Squire Technologies: Media Gateway Presentation.
The SVI_MG SS7 Media Gateway enables cost effective, scaleable SS7 and PSTN network breakout to VoIP / 4G / LTE networks, allowing carriers to realise the cost and performance benefits of integrating into an SS7 network.
The SVI_MG range of Media Gateways are a fully featured, carrier-grade product with a flexible and powerful routing engine, offered in 2 models 1000 and 8000 to satisfy clients deployment requirements and budget.
Squire Technologies: Media Gateway Controller Presentation.
The SVI_MGC SS7 Media Gateway Controller enables SS7 on leading VoIP Media Gateways using industry based standards – MGCP, MEGACO H.248, SIGTRAN, SIP, SIP-I, SIP-T and H.323.
The SVI_MGC Media Gateway Controller enables clients to interface their VoIP networks to SS7 PSTN based telephone networks allowing the rapid launch of VoIP services, NAS Modem Dial-Up, distributed networks etc.
Squire Technologies: 9225 Protocol Converter Presentation.
SS7 to PRI ISDN Protocol Converter.
The SS7 to ISDN Protocol Converter is a fully featured, carrier-grade product with a flexible and powerful routing engine, offered in 3 models 1000, 2000 and 8000 to satisfy client’s deployment requirements and budget.
The product has a high pedigree of worldwide SS7 to ISDN PRI signalling interconnect in over 70 countries, catering for both small interconnect up, and large international points of presence.
Squire Technologies: Media Gateway Controller Function Presentation.
The SVI_MGCF Media Gateway Controller Function provides a gateway between traditional Circuit Switched SS7 networks and next generation IMS networks such as LTE/ VoLTE.
The SVI-MGCF provides a fully 3GPP compliant Media Gateway Control Function extending Squire Technologies existing SVI-MGC SS7 Media Gateway Controller product utilising the rich heritage of functionality developed over 10 years of global deployment.
The SVI-MGCF provides conversion between SS7-ISUP signalling, SIP-I, SIP-T and traditional and IMS compliant SIP using H.248 MEGACO to control media gateways and DIAMETER to record charging information.
2014 innovaphone different protocols for different thingsVOIP2DAY
The document discusses various protocols used for unified communications, including H.323, SIP, H.460.17, ICE, DTLS-SRTP, and WebRTC. It summarizes the purpose and functionality of each protocol, how they enable connections through firewalls and NAT, and their advantages and disadvantages. WebRTC in particular allows for real-time communication within a web browser without plugins using HTML5 and JavaScript, establishing direct peer-to-peer connections through techniques like STUN and ICE.
TLS provides confidentiality, identity, and integrity for internet communication. It is used for HTTPS web pages and applications on computers and phones. TLS is based on SSL and uses asymmetric encryption where the server sends a public key to set up the secure connection. The client then challenges the server, which responds using its private key to prove its identity. Certificates bind a public key to an identity and are signed by a Certification Authority. They contain information like the key, owner identity, and validity period.
The SVI_C4 is a class 4 softswitch that offers powerful signalling and routing capabilities. It supports protocols like SIP, H.323, and ISUP and can scale from 500 to 10,000 simultaneous calls. The softswitch also includes features like redundancy, billing integration, monitoring, and security. It can be deployed in various ways including as a protocol converter, by wholesale carriers, and for private SIP networks.
GRX is the global private network where telecom network operators exchange GPRS roaming traffic of their users. It’s also used for all M2M networks where roaming is used, and that is the case from some company’s truck fleet management system down to intelligence GPS location spybug tracking system.
GPRS has been there from 2.5G GSM networks to the upcoming LTE Advanced networks, and is now quite widespread technology, along with its attacks. GRX has had a structuring role in the global telecom world at a time where IP dominance was beginning to be acknowledged. Now it has expanded to a lightweight structure using both IP technologies and ITU-originated protocols.
In this presentation, we’ll see how this infrastructure is protected and how it can be attacked. We’ll discover the issues with specific telco equipment inside GRX, namely GGSN and SGSN but also now PDN Gateways in LTE and LTE Advanced “Evolved Packet Core”. We will see the implications of this with GTP protocol, DNS infrastructure, AAA servers and core network technologies such as MPLS, IPsec VPNs and their associated routing protocols. These network elements were rarely evaluated for security, and during our engagements with vulnerability analysis, we’ve seen several vulnerabilities that we will be showing in this speech.
We will demo some of the attacks on a simulated “PS Domain” network, that it the IP part of the Telecom Core Network that transports customers’ traffic, and investigate its relationships with legacy SS7, SIGTRAN IP backbones, M2M private corporate VPNs and telecom billing systems. We will also seem how automation enable us to succeed at attacks which are hard to perform and will show how a “sentinel” attack was able to compromise a telecom Core Network during one penetration test.
The document provides an overview of NET-Quintum's product line including the Promina, VX, and Tenor series. It discusses the key features and benefits of these products such as their ability to perform protocol conversion, provide session border control functionality, and interoperate with Microsoft platforms. The presentation also highlights the products' deployment in carrier, military, and enterprise environments.
Squire Technologies: Media Gateway Controller Presentation.
The SVI_MGC SS7 Media Gateway Controller enables SS7 on leading VoIP Media Gateways using industry based standards – MGCP, MEGACO H.248, SIGTRAN, SIP, SIP-I, SIP-T and H.323.
The SVI_MGC Media Gateway Controller enables clients to interface their VoIP networks to SS7 PSTN based telephone networks allowing the rapid launch of VoIP services, NAS Modem Dial-Up, distributed networks etc.
Squire Technologies: 9225 Protocol Converter Presentation.
SS7 to PRI ISDN Protocol Converter.
The SS7 to ISDN Protocol Converter is a fully featured, carrier-grade product with a flexible and powerful routing engine, offered in 3 models 1000, 2000 and 8000 to satisfy client’s deployment requirements and budget.
The product has a high pedigree of worldwide SS7 to ISDN PRI signalling interconnect in over 70 countries, catering for both small interconnect up, and large international points of presence.
Squire Technologies: Media Gateway Controller Function Presentation.
The SVI_MGCF Media Gateway Controller Function provides a gateway between traditional Circuit Switched SS7 networks and next generation IMS networks such as LTE/ VoLTE.
The SVI-MGCF provides a fully 3GPP compliant Media Gateway Control Function extending Squire Technologies existing SVI-MGC SS7 Media Gateway Controller product utilising the rich heritage of functionality developed over 10 years of global deployment.
The SVI-MGCF provides conversion between SS7-ISUP signalling, SIP-I, SIP-T and traditional and IMS compliant SIP using H.248 MEGACO to control media gateways and DIAMETER to record charging information.
2014 innovaphone different protocols for different thingsVOIP2DAY
The document discusses various protocols used for unified communications, including H.323, SIP, H.460.17, ICE, DTLS-SRTP, and WebRTC. It summarizes the purpose and functionality of each protocol, how they enable connections through firewalls and NAT, and their advantages and disadvantages. WebRTC in particular allows for real-time communication within a web browser without plugins using HTML5 and JavaScript, establishing direct peer-to-peer connections through techniques like STUN and ICE.
TLS provides confidentiality, identity, and integrity for internet communication. It is used for HTTPS web pages and applications on computers and phones. TLS is based on SSL and uses asymmetric encryption where the server sends a public key to set up the secure connection. The client then challenges the server, which responds using its private key to prove its identity. Certificates bind a public key to an identity and are signed by a Certification Authority. They contain information like the key, owner identity, and validity period.
