Talk on "Socially-aware Traffic Management" given by Michael Seufert (http://www3.informatik.uni-wuerzburg.de/staff/michael.seufert/) at the workshop Sozioinformatik 2013 (http://www.sozioinformatik2013.de/, organized by Katharina Anna Zweig; held in conjunction with Jahrestagung der Gesellschaft für Informatik (INFORMATIK 2013)). The workshop addressed questions evolving around the interplay between social and technical systems, and bridged the gap from social sciences to computer sciences. The workshop talks gave an overview on different aspects of interactions between humans and IT-systems, and highlighted the need for a combination of social sciences and computer science in this field. The workshop showed that it is possible and sometimes necessary to integrate social studies into the design and application of IT-systems. This applies to SmartenIT especially in the context of socially-aware traffic management.
Michael Seufert, George Darzanos, Valentin Burger, Ioanna Papafili, Tobias Hoßfeld
Socially-Aware Traffic Management.
Workshop Sozioinformatik 2013, Koblenz, Germany, September 2013.
Abstract:
Socially-aware traffic management exploits social signals to optimize traffic management in the Internet in terms of traffic load, energy consumption, or end-user satisfaction. Several use cases can benefit from socially-aware traffic management and the performance of overlay applications can be enhanced. In the talk we show interdisciplinary efforts between communication networks and social network analysis. Specifically, we give an overview on existing use cases and solutions, but also raise discussions at the workshop on additional benefits from the integration of social information into traffic management.
Summary of UNIX commands used in the BTI Plant Bioinformatics Course in 2014. It includes a description of these common commands and some useful options.
Počítačové sítě I, lekce 6: Techniky přenosu datJiří Peterka
Verze 4.0 mé kurzovní přednášky na MFF UK Praha (kód předmětu NSWI090), připravená pro zimní semestr školního roku 2014/2015. Zdroj s možností tisku na http://www.earchiv.cz/l226/index.php3
Rodina protokolů TCP/IP, téma 3: Architektura TCP/IPJiří Peterka
Verze 3.0 mé kurzovní přednášky na MFF UK Praha (kód předmětu NSWI045), připravená pro letní semestr školního roku 2012/2013. Zdroj s možností tisku na http://www.earchiv.cz/l225/index.php3
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
IP tables-the linux firewall. This link shows the pdf document that you can download.This is a useful document for the beginners, lays the attention to know more about the topic.
Summary of UNIX commands used in the BTI Plant Bioinformatics Course in 2014. It includes a description of these common commands and some useful options.
Počítačové sítě I, lekce 6: Techniky přenosu datJiří Peterka
Verze 4.0 mé kurzovní přednášky na MFF UK Praha (kód předmětu NSWI090), připravená pro zimní semestr školního roku 2014/2015. Zdroj s možností tisku na http://www.earchiv.cz/l226/index.php3
Rodina protokolů TCP/IP, téma 3: Architektura TCP/IPJiří Peterka
Verze 3.0 mé kurzovní přednášky na MFF UK Praha (kód předmětu NSWI045), připravená pro letní semestr školního roku 2012/2013. Zdroj s možností tisku na http://www.earchiv.cz/l225/index.php3
Cisco CCNA Training/Exam Tips that are helpful for your Certification Exam!
To be Cisco Certified please Check out:
http://asmed.com/information-technology-it/
IP tables-the linux firewall. This link shows the pdf document that you can download.This is a useful document for the beginners, lays the attention to know more about the topic.
SECURED SOCIAL TUBE TO AVOID REDUNDANT VIDEO SHARING IN OSN SYSTEMEditor IJMTER
Recent years have witnessed the blossom of online social network service and online
video service as well as the rapid convergence of the two services. Social video contents or social videos
in short that is generated and shared by users in online social networks are becoming increasingly
popular on today's Internet. The unique propagation properties make the video access pattern in the
online social network quite different from that in the traditional centralized video service systems, in that
(1) video contents are no longer produced by a few centralized content providers, but by all individual
users; and (2) social connections and social activities determine the propagation of the videos among the
users. In that Existing system Secure Social tube, an improved peer-assisted video sharing system that
explores interest similarity, physical location and social relationship between peers in OSNs.
