to automate the system checks to ensure that nothing is accidentally overlooked.

  • We can mainly categorize an IDS into two type:

    1. NIDS (Network Intrusion Detection Systems).
    2. HIDS (Host Intrusion Detection Systems)

    There is still a question, why we use IDS if there is firewall to perform these tasks, Firewall is used to stop unwanted traffic from entering or leaving the internal enterprise network, where as the IDS is deployed to monitor traffic in vital segments in the network, generating alerts when an intrusion is detected.

    A firewall has got holes to let things through, without it you wouldn't be able to access the Internet or send or receive emails, there are different ways to bypass or cheat a firewall.

    Snort is an excellent open source Network Intrusion Detection System, OSSEC is an Open Source Host-based Intrusion Detection System.

    Below is an an overview of the basic architecture as well as practical examples of how to customize Open Source Host-based Intrusion Detection System to manage logging from your infrastructure and applications.

  • Video On Intrusion Detection System

    source:DARKSITE

    Monday, 13 May 2013

    GSM: Network Architecture

    The GSM technical specifications define the different entities that form the GSM network by defining their functions and interface requirements.
     
    The GSM network can be divided into four main parts:
    • The Mobile Station (MS).
    • The Base Station Subsystem (BSS).
    • The Network and Switching Subsystem (NSS).
    • The Operation and Support Subsystem (OSS).
    The architecture of the GSM network is presented in figure 1.










    Mobile Station:
    A Mobile Station consists of two main elements:
    • The Subscriber Identity Module (SIM): It is protected by a four-digit Personal Identification Number (PIN). In order to identify the subscriber to the system, the SIM card contains amongst others a unique International Mobile Subscriber Identity (IMSI). User mobility is provided through maping the subscriber to the SIM card rather than the terminal as we done in past cellular systems.
    • Mobile equipment/terminal (ME): There are different types of terminals (MN) distinguished principally by their power and application:
      • `fixed' terminals mainly installed in cars. Their maximum allowed output power is 20W
      • portable terminals can also be installed in vehicles. Their maximum allowed output power is 8W.
      • handheld terminals; their popularity is owed to their weight and volume, which is continuously decreasing. According to some specification these terminals may emit up to 0.8W. However, as technology has evolved their maximum allowed power ouput is limited to 0.1W.
      •  
    Base Station Subsystem: The BSS provides the interface between the ME and the NSS. It is in charge of the transmission and reception. It may be divided into two parts:
    • Base Station Controller (BSC): It controls a group of BTSs and manages their radio ressources. A BSC is principally in charge of handoffs, frequency hopping, exchange functions and power control over each managed BTSs.
    • Base Transceiver Station (BTS) or Base Station: it maps to transceivers and antennas used in each cell of the network. It is usually placed in the center of a cell. Its transmitting power defines the size of a cell. Each BTS has between 1-16 transceivers depending on the density of users in the cell.
    NSS: Its main role is to manage the communications between the mobile users and other users, such as mobile users, ISDN users, fixed telephony users, etc. It also includes data bases needed in order to store information about the subscribers and to manage their mobility. The different components of the NSS are described below.
    • MSC: the central component of the NSS. The MSC performs the switching functions of the network. It also provides connection to other networks.
    • GMSC: A gateway that interconnects two networks: the cellular network and the PSTN. It is in charge of routing calls from the fixed network towards a GSM user. The GMSC is often implemented in the same machines as the MSC.
    • HLR: The HLR stores information of the suscribers belonging to the coverage area of a MSC; it also stores the current location of these subscribers and the services to which they have access. The location of the subscriber maps to the SS7 address of the Visitor Location Register (VLR) associated to the MN.
    • VLR: contains information from a subscriber's HLR necessary to provide the subscribed services to visiting users. When a subscriber enters the covering area of a new MSC, the VLR associated to this MSC will request information about the new subscriber to its corresponding HLR. The VLR will then have enough data to assure the subscribed services without needing to ask the HLR each time a communication is established. The VLR is always implemented together with a MSC; thus, the area under control of the MSC is also the area under control of the VLR.
    • Authentication Center (AuC): It serves security purposes; it provides the parameters needed for authentication and encryption functions. These parameters allow verification of the subscriber's identity.
    • Equipment Identity Register (EIR): EIR stores security-sensitive information about the mobile equipments. It maintains a list of all valid terminals as identified by their International Mobile Equipment Identity (IMEI). The EIR allows then to forbid calls from stolen or unauthorized terminals (e.g, a terminal which does not respect the specifications concerning the output RF power).
    • GSM Interworking Unit (GIWU): The GIWU provides an  interface to various networks for data communications. During these communications, the transmission of speech and data can be alternated.
    Operation and Support Subsystem (OSS): It is connected to components of the NSS and the BSC, in order to control and monitor the GSM system. It is also in charge of controlling the traffic load of the BSS. It must be noted that as the number of BS increases with the scaling of the subscriber population some of the maintenance tasks are transferred to the BTS, allowing savings in  the cost of ownership of the system.
     
