Sunday, October 24, 2010

Data in GSM Networks

The Global System for Mobile Communication (GSM) is a multiservice cellular network. It provides not only voice service, but a good set of data services as well. This chapter describes the data services offered by a GSM network. It describes the data services before the advent of GPRS and EDGE.
The GSM data services can be categorized in terms of traffic, signaling, and broadcast channel data services. The GSM standard specifies data services on the traffic channel (TCH), which can be utilized by data applications such as fax and Internet service provider (ISP) connection. This is also referred to as circuit switched (CS) data service. The data service on a signaling channel is known as the point-to-point short message service (SMS). Using SMS, a subscriber sends or receives a short string of text (maximum 126 characters) using a signaling channel. There is another type of SMS service called SMS broadcast, which is the only broadcast channel data service. This service transports data on a specially defined broadcast channel to all the subscribers in a cell. The broadcast data applications, such as traffic reports and weather alerts, were anticipated to use this service, but it didn't get much attention in deployment from cellular service providers.

CYBER FORENSICS

Cyber forensics can be defined as the process of extracting information and data from computer storage media and guaranteeing its accuracy and reliability. The challenge of course is actually finding this data, collecting it, preserving it, and presenting it in a manner acceptable in a court of law.
Electronic evidence is fragile and can easily be modified. Additionally, cyber thieves, criminals, dishonest and even honest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media using a variety of freeware, shareware and commercially available utility programs.
A global dependency on technology combined with the expanding presence of the Internet as a key and strategic resource requires that corporate assets are well protected and safeguarded.
When those assets come under attack, or are misused, info security professionals must be able to gather electronic evidence of such misuse and utilize that evidence to bring to justice those who misuse the technology.
Cyber forensics, while firmly established as both an art as well as a science, is at its infancy. With technology evolving, mutating, and changing at such a rapid pace, the rules governing the application of cyber forensics to the fields of auditing, security, and law enforcement are changing as well. Almost daily, new techniques and procedures are designed to provide info security professionals a better means of finding electronic evidence, collecting it, preserving it, and presenting it to client management for potential use in the prosecution of cyber criminals.

Saturday, October 16, 2010

Internet Registries

Three regional Internet registries are responsible for the assignment of IP addresses and autonomous system numbers globally (other organizations are responsible for the assignment of domain names):
  • ARIN— American Registry for Internet Numbers
  • APNIC— Asia Pacific Network Information Centre
  • RIPE— Réseaux IP Européens
ARIN is a nonprofit organization established for the purpose of administration and registration of IP numbers for the following geographical areas: North America, South America, the Caribbean, and sub-Saharan Africa.
APNIC represents the Asia Pacific region, comprising 62 economies. It is a not-for-profit, membership-based organization whose members include Internet service providers, national Internet registries, and similar organizations.
RIPE is an open collaborative community of organizations and individuals operating wide area IP networks in Europe and beyond. The objective of the RIPE community is to ensure the administrative and technical coordination necessary to enable operation of a pan-European IP network. RIPE has no formal membership, and its activities are performed on a voluntary basis.

Satellite Communication Systems

The era of satellite systems began in 1957 with the launch of Sputnik by the Soviet Union.
However, the communication capabilities of Sputnik were very limited. The first real communication
satellite was the AT&T Telstar 1, which was launched by NASA in 1962. Telstar 1
was enhanced in 1963 by its successor, Telstar 2. From the Telstar era to today, satellite
communications [16] have enjoyed an enormous growth offering services such as data,
paging, voice, TV broadcasting, Internet access and a number of mobile services.
Satellite orbits belong to three different categories. In ascending order of height, these are
the circular Low Earth Orbit (LEO), Medium Earth Orbit (MEO) and Geosynchronous Earth
Orbit (GEO) categories at distances in the ranges of 100–1000 km, 5000–15 000 km andapproximately 36 000 km, respectively. There also exist satellites that utilize elliptical orbits.
These try to combine the low propagation delay property of LEO systems and the stability of
GEO systems.
The trend nowadays is towards use of LEO orbits, which enable small propagation delays
and construction of simple and light ground mobile units. A number of LEO systems have
appeared, such as Globalstar and Iridium. They offer voice and data services at rates up to 10
kbps through a dense constellation of LEO satellites.

