The document describes an interface from the Alcatel-Lucent 9900 Wireless Network Guardian (WNG) to provide notifications of network congestion events and allow queries of event status. The RESTful interface uses HTTP/HTTPS to transmit XML alerts containing event details like type, network element, subscribers, and intensity level. Notifications are sent for new alerts, updates if intensity changes, or if alerts are cleared. The interface also allows queries by event ID, network element, or correlation to retrieve latest status.
Restful Webserver Based Domotic Home Using Power over Ethernetijsrd.com
This document describes a system for controlling home appliances remotely over the internet using power over ethernet. The system uses Arduino boards with an ENC28J60 ethernet controller chip to implement a web server. Appliances like lights, fans and motors can be controlled through the web server interface by sending commands via HTTP requests. Ethernet provides both data connectivity and power delivery to devices using power over ethernet technology. The system was implemented and tested successfully for monitoring and switching home appliances remotely.
Wireless communication is rapidly growing, making it possible to design wireless network systems that can constantly collect, analyse, evaluate and validate our environment to get more control of the factors that influence it. With over a decade of intensive research and development, wireless sensor network technology has been emerging as viable solution to many innovative applications. In this project, we have developed a wireless TV audio transceiver (transmitter to multiple receivers) using microcontroller atmega 328 and nRF24L01 module. The nRF24L01 transceiver module uses the 2.4 GHz band and it can operate with band rates from 250 kbps up to 2 Mbps. If used in closed space and with lower band rate its range can reach up to 100 meters.
The document summarizes an experiment testing the range and reliability of communication between two RN2483 LoRa modules placed at varying distances. The results show that communication was successful at closer distances (100m) with lower output powers (0dB) but required higher powers (14dB) over longer distances. The modules were more susceptible to failures at different heights. Recommendations include further testing the modules at elevated heights and varying frequency/bandwidth settings.
This document describes a seminar report on powering devices using Wi-Fi. It discusses using a Wi-Fi router to wirelessly power low-power sensors and charge batteries at distances of up to 28 feet. It introduces a system called Po Wi-Fi that delivers power over Wi-Fi channels without significantly impacting network performance. Po Wi-Fi injects additional traffic on non-overlapping Wi-Fi channels to maximize power delivery while minimizing effects on associated clients and neighboring networks. It also presents a multi-channel energy harvester that can efficiently harvest power across multiple Wi-Fi channels to provide enough voltage for sensors and devices. The report evaluates Po Wi-Fi's ability to continuously power a temperature sensor wirelessly at a
IRJET- Smart Home Automation System using 8051 Micro-ControllerIRJET Journal
This document describes a smart home automation system that allows users to control home appliances remotely using a smartphone. The system uses an 8051 microcontroller connected to a Bluetooth module to receive control signals from a mobile app. When the user presses buttons in the app, characters are transmitted via Bluetooth to the microcontroller. It decodes the signals and activates relays connected to home appliances like lights and fans, turning them on and off. The system is designed to automate home appliances and save energy by remote control using Bluetooth communication between a smartphone and microcontroller.
Long Range Wide Area Network (LoRaWAN) devices have been hacking targets for quite some time. We dive into attacks that malicious actors can use against vulnerable LoRaWAN devices, and review the state of LoRaWAN security. This is the first in a three-part series.
PLNOG14: Internet w pojazdach - Paweł WachelkaPROIDEA
Paweł Wachelka - Huawei Polska
Language: Polish
Prezentacja pokaże w jaki sposób zapewnić bezprzewodowy dostęp do Internetu w autobusach, tramwajach, czy na przystankach. Wskaże także operatorom nowe możliwości świadczenia dodatkowych usług multimedialnych dla pasażerów komunikacji publicznej.
Zarejestruj się na kolejną edycję PLNOG: krakow.plnog.pl
This document describes the north bound interface for exporting analytics data from the 9900 Wireless Network Guardian (WNG) to external systems. It defines two mechanisms: one for bulk transfer of summary tables using Secure Copy Protocol on a periodic basis, and one for real-time transfer of session records using User Datagram Protocol. The summary tables include traffic, subscriber, and node performance statistics, organized into comma-separated value files with defined field formats.
Restful Webserver Based Domotic Home Using Power over Ethernetijsrd.com
This document describes a system for controlling home appliances remotely over the internet using power over ethernet. The system uses Arduino boards with an ENC28J60 ethernet controller chip to implement a web server. Appliances like lights, fans and motors can be controlled through the web server interface by sending commands via HTTP requests. Ethernet provides both data connectivity and power delivery to devices using power over ethernet technology. The system was implemented and tested successfully for monitoring and switching home appliances remotely.
Wireless communication is rapidly growing, making it possible to design wireless network systems that can constantly collect, analyse, evaluate and validate our environment to get more control of the factors that influence it. With over a decade of intensive research and development, wireless sensor network technology has been emerging as viable solution to many innovative applications. In this project, we have developed a wireless TV audio transceiver (transmitter to multiple receivers) using microcontroller atmega 328 and nRF24L01 module. The nRF24L01 transceiver module uses the 2.4 GHz band and it can operate with band rates from 250 kbps up to 2 Mbps. If used in closed space and with lower band rate its range can reach up to 100 meters.
The document summarizes an experiment testing the range and reliability of communication between two RN2483 LoRa modules placed at varying distances. The results show that communication was successful at closer distances (100m) with lower output powers (0dB) but required higher powers (14dB) over longer distances. The modules were more susceptible to failures at different heights. Recommendations include further testing the modules at elevated heights and varying frequency/bandwidth settings.