     
    Geographical areas
    A cell, as identified by its Cell Global Identity (CGI) number, maps to the radio coverage of a BTS. Similarly an LA as identified by its Location Area Identity (LAI) number , is a cluster of cells served by a single MSC/VLR. A group of LA under the control of the same MSC/VLR defines the MSC/VLR area. A Public Land Mobile Network (PLMN) is the area served by one network operator.
     
     
    Network operations
    In this paragraph, the description of the GSM network is focused on the differents functions to fulfil by the network and not on its physical components. In GSM, five main functions can be defined:
    • Transmission: of data and signaling. Not all the components of the GSM network are strongly related with both types of types of Tx. While the MSC, BTS and BSC, among others, are involved with data and signaling, components such as  HLR, VLR or EIR registers, are only concerned with signaling.
    • Radio Resources Management (RRM).
    • Mobility Management (MM).
    • Communication Management (CM).
    • Operation, Administration and Maintenance (OAM).

     Radio Resources Management (RRM)
    The role of the RR function is to establish, maintain and release communication links between mobile stations and the MSC. The elements that are mainly concerned with the RR function are the MN and the BTS. However, since the RR component performs connection management also during cell handoffs,  it also affects the MSC  which is the handoff management component.
    The RR is also responsible for the management of frequency resources as well as varying radio interface conditions. Main component operations are:
    • Channel assignment, change and release.
    • Handoff
    • Frequency hopping.
    • Power-level control.
    • Discontinuous transmission and reception.
    • Timing advance.

     Handoff
    The user movements may result a change in the channel/cell, when the quality of the communication is degrading; this is known as handoff. Handoffs occur between:
    • between channels within a cell
    • between cells controlled by the same BSC
    • between cells under the same MSC but controlled by different BSCs
    • between cells controlled by different MSCs.
    Handoffs are mainly controlled by the MSC. However to avoid unnecessary signalling, the first two types of handoffs are managed by the respective BSC (thus, the MSC is only notified of the handoff). To perform the handoff the mobile station controls continuously its own signal strengh and the signal strengh of the neighboring cells. The list of cells that must be monitored by the mobile station is given by the base station. Power measurements allow to decide which is the best cell in order to maintain the quality of the communication link. Two basic algorithms are used for handoffs:
    • The `minimum acceptable performance' algorithm. When the quality of the transmission degrades, the power level of the mobile is increased, until the increase of the power level has no effect on the quality of the signal. Upon this link layer hint, a handoff is initiated.