Specifically, social Tube incorporates four algorithms: a social network (SN)-based a buffer
management, scheduling, chunk delivery, chunk prefetching and P2P overlay construction. Proposed
system implement secure social tube approach to share useful videos in online social network and
implement video conversion approach to convert videos into frames and check each and every frames
using video content features and also eliminate the redundant video shared on network. Implement this
social tube framework in security manner.
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...Archiver
This presentation explored the use-cases driving ARCHIVER at the audience gathered at INFN, in Rome, Italy, for the Open Data Ecosystem and CS3 conference, 27-29 January 2020
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Copyright Protection in Peer To Peer NetworkIJERA Editor
Recently, P2P technology has become so popular that a large number of files are being exchanged by millions of users concurrently. However, due to the significant growth of P2P file sharing, even copyrighted files are also actively exchanged so copyright infringement has become a serious issue. In particular, P2P file sharing is recognized as a killer application for the P2P technology, and several P2P file sharing systems have been used by many users from the late 90’s to the present, including Napster, Gnutella, Kazaa and Bit Torrent. However, the popularization of such P2P file sharing causes several undesired issues in recent years, such as the illegal sharing of copyrighted contents violating the copyright law and the act as a hotbed of cyber-crimes such as phishing scams and leaks of personal information. In this work, we propose a solution to ensure copy right violation in P2P systems. Keywords- Peer to Peer systems, copyright infringement, file sharing, digital rights management, pollution attack, index poisoning, watermarking and fingerprinting.
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
CD-GAIN: Content Delivery Through the Analysis of Users' Access Patterns, ta...Dima Karamshuk
Using nine months of access logs comprising 1.9Billion sessions to BBC iPlayer, we survey the UK ISP ecosystem to understand the factors affecting adoption and usage of a high bandwidth TV streaming application across different providers. We find evidence that connection speeds are important and that external events can have a huge impact for live TV usage. Then, through a temporal analysis of the access logs, we demonstrate that data usage caps imposed by mobile ISPs significantly affect usage patterns, and look for solutions. We show that product bundle discounts with a related fixed-line ISP, a strategy already employed by some mobile providers, can better support user needs and capture a bigger share of accesses.
To effectively serve massive volumes of video traffic content delivery networks (CDNs) are turning to clients for assistance, creating hybrid peer-assisted content delivery systems. We analyze how peer-assisted CDNs are affected by a number of design obstacles which include: the need of localizing peer-to-peer traffic within ISPs (isp-friendliness), reluctance of users to participate in redistributing the content (partial participation) and necessity to match users with similar bitrate requirements (bitrate stratification).
Presented to Integrated Media Association
This speech pulls together Pew Internet findings and analysis about how people get news and relate to news items in the digital age.
http://www.pewinternet.org/ppt/2009_Feb_17_%20Public_Broadcasters.ppt#418,26,Behold Homo Connectus
Software Sustainability: preserving the future of research softwareNeil Chue Hong
Talk given at the National Science Foundation on the UK e-Science programme, the UK Software Sustainability Institute, and some of the challenges faced in ensuring long term development and maintenance of scientific software
Assessing Effect Sizes of Influence Factors Towards a QoE Model for HTTP Adap...SmartenIT
Tobias Hoßfeld, Michael Seufert, Christian Sieber, Thomas Zinner
Assessing Effect Sizes of Influence Factors Towards a QoE Model for HTTP Adaptive Streaming.
6th International Workshop on Quality of Multimedia Experience (QoMEX), Singapore, September 2014.