The SVI_C4 is a class 4 softswitch that offers powerful signalling and routing capabilities. It supports protocols like SIP, H.323, and ISUP and can scale from 500 to 10,000 simultaneous calls. The softswitch also includes features like redundancy, billing integration, monitoring, and security. It can be deployed in various ways including as a protocol converter, by wholesale carriers, and for private SIP networks.
GRX is the global private network where telecom network operators exchange GPRS roaming traffic of their users. It’s also used for all M2M networks where roaming is used, and that is the case from some company’s truck fleet management system down to intelligence GPS location spybug tracking system.
GPRS has been there from 2.5G GSM networks to the upcoming LTE Advanced networks, and is now quite widespread technology, along with its attacks. GRX has had a structuring role in the global telecom world at a time where IP dominance was beginning to be acknowledged. Now it has expanded to a lightweight structure using both IP technologies and ITU-originated protocols.
In this presentation, we’ll see how this infrastructure is protected and how it can be attacked. We’ll discover the issues with specific telco equipment inside GRX, namely GGSN and SGSN but also now PDN Gateways in LTE and LTE Advanced “Evolved Packet Core”. We will see the implications of this with GTP protocol, DNS infrastructure, AAA servers and core network technologies such as MPLS, IPsec VPNs and their associated routing protocols. These network elements were rarely evaluated for security, and during our engagements with vulnerability analysis, we’ve seen several vulnerabilities that we will be showing in this speech.
We will demo some of the attacks on a simulated “PS Domain” network, that it the IP part of the Telecom Core Network that transports customers’ traffic, and investigate its relationships with legacy SS7, SIGTRAN IP backbones, M2M private corporate VPNs and telecom billing systems. We will also seem how automation enable us to succeed at attacks which are hard to perform and will show how a “sentinel” attack was able to compromise a telecom Core Network during one penetration test.
The document provides an overview of NET-Quintum's product line including the Promina, VX, and Tenor series. It discusses the key features and benefits of these products such as their ability to perform protocol conversion, provide session border control functionality, and interoperate with Microsoft platforms. The presentation also highlights the products' deployment in carrier, military, and enterprise environments.
Philippe Langlois - LTE Pwnage - P1securityP1Security
Today, we’re entering the realm of LTE super high speed always-on connectivity and with that comes the victory of TCP/IP in front of the old ITU/3GPP protocols. And with this comes many side effects: software gets standardized, everything runs on top of ATCA (Advanced Telecom Computing Architecture) hardware running mostly Linux -give or take 6 or 8 proprietary FPGA-based sister cards, TFTP-booted with decade old VxWorks that routinely show hardcoded DES credentials and funny “behaviour”. Easily 20 GB of fat C++ binaries, some for x86, PPC, MIPS, some with up to 200 Mbytes file sizes for one single EXE! It’s called a vulnerability research and reverse engineering paradise… or hell.
All the protocols now run on top of IP, which ends up having 12 layers thanks to encapsulation and still the weight of legacy in bugs quantity and diversity. We’ll see how the porting of SS7 MAP on top of IP (SIGTRAN, Diameter) has given rise to funny Denial of Service (DoS) attacks against telecom core elements (DSR, STP), with trashy-crashy anti-forensics consequences for DPI and tracking (Hey @grugq!!).
We’ll look into specific vulnerabilities, and talk about the very particular way that Network Equipment Vendors deal with security in the telecom domain.
We will demo a virtualized Huawei HSS from our testbed and show some of the vulnerabilities and attacks directly on the equipment itself. We will finally talk about telco equipment and product security reviews and the fallacy of (some) certification and (many) standardization attempts. We will then see how to conduct a practical and fast telecom product security life cycle with automation and open source tools.
This document provides an overview and agenda for a course on Introduction to IPv6 for Service Providers. The course covers IPv6 essentials such as addressing, operations, applications/services, routing protocols, and transition strategies. It discusses the rationale for adopting IPv6 including the depletion of IPv4 addresses and the need to support the growing number of internet-connected devices. The document outlines some of the key limitations of IPv4 like fragmentation and the issues with long-term reliance on Network Address Translation (NAT) to overcome the address space depletion.
The document discusses Network Address Translation (NAT) and how it causes issues for SIP calls by hiding private IP addresses. It introduces Interactive Connectivity Establishment (ICE) as the IETF's solution to this problem. ICE uses STUN and TURN to dynamically discover potential transport addresses between endpoints and then verifies connectivity through these addresses to find the optimal path for media.
This document discusses network address translation (NAT) and NAT traversal techniques. It begins with an overview of NAT and why NAT traversal is needed to access network resources behind NAT. It then covers various NAT traversal solutions including port forwarding, NAT traversal protocols like STUN and TURN, and implementations like ICE and WebRTC that use these protocols. The document provides examples and diagrams to illustrate key NAT concepts and how different traversal techniques work.
Privacy Enhanced RTP Conferencing with WebRTC - PERCArnaud BUDKIEWICZ
Nowadays the cloud made deploying RTP conferencing solutions easier than ever. Wether you manage your own instances in a public cloud, or you use a (C)PaaS, not having to deal with the underlying physical machines, Virtual Machines, Operating Systems, .... has lower the adoption bar. Unfortunately, it has also introduced some security concerns, since your data is now flowing through a third-party machine, possibly in clear. WebRTC is fully encrypted end-to-end, but only for p2p connection. In connections that go through a media server, it's only encrypted hop-by-hop, leaving the Media Server accessing the media in clear. Anybody who would compromise the media server (or issue a gag order to the operator) would have access to your data. For many, this is unacceptable, and for a few, this is actually against regulations (Banks, MPAA, HIPAA, EU Telco operators, ....). Privacy Enhanced RTP Conferencing, PERC in short, comes up with solutions to achieve true end-to-end encryption, solutions that prevent third-party Media Server for ever having access to the media in Clear. Active participants to the corresponding PERC Working Group at IETF, we have also implemented the first public solution in chrome (client-side) and Jitsi Media Server and Janus (server-side), in used by banks today. We will provide here some insight about how one can benefit from PERC, and which modifications are needed on client side and server side.
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
Telecom security is way more than SIP-breaking some peripheral PBXs and raking a few thousands of dollars of free calls. From the formerly closed garden of SS7 to new all-IP telecom protocols such as Diameter and LTE protocols, the telecom domain faces now both the challenges of availability -one minute of downtime costs literally millions- and signaling vulnerabilities cutting down entire countries, causing massive frauds and the all new networking protocols. These new telecom protocols are rolled out in IP-centric fashion, with its myriad of standard IP security pitfalls and vulnerabilities, as well as very specific telecom vulnerabilities. The HLR is not only using TCP/IP for OAM and business workflow, but also now being named an HSS, it uses IP-only protocols such as Diameter for its Core Network signaling operations. That means that now telecom are facing new security risks both in term of exposure and threats, with its Core Network being exposed to unsophisticated IP-centered attackers, and the continuous waves of telecom-centered defrauders. In this presentation, we'll demo the new technologies of 3G and LTE networks and how to attack and defend them. We'll also show what kind of exposure one telecom companies, Mobile Network Operators and SS7 providers shows to external attackers.
