Introduction
Basically, Handover means the giving of control
of or responsibility for to someone else.
Similarly, The process of changing point of
communication while communicating is known
as handover in cellular network.
GSM-architecture-Location tracking and call setup- Mobility management- Handover-
Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and
service data mgt –-Mobile Number portability -VoIP service for Mobile Networks – GPRS –
Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-
combined RA/LA update procedures-Billing
Introduction
Basically, Handover means the giving of control
of or responsibility for to someone else.
Similarly, The process of changing point of
communication while communicating is known
as handover in cellular network.
GSM-architecture-Location tracking and call setup- Mobility management- Handover-
Security-GSM SMS –International roaming for GSM- call recording functions-subscriber and
service data mgt –-Mobile Number portability -VoIP service for Mobile Networks – GPRS –
Architecture-GPRS procedures-attach and detach procedures-PDP context procedure-
combined RA/LA update procedures-Billing
General packet radio services (GPRS) is step to efficiently transport high-speed data over the current GSM and TDMA-based wireless network infrastructures.
Deployment of GPRS networks allows a variety of new applications ranging from mobile e-commerce to mobile corporate VPN access
Deployments of GPRS network has already taken place in several countries in Europe and the far east.
GPRS Architecture and its components are covered extensively.
The slides give a little information about gprs and also gets into deeper explanation of its architecture.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. Need for GPRS
Speed
Immediacy
New
and better applications
User friendly billing
3. History
In 1994, a Special Mobile Group started to think
about a High Speed Data upgrade for GSM.
The first step was HSCSD (High Speed Circuit
Switched Data).
HSCSD is a circuit-switched extension to GSM.
The next step was GPRS.
GPRS is a packet-switched extension to GSM.
4. What is HSCSD?
HSCSD (High Speed Circuit Switched Data).
The simplest high speed data upgrade for GSM.
Provides GSM users with a bandwidth up to 57.6 Kbps.
Does not require a hardware upgrade within BSS or core
network (NSS), but different MS are needed.
5. What is GPRS?
GPRS is a packet oriented data service for IP and
X.25 over GSM networks.
GPRS is a step towards 3G and is often referred to
as 2.5G.
The GPRS network acts in parallel with the GSM
network, providing packet switched connections to
the external networks.
6. Functions
Traditional mobile communication network +
Traditional packet switched computer network.
Capability to separate circuit switched and packet
switched traffic from mobile station (MS)
Interfaces to Internet, intranets, Public Data Networks
(PDN)
Routing of packets to appropriate destination
Allocation of static or dynamic address for packets
originating from MS
Protection of the GPRS network from security threats
Translation between logical names and IP addresses
using Domain Name System (DNS)
10.
Figure shows the architecture of a GPRS network. The GPRS system
brings some new network elements to an existing GSM network. These
elements are:
Packet Control Unit (PCU)
Serving GPRS Support Node (SGSN): the MSC of the GPRS
network
Gateway GPRS Support Node (GGSN): gateway to external
networks
Border Gateway (BG): a gateway to other PLMN (Public Land
Mobile Network)
Intra-PLMN backbone: an IP based network inter-connecting all
the
GPRS elements
Charging Gateway (CG)
Legal Interception Gateway (LIG)
Domain Name System (DNS)
Firewalls: used wherever a connection to an external network is
required.
Not all of the network elements are compulsory for every GPRS network.
11. SGSN (Service GPRS Support Node )
The SGSN is the most important element of the GPRS
network.
The SGSN of the GPRS network is equivalent to the MSC of
the GSM network. There must at least one SGSN in a GPRS
network.
There is a coverage area associated with a SGSN. As the
network expands and the number of subscribers increases,
there may be more than one SGSN in a network.
Handles:
PDP contexts for Mobile Stations.
Determines Quality of Service assigned to user.
Routes packets to Mobile Stations.
“Pages” Mobile Stations when data is to be sent.
Handover/cell Change
12.
Stores:
Security:
Subscriber data for all Mobile Stations in the location area.
