Giornata di studio sui White Spaces, che si è tenuta lunedì 24 ottobre 2011, 9.30 - 17.00 – Sala Agorà, Incubatore d’Imprese Innovative del Politecnico di Torino (I3P).
The document summarizes the steps involved in establishing a radio connection between a UE and core network. It involves the UE sending a connection request, followed by setup of the radio link over Iub. Authentication and security procedures are then performed along with radio bearer and physical channel reconfiguration to complete the connection.
The document discusses routing protocols and path selection algorithms. It provides an overview of common dynamic routing protocols including RIP, EIGRP, OSPF, IS-IS, and BGP. It describes how distance vector protocols, link-state protocols, and path vector protocols work, and compares their algorithms. It also discusses how routers use prefix length and administrative distance to select the best path for forwarding packets.
Leonardo Sambrana of Extreme Networks gave a presentation covering MPLS LSP load sharing, selective VLAN mapping to VPLS, and MPLS in an SDN environment. The presentation discussed how LSP load sharing improves traffic distribution over link aggregation groups. It also explained how selective VLAN mapping allows multiple VLANs to be mapped to a single VPLS service. Finally, it compared traditional MPLS deployments to an SDN-based approach using OpenDaylight and discussed using MPLS traffic engineering and L3 VPNs with SDN.
The document describes various unicast and multicast routing protocols. It discusses Interior Gateway Protocols (IGPs) like RIP, OSPF, and IS-IS that are used for unicast routing within an autonomous system. It also discusses the Border Gateway Protocol (BGP) used for unicast routing between autonomous systems. For multicast routing, it covers protocols like DVMRP, MOSPF, CBT, and PIM that utilize concepts like reverse path forwarding, shared trees, and source trees to efficiently deliver packets to multiple receivers. Key multicast protocols like IGMP are also explained which help multicast routers track group memberships.
The document discusses routing protocols and path selection algorithms. It provides an overview of common dynamic routing protocols including RIP, EIGRP, OSPF, IS-IS, and BGP. It describes how distance vector protocols, link-state protocols, and path vector protocols work differently in advertising routes and calculating the best paths. It also discusses how routers use the forwarding information base and administrative distances to select the best path for forwarding packets.
This chapter discusses congestion control and quality of service techniques for data networks. It covers topics like traffic profiling, congestion and its effects on network performance, open and closed loop congestion control, examples of TCP and Frame Relay congestion control, flow characteristics and classes, scheduling algorithms, traffic shaping using leaky and token buckets, integrated services and differentiated services quality of service models, and quality of service in Frame Relay and ATM networks. The chapter also includes various figures illustrating related concepts.
The document summarizes the current state of the rail sector in Europe. It discusses the EU's regulatory actions to liberalize and reform rail through measures like unbundling infrastructure from services and creating a single market. Implementation has varied by country, with some maintaining state control over ownership, network management and operations. Empirical analysis found a negative correlation between passenger rail prices and levels of regulation and privatization. However, regulation was not correlated with perceptions of service quality, which still varied across countries. State-owned enterprises continue to play an important role in rail.
The document summarizes the steps involved in establishing a radio connection between a UE and core network. It involves the UE sending a connection request, followed by setup of the radio link over Iub. Authentication and security procedures are then performed along with radio bearer and physical channel reconfiguration to complete the connection.
The document discusses routing protocols and path selection algorithms. It provides an overview of common dynamic routing protocols including RIP, EIGRP, OSPF, IS-IS, and BGP. It describes how distance vector protocols, link-state protocols, and path vector protocols work, and compares their algorithms. It also discusses how routers use prefix length and administrative distance to select the best path for forwarding packets.
Leonardo Sambrana of Extreme Networks gave a presentation covering MPLS LSP load sharing, selective VLAN mapping to VPLS, and MPLS in an SDN environment. The presentation discussed how LSP load sharing improves traffic distribution over link aggregation groups. It also explained how selective VLAN mapping allows multiple VLANs to be mapped to a single VPLS service. Finally, it compared traditional MPLS deployments to an SDN-based approach using OpenDaylight and discussed using MPLS traffic engineering and L3 VPNs with SDN.
The document describes various unicast and multicast routing protocols. It discusses Interior Gateway Protocols (IGPs) like RIP, OSPF, and IS-IS that are used for unicast routing within an autonomous system. It also discusses the Border Gateway Protocol (BGP) used for unicast routing between autonomous systems. For multicast routing, it covers protocols like DVMRP, MOSPF, CBT, and PIM that utilize concepts like reverse path forwarding, shared trees, and source trees to efficiently deliver packets to multiple receivers. Key multicast protocols like IGMP are also explained which help multicast routers track group memberships.
