Skip to main content

Posts

TELECOMMUNICATION SERVICES(METHODOLOGY)

  (Transgrid, 2020) The picture above illustrates types of services which provide by Telecommunication corporations to various users, whether governments, organizations or individuals. These services have been contributing to make the process of the data transfer smoothly and rapidly. Some of these services are depending on many methods to connect two destinations together, such as Ethernet, Wavelength, Dark Fibre or offering advanced options for Facilities co-locations controlling and securing.  (Transgrid, 2020) Source: Transgrid, 2020.  Discover Competitive Telecommunication Solutions On Our National Network. . [image] Available at: <https://www.transgrid.com.au/what-we-do/business-services/telecommunications/PublishingImages/Pages/default/Current%20telco%20services.png> [Accessed 2 December 2020].    
Recent posts

The use of property for telecommunications(LAW)

The law is identifying the concept of using third-party properties by the telecommunication organizations. Telecommunications organizations have authorized to enter to third parity properties if necessary in case of establishment, repair, changes, removal of telecommunication installations. However, the telecommunications organizations must notify the owners before they use the authorization to enter to the properties to prevent any dispute that may occur  (Telecommunications Law, 2020).   '' If owner or user of the property that has been used for telecommunication installation intends to perform such works or adjustment of the property that might threaten the smooth or secure operation of the telecommunication installations, he/she is obliged to notify the applicable telecommunication organization - providing that there is no danger of delay - at least six weeks before starting the intended works'' (Telecommunications Law, 2020)     Source: Itu.int. 2020.  Telecommunic

SOFTWARE EXAMPLE(CISCO PACKET TRACER)

I will illustrate how can we create a simultaneous GSM network by using Cisco Packet Tracer.  In the begging, I create a surveillance office, then connect them together as a network with different IP by switch device, which is also linked to the central office server. After that, I use 3 relay towers and link them to the central office server. The following picture shows the destination of the call from smart devices to the telecom provider and opposite. Source: CiscoNetAcad

SOFTWARE FUNCTIONALITIES EXPLAINED(CISCO PACKET TRACER)

Menu Bar: This bar shows  File ,  Edit ,  Options ,  View ,  Tools ,  Extensions , and  Help  menus. commands such as  Open ,  Save ,  Save as Pkz, Print , and  Preferences  in these menus.  Main toolbar: This bar shows  icons to the  File  and  Edit  menu commands, buttons for  Copy ,  Paste ,  Undo ,  Redo ,  Zoom , Drawing Palette ,  Custom Devices Dialog . On the right,  there the  Network Information. Real-time/simulation Bar: here you can choose between real-time mode or simulation mode. User Created Packet Window: This window shows the packets you place in the network during the simulation process. Network component box:  This bar contains all of the network and end devices available with Packet Tracer. Workspace: This is the area where the project is created, and simulations are displayed.

SOFTWARE OVERVIEW (CISCO PACKET TRACER)

(Cisco, 2020) Cisco Packet Tracer is an application created by Cisco. This application provides a network simulation to practice simple and complex networks This software teaches how networks can be configured and gives a real-time experience like other simulating devices. reference:     Cisco, 2020. [image] Available at: <https://assets.bigcartel.com/product_images/255468197/Cisco+Packet+Tracer+Training.jpg?auto=format&fit=max&w=1200> [Accessed 29 November 2020].                                                                                                                                               

CASE STUDY- VODAFONE GLOBAL COMPANY (CONCLUSION)

In conclusion, Vodafone is succeeded in remaining as one of the largest telecom corporations globally, although it has faced Huawei’s attempts to penetrate its networks at different times. This incident shows the importance for digital forensics team in telecom companies to detect and prevent any threats that may affect on the telecom system. Also, the experience of Vodafone in the field of partner networks may be taken as a good model for small companies to attract many customers rapidly, and increase the coverage of the telecom services.