This document provides an overview and analysis of nation-state malware targeting telecommunications networks, specifically focusing on the Regin malware. It discusses the technical capabilities and architecture of Regin, analyzing how it infiltrates networks and implants modules. The document also explores other attack vectors such as SS7 and potential vulnerabilities in GPRS/IPX networks that malware could exploit. Dynamic demonstrations are provided of instrumenting Regin and simulating its attacks on networks and systems.
This document summarizes experiences from a proof of concept (PoC) federated STUN/TURN service. Key points include:
- The PoC used STUN, TURN, and ICE to enable real-time communications across firewalls and NATs.
- It explored different authentication methods like long-term credentials, REST APIs, and OAuth.
- The distributed service was deployed across multiple research networks in Europe.
- Lessons learned from the PoC included designing for security, using open source components, and supporting multiple authentication standards.
How to Intercept a Conversation Held on the Other Side of the PlanetPositive Hack Days
The document describes how to intercept mobile phone conversations and intercept text messages by exploiting vulnerabilities in the SS7 protocol. It explains how to collect a target's private information from the HLR like IMSI and location. It then shows how an attacker can spoof being an MSC or HLR to intercept calls and SMS, or conduct denial of service attacks by monopolizing the network's resources through endless signaling requests. The goal is to illustrate real threats to mobile network security from vulnerabilities in SS7 and inter-network connectivity.
Squire Technologies:SVI 9220 Presentation.
The SVI_9220 provides, at its core, a powerful, scalable SS7 to SS7 Protocol Converter delivering high performance SS7 Signalling only conversion with support for up to 128 SS7 Signalling links, dual redundancy and fully featured OA&M.
SIP is a protocol for establishing multimedia sessions over IP networks. It originated from work in the 1990s on protocols like SCIP and SIP drafts. SIP eventually became standardized as RFC 3261 and is now widely used for voice and video calling. Cisco supports SIP in products like Cisco Unified Communications Manager, Cisco Unified Border Element, and Cisco Unified Presence to enable VoIP calling and integration between SIP and other protocols. The future of SIP includes more peer-to-peer implementations and using presence as a foundation for new services.
On her majesty's secret service - GRX and a Spy AgencyStephen Kho
The document discusses GRX (GPRS Roaming Exchange) and how it could be of interest to spy agencies. It provides an overview of GRX architecture, protocols, and components. It also describes how one could potentially gain unauthorized access to GRX infrastructure by enumerating hosts, scanning for GTP ports, sending GTP requests to identify GGSNs, and targeting DNS servers which are used to resolve APNs and set up GTP tunnels. The goal would be to intercept mobile network traffic for surveillance purposes by exploiting any vulnerabilities in the GRX architecture, protocols, or components.
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
This document provides an overview of an agenda for a presentation on practical attacks against 3G/4G telecommunication networks. The presentation covers topics such as an overview of 3G and 4G standards and networks, backhaul networks, protocols used in telecom backends like GTP and SCTP, and exercises that will be performed in a lab environment using tools like gtp_scan, apnbf, and dizzy to demonstrate attacks.
Worldwide attacks on SS7/SIGTRAN networkP1Security
Publication performed by Alexandre De Oliveira and Pierre-Olivier Vauboin during Hackito Ergo Sum 2014
Mobile telecommunication networks are complex and provide a wide range of services, making them a tempting target for fraudsters and for intelligence agencies. Moreover, the architecture, equipment and protocols used on these networks were never designed with security in mind, availability being the first concern. Today, even though some telecom operators are investing money into securing their network, events confirm that for most of them maturity in term of security is yet to come, as recently shown with the example of massive traffic interception on compromised SCCP and GRX providers like Belgacom’s BICS. Here we present the most typical and legitimate telecom callflows from making a mobile phone call to sending a SMS. Then we describe the protocol layers involved and how to abuse them, which fields can be manipulated in order to attack both the operator infrastructure and its subscribers. Finally, we show a real life example of scan performed from an international SS7 interconnection and practical attacks on subscribers such as spam, spoofed SMS and user location tracking.
The document discusses the transport layer in networking. It describes the roles of TCP and UDP protocols in establishing communication sessions and transporting data between applications. TCP provides reliable, ordered delivery using acknowledgments and retransmissions while UDP is simpler but unreliable. Popular applications of each protocol are examined, such as DNS and DHCP using UDP, and HTTP using TCP. The three-way handshake process for TCP connection establishment is also outlined.
Muriel Medard - Network Coding in Satellites - Global SIP 2018CodeOn
Slides from Muriel Medard's Keynote at IEEE Global Conference on Signal and Information Processing, 27 November 2018, Disneyland Hotel, Anaheim, California
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Igalia
This document discusses lightweight 4over6 (lw4o6), an IPv6 transition technology. It describes lw4o6 as moving network address translation (NAT) to customer premises equipment (CPE) and using softwire mappings between IPv4 and IPv6 addresses. Open-source implementations of lw4o6 are available in Snabb and FD.io VPP. Experimental results show that lw4o6 can support a variety of applications.
El documento describe la cadena logística del Aeropuerto Internacional Cotopaxi en Ecuador. Actualmente operan 2 aerolíneas de pasajeros y 2 aerolíneas de carga (Cargolux y SkyLease Cargo) en el aeropuerto. Se ha planificado ampliar las instalaciones del aeropuerto y aumentar las frecuencias de vuelos para mejorar los servicios a usuarios. La cadena logística involucra a varias empresas como Pisque, Emsa, Cargolux, Centurion y Mawney que se encargan del almacenamiento, emb
La rúbrica evalúa el desempeño de 18 estudiantes en la actividad "La higiene personal y la esponja mágica" en tres aspectos: identificar medidas de higiene, compartir información previa con compañeros y trabajar de manera ordenada. La mayoría de los estudiantes cumplieron satisfactoriamente con los criterios, aunque algunos tuvieron dificultades para compartir información o trabajar de manera ordenada.
Philippe Langlois - LTE Pwnage - P1securityP1Security
Today, we’re entering the realm of LTE super high speed always-on connectivity and with that comes the victory of TCP/IP in front of the old ITU/3GPP protocols. And with this comes many side effects: software gets standardized, everything runs on top of ATCA (Advanced Telecom Computing Architecture) hardware running mostly Linux -give or take 6 or 8 proprietary FPGA-based sister cards, TFTP-booted with decade old VxWorks that routinely show hardcoded DES credentials and funny “behaviour”. Easily 20 GB of fat C++ binaries, some for x86, PPC, MIPS, some with up to 200 Mbytes file sizes for one single EXE! It’s called a vulnerability research and reverse engineering paradise… or hell.
All the protocols now run on top of IP, which ends up having 12 layers thanks to encapsulation and still the weight of legacy in bugs quantity and diversity. We’ll see how the porting of SS7 MAP on top of IP (SIGTRAN, Diameter) has given rise to funny Denial of Service (DoS) attacks against telecom core elements (DSR, STP), with trashy-crashy anti-forensics consequences for DPI and tracking (Hey @grugq!!).
We’ll look into specific vulnerabilities, and talk about the very particular way that Network Equipment Vendors deal with security in the telecom domain.
We will demo a virtualized Huawei HSS from our testbed and show some of the vulnerabilities and attacks directly on the equipment itself. We will finally talk about telco equipment and product security reviews and the fallacy of (some) certification and (many) standardization attempts. We will then see how to conduct a practical and fast telecom product security life cycle with automation and open source tools.