The document discusses routing protocols and path selection algorithms. It provides an overview of common dynamic routing protocols including RIP, EIGRP, OSPF, IS-IS, and BGP. It describes how distance vector protocols, link-state protocols, and path vector protocols work differently in advertising routes and calculating the best paths. It also discusses how routers use the forwarding information base and administrative distances to select the best path for forwarding packets.
This chapter discusses congestion control and quality of service techniques for data networks. It covers topics like traffic profiling, congestion and its effects on network performance, open and closed loop congestion control, examples of TCP and Frame Relay congestion control, flow characteristics and classes, scheduling algorithms, traffic shaping using leaky and token buckets, integrated services and differentiated services quality of service models, and quality of service in Frame Relay and ATM networks. The chapter also includes various figures illustrating related concepts.
The document summarizes the current state of the rail sector in Europe. It discusses the EU's regulatory actions to liberalize and reform rail through measures like unbundling infrastructure from services and creating a single market. Implementation has varied by country, with some maintaining state control over ownership, network management and operations. Empirical analysis found a negative correlation between passenger rail prices and levels of regulation and privatization. However, regulation was not correlated with perceptions of service quality, which still varied across countries. State-owned enterprises continue to play an important role in rail.
- The document discusses evolving legacy multi-vendor GFP encapsulated Gigabit Ethernet services delivered over SDH links to dynamic Ethernet lightpaths across an optical private line network. This would allow services to meet growing performance demands with smaller margins.
- It proposes transparency through OTN encapsulation, end-to-end performance monitoring via MEF 2.0 SOAM, and scaling capacity/reach through OTUk interfaces between network operators.
- Initial solutions involve GFP encapsulation over STM-64 links but scaling could use redeployed ROADMs and evolving to dynamic lightpaths treated as virtual paths within an optical core network.
This document provides an overview of routing protocols and path selection algorithms. It discusses the main types of routing protocols including distance vector protocols like RIP, link-state protocols like OSPF, path vector protocols like BGP, and hybrid protocols like EIGRP. It describes how each protocol uses different algorithms and metrics to determine the best path, avoid loops, and populate the routing table. Key topics covered include distance vector algorithms, link-state algorithms, path vector algorithms, and the role of the routing and forwarding tables in path selection.
This document discusses service logic in carrier Ethernet services. It begins by defining different Ethernet service types, such as E-Line, E-LAN, and E-Tree services. It then provides examples of how these services are implemented in both port-based and virtualized formats. The document also discusses combining multiple services on a single UNI. Finally, it covers the processing of L2CP control protocol frames and the actions that can be taken for different protocols.
BGP is the routing protocol used between autonomous systems (AS) on the Internet to exchange routing and reachability information. It uses path vector routing to exchange routing information between ASes and allows for policies to influence path selection. BGP attributes like AS path, next hop, local preference, and communities are used to apply policies and influence the best path selection. Techniques like route reflection and confederations help scale the internal BGP mesh within a large AS.
This document provides an overview of key topics in wireless networking, including the differences between wired and wireless networks, wireless technologies, basic service sets (BSS), radio frequency (RF), wireless bands and channels, and wireless encryption. It discusses how wireless networks remove the need for wires but introduce challenges with transmitting data through open space without physical protection. Access points and BSSIDs are described as creating closed wireless groups with a common standard and coverage area.
The document compares the costs of MPLS VPN connectivity versus point-to-point leased line connectivity for links over 500km and within a city. For long-distance cross-country links over 500km, the point-to-point leased line option is 58.73-74.3% cheaper than the MPLS VPN option even after discounts. Similarly for intra-city links, point-to-point leased lines are 20.21-20.73% cheaper. The tables provide a detailed cost breakdown and comparison of the different cost components for each connectivity option.
AODV routing Protocol in MANET by ThesisScientist
In this topic, a mechanism for improving the protocol ca be provided that will forecasts the latency in the route discovery phase and will use an enhanced local repairing technique in the stage of route repairing.
Students from Ms. Smith's World Religions class will take a field trip this Friday to visit places of worship for three major monotheistic religions - Judaism, Christianity, and Islam. The class will start their day with a tour of the local synagogue to learn about Jewish religious practices and beliefs. Next, they will attend a church service to observe a Christian mass. To conclude the trip, the class will visit a nearby mosque to learn about Muslim prayer rituals and speak with an imam.