Abstract:
HTTP Adaptive Streaming (HAS) is employed by more and more video streaming services in the Internet. It allows to adapt the downloaded video quality to the current network conditions, and thus, avoids stalling (i.e., playback interruptions) to the greatest possible extend. The adaptation of video streams is done by switching between different quality representation levels, which influences the user perceived quality of the video stream. In this work, the influence of several adaptation parameters, namely, switch amplitude (i.e., quality level difference), switching frequency, and recency effects, on Quality of Experience (QoE) is investigated. Therefore, crowdsourcing experiments were conducted in order to collect subjective ratings for different adaptation-related test conditions. The results of these subjective studies indicate the influence of the adaptation parameters, and based on these findings a simplified QoE model for HAS is presented, which only relies on the switch amplitude and the playback time of each layer.
More Related Content
Similar to Socially-aware Traffic Management (Workshop Sozioinformatik)
SECURED SOCIAL TUBE TO AVOID REDUNDANT VIDEO SHARING IN OSN SYSTEMEditor IJMTER
Recent years have witnessed the blossom of online social network service and online
video service as well as the rapid convergence of the two services. Social video contents or social videos
in short that is generated and shared by users in online social networks are becoming increasingly
popular on today's Internet. The unique propagation properties make the video access pattern in the
online social network quite different from that in the traditional centralized video service systems, in that
(1) video contents are no longer produced by a few centralized content providers, but by all individual
users; and (2) social connections and social activities determine the propagation of the videos among the
users. In that Existing system Secure Social tube, an improved peer-assisted video sharing system that
explores interest similarity, physical location and social relationship between peers in OSNs.
Specifically, social Tube incorporates four algorithms: a social network (SN)-based a buffer
management, scheduling, chunk delivery, chunk prefetching and P2P overlay construction. Proposed
system implement secure social tube approach to share useful videos in online social network and
implement video conversion approach to convert videos into frames and check each and every frames
using video content features and also eliminate the redundant video shared on network. Implement this
social tube framework in security manner.
Hybrid Cloud storage deployment models: ARCHIVER presentation at the CS3 Work...Archiver
This presentation explored the use-cases driving ARCHIVER at the audience gathered at INFN, in Rome, Italy, for the Open Data Ecosystem and CS3 conference, 27-29 January 2020
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Copyright Protection in Peer To Peer NetworkIJERA Editor
Recently, P2P technology has become so popular that a large number of files are being exchanged by millions of users concurrently. However, due to the significant growth of P2P file sharing, even copyrighted files are also actively exchanged so copyright infringement has become a serious issue. In particular, P2P file sharing is recognized as a killer application for the P2P technology, and several P2P file sharing systems have been used by many users from the late 90’s to the present, including Napster, Gnutella, Kazaa and Bit Torrent. However, the popularization of such P2P file sharing causes several undesired issues in recent years, such as the illegal sharing of copyrighted contents violating the copyright law and the act as a hotbed of cyber-crimes such as phishing scams and leaks of personal information. In this work, we propose a solution to ensure copy right violation in P2P systems. Keywords- Peer to Peer systems, copyright infringement, file sharing, digital rights management, pollution attack, index poisoning, watermarking and fingerprinting.
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
FUTURE OF PEER-TO-PEER TECHNOLOGY WITH THE RISE OF CLOUD COMPUTINGijp2p
Peer-to-Peer (P2P) networking emerged as a disruptive business model displacing the server based
networks within a point in time.P2P technologies are on the edge of becoming all-purpose in developing
several applications for social networking. In the past seventeen years, research on P2P computing and
systems has received enormous amount of attention in the areas of academia and the industry. P2P rose to
triumphant profit-making systems in the internet. It represents the best incarnation of the end to end
argument, the frequently disputed design philosophies that guided the design of the internet. The doubting
factor then is why is research on P2P computing now fading from the spotlight and suffering a nose dive
fall as dramatic as its rise to its popularity. This paper is going to capture a quick look at past results in
peer-to-peer computing with focus on understanding what led to its rise, what contributed to its commercial
success and what has led to its lack of interest. The insight of this paper introduces cloud computing as a
paradigm to peer-to-peer computing.