This document provides an overview and agenda for a course on Introduction to IPv6 for Service Providers. The course covers IPv6 essentials such as addressing, operations, applications/services, routing protocols, and transition strategies. It discusses the rationale for adopting IPv6 including the depletion of IPv4 addresses and the need to support the growing number of internet-connected devices. The document outlines some of the key limitations of IPv4 like fragmentation and the issues with long-term reliance on Network Address Translation (NAT) to overcome the address space depletion.
The document discusses Network Address Translation (NAT) and how it causes issues for SIP calls by hiding private IP addresses. It introduces Interactive Connectivity Establishment (ICE) as the IETF's solution to this problem. ICE uses STUN and TURN to dynamically discover potential transport addresses between endpoints and then verifies connectivity through these addresses to find the optimal path for media.
This document discusses network address translation (NAT) and NAT traversal techniques. It begins with an overview of NAT and why NAT traversal is needed to access network resources behind NAT. It then covers various NAT traversal solutions including port forwarding, NAT traversal protocols like STUN and TURN, and implementations like ICE and WebRTC that use these protocols. The document provides examples and diagrams to illustrate key NAT concepts and how different traversal techniques work.
Privacy Enhanced RTP Conferencing with WebRTC - PERCArnaud BUDKIEWICZ
Nowadays the cloud made deploying RTP conferencing solutions easier than ever. Wether you manage your own instances in a public cloud, or you use a (C)PaaS, not having to deal with the underlying physical machines, Virtual Machines, Operating Systems, .... has lower the adoption bar. Unfortunately, it has also introduced some security concerns, since your data is now flowing through a third-party machine, possibly in clear. WebRTC is fully encrypted end-to-end, but only for p2p connection. In connections that go through a media server, it's only encrypted hop-by-hop, leaving the Media Server accessing the media in clear. Anybody who would compromise the media server (or issue a gag order to the operator) would have access to your data. For many, this is unacceptable, and for a few, this is actually against regulations (Banks, MPAA, HIPAA, EU Telco operators, ....). Privacy Enhanced RTP Conferencing, PERC in short, comes up with solutions to achieve true end-to-end encryption, solutions that prevent third-party Media Server for ever having access to the media in Clear. Active participants to the corresponding PERC Working Group at IETF, we have also implemented the first public solution in chrome (client-side) and Jitsi Media Server and Janus (server-side), in used by banks today. We will provide here some insight about how one can benefit from PERC, and which modifications are needed on client side and server side.
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
Telecom security is way more than SIP-breaking some peripheral PBXs and raking a few thousands of dollars of free calls. From the formerly closed garden of SS7 to new all-IP telecom protocols such as Diameter and LTE protocols, the telecom domain faces now both the challenges of availability -one minute of downtime costs literally millions- and signaling vulnerabilities cutting down entire countries, causing massive frauds and the all new networking protocols. These new telecom protocols are rolled out in IP-centric fashion, with its myriad of standard IP security pitfalls and vulnerabilities, as well as very specific telecom vulnerabilities. The HLR is not only using TCP/IP for OAM and business workflow, but also now being named an HSS, it uses IP-only protocols such as Diameter for its Core Network signaling operations. That means that now telecom are facing new security risks both in term of exposure and threats, with its Core Network being exposed to unsophisticated IP-centered attackers, and the continuous waves of telecom-centered defrauders. In this presentation, we'll demo the new technologies of 3G and LTE networks and how to attack and defend them. We'll also show what kind of exposure one telecom companies, Mobile Network Operators and SS7 providers shows to external attackers.
This document provides an overview and analysis of nation-state malware targeting telecommunications networks, specifically focusing on the Regin malware. It discusses the technical capabilities and architecture of Regin, analyzing how it infiltrates networks and implants modules. The document also explores other attack vectors such as SS7 and potential vulnerabilities in GPRS/IPX networks that malware could exploit. Dynamic demonstrations are provided of instrumenting Regin and simulating its attacks on networks and systems.
This document summarizes experiences from a proof of concept (PoC) federated STUN/TURN service. Key points include:
- The PoC used STUN, TURN, and ICE to enable real-time communications across firewalls and NATs.
- It explored different authentication methods like long-term credentials, REST APIs, and OAuth.
- The distributed service was deployed across multiple research networks in Europe.
- Lessons learned from the PoC included designing for security, using open source components, and supporting multiple authentication standards.
How to Intercept a Conversation Held on the Other Side of the PlanetPositive Hack Days
The document describes how to intercept mobile phone conversations and intercept text messages by exploiting vulnerabilities in the SS7 protocol. It explains how to collect a target's private information from the HLR like IMSI and location. It then shows how an attacker can spoof being an MSC or HLR to intercept calls and SMS, or conduct denial of service attacks by monopolizing the network's resources through endless signaling requests. The goal is to illustrate real threats to mobile network security from vulnerabilities in SS7 and inter-network connectivity.
Squire Technologies:SVI 9220 Presentation.
The SVI_9220 provides, at its core, a powerful, scalable SS7 to SS7 Protocol Converter delivering high performance SS7 Signalling only conversion with support for up to 128 SS7 Signalling links, dual redundancy and fully featured OA&M.
SIP is a protocol for establishing multimedia sessions over IP networks. It originated from work in the 1990s on protocols like SCIP and SIP drafts. SIP eventually became standardized as RFC 3261 and is now widely used for voice and video calling. Cisco supports SIP in products like Cisco Unified Communications Manager, Cisco Unified Border Element, and Cisco Unified Presence to enable VoIP calling and integration between SIP and other protocols. The future of SIP includes more peer-to-peer implementations and using presence as a foundation for new services.
On her majesty's secret service - GRX and a Spy AgencyStephen Kho
The document discusses GRX (GPRS Roaming Exchange) and how it could be of interest to spy agencies. It provides an overview of GRX architecture, protocols, and components. It also describes how one could potentially gain unauthorized access to GRX infrastructure by enumerating hosts, scanning for GTP ports, sending GTP requests to identify GGSNs, and targeting DNS servers which are used to resolve APNs and set up GTP tunnels. The goal would be to intercept mobile network traffic for surveillance purposes by exploiting any vulnerabilities in the GRX architecture, protocols, or components.
HITB Labs: Practical Attacks Against 3G/4G Telecommunication NetworksJim Geovedi
This document provides an overview of an agenda for a presentation on practical attacks against 3G/4G telecommunication networks. The presentation covers topics such as an overview of 3G and 4G standards and networks, backhaul networks, protocols used in telecom backends like GTP and SCTP, and exercises that will be performed in a lab environment using tools like gtp_scan, apnbf, and dizzy to demonstrate attacks.
Worldwide attacks on SS7/SIGTRAN networkP1Security
Publication performed by Alexandre De Oliveira and Pierre-Olivier Vauboin during Hackito Ergo Sum 2014
Mobile telecommunication networks are complex and provide a wide range of services, making them a tempting target for fraudsters and for intelligence agencies. Moreover, the architecture, equipment and protocols used on these networks were never designed with security in mind, availability being the first concern. Today, even though some telecom operators are investing money into securing their network, events confirm that for most of them maturity in term of security is yet to come, as recently shown with the example of massive traffic interception on compromised SCCP and GRX providers like Belgacom’s BICS. Here we present the most typical and legitimate telecom callflows from making a mobile phone call to sending a SMS. Then we describe the protocol layers involved and how to abuse them, which fields can be manipulated in order to attack both the operator infrastructure and its subscribers. Finally, we show a real life example of scan performed from an international SS7 interconnection and practical attacks on subscribers such as spam, spoofed SMS and user location tracking.