This document provides an overview of the financial and operations of Babtel, a converged communications services provider operating in Iraq and the Middle East. It introduces the executive team and regional office locations. The mission statement aims for Babtel to be the trusted choice for secure, accessible and competitively priced communications services. Details are given on Babtel's coinless phone booth business, circuit switched telephony enterprise services, and Wi-MAX wireless access network.
The document discusses the Toyota Kata method of continuous improvement. It proposes using routines like grasping the current condition, setting a target condition, using PDCA cycles, and coaching katas. These routines are meant to be practiced frequently to develop the capability for continuous improvement. Frequent coaching cycles between a mentor and mentee are also recommended to establish rapport and keep practitioners learning.
The passage discusses the objectives and levels of production planning and control. The main objectives are to ensure the production of goods that meet customer needs, maximize output while minimizing costs and processing time, maintain optimal inventory levels, and maximize profit. Production planning occurs at three levels - factory planning, process planning, and operation planning. Effective production planning leads to benefits like reduced costs, inventory, and delivery times while improving customer service and profits. Limitations include assumptions not being accurate and difficulties with changes in technology, tastes, and policies.
This document summarizes information about an organization called Cyber-Duck and their approach to user experience (UX) design. It discusses their user-centered approach, some key principles of UX like defining audiences and solving real user needs, and tactics like system mapping, sketching, prototyping, and UX research. The document emphasizes starting with sketches and prototypes early, baking branding and growth strategies into the UX from the start, and defining the overall "experience" in pitches and presentations.
"Get Results With Email Marketing" is a dynamic presentation given by Simon Grabowski, CEO of GetResponse, at the e-nnovation conference in Poznan. It focuses on permission-based email marketing, email list building. Simon also shares proven email marketing strategies that can help to grow any business on the Internet.
The document describes a teacher gathering children's prior knowledge about digital cameras before showing them a digital story about bread making on YouTube to prepare them for a photostory project. The children then took pictures during a bread activity and recorded audio to describe the pictures, adding background music to create their own digital story.
The document provides examples of items one might pack in a suitcase for travel and the grammatically correct way to describe the quantities of each item. It suggests imagining describing the contents of your own suitcase to a partner. Sample items listed include a cell phone, books, t-shirts, cameras, jeans, shoes, pants, an MP3 player, backpack, sweater, map, belt, and blouse. Next to each is written either "a/an" or "two/three/four" to indicate singular or plural quantities.
The Mane Station is a product designed to hold hair styling tools like blow dryers and curling irons. It has barrel holes sized for common tools and a storage tray for smaller items like clips and brushes. Made of heat-resistant laminate, it is lightweight at 1.5 lbs and mounts securely to surfaces using adhesive strips. The Mane Station aims to provide a convenient storage solution for at-home hair stylists to keep their electrical tools organized and away from sinks.
1) The front page of the preliminary task used dark colors that did not blend well, while the final product used brighter colors that were better organized and incorporated images more effectively.
2) The contents page of the preliminary task lacked understanding of what should be included, but additional research improved the organization and design of the contents page in the final product.
3) Comparing the preliminary task to the final product showed the importance of research, planning and experience in creating a quality media product.
- The document discusses evolving legacy multi-vendor GFP encapsulated Gigabit Ethernet services delivered over SDH links to dynamic Ethernet lightpaths across an optical private line network. This would allow services to meet growing performance demands with smaller margins.
- It proposes transparency through OTN encapsulation, end-to-end performance monitoring via MEF 2.0 SOAM, and scaling capacity/reach through OTUk interfaces between network operators.
- Initial solutions involve GFP encapsulation over STM-64 links but scaling could use redeployed ROADMs and evolving to dynamic lightpaths treated as virtual paths within an optical core network.
This document provides an overview of routing protocols and path selection algorithms. It discusses the main types of routing protocols including distance vector protocols like RIP, link-state protocols like OSPF, path vector protocols like BGP, and hybrid protocols like EIGRP. It describes how each protocol uses different algorithms and metrics to determine the best path, avoid loops, and populate the routing table. Key topics covered include distance vector algorithms, link-state algorithms, path vector algorithms, and the role of the routing and forwarding tables in path selection.
This document discusses service logic in carrier Ethernet services. It begins by defining different Ethernet service types, such as E-Line, E-LAN, and E-Tree services. It then provides examples of how these services are implemented in both port-based and virtualized formats. The document also discusses combining multiple services on a single UNI. Finally, it covers the processing of L2CP control protocol frames and the actions that can be taken for different protocols.