This document describes a seminar report on powering devices using Wi-Fi. It discusses using a Wi-Fi router to wirelessly power low-power sensors and charge batteries at distances of up to 28 feet. It introduces a system called Po Wi-Fi that delivers power over Wi-Fi channels without significantly impacting network performance. Po Wi-Fi injects additional traffic on non-overlapping Wi-Fi channels to maximize power delivery while minimizing effects on associated clients and neighboring networks. It also presents a multi-channel energy harvester that can efficiently harvest power across multiple Wi-Fi channels to provide enough voltage for sensors and devices. The report evaluates Po Wi-Fi's ability to continuously power a temperature sensor wirelessly at a
IRJET- Smart Home Automation System using 8051 Micro-ControllerIRJET Journal
This document describes a smart home automation system that allows users to control home appliances remotely using a smartphone. The system uses an 8051 microcontroller connected to a Bluetooth module to receive control signals from a mobile app. When the user presses buttons in the app, characters are transmitted via Bluetooth to the microcontroller. It decodes the signals and activates relays connected to home appliances like lights and fans, turning them on and off. The system is designed to automate home appliances and save energy by remote control using Bluetooth communication between a smartphone and microcontroller.
Long Range Wide Area Network (LoRaWAN) devices have been hacking targets for quite some time. We dive into attacks that malicious actors can use against vulnerable LoRaWAN devices, and review the state of LoRaWAN security. This is the first in a three-part series.
PLNOG14: Internet w pojazdach - Paweł WachelkaPROIDEA
Paweł Wachelka - Huawei Polska
Language: Polish
Prezentacja pokaże w jaki sposób zapewnić bezprzewodowy dostęp do Internetu w autobusach, tramwajach, czy na przystankach. Wskaże także operatorom nowe możliwości świadczenia dodatkowych usług multimedialnych dla pasażerów komunikacji publicznej.
Zarejestruj się na kolejną edycję PLNOG: krakow.plnog.pl
This document describes the north bound interface for exporting analytics data from the 9900 Wireless Network Guardian (WNG) to external systems. It defines two mechanisms: one for bulk transfer of summary tables using Secure Copy Protocol on a periodic basis, and one for real-time transfer of session records using User Datagram Protocol. The summary tables include traffic, subscriber, and node performance statistics, organized into comma-separated value files with defined field formats.
This document discusses the concept of "Perpetual Experience" which is defined as providing continuous, real-time customer experiences powered by information. It involves focusing on both customer and employee experiences. The document outlines several companies that The QoE Group has worked with and proposes the use of "Perpetual Thinking" sessions that bring groups together to stimulate sharing, learning, and innovation. It also discusses developing an "Incubation Hub" and "Experience Engine" to empower employees, understand customer needs, and innovate new solutions using artificial intelligence. The goal is to continuously gather experiences and knowledge to address issues, implement validated solutions, and improve future customer interactions.
This document contains 3 case studies related to digital experiences and customer service. It discusses projects with KCOM focused on digital culture and collaboration, a project with Vodafone to plan 24/7 digital assistance, and a current project with a UK plc to develop a new customer vision and strategy. Key insights involve the importance of real-world, real-time knowledge and contextual understanding to drive organizational change and improve customer experiences.
The document discusses how digital is changing the customer experience and marketing framework. It notes that reviews and word-of-mouth are increasingly influencing consumer trust. The wearable device market is expected to grow significantly by 2018. Digital experiences that are simpler are more likely to earn consumer recommendations. The lines between marketing, commerce, and customer service are blurring. Customers now engage on their own terms across various platforms and devices.
Este documento presenta tres programas de software desarrollados para facilitar el análisis y evaluación de la calidad de experiencia (QoE) en servicios de voz sobre IP (VoIP). El primer programa permite el dimensionamiento teórico de VoIP, mientras que los otros dos evalúan la QoE en una red real mediante la introducción de perturbaciones y medición de métricas como retardo y pérdida de paquetes. Se describen diversos escenarios de prueba realizados y se recomienda el uso de estos programas para monitorear la cal
Nokia NetAct is a virtualized OSS that provides full visibility and control over networks through a single consolidated view. It simplifies network management, provides real-time performance and fault management, and helps optimize networks. NetAct is highly scalable, virtualized for minimal downtime, and supports both traditional and cloud-based networks through tools that automate operations to reduce costs. It has over 320 operator customers globally and experience managing multi-vendor, multi-technology networks.
On QoE Metrics and QoE Fairness for Network & Traffic ManagementTobias Hoßfeld
*** QoE Metrics ***
While Quality of Experience (QoE) has advanced very significantly as a field in recent years, the methods used for analyzing it have not always kept pace. When QoE is studied, measured or estimated, practically all the literature deals with Mean Opinion Scores (MOS). The MOS provides a simple scalar value for QoE, but it has several limitations, some of which are made clear in its name: for many applications, just having a mean value is not sufficient. For service and content providers in particular, it is more interesting to have an idea of how the scores are distributed, so as to ensure that a certain portion of the user population is experiencing satisfactory levels of quality, thus reducing churn. We put forward the limitations of MOS, present other statistical tools that provide a much more comprehensive view of how quality is perceived by the users, and illustrate it all by analyzing the results of several subjective studies with these tools.