The document discusses the transport layer in networking. It describes the roles of TCP and UDP protocols in establishing communication sessions and transporting data between applications. TCP provides reliable, ordered delivery using acknowledgments and retransmissions while UDP is simpler but unreliable. Popular applications of each protocol are examined, such as DNS and DHCP using UDP, and HTTP using TCP. The three-way handshake process for TCP connection establishment is also outlined.
Muriel Medard - Network Coding in Satellites - Global SIP 2018CodeOn
Slides from Muriel Medard's Keynote at IEEE Global Conference on Signal and Information Processing, 27 November 2018, Disneyland Hotel, Anaheim, California
Lightweight 4-over-6: One step further Dual-Stack Lite Networks (RIPE 76)Igalia
This document discusses lightweight 4over6 (lw4o6), an IPv6 transition technology. It describes lw4o6 as moving network address translation (NAT) to customer premises equipment (CPE) and using softwire mappings between IPv4 and IPv6 addresses. Open-source implementations of lw4o6 are available in Snabb and FD.io VPP. Experimental results show that lw4o6 can support a variety of applications.
El documento describe la cadena logística del Aeropuerto Internacional Cotopaxi en Ecuador. Actualmente operan 2 aerolíneas de pasajeros y 2 aerolíneas de carga (Cargolux y SkyLease Cargo) en el aeropuerto. Se ha planificado ampliar las instalaciones del aeropuerto y aumentar las frecuencias de vuelos para mejorar los servicios a usuarios. La cadena logística involucra a varias empresas como Pisque, Emsa, Cargolux, Centurion y Mawney que se encargan del almacenamiento, emb
La rúbrica evalúa el desempeño de 18 estudiantes en la actividad "La higiene personal y la esponja mágica" en tres aspectos: identificar medidas de higiene, compartir información previa con compañeros y trabajar de manera ordenada. La mayoría de los estudiantes cumplieron satisfactoriamente con los criterios, aunque algunos tuvieron dificultades para compartir información o trabajar de manera ordenada.
En búsqueda de la meteorología extrema en españaAeb1234
Este documento presenta las actividades de un cazador de tormentas en España. Resume su función de monitorear, documentar fotográficamente y advertir sobre tormentas severas, así como analizar los datos meteorológicos posteriores. Incluye fotos de varios tipos de tormentas como líneas de turbonada, bow echoes, supercélulas, arco iris, tubas, mammatus y nieve extrema.
Video forbrugertest + den optimale udviklingsprocesThore Fogh
Kort introduktion til Usertribe og video forbrugertest herunder de 8 tidspunkter i en udviklingsproces og optimeringsproces, hvor man med økonomisk fordel bør inddrage forbrugere.
El documento analiza dos estudios recientes sobre la evaluación económica del palivizumab para la prevención de la infección por virus respiratorio sincitial en recién nacidos de riesgo. A pesar de utilizar metodologías similares, los estudios llegan a conclusiones opuestas: uno concluye que el palivizumab es coste-efectivo, mientras que el otro determina que no lo es. Esto se debe principalmente a las diferentes premisas asumidas sobre la tasa de mortalidad y la relación entre la infección por VRS e in
Marco Furio Camilo fue un militar y político romano del siglo V a.C. que sirvió como dictador en el 396 a.C. y lideró a Roma en victorias contra los veyenses, faliscos y fidenenses. En el 391 a.C. fue elegido interrex pero luego fue acusado y exiliado. Mientras estaba exiliado en el 391 a.C., los galos invadieron Roma bajo el mando de Breno y derrotaron a los romanos en la Batalla del Río Alia. Camilo regresó del exilio y l
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa
Peter Ganten, founder and CEO of Univention, discusses how open source software can help address challenges of cloud computing adoption. Open source ensures auditability, portability, and interoperability between providers. It also increases flexibility, innovation, and trust while reducing costs and vendor lock-in. Univention's open source Corporate Server platform provides identity management and can be used across clouds and on-premises, helping with compliance, security, and hybrid scenarios. Partnerships with companies like Zarafa further cloud integration.
Este documento es un contrato de comisión mercantil entre COM S.A. de C.V. (el Comitente) y Adhi Cristina Coronel Ramirez (el Promotor). El Promotor se compromete a promover los contratos de servicios del Comitente en la ciudad de Puebla y su zona conurbana a cambio de una comisión por cada contrato suscrito, pagado y activado. El contrato establece las obligaciones del Promotor de promover los servicios, recabar documentación, elaborar reportes, mantener confidencialidad y no representar a empresas
Rotork RI Wireless is a revolutionary concept for wireless valve monitoring and diagnostics in the process industry. The field proven solution transmits real-time position indication to the control room and enables predictive maintenance for actuated valves, delivering capital and operating expenditure reduction, increased safety and increased productivity.
Este documento presenta ejercicios sobre abreviaturas y siglas. Primero pide investigar el significado de varias abreviaturas. Luego pregunta sobre cómo se escriben correctamente las siglas, ya sea con puntos o sin puntos. También relaciona la definición de acrónimos y siglas. Finalmente pide identificar si ciertas palabras son siglas o acrónimos.
Este documento lista información sobre instituciones culturales, artistas y organizaciones no gubernamentales en el Municipio Bolívar, Venezuela. Incluye detalles sobre dos casas de la cultura, una orquesta juvenil, un salón de lectura, varios artistas individuales en diferentes campos como pintura, música y danza, y grupos como coros, danzas y teatro. También menciona un museo de arte popular.
Una princesa llamada Elizabeth fue a enfrentar a un dragón que destruyó su castillo y secuestró a su prometido, el príncipe Ronaldo. Usando solo una bolsa de papel como vestido, engañó al dragón haciéndolo exhalar todo su fuego hasta dejarlo agotado, rescató a Ronaldo pero descubrió que él era vanidoso y la criticó por su apariencia, por lo que decidió no casarse con él.
Este documento presenta tres syllabus para las áreas de Ciencia y Ambiente, Personal Social y Matemática del segundo grado de primaria en el Colegio Privado San Antonio de Lima College. Cada syllabus detalla el tema transversal, la capacidad del área, las capacidades específicas, los valores, y el contenido semanal para el periodo de Mayo a Julio.
La renta vitalicia es un contrato en el que una persona recibe pagos periódicos hasta el final de su vida a cambio de una prima única. Un trabajador que se jubila puede elegir entre una renta vitalicia o un retiro programado. El retiro programado ofrece pagos mensuales variables basados en los ahorros acumulados, mientras que la renta vitalicia proporciona pagos fijos garantizados de por vida.
Introduction to the INTERREG CENTRAL Europe Project:Semi-natural grassland...salvere
The document introduces the INTERREG CENTRAL Europe Project called SALVERE, which aims to contribute to biodiversity protection in Europe by utilizing semi-natural grasslands as sources of biodiversity-rich plant material. The project involves 8 partners from 6 EU countries and focuses on studying methods for harvesting seeds from grasslands, assessing restoration techniques, and maintaining biodiversity-rich grasslands. Key activities include trials of different seed harvesting methods, analyzing seed production and quality, and restoring test sites to evaluate techniques. Results will be shared within the project and with external stakeholders through publications, workshops, and other outreach.