BGP is the routing protocol used between autonomous systems (AS) on the Internet to exchange routing and reachability information. It uses path vector routing to exchange routing information between ASes and allows for policies to influence path selection. BGP attributes like AS path, next hop, local preference, and communities are used to apply policies and influence the best path selection. Techniques like route reflection and confederations help scale the internal BGP mesh within a large AS.
This document provides an overview of key topics in wireless networking, including the differences between wired and wireless networks, wireless technologies, basic service sets (BSS), radio frequency (RF), wireless bands and channels, and wireless encryption. It discusses how wireless networks remove the need for wires but introduce challenges with transmitting data through open space without physical protection. Access points and BSSIDs are described as creating closed wireless groups with a common standard and coverage area.
The document compares the costs of MPLS VPN connectivity versus point-to-point leased line connectivity for links over 500km and within a city. For long-distance cross-country links over 500km, the point-to-point leased line option is 58.73-74.3% cheaper than the MPLS VPN option even after discounts. Similarly for intra-city links, point-to-point leased lines are 20.21-20.73% cheaper. The tables provide a detailed cost breakdown and comparison of the different cost components for each connectivity option.
AODV routing Protocol in MANET by ThesisScientist
In this topic, a mechanism for improving the protocol ca be provided that will forecasts the latency in the route discovery phase and will use an enhanced local repairing technique in the stage of route repairing.
Students from Ms. Smith's World Religions class will take a field trip this Friday to visit places of worship for three major monotheistic religions - Judaism, Christianity, and Islam. The class will start their day with a tour of the local synagogue to learn about Jewish religious practices and beliefs. Next, they will attend a church service to observe a Christian mass. To conclude the trip, the class will visit a nearby mosque to learn about Muslim prayer rituals and speak with an imam.
This document provides an overview of the financial and operations of Babtel, a converged communications services provider operating in Iraq and the Middle East. It introduces the executive team and regional office locations. The mission statement aims for Babtel to be the trusted choice for secure, accessible and competitively priced communications services. Details are given on Babtel's coinless phone booth business, circuit switched telephony enterprise services, and Wi-MAX wireless access network.
The document discusses the Toyota Kata method of continuous improvement. It proposes using routines like grasping the current condition, setting a target condition, using PDCA cycles, and coaching katas. These routines are meant to be practiced frequently to develop the capability for continuous improvement. Frequent coaching cycles between a mentor and mentee are also recommended to establish rapport and keep practitioners learning.
The passage discusses the objectives and levels of production planning and control. The main objectives are to ensure the production of goods that meet customer needs, maximize output while minimizing costs and processing time, maintain optimal inventory levels, and maximize profit. Production planning occurs at three levels - factory planning, process planning, and operation planning. Effective production planning leads to benefits like reduced costs, inventory, and delivery times while improving customer service and profits. Limitations include assumptions not being accurate and difficulties with changes in technology, tastes, and policies.
This document summarizes information about an organization called Cyber-Duck and their approach to user experience (UX) design. It discusses their user-centered approach, some key principles of UX like defining audiences and solving real user needs, and tactics like system mapping, sketching, prototyping, and UX research. The document emphasizes starting with sketches and prototypes early, baking branding and growth strategies into the UX from the start, and defining the overall "experience" in pitches and presentations.
"Get Results With Email Marketing" is a dynamic presentation given by Simon Grabowski, CEO of GetResponse, at the e-nnovation conference in Poznan. It focuses on permission-based email marketing, email list building. Simon also shares proven email marketing strategies that can help to grow any business on the Internet.
The document describes a teacher gathering children's prior knowledge about digital cameras before showing them a digital story about bread making on YouTube to prepare them for a photostory project. The children then took pictures during a bread activity and recorded audio to describe the pictures, adding background music to create their own digital story.
The document provides examples of items one might pack in a suitcase for travel and the grammatically correct way to describe the quantities of each item. It suggests imagining describing the contents of your own suitcase to a partner. Sample items listed include a cell phone, books, t-shirts, cameras, jeans, shoes, pants, an MP3 player, backpack, sweater, map, belt, and blouse. Next to each is written either "a/an" or "two/three/four" to indicate singular or plural quantities.
The Mane Station is a product designed to hold hair styling tools like blow dryers and curling irons. It has barrel holes sized for common tools and a storage tray for smaller items like clips and brushes. Made of heat-resistant laminate, it is lightweight at 1.5 lbs and mounts securely to surfaces using adhesive strips. The Mane Station aims to provide a convenient storage solution for at-home hair stylists to keep their electrical tools organized and away from sinks.
