Skip to main content

Commands used in Dockefile - Part4

  Docker is an opensource tool used for virtualization and deliver software in the form of packages called Containers. It is one of the most important tools used in networking domain.  Dockerfile  is a template for building the image which contains commands needed to package the software. In this post, I am going to explain the commands ADD & COPY used in  Dockerfile .   ADD Command:   ADD command is used to copy files, directories or files from remote URLS to destination path in the image. The source paths can contain wildcards.   If the destination has relative path, it is relative to the Working directory of the image. Note that source path is always relative to the Docker build context.   ADD command will not support authentication. So, if there are any protected files to be added in  Dockerfile  building, use other tools like curl or  wget   Dockerfile  copying Single & Multiple files, directory using ADD inst...

Introduction to ANDSF

Introduction to ANDSF: 

ANDSF full form is Access Network Discovery and Selection Function. It’s an entity in the Evolved Packet Core Network that helps in assisting User Equipment (UE) in the discovery or selection of access networks such as Wi-Fi, LTE etc. It follows the Client-Server architecture.  
ANDSF client and ANDSF server communicate using Open Mobile Alliance Device Management protocol (OMA-DM) over the s14 interface. It uses push and pulls mechanism for communication. The high-level interaction between the ANDSF server and UE looks like below:  

Information exchanged by ANDSF Server: 

ANDSF server provides the following category of information: 

Access Network Discovery Information: 
This information has the list of access networks like Wi-Fi that are in the range of the UE. In response to the UE request which contains information like location, supported interfaces, ANDSF provides the list of access networks available. Based on the response from the ANDSF server, the UE makes the decision to which network it should connect. The ANDSF response contains the following details: 
  • Type of technology like Wi-Fi, WiMAX 
  • Radio access network identifier like SSID of WLANs 
  • Technology information like one or more carrier frequencies 
These access networks can be belonging to any network operator. 

Inter-System Mobility Policy (ISMP): 

This policy is valid for UE’s that have access to more than one active access network at the same time. For example, a device may support both LTE and Wi-Fi technologies but can connect to only one at a time. It consists of rules and policies used by UE’s to select the most preferable technology.  

Inter-System Routing Policy (ISRP): 
This policy is valid for UE’s that have access to more than one active access network and also which can route IP traffic concurrently over multiple radio access interfaces. UE uses this policy information to select the most preferable access network to direct the given traffic. This information can also be used by UE using protocols like DSMIPv6 (Dual Stack Mobile IPv6). 
It also has validity conditions like location area condition, time of the day condition etc. Based on UE’s location, it can be connected to Home ANDSF (H-ANDSF) and Visitors ANDSF (V-ANDSF).  

Comments

  1. Mazenet Technologies is a comprehensive IT service provider of enterprise security solutions, offering a full range of Networking to support business infrastructure. Our 18+ years of expertise in storage optimization, cloud migration, and managed security services have aided the timely delivery of solutions by enhancing operational excellence in clients’ business. IT Managed Services Provider | Network consulting service | IT Products Get quote now or contact us : 7397723052.

    ReplyDelete

Post a Comment

Popular posts from this blog

Notes on IPv4, IPv6 and MAC representations

  In companies related to networking domain, “ Explain IPv4, IPv6 and MAC ” is one of the common questions asked in technical interview. This post provides overview of these concepts. IP: IP is the protocol used in Networking layer. It is responsible for the delivering packets from source to destination based on the identifier known as IP address of the device. There are two popular ways of representing the devices in the network. They are: IPv4  (Internet  Protocol version 4) IPv6 (Internet Protocol version6) IPv4:   This version of IP uses 32-bit addresses to identify the device on the network.  Therefore,  the total number of addresses possible with IPv4 is 2 32 . These  32-bit  addresses are divided into 4 octets (batch of 8 bits) with each octet represented in decimal numbers and octets are separated by dot. In IPv4 the loopback address of a device is  127.0.0.1 . IPv4 supports unicasting, broadcasting and multicasting. To map IPv4 addre...

Vyos - An Open Source Network Operating System

What is  a  Network Operating System?   Networking Operating System (NOS) is an O perating system  that  has the capability to  support workstations, database sharing, application sharing, file ,  and printer access sharing among multiple computers in a network. In general ,  NOS is a specialized operating system used for devices like router, switch or firewall. Features of Networking Operating System:   NOS has the following features: Basic features like protocol support, processor support, hardware detection and multiprocessing support for applications Authentication, access control, authorization ,  and restriction facilities are supported to provide security Provides file service, web service, printing and replication Has Naming and Directory Management services Has  the provision  for user management and remote access & system management Also has internetworking features like routing and ...

Introduction to EPC Network and its architecture

What is EPC?   EPC stands for Evolved Packet Core. It is a framework to provide both voice and data on a 4G LTE (Long Term Evolution) network.   2G and 3G networks process voice using circuit switched domain and data using the packet-switched domain. But the EPC network unifies both data as well as voice on Internet Protocol (IP) Server architecture and treat it as an IP application.   Key Components of EPC:   The following components play a vital role in the EPC network:   Mobile Management Entity:  It takes care of session management, authentication of user and tracking of the user across the network   Serving Gateway (S-Gateway):  It is responsible for the routing of data packets across access networks   Packet Data Node Gateway (PGW):  It is an interface between the LTE network and other packet data networks. It also helps in maintaining Quality of Service (QoS) and deep inspection of the packe...