CD-GAIN: Content Delivery Through the Analysis of Users' Access Patterns, ta...Dima Karamshuk
Using nine months of access logs comprising 1.9Billion sessions to BBC iPlayer, we survey the UK ISP ecosystem to understand the factors affecting adoption and usage of a high bandwidth TV streaming application across different providers. We find evidence that connection speeds are important and that external events can have a huge impact for live TV usage. Then, through a temporal analysis of the access logs, we demonstrate that data usage caps imposed by mobile ISPs significantly affect usage patterns, and look for solutions. We show that product bundle discounts with a related fixed-line ISP, a strategy already employed by some mobile providers, can better support user needs and capture a bigger share of accesses.
To effectively serve massive volumes of video traffic content delivery networks (CDNs) are turning to clients for assistance, creating hybrid peer-assisted content delivery systems. We analyze how peer-assisted CDNs are affected by a number of design obstacles which include: the need of localizing peer-to-peer traffic within ISPs (isp-friendliness), reluctance of users to participate in redistributing the content (partial participation) and necessity to match users with similar bitrate requirements (bitrate stratification).
Presented to Integrated Media Association
This speech pulls together Pew Internet findings and analysis about how people get news and relate to news items in the digital age.
http://www.pewinternet.org/ppt/2009_Feb_17_%20Public_Broadcasters.ppt#418,26,Behold Homo Connectus
Software Sustainability: preserving the future of research softwareNeil Chue Hong
Talk given at the National Science Foundation on the UK e-Science programme, the UK Software Sustainability Institute, and some of the challenges faced in ensuring long term development and maintenance of scientific software
Similar to Socially-aware Traffic Management (Workshop Sozioinformatik) (20)
Assessing Effect Sizes of Influence Factors Towards a QoE Model for HTTP Adap...SmartenIT
Tobias Hoßfeld, Michael Seufert, Christian Sieber, Thomas Zinner
Assessing Effect Sizes of Influence Factors Towards a QoE Model for HTTP Adaptive Streaming.
6th International Workshop on Quality of Multimedia Experience (QoMEX), Singapore, September 2014.
Abstract:
HTTP Adaptive Streaming (HAS) is employed by more and more video streaming services in the Internet. It allows to adapt the downloaded video quality to the current network conditions, and thus, avoids stalling (i.e., playback interruptions) to the greatest possible extend. The adaptation of video streams is done by switching between different quality representation levels, which influences the user perceived quality of the video stream. In this work, the influence of several adaptation parameters, namely, switch amplitude (i.e., quality level difference), switching frequency, and recency effects, on Quality of Experience (QoE) is investigated. Therefore, crowdsourcing experiments were conducted in order to collect subjective ratings for different adaptation-related test conditions. The results of these subjective studies indicate the influence of the adaptation parameters, and based on these findings a simplified QoE model for HAS is presented, which only relies on the switch amplitude and the playback time of each layer.
An Automatic and On-demand MNO Selection MechanismSmartenIT
A manual selection of the Mobile Network Operator (MNO) to be used on a mobile device is possible through the respective user interface. Furthermore, mobile devices can be adjusted to select automatically the MNO based on the strongest signal strength, among the list of those MNOs the Subscriber Identity Module (SIM) card is allowed to be registered with. However, so far in modern mobile operating systems, such as Android and iOS, there is no available method in the public developer’s Application Programming Interface (API), which allows for an automatic and on-demand selection of the MNO by third- party applications. Recently, various research approaches assume the existence of an automatic and on-demand MNO selection mechanism to achieve different goals, such as breaking the termination rates monopoly (AbaCUS) or minimizing the non-ionizing radiation of mobile/wearable devices. The interest of such a mechanism has been raised three years ago by the Android developers community. Thus, this work here presents an automatic and on-demand MNO selection mechanism, that has been designed and implemented on the Android platform. For evaluation purposes the energy and end-to-end (e2e) time consumption while switching among MNOs using this mechanism is evaluated and as an applied example the data consumption of AbaCUS signaling messages is measured.