1) The front page of the preliminary task used dark colors that did not blend well, while the final product used brighter colors that were better organized and incorporated images more effectively.
2) The contents page of the preliminary task lacked understanding of what should be included, but additional research improved the organization and design of the contents page in the final product.
3) Comparing the preliminary task to the final product showed the importance of research, planning and experience in creating a quality media product.
This document summarizes the findings of the Committee on Integrating the Science of Early Childhood Development. The committee concluded that early experiences influence brain development and that nurturing relationships are important for healthy development. However, early intervention programs that work are rarely simple or inexpensive. The committee made recommendations for policy and practice, including giving greater attention to social-emotional development, recognizing the importance of early childhood educators, enhancing support for working families, and reducing fragmentation of policies and services to better support early childhood development.
O documento fala sobre os diferentes tipos de amigos que fazem parte de nossas vidas, comparando-os às folhas de uma árvore. Descreve amigos da família como pais e irmãos, amigos de longa data, amigos temporários e amigos distantes. Conclui desejando paz, amor e prosperidade para todos os amigos.
Make a difference - MAD - progetto educativomcm&partners
MAD sviluppa – dall’ideazione all’erogazione – progetti educativi rivolti ai ragazzi delle scuole allo scopo di:
dare forza ai territori, valorizzandone i talenti, creando opportunità di sapere
dare valore concreto alla Responsabilità Sociale d’Impresa - CSR
comunicare in modo non convenzionale i propri valori
educare in modo innovativo le risorse aziendali ed il target prescelto
This document provides an overview of the key topics in computer science including data representation, computer hardware, software, algorithms, programming languages, and the history of computers. It introduces the von Neumann model which defines a computer as having four main subsystems: memory, arithmetic logic unit, control unit, and input/output. The model specifies that both programs and data are stored in memory and that programs are executed sequentially through instructions. The document then discusses the evolution of computer generations from mechanical to modern electronic computers based on this von Neumann model.
O documento descreve a retificação e republicação do gabarito oficial de um concurso público municipal para cargos de assistente social. Foi identificado um erro material no gabarito original, levando a banca examinadora a decidir pela correção e nova publicação do gabarito definitivo com as questões anuladas ou com alteração da alternativa correta. O anexo único apresenta o gabarito oficial definitivo com as alterações realizadas.
Talk done at "Communication challenges in
Intelligent Transportation Systems" in
Tel Aviv, January 30, 2008.
This slides provides an overview of the project, its communications requirements and needs and the solution adopted.
Network dimensoning and cost structure analysis of Radio access NetworkAsfak Rahman
The document discusses dimensioning and cost analysis for deploying a wireless network in a 1000 km2 urban area over 5 years. It calculates expected user demand based on population and usage. It then models the network capacity needs and dimensions the network for three deployment options: UMTS macro, UMTS micro, and WLAN. For each option, it calculates the site requirements, capacity, capital expenditures (CAPEX), and operating expenditures (OPEX) to meet the usage demands over the 5 year period. The most optimal and cost-effective solution is recommended to the operator.
Framework for Delivering IPTV Services over Satellite NetworksAJAL A J
Framework for Delivering IPTV Services over
Satellite Networks
Home Network
Access Network (AN)
IP based Core Network (IPCN)
Video Head End (VHE)
Satellite Link
Supporting Real-time Traffic: Preparing Your IP Network for ...Videoguy
This document provides guidance on preparing an IP network to support real-time video conferencing traffic. It discusses how real-time traffic differs from typical data traffic in terms of bandwidth utilization and sensitivity to delay and packet loss. It recommends implementing Quality of Service (QoS) using Differentiated Services across the network to prioritize real-time traffic. The document also covers classifying and managing bandwidth demand, and testing and monitoring the network to support video conferencing.
Javier Benitez's talk from the 2017 Open Networking Summit.
Colt is transforming the way they do business and offer network services to customers through the adoption of SDN & NFV as part of a company-wide transformation program called Novitas. Javier Benitez will focus in this presentation on active Colt’s Novitas developments, sharing with the audience their experience in deploying SDN & NFV solutions in production both for Ethernet and IP services, the learning associated as well as their future plans. In particular, Javier Benitez will cover Colt developments around Ethernet & IP on Demand, SD VPN, SDN controlled MPLS packet core and SDN/NFV NNI standardization.