    • The `power budget' algorithm. Here the handoff pre-empts the power increase, to obtain a good SIR.
    Mobility Management (MM) The MM component handles:
    • Location Management: Location is managed through periodicaly or on-demand. At power-on time, the MH signals an IMSI attach. On-demand location updates are signalled when the MN moves to a different PLMN or new location area (LA). The signal is sent to the new MSC/VLR, which forwards it to the subscriber's HLR. Upon authorization in the new MSC/VLR, the subscriber's HLR removes the registration entry of the MN at the old MSC/VLR. If after the update time interval, the MN has not registered, it is then deregistered. On power-off, the MN performs an IMSI detach.
    • security and authentication:  Authentication involves the SIM card and the Authentication Center. A secret key, stored in the SIM card and the AuC together with a ciphering algorithm called A3, are used to authenticate the user. The MN and the AuCcompute a SRES through A3 using the secret key and a nonce generated by the AuC. If the two computed SRES are the same, the subscriber is authenticated. The different services to which the subscriber has access are also checked. Next the a security check is performed in the equipment identity (IMEI). If the IMEI number of the mobile is authorized in the EIR, the mobile station is allowed to connect the network. To assure user confidentiality, the user is registered with a Temporary Mobile Subscriber Identity (TMSI) after its first location update procedure. Enciphering is another option to guarantee a very strong security.

    Communication Management (CM):
    The CM component manages:
    • Call control (CC): it controls call setup, management and tear-down in relation to management of type of service. Call routing is the primary task for this component. To reach a mobile subscriber, a user dials the Mobile Subscriber ISDN (MSISDN) number which includes:
      • a country code
      • a national destination code; this identifies the subscriber's operator
      • a code mapping to the subscriber's HLR.
      • The call is then passsed to the GMSC (if the call is originated from a fixed network) that 'knows' the HLR corresponding to the particular MSISDN number. The GMSC signals the HLR for call routing information. The HLR requests this information from the subscriber's current VLR. This VLR allocates temporarily a Mobile Station Roaming Number (MSRN) for the call. The MSRN number is the information returned by the HLR to the GMSC. It is latter that routes the call through the MSRN number, to the subscriber's current MSC/VLR. In the subscriber's current LA, the mobile is paged.
    • Supplementary Services management: This involves the MN and the HLR.

    • SMS management: Here the GSM network contacts the Short Message Service Center through the two following interfaces:
      • SMS-GMSC for Mobile Terminating Short Messages (SMS-MT/PP). It has the same role as the GMSC.
      • SMS-IWMSC for Mobile Originating Short Messages (SMS-MO/PP).

    Operation, Administration and Maintenance (OAM):
    The OAM component allows the operator to monitor and control the system as well as modify the configuration of the elements of the system. Not only the OSS is part of the OAM, but also the BSS and NSS participate in functions such as:
    • provide the operator with all the information it needs. This information is forwarded to the OSS to control the network.
    • perform self-test tasks in addition to the OAM functions.
    • control of multiple BTSs by the BSS.

    Saturday, 30 March 2013

    Ebook software Engineering by pressman

    So, you want "XYZ" ok... lets start coding.. STOP! Probably, this was the way you were developing some small softwares or program. Software Engineering, talks about engineering a product. It is the application of the knowledge you have to a software. You have to understand the idea behind developing the software, various parameters involved, cost, benefit, quality, reliability etc. The subject includes the software models for developing softwares and project planning ideas with different structures that are being followed in the companies. It makes you understand that just the code for a software would not suffice, you need to plan and implement it in the best way.


    Syllabus


    i) Introduction, What is software engineering?
    ii) Software Development Life Cycle, Requirements Analysis, Software Design, Coding, Testing, Maintenance etc. iii) Software Requirement Specification, Waterfall Model, Prototyping Model, Iterative Enhancement Model, Spiral Model, Role of Management in Software Development, Role of Metrics and Measurement, Problem Analysis, Requirement Specification, Validation, Metrics, Monitoring and Control.
    iv) System Design, Problem Partitioning, Abstraction, Top-down and bottom-up design, Structured Approach, Functional v/s Object-Oriented Approach, Design specification & verification, metrics, Monitoring & Control
    v) Coding, Top-down & Bottom-up, Structured Programming, Information Hiding, Programming Style, Internal Documentation, Verification, Metrics, monitoring & control
    vi) Testing, Levels of Testing- Functional Testing, Structural Testing, Test Plan, Test Cases Specification, Reliability assessment.
    vii) Software Project Management, Cost Estimation, Project Scheduling, Staffing, Software Configuration Management, Quality Assurance, Project Monitoring, Risk Management