*** QoE Fairness ***
User-centric service and application management focuses on the Quality of Experience (QoE) as perceived by the end user. Thereby, the goal is to maximize QoE while ensuring fairness among users, e.g., for resource allocation and scheduling in shared systems. Although the literature suggests to consider consequently QoE fairness, there is currently no accepted definition of QoE fairness. The contribution of this paper is the definition of a generic QoE fairness index F which has desirable key properties as well as the rationale behind it. By using examples and a measurement study involving multiple users downloading web content over a bottleneck link, we differentiate the proposed index from QoS fairness and the widely used Jain’s fairness index. Based on results, we argue that neither QoS fairness nor Jain’s fairness index meet all of the desirable QoE-relevant properties which are met by F. Consequently, the proposed index F may be used to compare QoE fairness across systems and applications, thus serving as a benchmark for QoE management mechanisms and system optimization.
The document discusses research on quantifying user satisfaction (QoE) in VoIP applications like Skype calls. It presents three key contributions:
1) Developing the first QoE measurement methodology based on analyzing large-scale Skype call data to correlate call duration with network quality factors like jitter and bit rate.
2) Proposing OneClick, a simple framework for crowdsourced QoE experiments based on user clicks to indicate dissatisfaction.
3) Introducing the first crowdsourcable QoE evaluation methodology to verify user judgments.
The document describes the IMS session flow between an originating and terminating user in an IP Multimedia Subsystem network. It involves signaling messages being passed between the user equipment and P-CSCF in the visited network, and the home network nodes of I-CSCF, S-CSCF and AS, to setup and terminate a call or session. The process includes invite, response, acknowledgement and release messaging at each stage to establish and end media connectivity between the users.
These slides address the concerns that the Telecom industry has over IMS, the spread of OTTs, the importance of interoperability, and the search for the Telecom network standards of the future. It answers such questions as, "Do we need to simplify IMS?", "Do we need standards?", "Why is IMS so complicated?", "What do we mean by a 'seamless experience'?", and many more.
The document describes several registration and de-registration flows for IP Multimedia Subsystem (IMS). The key steps are:
1. For registration, the UE requests P-CSCF information from DHCP and DNS servers, then sends a register request to the P-CSCF which assigns a S-CSCF and retrieves the user profile from HSS.
2. Periodic re-registration follows the same process to refresh the registration.
3. For de-registration, the UE or network send a register request with expiration time of zero, removing the registration.
The document describes 4 scenarios for IMS/MMD call flows involving session establishment. Scenario 1 involves the originating UE having resources ready before sending the INVITE message, and the terminating UE having resources ready before sending the first provisional response. The call flow shows the SIP signaling messages exchanged between the UEs and IMS network entities, including an INVITE with an SDP offer from UE-1, and a 180 Ringing response from UE-2 with an SDP answer.
This document provides information about layer 2 networking protocols. It aims to help readers master VLAN/PVLAN theory, understand STP principles, and learn trunking technology. The document discusses VLANs, PVLANs, QinQ VLANs, VLAN stacking, MVLANs, spanning tree protocol operation principles, STP port states, and trunking. It provides diagrams and explanations of these key layer 2 concepts and protocols.
This document provides product documentation for the TG-3269 Gigabit PCI Network Adapter. It includes sections on copyright and trademark information, FCC compliance statements, safety information, and specifications. The document also provides instructions for installing the hardware and software for the adapter on various Windows operating systems.
The document describes the steps for installing three Motorola private broadband network product families:
1. The T3 PowerBroadband System extends Ethernet over single-pair telephone wiring up to 600 meters and provides line power to wallplate devices.
2. The XLP-6800 Extended PoE System extends Ethernet over two or four pairs up to 3,000 meters and provides line power and PoE to connected devices.
3. The XLP-7000 Extended PoE System extends Ethernet over single-pair wiring up to 1,500 meters and provides line power and PoE to connected devices.
The installation process involves installing the core switch in a wiring closet, running cross connects to wallplates or
A LAN or Local Area Network is a computer network (or data communications network) which is confined in a limited geographical location. A Virtual (or logical) LAN is a local area network with a definition that maps workstations/PCs on some other basis than geographic location (for example, by department, type of user or primary application)
The document discusses virtual LANs (VLANs), VLAN trunking protocols, and configuration. VLANs create separate broadcast domains to isolate and secure network traffic. VLAN trunking uses tagging to transmit frames between switches while identifying the VLAN. The two main trunking protocols are Cisco's ISL and the IEEE 802.1Q standard. The document also provides examples of configuring VLANs, trunking, and the VLAN Trunking Protocol (VTP.)
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual
Local Area Networks (VLAN) on the whole local area network.[1] To do this, VTP carries VLAN
information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1Q, IEEE
802.10 and LANE trunks. VTP is available on most of the Cisco Catalyst Family products.
The document discusses virtual local area networks (VLANs) and provides instructions for configuring VLANs and inter-VLAN routing on a switch and router. It defines VLANs, their benefits, types of VLANs including data, default, native and management VLANs. It also covers trunking, 802.1Q tagging, dynamic trunking protocol (DTP), VLAN trunking protocol (VTP) and configuring inter-VLAN routing using a router on a stick. Basic configurations and verification steps are provided for hands-on lab applications to create VLANs, assign ports, enable trunking and test inter-VLAN routing.
Published in the year 2014, this paper explains how interoperability and decentralized automation system can be achived in electrical distribution grid using IEC61850. Network information from neighboring nodes can help field controllers make decisions faster and more accurately thereby making the distribution network self- healing and reliable.
