This document provides configuration steps for distributing BFS in-band data over a Gigabit Ethernet network using a Scientific Atlanta DCM 9900 digital content manager. Key steps include configuring the DCM 9900 to output each BFS source as an individual SPTS with a unique multicast IP address. On the DNCS, a multicast session is defined for each BFS source using the GQAM and configured IP address. Routers are configured for IP multicast routing and IGMP. Testing verified guide, PPV, and application data but image downloads failed due to a known defect when using OSM automux across multiple frequencies.
The NM200E Core Verification System is a revolutionary technology that enables nuclear plant operators to accurately measure the positions of all fuel assemblies in a PWR reactor at the end of an outage.
Developed by Newton Labs in partnership with a major U.S. nuclear utility, the NM200E produces a precise global map of fuel assembly s-hole positions, including any degree of misalignment or top nozzle rotation and compares them with the ideal positions established by plant engineers.
The accuracy of the NM200E is derived from sophisticated, Newton-developed software that compensate for the visually distorting thermal turbulence and use the core baffles as positional references.
In addition to accuracy, the NM200E features a considerably rapid mapping time of two hours or less.
In this presentation from the DDN User Meeting at SC13, Sarp Oral provides an update on the Spider II file system at Oak Ridge National Laboratory.
Watch the video presentation: http://insidehpc.com/2013/11/13/ddn-user-meeting-coming-sc13-nov-18/
The NM200E Core Verification System is a revolutionary technology that enables nuclear plant operators to accurately measure the positions of all fuel assemblies in a PWR reactor at the end of an outage.
Developed by Newton Labs in partnership with a major U.S. nuclear utility, the NM200E produces a precise global map of fuel assembly s-hole positions, including any degree of misalignment or top nozzle rotation and compares them with the ideal positions established by plant engineers.
The accuracy of the NM200E is derived from sophisticated, Newton-developed software that compensate for the visually distorting thermal turbulence and use the core baffles as positional references.
In addition to accuracy, the NM200E features a considerably rapid mapping time of two hours or less.
In this presentation from the DDN User Meeting at SC13, Sarp Oral provides an update on the Spider II file system at Oak Ridge National Laboratory.
Watch the video presentation: http://insidehpc.com/2013/11/13/ddn-user-meeting-coming-sc13-nov-18/
Watch the full OnDemand Webcast: http://bit.ly/wcincreasing80211
Making the move to 802.11n? Though the rewards are significant, they come with a cost. The increased complexity of 802.11n can be a bit maddening, and it will definitely impact the way you design, monitor, and maintain your WLAN. MIMO? Channel bonding? Aggregation? If these terms aren’t currently part of your WLAN vocabulary, they certainly will be by the time you make the move. And even though the specification has been ratified for some time now, 802.11n hardware continues to evolve.
Join us as we explore the number of MIMO streams, channel bonding, guard interval lengths, and other characteristics that define your WLAN capabilities. We’ll also characterize the current state of commercially available 802.11n hardware, arming you with the information you need to determine if, when, and how you want to make the move.
In these slides, we will cover:
- Key technologies that are new to 802.11n
- The relative importance of each technology in contributing to increased performance
- The current “state of the art” of commercially available 11n equipment
What you will learn:
- What new 11n technologies are most important to you
- When to use the various 11n technologies
- How to monitor and analyze WLANs – both mixed-mode and Greenfield 11n
Watch the full webcast at: http://bit.ly/80211nIncreasedSpeedComplexity.
4 Channel Relay Board 5V-Bluetooth Compatible for ArduinoRaghav Shetty
Bluetooth technology is a short distance communication technology used by almost all phones
including smart phones and all laptops. This technology find very wide uses including that of Home &
Industrial automation.
The Relay shield is capable of controlling 4 relays. The max switching power could be
12A/250VAC or 15A/24VDC. It could be directly controlled by Arduino through digital IOs.
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)Naoto MATSUMOTO
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing
(MEMO)
07 Feb, 2013
SAKURA Internet Research Center
Senior Researcher / Naoto MATSUMOTO
Demonstrating Quantum Speed-Up with a Two-Transmon Quantum Processor Ph.D. d...Andreas Dewes
The accompanying slides of my PhD defense presentation on experimental quantum computing, held at the CEA Saclay in November 2012.