This document evaluates the performance of IPTV video streaming over WiMAX networks under different terrain environments, including free space, outdoor to indoor, and pedestrian environments. It uses OPNET simulations to analyze network statistics such as packet loss, path loss, delay, and throughput. The results show that free space terrain has the lowest path loss and packet delay, while outdoor to indoor and pedestrian environments have higher path loss and delay. Specifically, free space path loss was around 100dB while outdoor environments was around 145dB. Additionally, packet loss was highest for outdoor scenarios due to lower signal to noise ratios in those environments. In general, more obstructed environments led to worse performance for IPTV video streaming over WiMAX networks.
Intelligent Network Services through Active Flow ManipulationTal Lavian Ph.D.
Active Flow Manipulation Abstractions:
Aggregate data into traffic flows
Flows whose characteristics can be identified in real-time
E.g., “all UDP packets to a particular service”, “all TCP packets from a particular machine”.
Actions to be performed in the traffic flows
Actions that can be performed in real-time
E.g., “Change the priority of all traffic destined to a particular service on a particular machine”, “Stop all traffic out of a particular link of a router”.
Our approach in this thesis is that, we have designed and built a National Carrier based core and edge network to simulate a real live scenario that spans the kingdom of Saudi Arabia. Some of the results in the thesis are presented against simulation time and some against network load.how to implement mpls on network
Installation and Maintenance of PON Services. PON Network Overview
o FTTH Architecture, Standards, and Wavelength allocations
o PON Lifecycle
o Responsibilities
• FTTH Installation Testing
o Recommended procedure
o Potential issues during Service Activation
• Difference between aerial and burial deployments
• Cause of high loss
o Drop fiber verification
o Achieving and Validating QoE
• Pass/Fail Thresholds and Standards
• Expectations when turning up different networks
• Streamline Result Transfer
o FLOW/NO App
Presentació a càrrec de Maria Isabel Gandia, cap de Comunicacions, duta a terme a la comunitat usuària de LAC-IX (Latin America and Caribbean IXPS) el 30 d'abril de 2021 en format virtual.
This session will discuss MEF's Lifecycle Service Orchestration (LSO) requirements from ordering through service activation, including supporting APIs. We will also discuss how MEF is working with open source communities including OPNFV and Open Daylight to make LSO a reality.
This document summarizes a project to evaluate the packet loss and data throughput of a software TNC (Terminal Node Controller) for communicating with a low Earth orbit amateur satellite. Terrestrial tests of the existing ground station equipment were conducted at 1200 and 9600 baud. 1200 baud performed well with 0.25% packet loss and average throughput near the theoretical maximum. 9600 baud had very high (~67%) packet loss, preventing connectivity tests. No satellite passes provided an opportunity for throughput testing. Models were developed to predict satellite pass characteristics and their impact on communication link quality and bit error rate.
This document provides an overview of Fibre Channel protocol and components. It describes the Fibre Channel layered architecture including FC-0 through FC-4 layers. It covers Fibre Channel frames, exchanges, sequences, flow control, addresses, port initialization process and common fabric services. Key topics include Fibre Channel protocol makeup, components, transceivers, cables, switches, host bus adapters, world wide names, and fabric login process.
The document describes a massively parallel and flexible optical network enabled by gRPC that allows 1Pbps transmission. It uses Space Division Multiplexing (SDM) over multi-core fiber to transmit over 400 optical channels in parallel. A Dynamic MAC allows handling skews caused by different wavelengths, fibers, and routes. The Dynamic MAC and gRPC enable flexible traffic routing and link bandwidth control. A demonstration shows a controller using gRPC to dynamically control link settings and routes based on traffic volume in real-time.
Voip over-wireless-network-wipro-technologiesbangalore2161Trung Phan
This document provides an overview of voice over IP (VOIP) over wireless networks. It begins with primers on VOIP systems and quality of service considerations for VOIP like delay. It then covers wireless LAN standards like 802.11 and challenges with supporting VOIP over wireless networks. Different approaches to providing VOIP over wireless that aim to meet delay constraints are discussed, such as enhanced distributed coordination function and distributed fair scheduling. Mobility issues with VOIP over wireless are also mentioned.
Blue Coat PacketShaper provides visibility and optimization of network applications through application classification, monitoring, quality of service controls, and compression. It automatically classifies network applications, monitors performance in real time, controls bandwidth with quality of service policies, and increases WAN capacity with compression. PacketShaper supports application delivery networks with deep application visibility and controls to optimize WAN performance.
Blue Coat PacketShaper provides visibility and optimization of network applications through application monitoring, traffic shaping, and compression. It automatically classifies network applications, provides quality-of-service controls, and increases WAN capacity. PacketShaper supports application delivery networks through deep application visibility and controls to optimize WAN performance.
