Monday, May 31, 2010

What is Inter Packet Gap or Inter Frame Gap?

Let's assume if a Gigi port which could transfer raw data up to 125,000,000 bytes per second with minimum frame size of 64 bytes. Device must need some time to process one packet after another. The difference of time to process from one packet to another is known as inter-frame or inter-packet gap. The minimum inter frame gap period is 96 bits or 12 bytes which amounts to 96 nano seconds + 7 byte of preamble and 1 byte of delimiter consequence 84 bytes.

Click Here To Read Rest Of The Post...

Saturday, May 29, 2010

Top IPv6 Sites

Given list depicts the top 50 IPv6 sites. 2607:f0d0:1000:11:1::1 2001:470:dc56:b00::25:1 2a01:e0c:1:1599::1 2a01:7b0:2:3::26 2001:278:0:1106::4 2001:41d0:1:149::1 2001:2e8:22:13::103 2001:1af8:3100:1:214:22ff:fe1e:d380 2a00:d00:ff:131:94:228:131:131 2001:41d0:2:4136::1 2a00:f80::10 2001:610:240:22::c100:68b 2001:0:53aa:64c:3827:3ed1:a42d:97ce 2001:41d0:2:8673::1 2607:f128::2 2001:dc7:1::daf1:6129 2001:4d88:ffff:ffff:30:524:ac23:2 2001:4f8:fff6::21 2607:f590:0:ffff::3d 2001:4178:2:1269::12 2607:f0d0:1003:c::30 2001:470:0:76::2 2001:470:b040:20::1 2001:200:167:201::20 2001:888:2000:d::a2 2607:f128:40::174 2001:a60:9003:a000::b003 2001:41d0:1:7b1f::1 2001:388:608c:8a3::95 2001:500:4:13::81 2001:268:fd02::8 2001:888:2000:29::206:85 2001:470:1f0a:1505::2 2620:0:2d0:200::7 2001:1600:3:6::101 2a01:3b0:1:1::1:a 2001:62a:4:1::80:108 2001:240:400::8591:e013 2620:0:1af0:144:ffff::fff2 2a01:390:1:0:21e:c9ff:feee:84b0 2001:5e8:0:1000::fc 2001:c80:a001:1::cad9:2c8f 2620:0:2d0:200::9 2001:dc6:ff00:3::8e 2001:470:1:3a::14 2620:0:2d0:1::193 2001:1600:3:7::101 2001:470:1:3a::13 2001:da8:200:200::4:100 2001:690:2200:a10::13


Click Here To Read Rest Of The Post...

Thursday, May 27, 2010

Diffie-Hellman(DH) Shared Key Exchange Mechanism

Diffie-Hellman is cryptography protocol, which allows two users to exchange the key over the public cloud. Mainly VPN uses Diffie-Hellman algorithms to provide reliable and trusted method of key exchanges. The algorithm was being invented by Whitefiled Diffie and Martin Hellman in 1976. During DH exchange both users must agree on two non secret numbers which could be available publically or in the form of any certificate. After this agreement, users exchange their keys and come to know that their and remote user keys are same. After bona fied to each other, they start exchange their data.
In this post, I will explain how the keys values are calculated. First we need to define two public keys which are available through any certificate or via any other method to both users. Let’s assume n and g are public keys for user1 and user2. Value of g should be small and n(take big values) should be prime number.
Both users are having same keys initially.
Next step is to use the private keys and compute the value which should be given to remote user.
Private key for user1 is 3 and for user2 is 5.

Calculate the public key value which will be transmitted to remote user. Formula for calculating Public Value for User1 will be given below:-
Public Value:- g^(private key of user1) mod n
Public Value:- 2^3 mod 997
Public Value:- 8 mod 997
Public Value:- 8

Formula for calculating Public Value for User2 will be given below:-
Public Value:- g^(private key of user2) mod n
Public Value:- 2^5 mod 997
Public Value:- 32 mod 997
Public Value:- 32

Now both users will exchange their public values to each other and on the basics of receiving public values user will calculate the secret key.
User1 is receiving 32 from user2 and user2 is receiving 8 from user1

User1 will calculate it’s shared key by using given formula:-
User1 Shared Key:- (Received Public Key From User2)^(user1 private key) mod n
User1 Shared Key:-32^3 mod 997
User1 Shared Key:-32768 mod 997
User1 Shared Key:- 864

User2 will calculate it’s shared key by using given formula:-
User2 Shared Key:- (Received Public Key From User1)^(user2 private key) mod n
User2 Shared Key:-8^5 mod 997
User2 Shared Key:-32768 mod 997
User2 Shared Key:- 864

User1 and User2 are having same shared keys which is 864

Click Here To Read Rest Of The Post...

