Professional Documents
Culture Documents
2
Radio Spectrum
2
Spectrum Analyzer
Oscilloscope
3
Spectrum Analyzer
5
Multiplexing
• Whenever the bandwidth of a medium linking two or more devices is greater than
the bandwidth needs of the devices, the link can be shared.
6
Multiplexing
Multiplexing
Frequency
Time Division Statistical
Division
Multiplexing Multiplexing
Multiplexing
7
Frequency Division Multiplexing
• A number of signals are sent simultaneously at the same time allocating separate
frequency bands.
• Therefore to avoid interference between two successive channels Guard bands are
used.
8
Frequency Division Multiplexing
9
Frequency Division DeMultiplexing
10
Frequency Division DeMultiplexing
11
Frequency Division DeMultiplexing
13
Interleaving
14
Digital Hierarichy
15
Digital Hierarichy
16
Digital Hierarichy
17
Digital Hierarichy
18
Statistical Multplexing
• This does not consider whether the device contains data or not.
19
Statistical Time Division Multplexing (STDM)
20
Statistical Time Division Multplexing (STDM)
Feature Description
Dynamically dividing bandwidth among communication
Method
channels based on actual data rate being transmitted
Increased network capacity,
Advantage reduced costs, and
effective utilization of bandwidth
21
E1 Carriers
Anritsu (cdn-anritsu.com)
E1 Carriers
23
Digital Hierarichy
24
Signalling
25
Digital Hierarichy
26
Digital Hierarichy
27
Signalling
28
Out-Band Signaling – Common Channel Signaling – SS7
Out-Band Signaling – Common Channel Signaling – SS7
Switch calls.
Out-Band Signaling – Common Channel Signaling – SS7
• Interception of Calls and SMS: Attackers can use SS7 vulnerabilities to intercept calls and
text messages, allowing them to listen in on conversations and read private messages.
• Call and SMS Spoofing: SS7 can be used to spoof the identity of a caller or sender of a
text message, making it appear as if the call or message is coming from a different
number.
SS7 Attacks
• Fraudulent Charges: SS7 can be used to make unauthorized charges to a user's phone
bill. Attackers can use SS7 to make calls or send text messages that appear to come from
the victim's phone number, leading to charges for services that the victim did not use.
• Obtaining access to an SS7 network: Attackers need access to an SS7 network in order
to be able to send location tracking requests. This can be achieved by gaining access to a
network through a vulnerability or by purchasing access from a third-party service.
• Location Tracking: SS7 can be used to track the location of a mobile device, which can
be a major security concern. Attackers can use SS7 to gather information about an
individual's whereabouts and use it for malicious purposes.
SS7 Attack – Location Access
• Sending location tracking requests: Once the attacker has access to an SS7 network,
they can send messages that request the location of the target device. These messages
are processed by the network, and the device's location is returned in response.
• Using location information for malicious purposes: The location information gathered
by the attacker can be used for a variety of malicious purposes, such as tracking the
movements of a target individual, conducting surveillance, or committing crimes.
SS7 and Diameter Signaling Threats (FYP – Research)
• Newer protocols such as SIP (Session Initiation Protocol) can also be extremely
vulnerable to cyber threats without proper controls in place. For instance, in 2018
a group of attackers managed to stage a denial of service (DoS) attack on Cisco
equipment through leveraging malformed SIP traffic.
SIP or Session Initiation Protocol (SIP) hacking is the most common cybersecurity threat
in Voice-over-IP (VoIP) communications. Without preventive measures, hackers can
easily tap into VoIP calls and distribute SIP malware or tamper with the service. Some of
the most common types of SIP attacks in 2020 included:
• SIP toll fraud
• SIP trunk hacking
• Caller ID spoofing
• DDoS attacks on the system
• Every time you make a phone call via the mobile, access the Internet or send
an email, you are benefitting from the work of ITU.
Digital Hierarichy
• Digital speech interpolation (DSI): A process which, when used in the transmit unit
of a DCME, causes a trunk channel (Voice channel) to be connected to a bearer
channel (part of E1 channel) only when activity is actually present on the trunk
channel.
• Low Rate Encoding (LBR)
• System LBR voice encoders
• 64Kbps 32 Kbps or low
ITUT G.763
Thank you !