VLANs logically segment LANs into broadcast domains by using switches to assign ports and their attached devices to VLAN groups based on their MAC address, IP subnet, or switch port. This allows devices that are physically located on different floors or buildings to belong to the same logical LAN segment while preventing Layer 2 broadcasts from crossing VLAN boundaries. VLAN trunk links between switches allow multiple VLANs to be transmitted over the same physical link.
The document contains questions and answers about networking concepts such as VLANs, trunking, VTP, STP, wireless networking, and inter-VLAN routing. Based on the provided exhibit and configuration snippets, it tests the reader's understanding of switch and router configuration as well as common network design implementations.
S2 will tag the traffic with VLAN ID 99 when it forwards it from host PC1 over the trunk link. When DLS2 switch is connected to the DLS1 switch via a trunk link, DLS2 will be updated with the VLANs that are configured on DLS1 because DLS2 is in client mode. If the network cable of Host A is moved from interface Fa0/1 to Fa0/3 on switch SW1, Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.
This document discusses the concept of "Perpetual Experience" which is defined as providing continuous, real-time customer experiences powered by information. It involves focusing on both customer and employee experiences. The document outlines several companies that The QoE Group has worked with and proposes the use of "Perpetual Thinking" sessions that bring groups together to stimulate sharing, learning, and innovation. It also discusses developing an "Incubation Hub" and "Experience Engine" to empower employees, understand customer needs, and innovate new solutions using artificial intelligence. The goal is to continuously gather experiences and knowledge to address issues, implement validated solutions, and improve future customer interactions.
This document contains 3 case studies related to digital experiences and customer service. It discusses projects with KCOM focused on digital culture and collaboration, a project with Vodafone to plan 24/7 digital assistance, and a current project with a UK plc to develop a new customer vision and strategy. Key insights involve the importance of real-world, real-time knowledge and contextual understanding to drive organizational change and improve customer experiences.
The document discusses how digital is changing the customer experience and marketing framework. It notes that reviews and word-of-mouth are increasingly influencing consumer trust. The wearable device market is expected to grow significantly by 2018. Digital experiences that are simpler are more likely to earn consumer recommendations. The lines between marketing, commerce, and customer service are blurring. Customers now engage on their own terms across various platforms and devices.
Este documento presenta tres programas de software desarrollados para facilitar el análisis y evaluación de la calidad de experiencia (QoE) en servicios de voz sobre IP (VoIP). El primer programa permite el dimensionamiento teórico de VoIP, mientras que los otros dos evalúan la QoE en una red real mediante la introducción de perturbaciones y medición de métricas como retardo y pérdida de paquetes. Se describen diversos escenarios de prueba realizados y se recomienda el uso de estos programas para monitorear la cal
Nokia NetAct is a virtualized OSS that provides full visibility and control over networks through a single consolidated view. It simplifies network management, provides real-time performance and fault management, and helps optimize networks. NetAct is highly scalable, virtualized for minimal downtime, and supports both traditional and cloud-based networks through tools that automate operations to reduce costs. It has over 320 operator customers globally and experience managing multi-vendor, multi-technology networks.
On QoE Metrics and QoE Fairness for Network & Traffic ManagementTobias Hoßfeld
*** QoE Metrics ***
While Quality of Experience (QoE) has advanced very significantly as a field in recent years, the methods used for analyzing it have not always kept pace. When QoE is studied, measured or estimated, practically all the literature deals with Mean Opinion Scores (MOS). The MOS provides a simple scalar value for QoE, but it has several limitations, some of which are made clear in its name: for many applications, just having a mean value is not sufficient. For service and content providers in particular, it is more interesting to have an idea of how the scores are distributed, so as to ensure that a certain portion of the user population is experiencing satisfactory levels of quality, thus reducing churn. We put forward the limitations of MOS, present other statistical tools that provide a much more comprehensive view of how quality is perceived by the users, and illustrate it all by analyzing the results of several subjective studies with these tools.
*** QoE Fairness ***
User-centric service and application management focuses on the Quality of Experience (QoE) as perceived by the end user. Thereby, the goal is to maximize QoE while ensuring fairness among users, e.g., for resource allocation and scheduling in shared systems. Although the literature suggests to consider consequently QoE fairness, there is currently no accepted definition of QoE fairness. The contribution of this paper is the definition of a generic QoE fairness index F which has desirable key properties as well as the rationale behind it. By using examples and a measurement study involving multiple users downloading web content over a bottleneck link, we differentiate the proposed index from QoS fairness and the widely used Jain’s fairness index. Based on results, we argue that neither QoS fairness nor Jain’s fairness index meet all of the desirable QoE-relevant properties which are met by F. Consequently, the proposed index F may be used to compare QoE fairness across systems and applications, thus serving as a benchmark for QoE management mechanisms and system optimization.
The document discusses research on quantifying user satisfaction (QoE) in VoIP applications like Skype calls. It presents three key contributions:
1) Developing the first QoE measurement methodology based on analyzing large-scale Skype call data to correlate call duration with network quality factors like jitter and bit rate.
2) Proposing OneClick, a simple framework for crowdsourced QoE experiments based on user clicks to indicate dissatisfaction.
3) Introducing the first crowdsourcable QoE evaluation methodology to verify user judgments.
The document describes the IMS session flow between an originating and terminating user in an IP Multimedia Subsystem network. It involves signaling messages being passed between the user equipment and P-CSCF in the visited network, and the home network nodes of I-CSCF, S-CSCF and AS, to setup and terminate a call or session. The process includes invite, response, acknowledgement and release messaging at each stage to establish and end media connectivity between the users.