    Download -Mediafire link

    Ebook- Programming with java by E.Balaguruswamy



    Java is yet another computer language but with a difference. It is the only language that is purely object-oriented. It is a secure language, making it well-suited for Internet programming. One of the important reasons for Java's success, apart from its object-orientation, is the amazing functionality it adds to the World Wide Web. This book by Balaguruswamy comprehensively covers all aspects of Java language. Beginning with an introduction to the language and its relationship with the Internet and World Wide Web, it explores Java's object¬ oriented features, and then moves on to discuss advanced topics that are unique to Java. The concept of learning by example has been stressed throughout the book. 

    Download Link:

    Deposit files link

    Friday, 22 February 2013

    IP Addressing and Subnetting basics

    ACTUALLY GUYS THIS POST IS NOT BY ME.I FOUND IT ON CISCO'S SITE SO I DECIDED TO PUT THIS POST ON MY BLOG :)

    Introduction

    This document gives you basic information needed in order to configure your router for routing IP, such as how addresses are broken down and how subnetting works. You learn how to assign each interface on the router an IP address with a unique subnet. There are many examples to help tie everything together.

    Prerequisites

    Requirements

    Cisco recommends that you have knowledge of these topics:
    • Basic understanding of binary and decimal numbers.


    Additional Information

    If definitions are helpful to you, use these vocabulary terms to get you started:
    • Address—The unique number ID assigned to one host or interface in a network.
    • Subnet—A portion of a network sharing a particular subnet address.
    • Subnet mask—A 32-bit combination used to describe which portion of an address refers to the subnet and which part refers to the host.
    • Interface—A network connection.
    If you have already received your legitimate address(es) from the Internet Network Information Center (InterNIC), you are ready to begin. If you do not plan to connect to the Internet, Cisco strongly suggests that you use reserved addresses from RFC 1918 .

    Understanding IP Addresses

    An IP address is an address used in order to uniquely identify a device on an IP network. The address is made up of 32 binary bits, which can be divisible into a network portion and host portion with the help of a subnet mask. The 32 binary bits are broken into four octets (1 octet = 8 bits). Each octet is converted to decimal and separated by a period (dot). For this reason, an IP address is said to be expressed in dotted decimal format (for example, 172.16.81.100). The value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary.
    Here is how binary octets convert to decimal: The right most bit, or least significant bit, of an octet holds a value of 20. The bit just to the left of that holds a value of 21. This continues until the left-most bit, or most significant bit, which holds a value of 27. So if all binary bits are a one, the decimal equivalent would be 255 as shown here:
        1  1  1  1 1 1 1 1
      128 64 32 16 8 4 2 1 (128+64+32+16+8+4+2+1=255)
    Here is a sample octet conversion when not all of the bits are set to 1.
      0  1 0 0 0 0 0 1
      0 64 0 0 0 0 0 1 (0+64+0+0+0+0+0+1=65)
    And this is sample shows an IP address represented in both binary and decimal.
            10.       1.      23.      19 (decimal)
      00001010.00000001.00010111.00010011 (binary)
    These octets are broken down to provide an addressing scheme that can accommodate large and small networks. There are five different classes of networks, A to E. This document focuses on addressing classes A to C, since classes D and E are reserved and discussion of them is beyond the scope of this document.
    Note: Also note that the terms "Class A, Class B" and so on are used in this document to help facilitate the understanding of IP addressing and subnetting. These terms are rarely used in the industry anymore because of the introduction of classless interdomain routing (CIDR).
    Given an IP address, its class can be determined from the three high-order bits. Figure 1 shows the significance in the three high order bits and the range of addresses that fall into each class. For informational purposes, Class D and Class E addresses are also shown.