Squire Technologies: Signal Transfer Point Presentation.
The SVI_STP provides a comprehensive future proof STP supporting legacy SS7 TDM, Next Generation IP SIGTRAN and IMS / LTE / 4G support. A mature, proven, carrier grade technology packed with feature rich capabilities derived from a decade of global deployments.
Squire Technologies: Signalling Gateway Presentation.
With low cost, reliable, high bandwidth IP networks available for distribution of signalling, the SS7 Signalling Gateway provides the means to bridge the SS7 network from the traditional PSTN and Mobile TDM interconnects to IP.
This document provides an overview of key concepts related to Voice over IP (VoIP) technology. It defines common VoIP terms and standards, describes how VoIP works by breaking analog voice signals into digital packets, and outlines typical system elements like softswitches, terminals, and gateways. It also discusses media standards, signaling protocols, quality of service measures, fax transmission methods, and various Patton Electronics VoIP products.
14 Net Presentation Telco Day Kiev Ukraine Mar 4 2009guest6aa1b1
The document provides an overview of NET-Quintum's product line including the Promina family of multiservice platforms, the VX series of VoIP gateways, and the Tenor series of VoIP gateways. It highlights key features such as protocol conversion, session border control functionality, management tools, and support for Microsoft unified communications. The presentation also discusses NET-Quintum's capabilities in carrier, military, and enterprise markets.
Squire Technologies: Short Message Server Gateway Presentation.
With the continuing growth and success of SMS traffic worldwide the SVI-SMSC Short Message Service Center can offer Operators with existing SS7 interconnects the ability to maximise their revenue by directly offering SMS services.
This document provides an overview and introduction to VoIP and SIP signaling. It discusses key topics such as VoIP architecture and components, the process of a VoIP telephone call including conversion between analog and digital signals and quality of service, SIP architecture including what SIP is, its capabilities and message format, and SIP call flow. The document is intended as a training presentation that includes definitions of terms, descriptions of concepts, diagrams, and quizzes related to VoIP and SIP.
VoIP allows for transmitting voice calls over TCP/IP networks instead of traditional circuit-switched networks. It started gaining popularity in the mid-1990s but had drawbacks due to lack of broadband. VoIP offers unlimited distance, lower costs, and uses standards-based protocols like H.323, SIP, and MGCP. Tadiran deployed VoIP across multiple sites globally using Universal Gateways and IP phones.
VOIP allows IP networks to carry voice applications like telephony and conferencing. It uses protocols like SIP, H.323, and MGCP for signaling and codecs like G.711 and G.729 for compressing analog voice. Key VOIP components include IP phones, gateways, call agents, and MCUs. Signaling protocols establish and terminate sessions, with SIP and H.323 using a peer-to-peer model and MGCP using a client-server model. Considerations for VOIP include low jitter, latency under 150ms, minimal packet loss, and high availability to provide a reliable voice service over IP networks.
Alberto Ticona Carcausto gave a presentation about the Cisco SPIAD 2900 product. The SPIAD 2900 allows new revenue streams for partners by providing a proven collaboration solution. It offers bundled pricing starting at $4,353 for 30 users up to $6,616 for 50 users. The SPIAD 2900 supports Cisco IP phones, Cisco Jabber, and video conferencing. It provides basic voice communications, advanced business phones, and supports BYOD. The solution allows connectivity to PSTN networks via SIP trunks or analog lines and can integrate locations across LANs, WANs or the public internet.
The document describes the Cisco 7200 Series Router. It provides high performance routing and processing for applications such as VPN gateways, broadband subscriber aggregation, and enterprise WAN aggregation. It offers modular interfaces that support a wide range of connectivity options from Ethernet and Fast Ethernet to synchronous serial and packet over SONET. The Cisco 7200 provides a cost-effective platform that integrates functions previously requiring separate devices.
This document provides an overview of traditional telephone network signaling protocols and voice over IP protocols. It discusses SS7 and its components for traditional PSTN signaling, as well as peer-to-peer and client-server protocol architectures. Specific protocols covered include H.323, SIP, MGCP, and SCCP. Network design considerations for VoIP are also mentioned.
Synway Products & Solutions provides a portfolio of products for large telecommunications projects including analog and digital media gateways, Asterisk hardware, and IP and TDM cards for call recording and call center solutions that have been implemented successfully for major companies worldwide such as migrating the customer service system for Alibaba Group. The company offers design, development, evaluation, deployment, and highly efficient support services. Synway is a leading designer and manufacturer of VoIP products established in 1995 in China with over 5 million channels installed in more than 30 countries.
The document provides a user manual for the Wellgate 26xx Series VoIP Gateway. It describes the gateway's features such as SIP support, voice codecs, security measures, and physical interfaces. The manual also outlines how to configure the gateway through the web interface, including setting the WAN connection as static IP, DHCP, or PPPoE, and configuring LAN settings such as enabling the DHCP server. Advanced configuration options cover subjects like system settings, codecs, tones, and dial plans.
The document provides an overview of IMS (IP Multimedia Subsystem), including its history, architecture, layers, benefits, and relationship to SIP (Session Initiation Protocol). IMS allows convergence of voice, video, and data over an IP-based network using SIP and other IETF protocols. It has a service plane for applications, a control plane for session management, and a media plane for transport.
The document describes Squire Technologies' SVI_SMSC, a carrier grade short message service centre (SMSC) that provides SMS services and capabilities such as high capacity and optimized delivery, scalability, high availability, future proof technology, security, flexible routing, message prioritization, retries, throttling, and filtering. It can offer operators the ability to maximize revenue by directly offering SMS services and was built on Squire Technologies' core SS7 expertise to be highly flexible, configurable, and scalable.
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some ...
What is SS7? An Introduction to Signaling System 7Alan Percy
SS7 or Signaling System 7 is the dominant protocol used to control the public telephone network. Call routing, number portability, caller-ID, mobile SMS and more are handled using SS7 in the public network. SS7 (along with SIGTRAN for transport), allow application to access public network resources for call control and authentication. During this session, we share some background on SS7, show how it is used in everyday communications, and provide some use cases in popular applications.
This document summarizes Dialogic's Distributed Signaling Interface (DSI) protocol stacks, which support Signaling System 7 (SS7) and IETF SIGTRAN specifications. The DSI SS7 stack supports protocols like MTP, ISUP, SCCP, TCAP, MAP, INAP, and CAP. The DSI SIGTRAN stack supports protocols like SCTP, M2PA, M3UA, and SUA to transport SS7 over IP networks. The stacks support standards from ANSI, ETSI, ITU, IETF and country-specific variations. Features include APIs for message content, common SS7/SIGTRAN API, distributed execution, and support for Solaris, Linux
This document provides information about the Cisco XFP10GEROC192IR product, including:
- It is a 10GBASE-ER and OC192 IR2 XFP module for networking.
- Launch 3 Telecom sells this product and provides same-day shipping, payment options like credit cards, and a warranty.
- They also offer services like repairs, maintenance contracts, installation, and recycling of telecom equipment.