These slides address the concerns that the Telecom industry has over IMS, the spread of OTTs, the importance of interoperability, and the search for the Telecom network standards of the future. It answers such questions as, "Do we need to simplify IMS?", "Do we need standards?", "Why is IMS so complicated?", "What do we mean by a 'seamless experience'?", and many more.
The document describes several registration and de-registration flows for IP Multimedia Subsystem (IMS). The key steps are:
1. For registration, the UE requests P-CSCF information from DHCP and DNS servers, then sends a register request to the P-CSCF which assigns a S-CSCF and retrieves the user profile from HSS.
2. Periodic re-registration follows the same process to refresh the registration.
3. For de-registration, the UE or network send a register request with expiration time of zero, removing the registration.
The document describes 4 scenarios for IMS/MMD call flows involving session establishment. Scenario 1 involves the originating UE having resources ready before sending the INVITE message, and the terminating UE having resources ready before sending the first provisional response. The call flow shows the SIP signaling messages exchanged between the UEs and IMS network entities, including an INVITE with an SDP offer from UE-1, and a 180 Ringing response from UE-2 with an SDP answer.
This document provides information about layer 2 networking protocols. It aims to help readers master VLAN/PVLAN theory, understand STP principles, and learn trunking technology. The document discusses VLANs, PVLANs, QinQ VLANs, VLAN stacking, MVLANs, spanning tree protocol operation principles, STP port states, and trunking. It provides diagrams and explanations of these key layer 2 concepts and protocols.
This document provides product documentation for the TG-3269 Gigabit PCI Network Adapter. It includes sections on copyright and trademark information, FCC compliance statements, safety information, and specifications. The document also provides instructions for installing the hardware and software for the adapter on various Windows operating systems.
The document describes the steps for installing three Motorola private broadband network product families:
1. The T3 PowerBroadband System extends Ethernet over single-pair telephone wiring up to 600 meters and provides line power to wallplate devices.
2. The XLP-6800 Extended PoE System extends Ethernet over two or four pairs up to 3,000 meters and provides line power and PoE to connected devices.
3. The XLP-7000 Extended PoE System extends Ethernet over single-pair wiring up to 1,500 meters and provides line power and PoE to connected devices.
The installation process involves installing the core switch in a wiring closet, running cross connects to wallplates or
A LAN or Local Area Network is a computer network (or data communications network) which is confined in a limited geographical location. A Virtual (or logical) LAN is a local area network with a definition that maps workstations/PCs on some other basis than geographic location (for example, by department, type of user or primary application)
The document discusses virtual LANs (VLANs), VLAN trunking protocols, and configuration. VLANs create separate broadcast domains to isolate and secure network traffic. VLAN trunking uses tagging to transmit frames between switches while identifying the VLAN. The two main trunking protocols are Cisco's ISL and the IEEE 802.1Q standard. The document also provides examples of configuring VLANs, trunking, and the VLAN Trunking Protocol (VTP.)
VLAN Trunking Protocol (VTP) is a Cisco proprietary protocol that propagates the definition of Virtual
Local Area Networks (VLAN) on the whole local area network.[1] To do this, VTP carries VLAN
information to all the switches in a VTP domain. VTP advertisements can be sent over ISL, 802.1Q, IEEE
802.10 and LANE trunks. VTP is available on most of the Cisco Catalyst Family products.
The document discusses virtual local area networks (VLANs) and provides instructions for configuring VLANs and inter-VLAN routing on a switch and router. It defines VLANs, their benefits, types of VLANs including data, default, native and management VLANs. It also covers trunking, 802.1Q tagging, dynamic trunking protocol (DTP), VLAN trunking protocol (VTP) and configuring inter-VLAN routing using a router on a stick. Basic configurations and verification steps are provided for hands-on lab applications to create VLANs, assign ports, enable trunking and test inter-VLAN routing.
Published in the year 2014, this paper explains how interoperability and decentralized automation system can be achived in electrical distribution grid using IEC61850. Network information from neighboring nodes can help field controllers make decisions faster and more accurately thereby making the distribution network self- healing and reliable.
VLANs logically segment LANs into broadcast domains by using switches to assign ports and their attached devices to VLAN groups based on their MAC address, IP subnet, or switch port. This allows devices that are physically located on different floors or buildings to belong to the same logical LAN segment while preventing Layer 2 broadcasts from crossing VLAN boundaries. VLAN trunk links between switches allow multiple VLANs to be transmitted over the same physical link.
The document contains questions and answers about networking concepts such as VLANs, trunking, VTP, STP, wireless networking, and inter-VLAN routing. Based on the provided exhibit and configuration snippets, it tests the reader's understanding of switch and router configuration as well as common network design implementations.
S2 will tag the traffic with VLAN ID 99 when it forwards it from host PC1 over the trunk link. When DLS2 switch is connected to the DLS1 switch via a trunk link, DLS2 will be updated with the VLANs that are configured on DLS1 because DLS2 is in client mode. If the network cable of Host A is moved from interface Fa0/1 to Fa0/3 on switch SW1, Host A is no longer a member of VLAN 10, because port Fa0/3 has been manually assigned to VLAN 30.
This document summarizes a presentation given by Steve Frank of EtherWAN, a manufacturer of Ethernet networking devices. EtherWAN focuses on producing environmentally hardened Ethernet switches and media converters for applications in transportation infrastructure, security/surveillance, and smart grid utilities. Their devices are designed to operate in extreme temperatures and withstand vibration. EtherWAN provides managed and unmanaged switches with features like VLAN tagging, QoS, port security, and fast recovery from link failures. Their hardened devices are suited for network edge applications requiring reliability.