Conecta latam2019 network challenges and business modeling for new low late...Alberto Boaventura
Intends to analyze the challenges for low latency services and upcoming new data opportunities. Describes the Internet data service waves: Internet Mobile; Internet of Things and now Tactile Internet, how low latency is becoming the king and new data services, the main attribute. Tactile Internet will open immersive services experience beyond current audiovisual ones, but it depends to understand the human sense reaction idiosyncrasies. Also for IoT, how latency will affect overall productive processes since new robotics control for Industry 4.0 to remote surgery. It introduces the Edge Computing as one the most important toll to reduce latency by facilitating data processing at or near the source of data generation. I.e., Edge Computing avoids the application data travels from the source to very far application and processing hosts. But the latency reduction does not have an unique strategy, and it requires to have transport network proper dimensioned and configured can certainly improve the network low latency. In addition, new transport architecture with simplification collapsing network layers, network aware multidomain control, automation etc. will be definitively imperative for optimizing latency for new critical applications. Improving processor performance using technologies beyond regular x86 servers, such as: GPUs, FPGA, DPDK etc, can reduce the time of workloads and delivering/returning data to user application with readiness.
In terms of low latency opportunities, accordingly to Chatan Sharma Consulting, Edge Internet economy will be over $4.1 Trillion worldwide. The initial growth will come from Edge serving existing use cases and will gradually be accelerated by the new use cases as the deployment becomes more widespread and developers learn to take advantage of the Edge Internet architecture for applications across industry domains in all major markets. But for MNOs, Edge Computing will open a several opportunities such as Service Integration, Managed Services, IaaS/PaaS/SaaS, new collocation business modelling etc. Besides latency, in general Edge Computing can bring an immediate benefit around local traffic offloading that implies in reducing overall CapEx cost. Higher Traffic Density can rapidly justify the Edge Computing deployment.
The document introduces LTE network planning and RNP solutions. It discusses the flat LTE network architecture and protocols including OFDM and MIMO. LTE network planning includes coverage and capacity planning using link budget and capacity estimation. The RNP solution introduces tools for performance enhancement like interference avoidance and co-antenna analysis.
Similar to La Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari (20)
"Iot on the field: making smart environments in everyday experience"CSP Scarl
CSP is an organization that develops Internet of Things (IoT) platforms and applications. They have created an IoT platform called IoTNet that allows access to heterogeneous sensor data through a graphical user interface or machine-to-machine communication. CSP has also developed a wireless network called HPWNet and uses various sensor networks for applications in precision agriculture, smart cities, and environmental monitoring. Some of their projects include monitoring glaciers and botanical gardens with wireless sensors, precision viticulture with sensors in vineyards, and mobile air quality monitoring. CSP aims to provide reliable sensor data at a large scale to support applications in smart cities and IoT.
OBSERVO - Piattaforma Open Source per la videosorveglianza territorialeCSP Scarl
Grazie alla collaborazione degli Enti Locali e all'esperienza tecnologica di CSP, la Regione Piemonte ha sviluppato un software di videosorveglianza opensource che permette agli Enti Locali di dotarsi di impianti di videosorveglianza in modo scalabile, flessibile, senza elevati investimenti economici ma soprattutto seguendo linee guida comuni. Tra le funzionalità principali, la piattaforma Observo e il software di videosorveglianza implementano la gestione di planimetrie di luoghi indoor, il tracking real-time di mezzi mobili e di relativi impianti di videosorveglianza temporanea, aggiornamento automatico e sincronizzazione delle informazioni, gestione sicura degli accessi e dei profili utente nel completo rispetto delle normative vigenti.