PLNOG16: Usługi w sieciach operatorskich, Marcin AronowskiPROIDEA
This document discusses network services in carrier networks. It begins with an agenda for a 168 slide, 40 minute presentation on multiservice IP next-generation networks (NGN). It then discusses concepts like quality of service (QoS), multicasting, and TCP performance in the context of modern networking technologies like HTTP/2, over-the-top services, and 100 gigabit Ethernet. The rest of the document provides details on implementing QoS, guidelines for QoS for video, the history and uses of multicasting, and fundamentals of multicast addressing.
Similar to Squire Technologies: Media Gateway (20)
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
2. www.squire-technologies.com
SVI_MG Media Gateway
► The SVI_MG provides a carrier grade single solution TDM
to VoIP Gateway supporting both signalling and media in
the same product
► The media gateway enables carriers, ISPs, and service
providers to rapidly add new telephony services. It gives
them a clear migration path to an all-IP network and any-to-
any voice connectivity.
► With the SVI_MG, customers can deliver state-of-the-art
VoIP services into legacy SS7, PRI and CAS networks
SVI_MG Overview
2
www.squire-technologies.com
3. www.squire-technologies.com
SVI_MG Media Gateway
► The SVI MG is offered in 2 models the SVI_MG 1000 and the SVI_MG 8000 to
satisfy clients deployment requirements and budget.
► The differences between the 1000 and 8000 models lie in the supported
interfaces, scaling, form factors and redundancy options
► SVI-MG 1000
► Entry Level product supporting from 1 to 72 E1/T1
► Delivered in 1U, 2U or 4U PCI 19’
► PCI Form Factor
► Optional 1+1 Redundancy
► SVI-MG 8000
► Full carrier grade product supporting from 1 to 1000 E1
► Support for OC-3 / STM-1/ DS3 interfaces
► Full Dual Plane Redundancy provided as standard
► cPCI form factor
SVI_MG Overview
3
4. www.squire-technologies.com
SVI-MG Media Gateway
► The signalling, supported media codecs, routing capabilities and OA&M
interface is common across both SVI_MG models:
4
SVI_MG Overview
Common Signalling Functionality
SS7, ISDN, CAS, R2, SIP, H.323, SIP-I, SIP-T, SIGTRAN
Common Codec Functionality
G.711,G.726,G.727,G723.1,G.729A/B,GSM FR,MS, GSM,NetCoder,AMR, ilbc, G.722,T.38 ,Echo Cancellation, DTMF
detection/generation, Call Progress tones, modem detection
Common Operation, Administration and Maintenance Interface
User Interface, log files, traces
DISDN
SS7/PSTN
R2/ CAS
VoIP
Networks
6. www.squire-technologies.com
SVI_MG 1000
► Single box TDM to VoIP solution
► Scales from 1E1 to 72E1, upgrade path
1E, 2E1,4E1,8E1, E1/T1 interfaces
► Supports 1+1 Redundancy
► PCI Form Factor
► Delivered in 1U, 2U or 4U PCI 19’ Telco
Grade Chassis
► Typically deployed by wholesale VoIP
carriers and ISP’s in 4,8 and 16 E1
configurations to deliver reliable, high
quality voice traffic between PSTN and
VoIP networks
6
Overview
7. www.squire-technologies.com
SVI_MG 8000
► Large scale TDM to VoIP deployments
► Scales from 16E1 to 1000 E1, upgrade
path 8E1,16E1,
E1/T1 interface support
► Support for OC-3 / STM-1/ DS3 interfaces
► Supports up to 9 x OC-3 / STM-1
interfaces
► Supports up to 27 x DS3/T3 interfaces,
upgrade path 1xT3, 2xT3, 3xT3
► Full Dual Plane Redundancy provided as
standard via Gateway Controller <->
Blade Server architecture.
► cPCI Form Factor – providing industry
standard hot-swap capabilities
► Delivered in 1U, 2U, 5U or 8U cPCI 19’
Telco Chassis
7
Overview
8. www.squire-technologies.com
SVI_MG Media Gateway
8
PSTN Physical Interconnect
SSP VoIP
VoIP
VoIP
SG
SSP
SG
SSP
TDM &
Signalling IP
10/100/1000
IP
10/100/1000
SIGTRAN
TDM/E1/ T1
IP
10/100/1000
TDM/E1/ T1
TDM & Signalling/
SIGTRAN
TDM interconnect
SIGTRANinterconnect
SIP Trunksinterconnect
Supporting multiple interface types the SVI-MG
delivers simultaneous termination of TDM and IP
PSTN interconnect as well as simultaneous
conversion between all variants.
TDM interconnect
- E1/ T1
- T3, DS3
- OC-3/ STM-1
SIGTRAN
- M2PA
- M2UA
- M3UA
- SUA
SIP Trunks
- SIP-I/ SIP-T
- Q1912.5
9. www.squire-technologies.com
SSP
n
SSP
n
SVI_MG Media Gateway
9
SS7 MTP Configurations
SSP VoIP
VoIP
VoIP
SSP
n
STP
D
SSP
A-n
F Link interconnect
Multiple F Link interconnects
A Link interconnects
DeliveringA–F link support, the SVI_MG supports
conversion between ‘any-to-any’simultaneous
multiple variants.
MTP L1-L3
- ITU-T Q.701-707
- ANSI T1-111.1-111.8
- Chinese GF 001-9001
- PNO-ISC/ SPEC/005
PC0
STP
A
Dimensioning
- 32 Signalling Links
- 32 Originating Point Codes
- 128 Linksets
- 1024 Destination Point Codes
10. www.squire-technologies.com
SVI_MG Media Gateway
10
SS7 SIGTRAN SCCP/TCAP Backhaul
Allows backhaul of SCCP/TCAP traffic from SS7
interconnect to third party device over M3UA/SUA.
SVI_MG still terminates voice traffic
Backhaul SIGTRAN
- M3UA
- SUA
SMSC
VoIP
STP
D
SSP
A-n
STP
A
11. www.squire-technologies.com
SVI_MG Media Gateway
11
PSTN Layer 4 Protocols
► ISUP
► ANSI ISUP - T1.113.1 to T1.113.4
► GR-246,TelcordiaISUP (T1.113.1to
T1.113.4)
► ITU ISUP - Q.761-Q.764Blue & White
Book
► TTC - JT- Q761-Q764
► ETSI ISUP-EN 300 356-1
► China YDN 038China
► FrenchSSURF (SPIROU)
► AustraliaACIF AG500
► BelgiumC2122 Ed.2
► FinlandSFS 5779
► GermanyZZN73.0.0
► Hong Kong HKTA 2202
► ItalySpecificaTecnicaN.763
► Mexico NOM-112SCTI
► Sweden8211-A335,8221A325
► UK PNO-ISC/SPEC/007
► RussiaISUP-R
► KazakhstanISUP-K
► New ZealandPTC
► Lithuanian
► Brazilian210-110-724
► Swiss
► Pakistan
► Spanish
► Polish
► Portuguese
► TUP
▶ ITU TUP Q721-Q725
▶ SSUTR2 V11-T1998
▶ ChineseGF 001-9001
▶ Brazil
▶ IUP
▶ UK PNO-ISC/SPEC/006
▶ SCCP
▶ ITUT Q711-Q714
▶ JT-Q711-G714
▶ ETSI ETS 300589
▶ ANSI T1.112
▶ TCAP
▶ ITUT Q771-Q774
▶ JT-Q771-G774
▶ ANSI T1.114
▶ Operations
▶ CNAM ANSI T1.641-1995(R2004)
Calling
Name IdentificationPresentation
▶ LNP GR-1936-CORE
▶ CAMEL
▶ 3GPP TS 23.078
▶ ISDN
▶ AT&T 41459/49(AT&T ISDN PRI)
▶ (BellcoreGR-1268)
▶ ETSI PRI (ETS 300 102)
▶ ETSI QSIG (ETS 300 172)
▶ ITUT PRI (Q931,DSS1)
▶ NIS A211-1
▶ NI1,NI2
▶ TS014,1TR6, VN3
► R2/ CAS
▶ CCITT Blue Book
▶ CountryVariants
Contact us if support is required for
a specificcountry variant
15. www.squire-technologies.com
SVI_MG Media Gateway
► Incoming Calls Routed
based on
► Called and Calling
Party Information
► Protocol Information
► Originating Network
► Trunk Group,
Hunt Group,
VoIP Destination,
Protocol
► Time Of Day
► Cost Of Route
► Outgoing Call
Manipulation
► Called and Calling
Party Information
► Protocol Information
► Enhanced Call
Completion
Algorithms
► Reattemptcall
► Same
Destination
and/or different
destinations
► Reattemptbased
on call failure
reason
► Load share across
different destinations
► Hunt high, low, odd,
even, incremental,
decremental,
percentage,ASR.