CASE STUDY- VODAFONE GLOBAL COMPANY (DISCUSSION)

After months of investigation, Vodafone has discovered security bugs in its networks which installed by Huawei company. All evidence has pointed to Huawei company as responsible on these bugs. (Bloomberg, 2019) In 2009, Huawei built back doors on the home router in the Vodafone network, which allowed them to access to sensitive data and take full control to Vodafone networks. (Bloomberg, 2019)  In 2011, Vodafone requested Huawei to fix these back doors, and it received a confirmation from the provider that all issues were fixed, but further investigations have found the threats still existed. In 2012, again Vodafone identified other back doors in some of its fixed access network which called optical service nodes. After that, Vodafone and Huawei have announced that all issues were solved. (Bloomberg, 2019) Sources: Bloomberg, 2019.  Vodafone Found Hidden Backdoors In Huawei Equipment . [online] Bloomberg. Available at: <https://www.bloomberg.com/news/articles/2019-04-30/vodafon

CASE STUDY- VODAFONE GLOBAL COMPANY (METHODOLOGY)

The Vodafone company have been relating to many successes in the telecommunication sector for 20 Years ago. these achievements were reflected positively on the company’s reputation locally and globally.  (Vodafone,2020)  Furthermore, the wide telecom coverage across the country has contributed to obtain many mergers, acquisitions, and agreements with different corporations either in telecommunication or security fields.  (Vodafone, 2020)  In 2001, Vodafone introduced the concept of the partner networks when they signed with TDC Mobile of Denmark to use their networks to spread its service Instead of pumping huge sums for investment there .   (Media, 2020) In 2017, Vodafone launched news that It has acquired the cable and wireless worldwide company by one billion pound after dramatic negotiations. This takeover has raised up the value of the company and created an opportunity to obtain a high position in the network sector. (Lunden, 2012)  although there were many successes, the company

CASE STUDY- VODAFONE GLOBAL COMPANY (LITERATURE REVIEW)

  Historically, The telecommunication in the UK was really started in 1870, when the post office acquired the UK Telegraph Service. This acquisition allowed the nation to use a wide communication service across the country easily, which contributed to increase the telecom transactions rapidly around 7 million telegraph in this year.  (UK Telephone, 2020) Nowadays, with the noticeable evolution In the telecommunication services, the UK telecom sector is considered one of the largest telecom market in Europe. Numerous telecom companies compete to getting the latest telecom technology and offering different services.  (GlobeNewswire, 2020)  Various of telecom companies could compare them according to their market value, for example, the market value of the Vodafone company is around 63 billion$, which lead it to be on the top of the list of the strongest telecom companies in the UK as well as a big gap with Sky company which ranked second in the list with a value of 9 billion$.  (Statista

CASE STUDY- VODAFONE GLOBAL COMPANY (INTRODUCTION)

                 (caveman, 2017)              The Vodafone Global Company is considered a leading telecommunications system in the Europ and Africa. It was established in 1982 by one of the British electronics companies which called Racal Telecommunication.   (The History of Vodafone, 2020)   In the begging of 1985, the first office for this company was located in Newbury, Berkshire. Vodafone's name comes from (Voice Data Fone), which means the elements of the telecommunication system.  (The History of Vodafone, 2020)  The company has made many agreements acquisition on various telecommunication companies globally during the last 45 years ago, Which contributed obviously to spread the name of the company rapidly across the world. The biggest takeovers in the history was made in 1999, when the Vodafone has been taken over the German Telecom Giant Mannesmann by 112£ billion. ( BBC News, 2000 ) Nowadays, the number of Vodafone's customers are increasing globally, with 432 million

SECURE SPEECH SOLUTIONS -DIGITAL ENCRYPTION

Secure speech is defined as a method to protect the voice data from any interruption or eavesdropping operations which may occur during the call. Radio communication is being faced with many technical threats which may affect on the destination of the signal, especially with some devices which used an old generation of encryption system. The digital encryption is used as one of various types of s peech   encryption.  (Voice Crypto, 2020)  ''The  Speech is first digitized using an Analog-to-Digital Converter (ADC) or a Vocoder  The resulting digital data stream is then mixed using an XOR-operation with a data stream from a pseudo-random number generator (PRNG) This principle is also known as the Vernam Cipher. The resulting encrypted data stream that is then converted back to the analogue domain (modem), so that it can be transmitted.''  (Voice Crypto, 2020) The next simplified diagram is shown the process of digital encryption.   (Voice Crypto, 2020) References: Cryptom

Questionnaire- the impact of jamming and fraud threats on GSM system.

 In accordance with the questionnaire,  57.1% of the participants have exposed to jamming operations while they were calling with other parties by the GSM system. Also, 81.8% of them have faced fraud calls from unknown individuals. This attack is called a phishing threat which asks the victim to share his personal information such as bank details, user names, passwords or other things that related to the victim with the hacker either by text message or phone call.