Store not-acknowledged packets in case of a cell change during
an ongoing packet data transfer
Authentication, by means of identity or equipment check.
Data compression is used to minimise the size of transmitted data
units
Charging
The SGSN collects CDR's (Call Data Records) for the use of the
own network resources.
13. GGSN (Gateway GPRS Support Node)
The GGSN is the gateway to external networks.
Every connection to a fixed external data network
has to go through a GGSN.
The GGSN acts as the anchor point in a GPRS data
connection even when the subscriber moves to
another SGSN during roaming.
There are usually two or more GGSNs in a network
for redundancy purposes, and they back up each
other up in case of failure.
The functions of a GGSN are given below:
14.
Handles:
Stores:
Interconnects a PLMN to the external world (Internet).
Routes IP packets to the appropriate SGSN.
Routing packets originating from a mobile to the correct external
network
Activation and Deactivation of PDP-Contexts / Session
Management.
Subscriber data for active Mobile Stations.
Security:
Interfaces to external IP networks and deals with security issues
Firewall.
Screening.
Charging
The GGSN will, in addition to the SGSN, collect CDRs and forward
them to the charging gateway (CG).
GGSN will collect call data records based on the usage of external
network resources .
15. Charging Gateway
GPRS users have to be charged for the use of the
network.
In a GSM network, charging is based on the destination,
duration, and time of call.
However, GPRS offers connectionless service to users, so it
not possible to charge subscribers on the connection
duration.
Charging has to be based on the volume, destination, QoS,
and other parameters of a connectionless data transfer.
These GPRS charging data are generated by all the SGSNs
and GGSNs in the network. This data is referred to as
Charging Data Records or CDRs.
16.
One data session may generate a number of CDRs, so
these need to collected and processed.
The Charging Gateway (CG) collects all of these
records, sorts them, processes it, and passes it on to
the Billing System.
The GPRS subscriber is billed for the data transaction.
All CDRs contain unique subscriber and connection
identifiers to distinguish it.
A protocol called GTP„ (pronounced GTP prime) is
used for the transfer of data records between GSNs
and the Charging Gateway.
17. Border Gateway
The Border Gateway (BG) is a router that can provide a
direct GPRS tunnel between different operators' GPRS
networks. This is referred to as an inter- PLMN data
network.
It is more secure to transfer data between two operators„
PLMN networks through a direct connection rather than
via the public Internet.
The Border Gateway will commence operation once the
GPRS roaming agreements between various operators
have been signed.
It will essentially allow a roaming subscriber to connect to
company intranet through the Home GGSN via the
visiting PLMN network.
18. Domain Name Servers
These devices convert IP names into IP addresses
for example, server.nokia.com to 133.44.15.5.
19. Lawful Intercept Gateway
This is for monitoring traffic for law-enforcement
agencies that require court order.
When data packets traverse the GPRS network , it
may be intercepted and forwarded to the agencies.
20. Packet Control Unit
GPRS cell phone will trasmit data in Packet switched
mode and voice in circuit switched mode .
So there needs to be a network to differenciate the
different kinds of calls and send them to respective core
networks – voice call to MSC and data calls to SGSN.
PCU does this . PCU is placed at the Base station
subsystem (BSS) .
The functions of PCU are
Packet segmentation and reassembly
Access control
Scheduling for all active transmissions including radio channel
management
Controlling transmission for checking, buffering and
retransmission
21. Classes Of GPRS Equipments
As GPRS users need to handle both voice and data
services, the following classifications are made in the
perspective of GPRS equipment.
Class A.
Class B.
Equipments that handle voice calls and transfer data at
the same time
Equipments that can handle voice or data traffic
separately, and can put a packet transfer on hold to
receive a phone call
Class C.
Equipments that handle voice calls and transfer data , but
has to be disconnected from one mode explicitly inorder
to enable the other
23.
Gb:
Gr:
Between a SGSN and a BSS.
The Gb interface carries the GPRS traffic and signalling
between the GSM radio network (BSS) and the GPRS network.
Frame Relay based network services is used for this interface.
Between an SGSN and the HLR.