    FIGURE 1
      3an.gif

    In a Class A address, the first octet is the network portion, so the Class A example in Figure 1 has a major network address of 1.0.0.0 - 127.255.255.255. Octets 2, 3, and 4 (the next 24 bits) are for the network manager to divide into subnets and hosts as he/she sees fit. Class A addresses are used for networks that have more than 65,536 hosts (actually, up to 16777214 hosts!).
    In a Class B address, the first two octets are the network portion, so the Class B example in Figure 1 has a major network address of 128.0.0.0 - 191.255.255.255. Octets 3 and 4 (16 bits) are for local subnets and hosts. Class B addresses are used for networks that have between 256 and 65534 hosts.
    In a Class C address, the first three octets are the network portion. The Class C example in Figure 1 has a major network address of 192.0.0.0 - 233.255.255.255. Octet 4 (8 bits) is for local subnets and hosts - perfect for networks with less than 254 hosts.

    Network Masks

    A network mask helps you know which portion of the address identifies the network and which portion of the address identifies the node. Class A, B, and C networks have default masks, also known as natural masks, as shown here:
    Class A: 255.0.0.0
    Class B: 255.255.0.0
    Class C: 255.255.255.0
    An IP address on a Class A network that has not been subnetted would have an address/mask pair similar to: 8.20.15.1 255.0.0.0. To see how the mask helps you identify the network and node parts of the address, convert the address and mask to binary numbers.
    8.20.15.1 = 00001000.00010100.00001111.00000001
    255.0.0.0 = 11111111.00000000.00000000.00000000
    Once you have the address and the mask represented in binary, then identifying the network and host ID is easier. Any address bits which have corresponding mask bits set to 1 represent the network ID. Any address bits that have corresponding mask bits set to 0 represent the node ID.
    8.20.15.1 = 00001000.00010100.00001111.00000001
    255.0.0.0 = 11111111.00000000.00000000.00000000
                -----------------------------------
                 net id |      host id             
    
    netid =  00001000 = 8
    hostid = 00010100.00001111.00000001 = 20.15.1

    Understanding Subnetting

    Subnetting allows you to create multiple logical networks that exist within a single Class A, B, or C network. If you do not subnet, you are only able to use one network from your Class A, B, or C network, which is unrealistic.
    Each data link on a network must have a unique network ID, with every node on that link being a member of the same network. If you break a major network (Class A, B, or C) into smaller subnetworks, it allows you to create a network of interconnecting subnetworks. Each data link on this network would then have a unique network/subnetwork ID. Any device, or gateway, connecting n networks/subnetworks has n distinct IP addresses, one for each network / subnetwork that it interconnects.
    In order to subnet a network, extend the natural mask using some of the bits from the host ID portion of the address to create a subnetwork ID. For example, given a Class C network of 204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in this manner:
    204.17.5.0 -      11001100.00010001.00000101.00000000
    255.255.255.224 - 11111111.11111111.11111111.11100000
                      --------------------------|sub|----
    By extending the mask to be 255.255.255.224, you have taken three bits (indicated by "sub") from the original host portion of the address and used them to make subnets. With these three bits, it is possible to create eight subnets. With the remaining five host ID bits, each subnet can have up to 32 host addresses, 30 of which can actually be assigned to a device since host ids of all zeros or all ones are not allowed (it is very important to remember this). So, with this in mind, these subnets have been created.
    204.17.5.0 255.255.255.224     host address range 1 to 30
    204.17.5.32 255.255.255.224    host address range 33 to 62
    204.17.5.64 255.255.255.224    host address range 65 to 94
    204.17.5.96 255.255.255.224    host address range 97 to 126
    204.17.5.128 255.255.255.224   host address range 129 to 158
    204.17.5.160 255.255.255.224   host address range 161 to 190
    204.17.5.192 255.255.255.224   host address range 193 to 222
    204.17.5.224 255.255.255.224   host address range 225 to 254
    Note: There are two ways to denote these masks. First, since you are using three bits more than the "natural" Class C mask, you can denote these addresses as having a 3-bit subnet mask. Or, secondly, the mask of 255.255.255.224 can also be denoted as /27 as there are 27 bits that are set in the mask. This second method is used with CIDR. With this method, one of these networks can be described with the notation prefix/length. For example, 204.17.5.32/27 denotes the network 204.17.5.32 255.255.255.224. When appropriate the prefix/length notation is used to denote the mask throughout the rest of this document.
    The network subnetting scheme in this section allows for eight subnets, and the network might appear as:

    FIGURE 2
      3b.gif

    Notice that each of the routers in Figure 2 is attached to four subnetworks, one subnetwork is common to both routers. Also, each router has an IP address for each subnetwork to which it is attached. Each subnetwork could potentially support up to 30 host addresses.
    This brings up an interesting point. The more host bits you use for a subnet mask, the more subnets you have available. However, the more subnets available, the less host addresses available per subnet. For example, a Class C network of 204.17.5.0 and a mask of 255.255.255.224 (/27) allows you to have eight subnets, each with 32 host addresses (30 of which could be assigned to devices). If you use a mask of 255.255.255.240 (/28), the break down is:
    204.17.5.0 -      11001100.00010001.00000101.00000000
    255.255.255.240 - 11111111.11111111.11111111.11110000
                      --------------------------|sub |---
    Since you now have four bits to make subnets with, you only have four bits left for host addresses. So in this case you can have up to 16 subnets, each of which can have up to 16 host addresses (14 of which can be assigned to devices).
    Take a look at how a Class B network might be subnetted. If you have network 172.16.0.0 ,then you know that its natural mask is 255.255.0.0 or 172.16.0.0/16. Extending the mask to anything beyond 255.255.0.0 means you are subnetting. You can quickly see that you have the ability to create a lot more subnets than with the Class C network. If you use a mask of 255.255.248.0 (/21), how many subnets and hosts per subnet does this allow for?
    172.16.0.0  -   10101100.00010000.00000000.00000000
    255.255.248.0 - 11111111.11111111.11111000.00000000
                    -----------------| sub |-----------
    You are using five bits from the original host bits for subnets. This allows you to have 32 subnets (25). After using the five bits for subnetting, you are left with 11 bits for host addresses. This allows each subnet so have 2048 host addresses (211), 2046 of which could be assigned to devices.
    Note: In the past, there were limitations to the use of a subnet 0 (all subnet bits are set to zero) and all ones subnet (all subnet bits set to one). Some devices would not allow the use of these subnets. Cisco Systems devices allow the use of these subnets when theip subnet zero command is configured.

    Examples

    Sample Exercise 1

    Now that you have an understanding of subnetting, put this knowledge to use. In this example, you are given two address / mask combinations, written with the prefix/length notation, which have been assigned to two devices. Your task is to determine if these devices are on the same subnet or different subnets. You can do this by using the address and mask of each device to determine to which subnet each address belongs.
    DeviceA: 172.16.17.30/20
    DeviceB: 172.16.28.15/20
    Determining the Subnet for DeviceA:
    172.16.17.30  -   10101100.00010000.00010001.00011110
    255.255.240.0 -   11111111.11111111.11110000.00000000
                      -----------------| sub|------------
    subnet =          10101100.00010000.00010000.00000000 = 172.16.16.0
    Looking at the address bits that have a corresponding mask bit set to one, and setting all the other address bits to zero (this is equivalent to performing a logical "AND" between the mask and address), shows you to which subnet this address belongs. In this case, DeviceA belongs to subnet 172.16.16.0.
    Determining the Subnet for DeviceB:
    172.16.28.15  -   10101100.00010000.00011100.00001111
    255.255.240.0 -   11111111.11111111.11110000.00000000
                      -----------------| sub|------------
    subnet =          10101100.00010000.00010000.00000000 = 172.16.16.0
    From these determinations, DeviceA and DeviceB have addresses that are part of the same subnet.

    Sample Exercise 2

    Given the Class C network of 204.15.5.0/24, subnet the network in order to create the network in Figure 3 with the host requirements shown.