Concludendo, lo scopo del progetto è testare un sistema che consenta di produrre innovazione in un settore, quello dei servizi di pubblica utilità, attraverso tecnologie di prevenzione situazionale, in cui negli anni sono stati prodotti significativi investimenti pubblici coinvolgendo una vasta eterogeneità di tecnologie differenti, talvolta obsolete. Il progetto Observo, infatti, si inserisce nell’azione che da anni la Regione Piemonte svolge per promuovere e sostenere politiche locali di sicurezza, attraverso la cooperazione di soggetti pubblici e privati, sperimentando strumenti innovativi volti a migliorare l’azione pubblica in materia di sicurezza urbana nonché incrementarne la percezione da parte dei cittadini. La sperimentazione della piattaforma Observo diviene utile, da un lato per promuovere un corretto ed efficace uso delle tecnologie destinate alla prevenzione situazionale (ad esempio per specifiche indagini territoriali), e dall’altro sarà un’occasione per affrontare a livello regionale le questioni connesse all’utilizzo dei sistemi di controllo mediante tecnologie.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
La Sperimentazione White Spaces in Piemonte Applicazioni per Reti Veicolari
1. La Sperimentazione White Spaces
in Piemonte
Applicazioni per Reti Veicolari
Claudio Casetti
Dipartimento di Elettronica
Politecnico di Torino
2. Goals
¤ ITS (Intelligent Transportation Systems) environment
¤ Design a roadside downloading application for vehicles
with prefetching of content
¤ Exploit long-range UHF coverage for signalling traffic
(vehicle position, content requests)
¤ Exploit short-range, high-bandwidth 5GHz links for content
downloading
3. Starting Point
¤ VICSUM project
¤ funded by Regione Piemonte in 2007-09
¤ partners: Politecnico di Torino, CSP, CRF
¤ The VICSUM legacy
¤ Hand-on expertise in VANETs
¤ Designing mobile applications
¤ Living testbeds (Villa Gualino)
¤ The “VICSUM cars”
4. Network Architecture
¤ Infrastructure
¤ Central Controller (CC)
¤ Roadside Units (RSU)
¤ Long-Range Unit (LRU)
¤ Vehicle On-Board Units (OBU)
RSU1 RSU2
5. Network Architecture
¤ Control Plane
¤ Common channel shared by CC (though LRU) and Vehicle
OBUs
(700 MHz)
¤ High-bit rate communication on point-to-point link between
CC and RSU
¤ User Plane
¤ RSU to vehicles OBU communication (5 GHz)
6. The LFT Protocol
¤ We designed and implemented a communication
protocol called Locate-Fetch-Transfer (LFT)
¤ LFT operates among RSUs, CC and OBUs
¤ LFT incorporates control and user plane
7. LFT Protocol Overview (1)
¤ Vehicle notifies to CC over
700 MHz link:
¤ own position
¤ content requests
¤ CC fetches requested content
and dispatches it to
the nearest RSU
RSU1 RSU2
¤ Vehicle associates to RSU and
downloads as much as
possible
8. LFT Protocol Overview (2)
¤ When moving out of RSU
coverage, the download stops
¤ RSU reports the outcome of
the download
¤ If incomplete, the CC
schedules the download to
continue at the next RSU
RSU1 RSU2
¤ Remaining file is dispatched
to the next RSU
9. The Test
¤ The OBU requests the download of a 200-MB file
¤ The download is completed over several “contacts”
with RSUs
¤ We measured
¤ the number of contacts to complete the transfer
¤ the coverage time
¤ the achieved throughput
10. The Test
¤ Preliminary tests at Villa Gualino (Torino)
¤ Signalling traffic on a 2.4-GHz (802.11b) channel
¤ Data channel on a 5-GHz (802.11a) channel
¤ Final tests in Val di Viù
12. Results
20 km/h 40 km/h
25 25
vehicle request and vehicle configuration vehicle request and vehicle configuration
vehicle configuration vehicle configuration
20 20
Throughput [Mbps]
Throughput [Mbps]
15 15
10 10
5 5
0 0
0 100 200 300 400 500 600 700 0 200 400 600 800 1000 1200
Time [s] Time [s]
13. Comparison with simple transfer
Our protocol: 7 contacts needed to transfer content
Access Point AP1 AP2 AP2 AP1 AP1 AP2 AP2
# of downloaded chunks
from the CC 35000 35000 35000 35000 35000 35000 18494
# of downloaded chunks 32850 30430 24750 18686 12650 28950 18494
Coverage time [s] 39 32 41 48 33 31 20
Throughput [Mb/s] 8.33 9.4 5.97 3.85 3.79 9.23 9.14
Simple transfer: 10 contacts needed to transfer content
Access Point AP1 AP2 AP2 AP1 AP1 AP2 AP2 AP1 AP1 AP2
# of downloaded chunks
from the CC 35000 35000 35000 35000 35000 35000 35000 35000 35000 17379
# of downloaded chunks 17890 22887 26080 21261 29190 19903 32574 27438 26555 17379
Coverage time [s] 38 40 48 46 35 36 40 38 39 21
Throughput [Mb/s] 3.68 3.77 5.37 3.75 6.41 3.45 7.81 5.8 5.39 4.52
14. Conclusions
¤ LFT is not a Cognitive Radio application but could work
with any CR system
¤ Sustained throughput comparable to ADSL speeds to
mobile users
¤ Use of today’s technology
¤ Future work: lots of optimization to do!