Skip to main content

Commands used in Dockefile - Part4

  Docker is an opensource tool used for virtualization and deliver software in the form of packages called Containers. It is one of the most important tools used in networking domain.  Dockerfile  is a template for building the image which contains commands needed to package the software. In this post, I am going to explain the commands ADD & COPY used in  Dockerfile .   ADD Command:   ADD command is used to copy files, directories or files from remote URLS to destination path in the image. The source paths can contain wildcards.   If the destination has relative path, it is relative to the Working directory of the image. Note that source path is always relative to the Docker build context.   ADD command will not support authentication. So, if there are any protected files to be added in  Dockerfile  building, use other tools like curl or  wget   Dockerfile  copying Single & Multiple files, directory using ADD inst...

Introduction to OMA-DM protocol

OMA-DM stands for Open Mobile Alliance Device Management. It is the protocol that supports communication between the Access Network Discovery and Selection Function (ANDSF) server and Client. This protocol is based on client-server architecture. It is IP based and is related to the transport protocol used. This protocol is based on SyncML which is a lighter version of XML. It uses a messaging sequence that consists of three parts: 

Alert Phase: 
This is an optional phase used for server-initiated management sessions. In this phase, data flows only from server to client. When the server wants to push settings to the device, it has to send a notification packet to it to start new management session. This phase is done using Wireless Application Protocol (WAP) push message over the SMS bearer. 

Setup phase: 
This is a mandatory phase used for authentication and device management purpose. In this phase, data flows between UE to the ANDSF server. The client sends and setup request which is followed by server response. The setup request has the following information: 
      1) Device information like the device ID, phone language and model tag 
      2)Client credentials for authentication purpose 
      3) Session origin which determines who initiated the session

Data Management Session: 
The setup phase ends with the server sending the command to the client. In this phase, the client sends status information to the server in response to the command's received.  After this, the server sends commands to the client or indicate that there are no more operations. If the server sends there are no more options, then the client stops sending messages to the server and close the session. 

The first two phases are carried over a TLS session with UE and server. Note that the session is always started by the client but the server may request with the notification alert SMS.  In General Authentication Architecture (GAA), the TLS session is secured using the PSK key. In the generic OMA-DM mode, it is a normal HTTPS session. 

If GAA is not used, the server responds to the client with its credentials for authentication purposes. Also, along with the credentials, it sends initial DM commands. In OMA-DM mode, the server issues commands and the client follows them.  
 

OMA-DM Management objects: 
In OMA-DM, the device configuration data is arranged in the hierarchical manner called device management tree. In this tree, subtrees are called as device management nodes and leaf nodes are called as Manageable Objects (MO). Note that the ANDSF MO is subtree under “./ANDSF” node. It uses SyncML messages to manipulate Manageable objects using the following commands: 

1) Add – Add a node to the device management tree 
2) Get – Get the name of the node based on the URI request in GET method 
3) Replace – Replace an object of the device management tree 
4) Delete – Delete an object of the device management tree 
5) Copy  Copy an object of the device management tree 
6) Exec –Exceutes the device defined command on the object int the device management tree 

The ANDSF MO generally uses ADD, DELETE, GET, and REPLACE frequently. Each MO is an interface for functionality and the following MO are mandatory in OMA-DM. 
1) Devinfo 
2) DevDetail 
3) DmAcc 

Comments

Popular posts from this blog

Vyos - An Open Source Network Operating System

What is  a  Network Operating System?   Networking Operating System (NOS) is an O perating system  that  has the capability to  support workstations, database sharing, application sharing, file ,  and printer access sharing among multiple computers in a network. In general ,  NOS is a specialized operating system used for devices like router, switch or firewall. Features of Networking Operating System:   NOS has the following features: Basic features like protocol support, processor support, hardware detection and multiprocessing support for applications Authentication, access control, authorization ,  and restriction facilities are supported to provide security Provides file service, web service, printing and replication Has Naming and Directory Management services Has  the provision  for user management and remote access & system management Also has internetworking features like routing and ...

Notes on IPv4, IPv6 and MAC representations

  In companies related to networking domain, “ Explain IPv4, IPv6 and MAC ” is one of the common questions asked in technical interview. This post provides overview of these concepts. IP: IP is the protocol used in Networking layer. It is responsible for the delivering packets from source to destination based on the identifier known as IP address of the device. There are two popular ways of representing the devices in the network. They are: IPv4  (Internet  Protocol version 4) IPv6 (Internet Protocol version6) IPv4:   This version of IP uses 32-bit addresses to identify the device on the network.  Therefore,  the total number of addresses possible with IPv4 is 2 32 . These  32-bit  addresses are divided into 4 octets (batch of 8 bits) with each octet represented in decimal numbers and octets are separated by dot. In IPv4 the loopback address of a device is  127.0.0.1 . IPv4 supports unicasting, broadcasting and multicasting. To map IPv4 addre...

Introduction to Docker and Containers - Overview, Installation, Image and Container creation

Docker is an open source software used to develop and deliver the software in  the  form of packages known as Containers. Software used for hosting containers is known as Docker Engine. Docker is written in the Go programming language. Containers are isolated from each other. Each container has its own libraries, configuration files and there are mechanisms through containers  to  communicate with each other. These containers are created from images which can be modified or customized based on the need. All the containers share the host operating system and hence these are light-weight. An Image from which containers are created is nothing but a package of code, libraries, environment variables and configuration files. For knowing differences between docker containers and virtual machines, click  here . Here we learn how to install  D ocker, build an image, create containers using  the  image, clearing and viewing containers i...