HSCSD and GPRS

Another advantage of GSM is its support for several extension technologies that achieve
higher rates for data applications. Two such technologies are High Speed Circuit Switched
Data (HSCSD) and General Packet Radio Service (GPRS). HSCSD is a very simple upgrade
to GSM. Contrary to GSM, it gives more than one time slot per frame to a user; hence the
increased data rates. HSCD allows a phone to use two, three or four slots per frame to achieve
rates of 57.6, 43.2 and 28.8 kbps, respectively. Support for asymmetric links is also provided,
meaning that the downlink rate can be different than that of the uplink. A problem of HSCSD
is the fact that it decreases battery life, due to the fact that increased slot use makes terminals
spend more time in transmission and reception modes. However, due to the fact that reception
requires significantly less consumption than transmission, HSCSD can be efficient for web
browsing, which entails much more downloading than uploading.
GPRS operation is based on the same principle as that of HSCSD: allocation of more slots
within a frame. However, the difference is that GPRS is packet-switched, whereas GSM and
HSCSD are circuit-switched. This means that a GSM or HSCSD terminal that browses the
Internet at 14.4 kbps occupies a 14.4 kbps GSM/HSCSD circuit for the entire duration of the
connection, despite the fact that most of the time is spent reading (thus downloading) Web
pages rather than sending (thus uploading) information. Therefore, significant system capacity
is lost. GPRS uses bandwidth on demand (in the case of the above example, only when
the user downloads a new page). In GPRS, a single 14.4 kbps link can be shared by more than
one user, provided of course that users do not simultaneously try to use the link at this speed;
rather, each user is assigned a very low rate connection which can for short periods use
additional capacity to deliver web pages. GPRS terminals support a variety of rates, ranging
from 14.4 to 115.2 kbps, both in symmetric and asymmetric configurations.

GSM

Throughout Europe, a new part of the spectrum in the area around 900 MHz has been made
available for 2G systems. This allocation was followed later by allocation of frequencies at
the 1800 MHz band. 2G activities in Europe were initiated in 1982 with the formation of a
study group that aimed to specify a common pan-European standard. Its name was ‘Groupe
Speciale Mobile’ (later renamed Global System for Mobile Communications). GSM [3],
which comes from the initials of the group’s name, was the resulting standard. Nowadays,
it is the most popular 2G technology; by 1999 it had 1 million new subscribers every week.
This popularity is not only due to its performance, but also due to the fact that it is the only 2G
standard in Europe. This can be thought of as an advantage, since it simplifies roaming of
subscribers between different operators and countries.
The first commercial deployment of GSM was made in 1992 and used the 900 MHz band.
The system that uses the 1800 MHz band is known as DCS 1800 but it is essentially GSM.
GSM can also operate in the 1900 MHz band used in America for several digital networks and
in the 450 MHz band in order to provide a migration path from the 1G NMT standard that
uses this band to 2G systems.
As far as operation is concerned, GSM defines a number of frequency channels, which are
organized into frames and are in turn divided into time slots. The exact structure of GSM
channels is described later in the book; here we just mention that slots are used to construct
both channels for user traffic and control operations, such as handover control, registration,
call setup, etc. User traffic can be either voice or low rate data, around 14.4 kbps.

What Is PHP?

PHP is officially known as PHP: Hypertext Preprocessor. It is a server-side scripting language often written in an HTML context. Unlike an ordinary HTML page, a PHP script is not sent directly to a client by the server; instead, it is parsed by the PHP engine. HTML elements in the script are left alone, but PHP code is interpreted and executed. PHP code in a script can query databases, create images, read and write files, talk to remote servers—the possibilities are endless. The output from PHP code is combined with the HTML in the script and the result sent to the user.

PHP is also installed as a command-line application, making it an excellent tool for scripting on a server. Many system administrators now use PHP for the sort of automation that has been traditionally handled by Perl or shell scripting.

Why Choose PHP?

There are some compelling reasons to work with PHP. For many projects, you will find that the production process is significantly faster than you might expect if you are used to working with other scripting languages. At Corrosive we work with both PHP and Java. We choose PHP when we want to see results quickly without sacrificing stability. As an open-source product, PHP is well supported by a talented production team and a committed user community. Furthermore, PHP can be run on all the major operating systems and with most servers.

Speed of Development

Because PHP allows you to separate HTML code from scripted elements, you will notice a significant decrease in development time on many projects. In many instances, you will be able to separate the coding stage of a project from the design and build stages. Not only can this make life easier for you as a programmer, but it also can remove obstacles that stand in the way of effective and flexible design.

PHP Is Open Source

To many people, open source simply means free, which is, of course, a benefit in itself.

Well-maintained open-source projects offer users additional benefits, though. You benefit from an accessible and committed community that offers a wealth of experience in the subject. Chances are that any problem you encounter in your coding can be answered swiftly and easily with a little research. If that fails, a question sent to a mailing list can yield an intelligent, authoritative response.

You also can be sure that bugs will be addressed as they are found, and that new features will be made available as the need is defined. You will not have to wait for the next commercial release before taking advantage of improvements.

There is no vested interest in a particular server product or operating system. You are free to make choices that suit your needs or those of your clients, secure that your code will run whatever you decide.

Performance

Because of the powerful Zend engine, PHP shows solid performance compared with other server scripting languages, such as ASP, Perl, and Java Servlets, in benchmark tests. To further improve performance, you can acquire a caching tool (Zend Accelerator) from http://www.zend.com/; it stores compiled code in memory, eliminating the overhead of parsing and interpreting source files for every request.