This document provides a 3-sentence summary of the key points:
The document discusses VLAN configuration on Supermicro switches, including the basics of VLANs, supported VLAN types (port-based, MAC-based, and protocol-based), and how VLAN identification works when a packet is received. Port-based VLANs are configured by assigning ports as access, trunk, or hybrid ports and setting the acceptable frame types. The document also provides instructions for creating, modifying, and removing VLANs.
The document discusses monitored emergency lighting systems, which use networked lights and exit signs that can be tested remotely. It recommends using a LonWorks powerline network to connect emergency lights due to the low data needs, low installation costs, and ability to leverage existing power cables. Typical system architectures involve connecting lights to a backbone of twisted pair cabling using powerline-to-twisted pair routers and monitoring all devices from a central server.
21 An X10 based intelligent gateway for Process Control Applications - 7th Wo...Cristian Randieri PhD
An X10 based intelligent gateway for Process Control Applications - Accepted for the 7th World Multi-Conference on Systemics, Cybernetics and Informatics SCI 2003, Orlando (Florida), 27-30 July 2003
di C. Randieri, V. Bellini, O. Mirabella
Abstract
In this paper we present a new device for a remote control system based on X10 protocol and Internet technologies. This device is used in experimental nuclear physics for the remote control of various kinds of apparatus like pumps, valve and other basic systems that do not necessarily need high-speed control systems. The solution described makes experiment handling more flexible, eliminating any problem which originates from the need for cabling new systems being controlled.
The document summarizes virtual private networks (VPNs), including their definition, need, and how they work. VPNs allow corporate networks to securely transmit data over the public internet. They provide flexibility, scalability, and cost savings compared to traditional private networks. The document describes various VPN types and protocols like IPsec and PPTP. It also discusses VPN hardware and software requirements and advantages/disadvantages of VPNs.
This document provides an overview of virtual local area networks (VLANs). It begins with an introduction to VLANs, explaining that they allow devices to communicate as if on the same physical LAN even if they are on different physical LANs. The document then covers VLAN types including data, default, native and voice VLANs. It also discusses VLAN switch ports, managing VLANs, and the benefits of VLANs over wireless local area networks. In conclusion, it states that VLANs segment broadcast domains to improve LAN performance and manageability while reducing costs.
This document provides an overview of virtual local area networks (VLANs). It begins with an introduction to VLANs, explaining that they allow devices to communicate as if on the same physical LAN even if they are on different physical LANs. The document then covers VLAN types including data, default, native and voice VLANs. It also discusses VLAN switch ports, managing VLANs, and the benefits of VLANs over wireless local area networks. In conclusion, it states that VLANs segment broadcast domains to improve LAN performance and manageability while reducing costs.
Yokogawa understands very well that reliable, high-performance field- wireless solutions are important for end-users to trust and adopt field wireless in their plants.
The document discusses Intel network cards and their performance. It explains that throughput and CPU utilization are key metrics, with higher throughput and lower CPU utilization being better. It then describes Intel Adaptive Technology which can automatically adjust packet spacing and reduce collisions to improve these metrics. Testing showed it reduced CPU utilization by 20% and interrupt rates from 2800 to 900. It also allows hardware optimization for different operating systems.
Similar to Alu 9900 wng_congestion_notification_interface_v1 3_external (20)
This document discusses how to move from data silos to enterprise-wide data analytics. It outlines how traditional analytics focused on structured, repeatable analysis of limited data, while big data enables iterative, exploratory analysis of varied, high-volume, real-time data. It recommends adopting this big data approach by combining traditional and non-traditional data sources. The document also provides examples of how one company, Cricket, evolved their use of big data analytics to gain insights into customer behavior, preferences, and network performance from billions of data records.
The document discusses identity as a service and the growing importance of digital identity. It notes that identity can serve as an enabler for personalized services, a currency that users can trade for value, and a product that companies can sell. However, identity management also carries risks around data privacy and legal compliance. The document outlines several business cases for identity services, including permission-based marketing, identity brokering, an identity bank, and privacy-as-a-service. UnboundID is introduced as a provider of identity platforms to help companies dynamically manage customer identity data across applications while respecting privacy.
Huawei - Access failures troubleshooting work shopnavaidkhan
This document provides information on troubleshooting access failures in mobile networks, including:
1. It describes the general call setup procedure and potential points of failure, such as RRC, paging, and RACH access failures.
2. Common causes of access failures are discussed, like RF issues, radio parameter problems, and other miscellaneous causes.
3. Guidance is given on how to identify and resolve different types of failures, including steps to troubleshoot RRC access failures through analyzing configuration, alarms, traffic patterns, and radio parameters.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The Rocket Optimizer log contains information on video transcoding statistics and video server performance. The VideoTranscoderStats section provides details on optimization such as session ID, video duration, processing time and file sizes. The VideoServerStats section describes metrics like requests served, bandwidth usage and error rates to evaluate video delivery.
Smartphones – A game changer in expectations of customer experiencenavaidkhan
This document summarizes a presentation given by Turki Alqarefah of Zain Group and Stephen Bowker of AIRCOM International about optimizing the smartphone experience for customers. It discusses how Zain engaged AIRCOM to improve the experience of their smartphone users in Kuwait. AIRCOM conducted an operator benchmark and audit of Zain's 3G RAN, which led to optimizing smartphone experience. This resulted in improved paging success by 92% and reduced signaling load by 36%. The document also outlines challenges of providing optimal experiences for smartphone users.