    FIGURE 3

      3c.gif

    Looking at the network shown in Figure 3, you can see that you are required to create five subnets. The largest subnet must support 28 host addresses. Is this possible with a Class C network? and if so, then how?
    You can start by looking at the subnet requirement. In order to create the five needed subnets you would need to use three bits from the Class C host bits. Two bits would only allow you four subnets (22).
    Since you need three subnet bits, that leaves you with five bits for the host portion of the address. How many hosts does this support? 25 = 32 (30 usable). This meets the requirement.
    Therefore you have determined that it is possible to create this network with a Class C network. An example of how you might assign the subnetworks is:
    netA: 204.15.5.0/27      host address range 1 to 30
    netB: 204.15.5.32/27     host address range 33 to 62
    netC: 204.15.5.64/27     host address range 65 to 94
    netD: 204.15.5.96/27     host address range 97 to 126
    netE: 204.15.5.128/27    host address range 129 to 158

    VLSM Example

    In all of the previous examples of subnetting, notice that the same subnet mask was applied for all the subnets. This means that each subnet has the same number of available host addresses. You can need this in some cases, but, in most cases, having the same subnet mask for all subnets ends up wasting address space. For example, in the Sample Exercise 2 section, a class C network was split into eight equal-size subnets; however, each subnet did not utilize all available host addresses, which results in wasted address space. Figure 4 illustrates this wasted address space.

    FIGURE 4
     
    3d.gif
    Figure 4 illustrates that of the subnets that are being used, NetA, NetC, and NetD have a lot of unused host address space. It is possible that this was a deliberate design accounting for future growth, but in many cases this is just wasted address space due to the fact that the same subnet mask is being used for all the subnets.
    Variable Length Subnet Masks (VLSM) allows you to use different masks for each subnet, thereby using address space efficiently.

    VLSM Example

    Given the same network and requirements as in Sample Exercise 2 develop a subnetting scheme with the use of VLSM, given:
    netA: must support 14 hosts
    netB: must support 28 hosts
    netC: must support 2 hosts
    netD: must support 7 hosts
    netE: must support 28 host
    Determine what mask allows the required number of hosts.
    netA: requires a /28 (255.255.255.240) mask to support 14 hosts
    netB: requires a /27 (255.255.255.224) mask to support 28 hosts
    netC: requires a /30 (255.255.255.252) mask to support 2 hosts
    netD*: requires a /28 (255.255.255.240) mask to support 7 hosts
    netE: requires a /27 (255.255.255.224) mask to support 28 hosts
    
    * a /29 (255.255.255.248) would only allow 6 usable host addresses
      therefore netD requires a /28 mask.
    The easiest way to assign the subnets is to assign the largest first. For example, you can assign in this manner:
    netB: 204.15.5.0/27  host address range 1 to 30
    netE: 204.15.5.32/27 host address range 33 to 62
    netA: 204.15.5.64/28 host address range 65 to 78
    netD: 204.15.5.80/28 host address range 81 to 94
    netC: 204.15.5.96/30 host address range 97 to 98
    This can be graphically represented as shown in Figure 5:

    FIGURE 5

      3e.gif
    Figure 5 illustrates how using VLSM helped save more than half of the address space.

    CIDR

    Classless Interdomain Routing (CIDR) was introduced to improve both address space utilization and routing scalability in the Internet. It was needed because of the rapid growth of the Internet and growth of the IP routing tables held in the Internet routers.
    CIDR moves way from the traditional IP classes (Class A, Class B, Class C, and so on). In CIDR , an IP network is represented by a prefix, which is an IP address and some indication of the length of the mask. Length means the number of left-most contiguous mask bits that are set to one. So network 172.16.0.0 255.255.0.0 can be represented as 172.16.0.0/16. CIDR also depicts a more hierarchical Internet architecture, where each domain takes its IP addresses from a higher level. This allows for the summarization of the domains to be done at the higher level. For example, if an ISP owns network 172.16.0.0/16, then the ISP can offer 172.16.1.0/24, 172.16.2.0/24, and so on to customers. Yet, when advertising to other providers, the ISP only needs to advertise 172.16.0.0/16.


    Monday, 14 January 2013

    How Domain Name System (DNS) Works

    Note: This post is not by me.

