Skip to main content

Commands used in Dockefile - Part4

  Docker is an opensource tool used for virtualization and deliver software in the form of packages called Containers. It is one of the most important tools used in networking domain.  Dockerfile  is a template for building the image which contains commands needed to package the software. In this post, I am going to explain the commands ADD & COPY used in  Dockerfile .   ADD Command:   ADD command is used to copy files, directories or files from remote URLS to destination path in the image. The source paths can contain wildcards.   If the destination has relative path, it is relative to the Working directory of the image. Note that source path is always relative to the Docker build context.   ADD command will not support authentication. So, if there are any protected files to be added in  Dockerfile  building, use other tools like curl or  wget   Dockerfile  copying Single & Multiple files, directory using ADD inst...

Introduction to GSM

What is GSM? 
GSM stands for Global System for Mobile Communication. It is nothing but a digital mobile network used by mobiles in Europe and some other countries. GSM uses a variant of Time Division Multiple Access (TDMA). It digitizes and compresses data and send it via the channel in their own time slots. GSM operates at the frequency of 900 or 1800MHz. 

Composition of GSM Network: 
GSM network is composed of three parts namely the Network Switching Subsystem (NSS), Operation and Support Subsystem (OSS), and Base Station Subsystem (BSS). The architecture of the GSM network looks like below: 
GSM architecture 
In GSM, mobile device is connected to the network via hardware of the BSS. The SIM (Subscriber Identity Module) card is used for the authentication of the mobile user.   

The traffic between NSS and mobile devices is controlled by BSS. The BSS has two components namely Base Transceiver Station (BTS) and Base Station Controller (BSC). BTS has the equipment necessary to communicate with mobile phones. BSC is another entity that communicates with BTS and controls a group of BTS components. 

The NSS component is also known as the core network is used to track the location of callers to enable delivery of the cellular services. Mobile carriers have their own NSS. The NSS has various parts like Mobile Switching Center (MSC) and Home Location Register (HLN). These components perform functions like routing calls, SMS (Short Message Service) and storing caller account information. 

Security of GSM: 
GSM uses authentication in the form of a password. The password is encrypted using stream cipher cryptography algorithms like A5/1, A5/2, and A5/3. These are broken and hence GSM is susceptible to plain text attacks.   

GSM uses General Packet Radio Service (GPRS) to transmit data via web browsing. GPRS uses algorithms like GEA/1, GEA/2 and these algorithms are also broken. 

Comments

Popular posts from this blog

Notes on IPv4, IPv6 and MAC representations

  In companies related to networking domain, “ Explain IPv4, IPv6 and MAC ” is one of the common questions asked in technical interview. This post provides overview of these concepts. IP: IP is the protocol used in Networking layer. It is responsible for the delivering packets from source to destination based on the identifier known as IP address of the device. There are two popular ways of representing the devices in the network. They are: IPv4  (Internet  Protocol version 4) IPv6 (Internet Protocol version6) IPv4:   This version of IP uses 32-bit addresses to identify the device on the network.  Therefore,  the total number of addresses possible with IPv4 is 2 32 . These  32-bit  addresses are divided into 4 octets (batch of 8 bits) with each octet represented in decimal numbers and octets are separated by dot. In IPv4 the loopback address of a device is  127.0.0.1 . IPv4 supports unicasting, broadcasting and multicasting. To map IPv4 addre...

Commands used in Dockefile - Part4

  Docker is an opensource tool used for virtualization and deliver software in the form of packages called Containers. It is one of the most important tools used in networking domain.  Dockerfile  is a template for building the image which contains commands needed to package the software. In this post, I am going to explain the commands ADD & COPY used in  Dockerfile .   ADD Command:   ADD command is used to copy files, directories or files from remote URLS to destination path in the image. The source paths can contain wildcards.   If the destination has relative path, it is relative to the Working directory of the image. Note that source path is always relative to the Docker build context.   ADD command will not support authentication. So, if there are any protected files to be added in  Dockerfile  building, use other tools like curl or  wget   Dockerfile  copying Single & Multiple files, directory using ADD inst...

Notes on HTTP Response Status codes

  In Networking domain or API testing, it is often common that we should be able to interpret the status codes in Http Response received when we send a request and take a decision . .  Also, in technical interviews related to networking domain, “ Explain Http Status codes”  is one of the common interview questions. In this post, I am giving overview of Http Status codes. Http response status codes can be broadly classified into below 5 categories:   1xx - Informational codes 2xx - Success codes 3xx - Redirection codes 4xx - Client Error or Bad Request 5xx - Server Error 1xx Codes: 1xx codes means that server has received the request and understood the need of the client. These status codes indicate client to wait for getting a final response. An example where we may get these codes is that the client asking server to switch protocols. 2xx Codes: 2xx codes means that server has received, understood and accepted. Some important codes and meaning are given below: ...