Self optimizing networks-benefits of son in lte-july 2011navaidkhan
This document provides an overview of Self-Organizing Network (SON) capabilities for LTE networks as standardized in 3GPP Release 8, 9, and 10. It discusses the goals of SON, which are to automate network configuration and optimization to reduce costs and improve performance. Key SON features covered include base station self-configuration, automatic neighbor relations, tracking area planning, load balancing, mobility robustness, interference coordination, and energy savings. The timeline of SON standardization and enhancements across LTE releases is presented. Live results demonstrating benefits of applying SON techniques to HSPA+ networks are described. The document also discusses application of SON to technologies like distributed antenna systems and small cells.
This document provides an overview of different database technologies for managing large amounts of data, including row-based databases, columnar databases, and NoSQL databases. It discusses how traditional row-based databases struggle with analytics on large, dynamic datasets due to performance issues. Columnar databases help address this by storing data by column rather than row, reducing the amount of data retrieved for queries. NoSQL databases provide non-relational alternatives. The document aims to help readers understand which technology is best suited to their specific data challenges and needs.
Signalsflash070113 LTE World Summit Key take awaysnavaidkhan
- The document summarizes key points from the LTE World Summit, including that carrier aggregation allows more effective spectrum utilization and helps level the playing field between operators with different amounts of spectrum. It allows dynamic load balancing between non-contiguous LTE bands.
- The availability of LTE-Advanced and carrier aggregation increases theoretical peak data rates for most LTE subscribers from ~75Mbps to ~150Mbps. Higher throughput will particularly benefit users at the cell edge or in challenging RF conditions and when networks are congested.
- While higher speeds sound exciting, typical mobile users may not notice major differences except when downloading large files, as web pages and most transactions don't require more than a few megabits per second
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
2. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 2 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
TABLE OF CONTENTS
1. SCOPE...................................................................................................................................................3
2. 9900 WNG INTERFACE......................................................................................................................4
The 9900 WNG notifies the external entity over the interface of the following types of events:..............4
2.1 Network Performance Event Interface..............................................................................................4
2.2 Event Query Interface .......................................................................................................................5
3. RESTFUL INTERFACE DESCIRPTION ............................................................................................6
3.1 Network Performance Events............................................................................................................6
3.1.1 Network Load Alerts creation.................................................................................................6
3.1.2 NW Load Alerts Updates.........................................................................................................8
3.1.3 Clearing NW Load Alerts........................................................................................................8
3.2 Event Query Interface .......................................................................................................................9
3. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 3 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
1. SCOPE
This document describes the interface from the 9900 WNG to provide notification of congested
cells and the IP addresses contributing that network load. The interface is intended to be used to
identify loaded cells for the purpose of optimization.
4. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 4 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
2. 9900 WNG INTERFACE
The 9900 WNG network load notification interface is a RESTful, web services API. This API
uses request-response type messages to allow notification of anomaly events to external entities.
The communication between the 9900 WNG and the client may occur over HTTPS and using
port 8443. Alternatively the communication may be over SSH using port 22.
By default, the interface will communicate over secure connections (HTTPS or SSH), however,
the operator may optionally disable the security to just use HTTP.
The 9900 WNG notifies the external entity over the interface of the following types of
events:
• Network Performance Events – alerts associated with identifying a network element /
segment that is exhibiting a performance threshold crossing including the subscribers that
are contributing to that performance crossing threshold
In addition to notifications, an external entity can issue a query to obtain the status of particular
network element or correlation / event id as described below.
2.1 Network Performance Event Interface
The Network Performance Event notification interface provides notification of a performance
event on a per Network Element basis:
• Performance Event Type (eg. NWLoad Alert, Trend Alert)
• Event ID
• Timestamp in UTC format
• Refresh Update Type (time, transition, query)
• Network Element Type (CELL, RNC, SGSN…)
• Cell Type (CDMA, GPRS, W-CDMA, LTE, WIMAX…)
• Network Element name/ID
• Performance Event Status (Active or Cleared)
• Performance Event Intensity (0 to 5)
• Subscriber List - IP Addresses (v4/v6) of Subscribers traversing/terminating on the
Network Element
• Correlation ID
• Detector ID (Unique Identifier for each 9900 WNG detector)
As the Network Element enters into, exits from, or transitions from one level of intensity to
another, the 9900 WNG will notify the client.
The 9900 WNG can filter notifications and only send if a performance/trend event is of a
specified intensity threshold.
The 9900 WNG expects an HTTP status code response (eg. 200 OK), otherwise it will retry the
POST.
5. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 5 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
2.2 Event Query Interface
The Query Interface is used to allow an external entity to query the status of a particular network
element or correlation id/event id for outstanding or past events. This interface is useful in the
case where the external entity may have experienced a communication or system failure in which
event notifications may have been lost. As such the interface provides a mechanism to
synchronize the status between the 9900 WNG and external entity.
The content of the query will be identical to the event notification with the Refresh Update Type
= QUERY.
6. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 6 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
3. RESTFUL INTERFACE DESCIRPTION
3.1 Network Performance Events
The Network related events (NWloadalert alerts) are sent to the external entity using HTTP or
HTTPS to URI
<client-ip-addr>/wng/perfalert.
9900 WNG load alerts are created or cleared using method POST.
3.1.1 Network Load Alerts creation
The HTTP/HTTPS post for the creation of a performance alert (load alert) to the external entity
uses the following XML format.