The Gr gives the SGSN access to subscriber information in the
HLR.
The HLR can be located in a different PLMN than the SGSN
(MAP).
Gs:
Between a SGSN and a MSC.
The SGSN can send location data to the MSC or receive
paging requests from the MSC via this optional interface.
24.
Gf:
Between an SGSN and the EIR.
The Gf gives the SGSN access to GPRS user equipment
information.
The EIR maintains three different lists of mobile equipment:
black list for stolen mobiles, grey list for mobiles under
observation and white list for other mobiles .
Gc
Between the GGSN and the HLR.
The GGSN may request the location of an MS via this optional
interface.
The interface can be used if the GGSN needs to forward
packets to an MS that is not active.
Gn
Between two GSNs (GPRS support node) within the same
PLMN. (GP interface is used if they are in different PLMN)
25. It consist of a protocol stack that includes IP and GPRS
Tunnelling Protocol (GTP)
GTP has two parts , the GTP-U which is used to carry user
data and GTP-C to carry control data.
Gd:
Interface connects the SGSN to an SMS gateway , thus
enabling the SGSN to support SMS services.
Gi:
Is a references rather than an interface.
It refers to the connection between the GGSN and some
external network
IPV4, IPV6, and PPP are supported by GGSN
Um:
Modified air interface between mobile device and the GPRS
network.
26. GPRS Logical channel
Logical channels in the GPRS network , are divided
into two categories
Traffic channels
Signalling/Control Channels
Logical channels are defined to perform multiple
functions like broadcast , paging , signalling and
payload transport.
They are listed in table
27. Group
Channel
Function
Direction
Packet Broadcast Control Channel
PBCCH
Broadcast
Control
BSS MS
Packet Data Traffic Channel
PDTCH
Data traffic
flow
MS BSS
Packet Dedicated Control Channel
PACCH
Associated
Control
MS BSS
PTCCH
Timing Cntrl
PRACH
Random
Access
MS BSS
PAGCH
Access
Grant
MS BSS
PPCH
Paging
MS BSS
PNCH
Notification
MS BSS
Packet Common Control Channel
MS BSS
28.
PDTCH:
PBCCH:
Packet Data Traffic Channel
Is employed for the transfer of user data, assigned to one
mobile station (MS) during data transfer.
Each MS can use several PDTCHs simultaneously
Packet Broadcast Control Channel.
Is a uni-directional point to multi point signalling channel
from base station sub system (BSS) to mobile stations.
PTCCH:
Packet Timing Advance Control Channel .
used for adaptive frame synchronisation.
29.
PCCCH:
Packet Common Control Channel.
bi-directional point to multi point channel
Transport signalling information for network access
management
It consist of for sub channels as shown in table
30. GPRS Service Types
A PLMN provider is responsible for the data transfer
between the GPRS Service Access Points
Two kinds of services are presents
PTP (Point to Point):
Used for single packet transfer between two subscribers.
Operated in connection oriented (CONS) and connection
less mode (CLNS)
CONS for X.25
CLNS for IP
PTM (Point to Multipoint):
Supports transmission of data packets between a service
user and a specified group inside a certain geographical
region.
31.
It is again divided into
PTM- Multicast (PTM-M).
PTM- Group (PTM-G)
In PTM-M Data packets are broadcast over a certain
geographical area.
A group identifier indicates whether the packets are intended
for all users or a group of users
PTM- Group (PTM-G) is meant for only certain group of users
The messages are addressed explicitly to a specified group
and are sent to all geographical region where the group
members are located .
33.
Idle Mode. (MS off or not attached yet.).
Ready Mode. (MS is able to send and receive data).
If the MS is on, and is a Class B or Class C MS, the MS will
listen to the network, but not make any updating of where
the MS is. It is not possible to page an MS.
Cell updating is necessary.
If no activity within the timer (44s) the MS will fall back to a
stand-by state.
NOTE: an MS can be forced back to standby mode due to
lack of recourses.
Standby Mode. (MS is listening to the Network).
It is possible to page the MS.