Please not that some slides appear "broken" due to the animation sequences they contain, to get a correct view of the presentation, just download the PPTX.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
BFS Distribution Via DCM
1. BFS In Band
Distribution via
DCM 9900
WAN/LAN LAB (4.2.500)
DNCS Systems Integration
Subscriber Networks
Revision 1.1
September 19, 2006
2. Revision History
Revision Date Description Author
1.0 8/11/2006 First Revision David Turrie
1.1 9/19/2006 Updated DCM configuration (No Transrate group) David Turrie
3. Table of Contents
TABLE OF CONTENTS.................................................................................................3
INTRODUCTION.............................................................................................................4
Purpose.............................................................................................................................................4
Audience...........................................................................................................................................4
References.........................................................................................................................................4
LAB NETWORK CONFIGURATION.............................................................................5
Physical Connectivity......................................................................................................................5
Equipment Information..................................................................................................................6
BFS In Band Configuration............................................................................................................7
Architectural Considerations.........................................................................................................9
Configuration Steps (Basic Outline)............................................................................................10
DCM 9900 (Gbe with Co-Processor Card).................................................................................10
DNCS...........................................................................................................................................10
Network.......................................................................................................................................10
Test Procedure Steps (Basic Outline)..........................................................................................11
4. Introduction
Purpose
This document provides detailed configuration information for distributing BFS In Band (IB)
data via the Scientific-Atlanta (S-A) digital content manager (DCM 9900). The DCM9900 is a
new product that is gaining traction due to its support for Switched Digital Video (SDV) and Ad
Insertion. Operators may also want to take advantage of this device to distribute BFS IB via
their Gigabit Ethernet networks allowing them to remove all remnants of their ASI distribution
networks.
Audience
This document is intended for Scientific-Atlanta personnel who are experienced with the Digital
Video System and basic networking principles.
References
[1] Install Direct ASI.doc, dtd 1/21/2005 (K. Perry)
[2] DCM Configuration Guide.pdf
5. Lab Network Configuration
Physical Connectivity
Figure 1 shows the physical connectivity of the components pertinent to this document.
Figure 1 – Physical Connectivity
6. Equipment Information
Table 1 – Equipment List
Description Vendor Hardware Software Comments
Item Release
1 DNCS Scientific-Atlanta SUN E450 SR 4.2.0.20
(Subscriber)
2 HMUX Card Video Propulsion DVP-2764/MT SAIasi Installed in
package DNCS
1.0.0.6
3 CF QAM Scientific-Atlanta D9476 2.5.0 BFS QAM
(Subscriber)
4 Digital Content Manager Scientific Atlanta DCM9900 2.00.18 ASI I/O module;
(Transmissions) Gbe I/O module
with co-processor
5 GQAM Scientific-Atlanta D9479-1 4.0.3
(Subscriber)
6 Settops Scientific-Atlanta 8300HD 1.89.10.1
8000HD 1.89.10.1
2000 Rev 5.0 1.60.2.1
3250HD 1.60.15
7606 (Sup7203B) 12.2(18)SXD5
7 Aggregation Router Cisco 650X 48 port
10/100/1000BT
and 650X 24 port
Gbe (SFP)
modules
4948-L3 12.2(20)EWA
8 Remote Switch Router Cisco
3750-L3 12.2(25)SEB2
7. BFS In Band Configuration
Table 2 lists the BFS In band sessions used for the test that are automatically setup by the DNCS
on the BFS QAM.
Table 2 – Default BFS sessions
# In Band Data Rate Elementary
Session ID Program # PMT PID
Service (Mbps) Stream PID
1 In-Band 00:00:00:00:00:00 02 (0x 02) 1.0 128 (0x80) 112 (0x70) 113 (0x71)
2 CAM IB 00:00:00:00:00:00 04 (0x 04) 1.0 129 (0x81) 128 (0x80) 129 (0x81)
3 IPG IB 00:00:00:00:00:00 06 (0x 06) 1.0 130 (0x82) 144 (0x90) 145 (0x91)
4 PPV IB 00:00:00:00:00:00 08 (0x 08) 1.0 131 (0x83) 160 (0xA0) 161 (0xA1)
5 IPG2 IB 00:00:00:00:00:00 10 (0x 0A) 1.0 132 (0x84) 176 (0xB0) 177 (0xB1)
6 IPG3 IB 00:00:00:00:00:00 12 (0x 0C) 1.0 133 (0x85) 192 (0xC0) 193 (0xC1)
7 IPG4 IB 00:00:00:00:00:00 14 (0x 0E) 1.0 134 (0x86) 208 (0xD0) 209 (0xD1)
8 IPG5 IB 00:00:00:00:00:00 16 (0x 10) 1.0 135 (0x87) 224 (0xE0) 225 (0xE1)
9 IPG6 IB 00:00:00:00:00:00 18 (0x 12) 1.0 136 (0x88) 240 (0xF0) 241 (0xF1)
10 IPG7 IB 00:00:00:00:00:00 20 (0x 14) 1.0 137 (0x89) 256 (0x100) 257 (0x101)
11 PPV IB2 00:00:00:00:00:00 22 (0x 16) 0.8 138 (0x8a) 272 (0x110) 273 (0x111)
12 SDV IB 00:00:00:00:00:00 24 (0x 18) 1.0 139 (0x8b) 288 (0x120) 289 (0x121)
13 OSM 00:00:00:00:00:00 199 (0x C7) 3.0 167 (0xa7) 736 (0x2E0) 737 (0x2E1)
14 SAIXOD 00:00:00:00:00:00 7000 (0x1B58) 2.0 168 (0xa8) 752 (0x2F0) 753 (0x2F1)
Total
As is the case with all remote headend installations, a QAM must be directly connected to the
DNCS regardless if this QAM is connected to the HFC plan (aka “dummy QAM”) and the
operator must configure a separate source definition and session per remote headend for each
source. In this case, the session type is a GQAM multicast session. Table 3 shows these sessions
for remote 1 GQAM. The multicast sessions for the remote 2 GQAM are identical except for the
session MAC ending with 0x11.