► Other
► Reject Call with
Protocol Reason
► Reject Call with
announcement
15
Intelligent Call Routing
Digit Routing
Timeof Day
Quality of Route
Digits + LCR
9123568686 91
81
11
ASR 40%
ASR 50%
ASR 75%
91+10cents
91+11cents
91+12cents
16. www.squire-technologies.com
SVI_MG Media Gateway
► SQL
► SVI calls SQL stored procedures
into customers SQL database
which returns routing information
► PostgreSQL and MYSQL
support
► Radius
► RadiusAuthorisation response
contains routing information
► HTTP
► Call back Service
16
External Routing APIs
External RoutingAPIs allow for customers to fully control routing through their own applications,
enabling integration of SVI into existing client infrastructure.
SS7VoIP
Client’s
RADIUS Server
Client’s
SQL Database
HTTP Server
GSM Modem
17. www.squire-technologies.com
SVI_MG Media Gateway
17
Billing
SS7VoIP
Client’s
RADIUS Server
Client’s
SQL Database
FTP Server
► Call Data Records (CDRs)
► On board CSV files contains all call attempts
► Stored in systems SQL Database
► Over 60 fields of call information
► FTP Server
► Client or Server controlled CDR retrieval
► Radius/Diameter Server
► FullAAAsupport (Authentication,
Authorisation andAccounting) support
► SQL
► Direct writing of CDRS to SQL clients SQL
database
SVI_Itel
18. www.squire-technologies.com
SVI_MG Media Gateway
18
OA&M – Operation,Administration and Maintenance
► Web based GUI
► SVI_MS Management
System
►Secure Remote Access
►Full Configuration
►Monitoring
►Debugging
► Command Line
Interface
19. www.squire-technologies.com
SVI_MG Media Gateway
19
OA&M – Operation,Administration and Maintenance
SVI MS
► The globally deployed SVI platform empowers
its users with an advanced level of expertise
and functionality.
► The SVI-MS management system features a
comprehensive toolkit combining ease of use
and the ability to run, analyse multiple systems
both safely and securely, providing efficient:-
► Configuration - Real time system setup,
onboard resource and call routing
management
► Monitoring - Comprehensive statistical
service monitoring and system status tool
► Debugging - Rapid tracing, diagnosing and
CDR analysis compatible with Wireshark
and Ethereal
20. www.squire-technologies.com
SVI_MG Media Gateway
20
OA&M – Operation,Administration and Maintenance
► The web based GUI brings the user powerful
tools to manage system resources, delivering a
real-time OA&M, offering:-
► Dashboard interface
► Wizard library
► Customisation – via XML
► Secure multi-user features
► Extensive help resources
► Compatibility with the entire SVI range
21. www.squire-technologies.com
SVI_MG Media Gateway
21
OA&M – Command Line Interface
► Configuration
► High speed real time
configuration for expert
users
► Full ‘secure’remote
access
► Administration
► Low Level MMI Interface
► Full onboard database
inspection and control
► Real time resource
status display
► Controlling system
resources
► Maintenance
► Configurable logfiles,
capturing all aspects of
system performance
► Compatible with
Wireshark and Ethereal
for full graphical protocol
traces
► Performance
► Extensive onboard
CDRs and statistics
generation
► Call minutes, ASR, PDD,
ACD, etc
► Resource Statistics
► Trap Reports
► Network Monitoring
► Trap capture
► Statistic monitoring,
Graphing andAlarming
22. www.squire-technologies.com
SVI_MG Media Gateway
The sophisticated SVI platform, brings secure
reliability and a proven global pedigree for network
operators, incorporating:-
► System
► Integrated Firewall
► Username, password protected
► Secure external protocols used for access (SSH,
SCP)
► Only process calls for configured VoIP
Destinations
► Reports on unauthourised access
► Client Challenge procedures
► Radius
► Authorisation and Authentication
22
Security
23. www.squire-technologies.com
SVI_MG Media Gateway
► 1+1 Dual Plan Worker/ Hot Standby
► Database and signalling information
checkpointed between planes
► Replicated hardware and software
► Maintain SIP calls in answer on failover
► Eliminates single points of failure
► Five Nines uptime (99.999%)
► Sub 1 second switchover time
► Calls in session maintained
► Single IP service address using VIP technology
► Real time Maintenance upgrades
23
SVI_MG 1000 Redundancy Model
VoIP
VirtualIP
Worker
Data & Signalling
CheckPointing
Hot Standby
PC0
SS7
► SVI_MG 1000
► 1+1 Dual Plane Redundancy
► How swap PSU, Fans
24. www.squire-technologies.com
SVI_MG Media Gateway
24
SVI_MG 8000 Redundancy Model
VoIP
VirtualIP
Worker
Data & Signalling
CheckPointing
Hot Standby
SS7
► Separate Processing Units and Interface cards
► No loss of bandwidth during processing unit outage
► Support of multiple Blade Servers
► Dual Controller Planes
► 1+1 Dual Plane Redundancy
► Blade Server
► Up to 8 Hot Swap PSUs
► Each Interface Blade has redundant Ethernet
► Passive Back Plane
► Hot Swap Fans
► Hot Swap Blades
Gateway
Controller
Gateway
Controller
PC0
Blade Server
ControlandSignalling
25. www.squire-technologies.com
SVI_MG Media Gateway
► Installation services
► Pre-configuration services
► On-site installation and
commissioning
► Remote installation and
commissioning via internet/
VPN
► Training – onsite or at Squire
Technologies
25
Additional information: Services
► Product enhancement services
► Cost-effective, client focused
adaptation of existing products
► Feature request development
► Support Services
► Range of support packages
from office hours to 24-7
26. www.squire-technologies.com
SVI_MG Media Gateway
► Visit www.squire-technologies.com
► For further product information on SS7 VoIP products for
carriers, operators and service providers, plus case
studies and customer testimonials.
► Email sales@squire-technologies.com
► To contact and member of our sales team
► Call +44 (0)1305 757314
► To speak with us today
26
Further information