Gamification Framework for Personalized Surveys on Relationships in Online So...SmartenIT
Michael Seufert, Karl Lorey, Matthias Hirth, Tobias Hoßfeld
Gamification Framework for Personalized Surveys on Relationships in Online Social Networks.
1st International Workshop on Crowdsourcing and Gamification in the Cloud (CGCloud), Dresden, Germany, December 2013.
Abstract:
The estimation of psychological properties of relationships (e.g., popularity, influence, or trust) only from objective data in online social networks (OSNs) is a rather vague approach. A subjective assessment produces more accurate results, but it requires very complex and cumbersome surveys. The key contribution of this paper is a framework for personalized surveys on relationships in OSNs which follows a gamification approach. A game was developed and integrated into Facebook as an app, which makes it possible to obtain subjective ratings of users' relationships and objective data about the users, their interactions, and their social network. The combination of both subjective and objective data facilitates a deeper understanding of the psychological properties of relationships in OSNs, and lays the foundations for future research of subjective aspects within OSNs.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
1. Institute of Computer Science
Chair of Communication Networks
Prof. Dr.-Ing. P. Tran-Gia
Socially-Aware Traffic
Management
Michael
Seufert, George Darzanos, Valentin Burger, Ioanna
Papafili, Tobias Hoßfeld
www3.informatik.uni-wuerzburg.de
2. Agenda
1.
Traffic Management in the Internet
2.
New Internet Applications
3.
Social Awareness
4.
Socially-Aware Traffic Management
5.
EU FP7 Project SmartenIT
2
Michael Seufert
2
3. Traffic Management in the Internet
Broadband deployment makes Internet more efficient
But traffic volumes on the Internet increase due to new
applications or new service levels
Traffic on the Internet has to be managed by Internet Service
Providers (ISPs) in order to
Avoid congestion
Deliver services in an acceptable quality
Save resources, energy, and costs
Methods for traffic management
Prioritization
Routing
Bandwidth shaping
Caching
Offloading
3
Michael Seufert
3
4. New Internet Applications
Trend: Applications are moved into the “cloud”
Video/music on demand
Live video/HD TV/music streaming
Video conferencing/VoIP
Remote desktop
Collaboration
File storage/sharing
Instant messaging
Gaming
Online social networks
Changes in Internet structure and content delivery
4
Michael Seufert
4
6. Yesterday: Internet Structure and VoD Traffic
Traffic from content
provider produces
transit costs and may
have high delay
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Tier 2
ISP
Tier 2
ISP
Content
Provider
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 3
Tier 3
Tier 3
6
Michael Seufert
6
7. Changes: Internet Structure and VoD Traffic
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 3
Tier 3
Tier 3
7
Michael Seufert
7
8. Changes: Internet Structure and VoD Traffic
Tier 1 ISP
Tier 1 ISP
Content providers
expand to global CDN
to save transit costs
and get content close
to users
Tier 1 ISP
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 3
Tier 3
Tier 3
8
Michael Seufert
8
9. Changes: Internet Structure and VoD Traffic
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Global Video
CDN
Cache
Tier 3
Tier 3
Tier 3
9
Michael Seufert
9
10. Changes: Internet Structure and VoD Traffic
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Global Video
CDN
Cache
Tier 3
Tier 3
Tier 2
Tier 2
Content providers offer
ISP
ISP
local caching services
to bring content closer
to users and to save
transit costs
Tier 3
10
Michael Seufert
10
11. Social Awareness
Social signals are ubiquitous
Online Social Networks
– Friendships
– Interest
– Trust-relevant metadata
Applications
– Call/messaging patterns
– Interaction patterns
– Content popularity
Sensors
– Location
Social awareness
Harvest social signals
Extract and exploit information
Goal: Improvement of a service
11