9. Architectural Considerations
1. Multicast versus unicast: Since each remote headend distributes the same BFS IB
content to the settops, distributing BFS IB on the network using multicast is the obvious
choice.
2. MPTS versus SPTS: The operator can either configure the DCM9900 to transmit the
BFS IB sources in a single MPTS or each source as a SPTS. I chose SPTS for two
reasons:
a. Redundancy: If the operator configured redundant BFS IB sources, then it makes
sense for each BFS source to be a SPTS in order for the GQAM (and
subsequently the network) to selectively choose an alternate DCM 9900 in the
case of a failed individual BFS source. If MPTS, the GQAM will receive all
sources when it joins the alternate group/source pair.
b. Troubleshooting: Using SPTS allows the operator to see each BFS source in the
multicast routing table and may assist them when a particular BFS source is not
functional at the settop.
The one deficiency of using SPTS is that a unique IP address per BFS source is required.
Since the number of BFS IB sources is typically limited (Forty is a high number), this
should not be a factor for most installations.
3. Source Specific Multicast versus Anycast: Use of SSM is only required if the customer
is interested in configuring redundant BFS sources or if they desire to limit the BFS
multicast to be received only from a “qualified” video source (i.e. DCM9900).
Otherwise, anycast can be used (i.e. IGMPv2/PIM-SM). In this lab system, SSM is
configured on the routers; and therefore, the standard IANA IP address range 232/8 is
used. The last octet matches the program number for easier identification.
4. Transrating: Transrating is not required since the DNCS transmits BFS via ASI at a
constant rate and the settop requires that the multiplexer not alter the data. The BFS
programs on the ASI input were dragged to the Gigabit Ethernet output port and assigned
a rate per the DNCS GUI settings with a small overhead to avoid continuity errors.
5. Bootloader: Ideally, the same frequency should be allotted for all QAM Carriers
forwarding BFS to avoid requiring OSM_Automux. If this is not possible, the operator
must enable OSM_Automux, but currently there is a bug (CR 60956) that breaks
OSM_Automux in this configuration. Until the bug is fixed and in the release used by
the system, the operator must have the same frequency available per remote site for BFS.
10. Configuration Steps (Basic Outline)
DCM 9900 (Gbe with Co-Processor Card)
1. Assign BFS sources from the programs listed under the DCM ASI input to a Gigabit
Ethernet port.
2. Set the multicast IP address for each BFS source per Table 3. (Note: The UDP port is
arbitrary – I assigned the same port to all BFS sources for easier troubleshooting).
3. Set the data rate for each output program, matching the BFS Admin setting plus a small
overhead.
DNCS
1. For each BFS source, create a source definition with a unique session ID (see Table 3).
2. Choose Multicast Session via GQAM and configure the following:
a. Bandwidth (per BFS Admin Source Configuration)
b. QAM Name
c. Output Carrier (Ideally, choose the same carrier for all BFS sessions)
d. Program Number: Enter the program number per Table 3
Note: The program number is not required for the GQAM to activate the session if SPTS is
used. However, specifying the program number is required for the bootloader carousel
session; otherwise, CVT will not work . In addition, it may be useful to include the program
number for all sessions for future reference when displaying the session on the DNCS GUI.
e. Source Address 1: (Enter DCM 9900’s Gbe IP address)
f. Source Address 2 and 3: If using redundant sources, enter the secondary and
tertiary IP addresses. Otherwise, leave blank.
g. Input Destination Multicast IP Address: See Table 3
h. UDP Port: Leave Blank
Network
1. Configure IP multicast routing on each router
2. Enable a multicast routing protocol on the DCM 9900 and GQAM interfaces. For this
test, PIM-SSM was used.
3. Enable IGMPv3 on the GQAM interface (if SSM is used).
11. Test Procedure Steps (Basic Outline)
For all steps, compare performance with local settops (same models) that receive BFS IB directly
from the BFS QAM.
1. IPG Verification
a. Reboot settop.
b. Verify the settop boots “Ready QAM” for IPG
c. Check the guide for seven days of IPG
d. Verify that the mini-carousel discovery file is successfully downloaded.
Results: SUCCESS
2. PPV Verification
a. Tune to a PPV channel
b. Ensure the PPV barker shows the latest event
c. Buy a PPV event.
Results: SUCCESS
3. Other In Band Application Verification
a. Tune to a xOD channel
b. Verify the client successfully loads.
c. Purchase a movie.
Results: SUCCESS
4. Image Download Verification
a. Download an image to a settop via CVT.
Results:
OK if not using OSM Automux.
Failed if using OSMAutomux configuration due to a defect on how OSM Kludge Manager
obtains the TSID for the remote GQAMs. CR 60956
Note: OSM Automux is required if each GQAM carrier forwarding BFS IB does not
match the BFS QAM frequency.