Portability

PHP is designed to run on many operating systems and to cooperate with many servers and databases. You can build for a Unix environment and shift your work to NT without a problem. You can test a project with Personal Web Server and install it on a Unix system running on PHP as an Apache module.

TOP COUNTRIES IN MOBILE Subscribers

TOP COUNTRIES using MOBILE PHONES
  1. CHINA
  2. INDIA
  3. USA
  4. RUSSIA
  5. BRAZIL
  6. INDONESIA
  7. JAPAN
  8. GERMANY

Sunday, October 10, 2010

http://www.addthis.com/bookmark.php?v=20

http://www.addthis.com/bookmark.php?v=20

TCP/IP Layers

TCP/IP Architecture and the TCP/IP Model


The OSI reference model consists of seven layers that represent a functional division of the tasks required to implement a network. It is a conceptual tool that I often use to show how various protocols and technologies fit together to implement networks. However, it's not the only networking model that attempts to divide tasks into layers and components. The TCP/IP protocol suite was in fact created before the OSI Reference Model; as such, its inventors didn't use the OSI model to explain TCP/IP architecture (even though the OSI model is often used in TCP/IP discussions today, as you will see in this Guide, believe me.)
The TCP/IP Model

The developers of the TCP/IP protocol suite created their own architectural model to help describe its components and functions. This model goes by different names, including the TCP/IP model, the DARPA model (after the agency that was largely responsible for developing TCP/IP) and the DOD model (after the United States Department of Defense, the “D” in “DARPA”). I just call it the TCP/IP model since this seems the simplest designation for modern times.

Regardless of the model you use to represent the function of a network—and regardless of what you call that model!—the functions that the model represents are pretty much the same. This means that the TCP/IP and the OSI models are really quite similar in nature even if they don't carve up the network functionality pie in precisely the same way. There is a fairly natural correspondence between the TCP/IP and OSI layers, it just isn't always a “one-to-one” relationship. Since the OSI model is used so widely, it is common to explain the TCP/IP architecture both in terms of the TCP/IP layers and the corresponding OSI layers, and that's what I will now do.

TCP/IP

Introduction
TCP/IP is the most used network protocol nowadays. In this tutorial we will explain how it works in a very easy to follow language.

So, what is a network protocol anyway? Protocol is like a language used to make two computers to talk to each other. Like in real world, if they are not talking the same language, they cannot communicate.

Before going further, we recommend you to read our tutorial The OSI Reference Model for Network Protocols, which is a primer for understanding how network protocols work. Consider the present tutorial as a sequel to our OSI Reference Model tutorial.

TCP/IP is not really a protocol, but a set of protocols – a protocol stack, as it is most commonly called. Its name, for example, already refers to two different protocols, TCP (Transmission Control Protocol) and IP (Internet Protocol). There are several other protocols related to TCP/IP like FTP, HTTP, SMTP and UDP – just to name a few

The Internet Protocol Suite is the set of communications protocols used for the Internet  and other similar networks. It is commonly also known as TCP/IP, named from two of the most important protocols in it: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two networking protocols defined in this standard. Modern IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the Internet  and local area networks, which emerged during the 1980s, together with the advent of the World Wide Web in the early 1990s.

The Internet Protocol Suite, like many protocol suites, is constructed as a set of layers. Each layer solves a set of problems involving the transmission of data. In particular, the layers define the operational scope of the protocols within.

Often a component of a layer provides a well-defined service to the upper layer protocols and may be using services from the lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted.
The TCP/IP model consists of four layers.

Tuesday, October 05, 2010

Installing WINE on Ubuntu 9.10

How to Install WINE on Ubuntu 9.10




1.Open Firefox and go to http://wine.budgetdedicated.com

2.Under "Direct links to the latest Wine Packages", select Ubuntu Jaunty (9.04) package (1.1.32 1386 or 1.1.32 amd64) depending on your platform

3.Left Click your selection and then tick the option to (1) Open with GDebi Package Installer and (2) Click OK to install

If all goes well, you should now have WINE up and running on your Ubuntu 9.10.

Installation of Wine in Ubuntu

Here is a quick way to add the winehq repository so you dont need to wait for the ubuntu community to add the latest wine.


Open up a terminal Applications->Accessories->Terminal

Now copy/paste these commands:

Adding the gpg apt key:



wget -q http://wine.budgetdedicated.com/apt/387EE263.gpg -O-
sudo apt-key add -



Lets add the Repository via wget:



sudo wget http://wine.budgetdedicated.com/apt/sources.list.d/hardy.list -O /etc/apt/sources.list.d/winehq.list



Now lets update our apt sources and install the latest wine!



sudo apt-get update ; sudo apt-get install wine



Ok now you will always have the latest wine package installed!