Tuesday, May 18, 2010

Wimax Interfaces Naming Convention

IP network interfaces are called as core interfaces,access interfaces or PE-CE interfaces. But in WIMAX, interfaces are named as depicted belows:-
1. R1 Interface:- This is actual wireless interface which connects Mobile Subscriber to BS(Base Station).
2. R2 Interface:- This is the logical interface with CSN(Core Service Network). In case of Mobile IP.
3. R3 Interface:- Interface between ASN(Access Service Network) and CSN(Core Service Network).All the radius messages are exchanged on this interface.
4. R4 Interface:- This is the logical interface between ASN-Gty(Access Service Network). This interface is used during handovers in romaing.

5. R5 Interface:- This is logical interface between Home CSN(Core Service Network). This is used during roaming scenarios.
6. R6 Interface:- This is the physical or logical interface between BS(Base Station) and ASN-Gty.
7. R7 Interface:- This is logical/physical interface between decision point and enforcement point. Both are the parts of ASN-Gty.
8. R8 Interface:- This is logical interface between BS(Base Station). This is used during handovers from one BS to another.

Click Here To Read Rest Of The Post...

Sunday, May 16, 2010

Hack Twitter Password

Twitter is becoming a daily life part and before the start of any new work, we would like to post updates on twitter. Twitter is growing incredibly because it's easy to use and secure. Today after noon, when I was analyzing some of my yesterday pcap files and I was astonished to see that twitter is sending clear text password during change in profile setting. This could be a high alert flaw because without using keyword logger, I am loosing my password identity. On the same lan twitter hack could expose lot of username and passwords. I had captured the logs where in password field is colored with black and I could see it with my naked eyes because
it is in clear text format which is explicitly depicting that Twitter team is not using any encryption method during setting or profile updates.
Image 1

Image 2

Click Here To Read Rest Of The Post...

Wednesday, May 12, 2010

Wimax Architecture

Wimax is fully ip network which gives the last mile users to access internet at high speed. Wimax architecture consists of the following components:-
1. MS(Mobile Subscriber) or SS(Subscriber Station)
2. ASN (Access Service Network)
3. CSN (Core or connectivity Service Network)
MS or SS are used by the users to connect the VPN or Internet by using air interface. All the MS or SS connects to the BS(Base Station) and BS further connects to the ASN-Gty.
ASN network consists of Base Stations and ASN-Gty(Access Service Network Gateway). BS are responsible for providing air interface to mobile subscribers to connect VPN or Internet. Apart from this BS manages the subscribers QOS policy enforcements, traffic classification, session managements and handovers during roaming.

ASN-Gty works as LNS(Layer 2 Network Server) server which aggregates all the layer 2 traffic and provides the connectivity to internet. A part from this it manages QOS profiles, keys management, radius client, mobility tunnels with base stations for roaming users. Allocates profile as Simple and Mobile ip communication for SS or MS and becomes foreign agent for them.

CNS consists of AAA, HA, VHR, OSS. It connects to the internet gateway to route the traffic in case of data network. If MS looks for voip calls in that case it also provides the connectivity to PSTN network.

Click Here To Read Rest Of The Post...

Thursday, May 6, 2010

Cisco CCNA Service Provider

The Cisco CCNA Service Provider (SP) Operations certification and the written exam for the CCIE Service Provider (SP) Operations certification are now available.
The Cisco CCNA SP Operations certification targets entry-level students with a foundation of network operations skills in SP IP NGN environments required of associate-level operations personnel. Both the Supporting Cisco Service Provider IP NGN Operations (SSPO) course and required # 640-760 exam are now available. Interested students should access the CCNA SP Operations home page for more information.

This exam code is 640-760 SSPO (Supporting Cisco Service Provider IP NGN Operations).

Click Here To Read Rest Of The Post...

Tuesday, May 4, 2010

OSPF Sham Link In Different Area

OSPF Network Design Solutions (2nd Edition)One of my reader asked a question,"Normally customers require sham link to prefer back door link in case of MPLS VPN environment, when customer run same area. But if the customer is using different area, how the back door link work."
If we read RFC 2328 which is clearly states that to make communication possible between two areas,OSPF must have area 0 connectivity. In this type of topology, the backdoor will never work.
If someone is having any different thought, please share it.

Click Here To Read Rest Of The Post...

Sunday, May 2, 2010

Virtualization On Windows Host

Now days, I am working on ASN gateway products and for simulation and testing purpose I require linux machine. But being addicted to windows, I am afraid to use linux machines separately. Another problem is to carry two different machines one for windows and another for linux. So finally I decided to go with linux machine on windows platform by using virtual machine concept on windows. I found a good article of using different on type of virtual machine on windows platform. Website has illustrated good article of creating virtual machines by using different software. The main advantage of using VM is to utilize the computer resources at its best. By using virtualization one can create multiple machines in few minutes and connect those machines virtually. It seems like that you are working on physical environment with different machines but in real all are present in same computer. The another advantage of using VM is that you can install windows machines, linux machines, mac machines and test the interoperability with each other. The installation process is very easy and same like as we do copy in windows. If you want to create a new machine of same existing OS, simply copy and paste the image file in new machine. For installation please refer to webworld article “how to use virtualization software when working on windows host”.

Click Here To Read Rest Of The Post...