    In the world of Internet and the area of computer networks, you will often come across the term Domain Name System or Domain Name Service which is simply referred to as DNS. The working of DNS forms one of the basic concepts of computer networks whose understanding is very much essential especially if you are planning to get into the field of ethical hacking or network security.
    In this post, I will try to explain how Domain Name System works in a very simple and easy to follow manner so that even the readers who do not have any prior knowledge of computer networks should be able to understand the concept.

    What is a Domain Name System?

    A “Domain Name System” or “Domain Name Service” is a computer network protocol whose job is to map a user friendly domain name such as “Gohacking.com” to its corresponding IP address like “173.245.61.120″.
    How Domain Name System (DNS) Works
    Every computer on the Internet, be it a web server, home computer or any other network device has a unique IP address allotted to it. This IP address is used to establish connections between the server and the client in order to initiate the transfer of data. Whether you are trying to access a website or sending an email, the DNS plays a very important role here.
    For example, when you type “www.google.com” on your browser’s address bar, your computer will make use of the DNS server to fetch the IP address of Google’s server that is “74.125.236.37″. After obtaining the IP address, your computer will then establish a connection with the server only after which you see the Google’s home page loading on your browser. The whole process is called DNS Resolution.
    With millions of websites on the Internet, it is impossible for people to remember the IP address of every website in order to access it. Therefore, the concept of domain name was introduced so that every website can be identified by its unique name which makes it easy for people to remember. However, the IP address is still used as the base for internal communication by network devices. This is where the DNS comes in to action that works by resolving the user friendly domain name to its corresponding machine friendly IP address.
    In simple words, domain names are for humans while IP addresses are for network devices. The “Domain Name System” is a protocol to establish a link between the two. Hence, it is not a surprise that you can even load a website by directly typing its IP address instead of the domain name in the browser’s address bar (give it a try)!

    Types of DNS Servers and their Role:

    The Domain Name System (DNS) is a distributed database that resides on multiple computers on the Internet in a hierarchical manner. They include the following types:

    Root Name Servers:

    The root servers represent the top level of the DNS hierarchy. These are the DNS servers that contain the complete database of domain names and their corresponding IP addresses. Currently, there are 13 root servers distributed globally which are named using the letters A,B,C and so on up to M.

    Local Name Servers:

    Local servers represent the most lower level DNS servers that are owned and maintained by many business organizations and Internet Service providers (ISPs). These local servers are able to resolve frequently used domain names into their corresponding IP addresses by caching the recent information. This cache is updated and refreshed on a regular basis.

    How DNS Server Works?

    Whenever you type a URL such as “http://www.gohacking.com” on your browser’s address bar, your computer will send a request to the local name server to resolve the domain name into its corresponding IP address. This request is often referred to as a DNS query. The local name server will receive the query to find out whether it contains the matching name and IP address in its database. If found, the corresponding IP address (response) is returned. If not, the query is automatically passed on to another server that is in the next higher level of DNS hierarchy. This process continues until the query reaches the server that contains the matching name and IP address. The IP address (response) then flows back the chain in the reverse order to your computer.
    In rare cases where none of the lower level DNS servers contain the record for a given domain name, the DNS query eventually reaches one of the root name server to obtain the response.

    FAQs about Domain Name System:

    Here is a list of some of the FAQs about DNS:

    How does a “root name server” obtain the information about new domains?

    Whenever a new domain name is created or an existing one is updated, it is the responsibility of the domain registrar to publish the details and register it with the root name server. Only after this, the information can move down the DNS hierarchy and get updated on the lower level DNS servers.

    What is DNS propagation?

    Whenever a new domain name is registered or an existing one is updated, the information about the domain must get updated on all the major DNS servers so that the domain can be reached from all parts of the globe. This is called DNS propagation and the whole process can take anywhere from 24 to 72 hours to get completed.

    How often the DNS servers are updated to refresh the cache?

    There is no specific rule that defines the rate at which DNS servers should be updated. It usually depends on the organization such as the ISP that maintains the server. Most DNS servers are updated on an hourly basis while some may update their databases on a daily basis.
    I hope you have now understood the working of DNS in a very convincing manner. Pass your comments and share your opinion.

    credit: www.gohacking.com