<perfalert>
<NWloadalert>
<alertId></alertId>
<timestamp></timestamp>
<refupdate></refupdate>
<ne_type></ne_type>
<cell_type></cell_type>
<name></name>
<status></status>
<intensity></intensity>
<sub_list>
<subid>
<IMSI></IMSI>
<ipv4></ipv4>
<ipv6></ipv6)
</subid>
…
<subid>
<IMSI></IMSI>
<ipv4></ipv4>
<ipv6></ipv6)
</subid>
</sub_list>
<correlationId></correlationId>
<detectorId></detectorId>
</NWloadalert>
</perfalert>
Where the possible values for the different XML tags are:
<alert_id>
Unique integer id corresponding to the notification
<timestamp>
YYYY-MM-DD:HH:MM:SS:MS in UTC (including time-offset)
<ref-update>
TIME
TRANSITION
7. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 7 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
QUERY
NOTE: If a network element transitions from any intensity to a
different intensity, then the ref_update value will be set to
TRANSITION. If a network element remains in the current
intensity level for a configurable time period, the 9900 WNG will
re-issue and refresh the notification with an updated set of IP
addresses and set the ref_update value to TIME. The exception is
intensity 0. Notifications will only be generated on transitions
from and to intensity 0. If a network element remains in
intensity 0, no further notifications will be sent. By default,
the update interval between TIME notifications is 2 minutes,
however, this is system configurable via the 9900 WNG CLI. If
the update is the result of an external entity issuing a query
for the status, then the ref-update value will be set to QUERY.
<ne_type>
CELL
BS
RNC
SGSN
GGSN
Note: Currently the only supported value is CELL.
<cell_type>
CDMA
GPRS
W-CDMA
LTE
WIMAX
<name>
Network element name (eg. 20401602cc4dd9 is a cell id in hex format)
<status>
ACTIVE
ACKNOWLEDGED
AUTO_CLEARED
MANUAL_CLEARED
RESET_CLEARED
<intensity> values (0-5)
NOTE: The thresholds that correspond to the intensity values are user configured on the 9900 WNG.
<sub_list> list of subscribers in the network element at the time of the notification.
<sub_id> Subscriber id is used to provide an identification of subscriber breakdown per sub. The
subid tag will be repeated for each subscriber in the list and is used to identify the grouping of attributes
for that given subscriber (note the “id” portion will not be updated for each sub – instead it is strictly
used to separate entries.
8. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 8 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
<IMSI> The Subscriber IMSI or NAI.
<ipv4> The IP V4 address in text representation. If the subscriber does not have an IPv4 address, this
tag entry will be missing.
<ipv6> The IP V6 address in text representation. If the subscriber does not have an IPv6 address, this
tag entry will be missing.
The addresses will be in text representation for both v4 and v6 addresses. NOTE: If a UE has both a v4
and v6 address, both addresses will be in the list.
<correlationId> unique integer. Used to correlate to an update of an existing alert.
<detectorId> unique integer. This is used to identify the 9900 WNG detector from which the alert was
generated. Useful if the recipient is receiving alerts from multiple 9900 WNG detectors.
3.1.2 NW Load Alerts Updates
In order to update a NW Load Alert, the 9900 WNG sends the same XML message but using the
<ref_update> tag can be used to distinguish whether the update is due to a transition from one
intensity level to another or based on a time interval update.
If a network element transitions from any intensity to a different intensity, then the ref_update
value will be set to TRANSITION. If a network element remains in the current intensity level for
a configurable time period, the 9900 WNG will re-issue and refresh the notification with an
updated set of IP addresses and set the ref_update value to TIME. The exception is intensity 0.
Notifications will only be generated on transitions from and to intensity 0. If a network element
remains in intensity 0, no further notifications will be sent.
The <correlationId> in the message has to match the one in the original event creation, the
network element name has to match also.
The list of sub_list subscriber and address will be a complete list of all subs/addresses in that
congested network element at the time of the notification.
3.1.3 Clearing NW Load Alerts
In order to clear a NW Load Alert, the 9900 WNG sends the same XML message but using
<status> with one of the following:
AUTO_CLEARED
MANUAL_CLEARED
RESET_CLEARED
The intensity will also be set to 0.
The <correlationId> in the Clear message has to match the one in the original event creation, the
network element name has to match also.
9. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 9 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
3.2 Event Query Interface
The HTTP request for the creation of a status query and response to & from the 9900 WNG uses the
following XML format:
<statusquery>
<eventtype>
<queryId></queryid>
<alertId></alertId>
<name></name>
<correlationId></correlationId>
<detectorId></detectorId>
</eventtype>
</statusquery>
<queryId>
Mandatory - Unique integer id corresponding to the query
<eventtype>
Mandatory - Corrresponds to the type of event for which the
query shall be executed – NWLoadalert, trendalert, etc.
<alertId>
Optional – corresponds to the alertID that was reported during
the notification
<name>
Optional – corresponds to the network element name for which
the query shall be executed upon.
<correlationid>
Optional – corresponds to the correlationid for a given set of
alerts
One of alertid, name, or correlationid must be specified in the query.
If name or correrlationid are specified, the latest status is provided.
Response
<statusresponse>
<queryid>
<querytimestamp></querytimestamp>
SAME CONTENT AS NOTIFICATION ABOVE
</queryid>
</statusres[pmse>
10. Alcatel-Lucent 9900 WNG Congestion Alert Interface
Last Revised: 2011.05.20 Page 10 of 10 Version 1.3
This document contains Confidential Information of Alcatel-Lucent
- END OF DOCUMENT -