Michael Seufert
11
12. demand of item i λi(t)
Online Social
Network
λi(t)
Outlook: Towards Social Awareness
Use OSN
information to
predict demand
of video i λi(t)
Pre-fetch
trending videos
Improve local
cache hit ratios
Use unutilized
bandwidth in offpeak periods
t
User
File-Storage
Physical
Network
VoD
AccessNetwork
Content
Distribution
Network
InternetExchange
Point
local cache
capacitiy Γ(t)
Access-Network
12
Michael Seufert
12
13. Socially-Aware Traffic Management
N. Sastry, E. Yoneki, J. Crowcroft, “Buzztraq: Predicting
geographical access patterns of social cascades using social
networks“, Proceedings of the Second ACM EuroSys Workshop
on Social Network Systems, 2009
13
Michael Seufert
13
14. Socially-Aware Traffic Management
N. Sastry, E. Yoneki, J. Crowcroft, “Buzztraq: Predicting
geographical access patterns of social cascades using social
networks“, Proceedings of the Second ACM EuroSys Workshop
on Social Network Systems, 2009
14
Michael Seufert
14
15. Socially-Aware Traffic Management
N. Sastry, E. Yoneki, J. Crowcroft, “Buzztraq: Predicting
geographical access patterns of social cascades using social
networks“, Proceedings of the Second ACM EuroSys Workshop
on Social Network Systems, 2009
15
Michael Seufert
15
16. Socially-Aware Traffic Management
N. Sastry, E. Yoneki, J. Crowcroft, “Buzztraq: Predicting
geographical access patterns of social cascades using social
networks“, Proceedings of the Second ACM EuroSys Workshop
on Social Network Systems, 2009
Prediction of future access to user generated content (e.g. videos)
Generation of hints for replica placement and/or cache replacement
Usually replica placement is based on access history (locations of
previous users)
Add locations of potential future users (i.e., OSN friends of previous
users) to account for social cascades
Social cascade prediction improves history-based placement if
content mainly spreads virally
Useful for content which is not (yet) globally popular, otherwise CDN
16
Michael Seufert
16
17. Outlook: Exploiting Social Awareness
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Global Video
CDN
Cache
Tier 3
Tier 3
Tier 3
17
Michael Seufert
17
18. Outlook: Exploiting Social Awareness
Tier 1 ISP
Tier 1 ISP
Tier 1 ISP
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Global Video
CDN
Cache
Tier 3
User posts a video
which will be
watched by his
friend the next day
Tier 3
Tier 3
18
Michael Seufert
18
19. Outlook: Exploiting Social Awareness
Tier 1 ISP
Tier 1 ISP
Video can be
Tier 1 ISPtransmitted to cache
during night (offpeak hours)
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Global Video
CDN
Cache
Tier 3
User posts a video
which will be
watched by his
friend the next day
Tier 3
Tier 3
19
Michael Seufert
19
20. Outlook: Exploiting Social Awareness
Tier 1 ISP
Tier 1 ISP
Video can be
Tier 1 ISPtransmitted to cache
during night (offpeak hours)
Global Video CDN
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
Tier 2
ISP
When user wants to
watch the video the
next day, it is
already in the cache
Global Video
CDN
Cache
Tier 3
User posts a video
which will be
watched by his
friend the next day
Tier 3
Tier 2
ISP
Tier 3
20
Michael Seufert
20
21. SmartenIT
Socially-aware Management of New
Overlay Application Traffic combined
with Energy Efficiency in the Internet
EC FP7 STREP No. 317846, Duration: Nov 2012 – Oct 2015
10 European partners (academia, network and cloud operators)
Incentive-compatible cross-layer
traffic management for
Cloud service providers
ISPs
End-users
Exploitation of social awareness
User relations
Interests
Focus on energy efficiency
21
Michael Seufert
21
22. Discussion
Which services can benefit from socially-aware traffic
management?
Traffic and requirement prediction
Trusted communication
…
Which social information is needed?
Detail level
Time scale
…
How to collect this social information?
Social signals from various platforms
Collaboration with OSN
Crawling of data
Incentives for users to share their data
…
What about users„ privacy?
22
Michael Seufert
22