This document discusses approaches for video quality assessment of IPTV, including full-reference, reduced-reference, no-reference bitstream, and hybrid models. Bitstream-based models extract features from the video bitstream such as error propagation, motion vectors, and transform coefficients to estimate quality. Hybrid models combine both pixel- and bitstream-based approaches. Recommendations from the ITU and VQEG are presented for various use cases and content types.
Condroid WSN/DTN Gateway - System Architecture & Requirement Laili Aidi
Condroid WSN/DTN Gateway - System Architecture & Requirement. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-analysis-design
Presentation from World Congress on Internet Security 2011, London.
Based on the paper "A Survey of Static Software Watermarking" with some thoughts on the usefulness of watermarking for software protection.
http://jameshamilton.eu/content/survey-static-software-watermarking
Dokumen ini membahas tentang sistem posisi global (GPS) yang menjelaskan prinsip kerjanya, komponen-komponen utamanya seperti satelit dan receiver, kegunaannya, dan keterbatasannya. GPS adalah sistem navigasi berbasis satelit yang mentransmisikan sinyal ke receiver untuk menentukan lokasi, kecepatan, dan waktu pengguna. Sistem ini terdiri atas segmen satelit, stasiun kontrol, dan receiver pengguna. GPS banyak digunakan unt
Condroid Remote Management Work ProcedureLaili Aidi
Condroid Remote Management Work Procedure. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/remote-management-system-analysis-design
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
Abstract—The development and rollout of WiMAX introduces several regulatory and policy issues. This paper highlights the WiMAX Regulation in South Korea, as a country that is already more mature and had become the first to implement Wireless Broadband Access (WBA) of its kind (WiBro) in the world, and Indonesia, as a country that is still in the process of formulating the reconcilable regulation. The paper begins with a brief overview of the technologies behind WiMAX and compared the market situation relative to broadband and 3G mobile networks. Next, the paper examines the potentially significant specific policy and regulatory issues for regulator in each country and competition climate between stockholders. Finally, this data was used to obtain recommendations to overcome the said problems. We found out that WiMAX may prove to be a disruptive technology for existing telecommunication and Internet sector, but careful policy effectuation can ensure that the disruption could create the maximum benefit possible in the society and market.
---
Please contact trough lailiaidi at gmail.com for download request
This document discusses approaches for video quality assessment of IPTV, including full-reference, reduced-reference, no-reference bitstream, and hybrid models. Bitstream-based models extract features from the video bitstream such as error propagation, motion vectors, and transform coefficients to estimate quality. Hybrid models combine both pixel- and bitstream-based approaches. Recommendations from the ITU and VQEG are presented for various use cases and content types.
Condroid WSN/DTN Gateway - System Architecture & Requirement Laili Aidi
Condroid WSN/DTN Gateway - System Architecture & Requirement. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-analysis-design
Presentation from World Congress on Internet Security 2011, London.
Based on the paper "A Survey of Static Software Watermarking" with some thoughts on the usefulness of watermarking for software protection.
http://jameshamilton.eu/content/survey-static-software-watermarking
Dokumen ini membahas tentang sistem posisi global (GPS) yang menjelaskan prinsip kerjanya, komponen-komponen utamanya seperti satelit dan receiver, kegunaannya, dan keterbatasannya. GPS adalah sistem navigasi berbasis satelit yang mentransmisikan sinyal ke receiver untuk menentukan lokasi, kecepatan, dan waktu pengguna. Sistem ini terdiri atas segmen satelit, stasiun kontrol, dan receiver pengguna. GPS banyak digunakan unt
Condroid Remote Management Work ProcedureLaili Aidi
Condroid Remote Management Work Procedure. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/remote-management-system-analysis-design
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
Abstract—The development and rollout of WiMAX introduces several regulatory and policy issues. This paper highlights the WiMAX Regulation in South Korea, as a country that is already more mature and had become the first to implement Wireless Broadband Access (WBA) of its kind (WiBro) in the world, and Indonesia, as a country that is still in the process of formulating the reconcilable regulation. The paper begins with a brief overview of the technologies behind WiMAX and compared the market situation relative to broadband and 3G mobile networks. Next, the paper examines the potentially significant specific policy and regulatory issues for regulator in each country and competition climate between stockholders. Finally, this data was used to obtain recommendations to overcome the said problems. We found out that WiMAX may prove to be a disruptive technology for existing telecommunication and Internet sector, but careful policy effectuation can ensure that the disruption could create the maximum benefit possible in the society and market.
---
Please contact trough lailiaidi at gmail.com for download request
Vlad Trifa - Final PhD Thesis Defense at ETH ZurichVlad Trifa
The final defense of my phd thesis at ETH Zurich. The final report will be posted soon on my personal Web site (vladtrifa.com), once accepted by the school commission and submitted.
This document is a resume for Sandip Bose providing contact information, education history, professional certifications, objective, qualifications, skills, work experience, and honors. Key details include an M.S. in Electrical Engineering from University of Nevada-Reno with a 4.0 GPA and various IT certifications. Current role is Apigee Infrastructure Engineer at Prudential with over 15 years of experience in DevOps, infrastructure engineering, and systems administration roles at AT&T.
You already have working infrastructure. You know the ins and outs of your video protocol.
Everything is working, but you feel like things could work even better. If so, this talk is for you!
This talk explores all the things WebRTC could unlock for you. There could be solutions for problems you didn't
even realize were fixable!
Netty @Apple: Large Scale Deployment/ConnectivityC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1SIYyxQ.
Norman Maurer presents how Apple uses Netty for its Java based services and the challenges of doing so, including how they enhanced performance by participating in the Netty open source community. Maurer takes a deep dive into advanced topics like JNI, JVM internals, and others. Filmed at qconsf.com.
Norman Maurer is one of the core developers of Netty, a member of the Apache Software Foundation and a contributor to many Open Source Projects. He's a Senior Software Engineer for Apple, where he works on Netty and other projects.
This document provides an overview of the standards and technologies that underpin WebRTC. It describes how WebRTC allows real-time voice, video, and data sharing directly in the browser without plugins. Key points covered include:
- WebRTC is based on standards from the IETF and W3C for signaling, media protocols (like STUN, ICE, DTLS, SRTP), and JavaScript APIs.
- These standards address the challenges of peer-to-peer real-time communication over varied network environments like home networks and cellular data networks.
- WebRTC uses HTTP/HTTPS for signaling and peer-to-peer protocols for media to traverse NATs and firewalls. TURN servers are used
This document provides an overview of JSR82, the Java APIs for Bluetooth, including:
- A brief history and timeline of JSR82 from its inception in 2000 to current status at version 1.1.
- An overview of the core JSR82 APIs for device discovery, service discovery, connections between devices, and power management.
- Discussion of implementations of JSR82 and its use in developing Bluetooth applications.
- The evolving Bluetooth landscape including new developments like Ultra Low Power and how JSR82 could be enhanced to support these.
- Potential next steps for JSR82 such as a major update or new standard to build upon its foundations.
Practical, team-focused operability techniques for distributed systems - DevO...Matthew Skelton
In this talk, we explore five practical, tried-and-tested, real world techniques for improving operability with many kinds of software systems, including cloud, Serverless, Microservices, on-premise, and IoT. Based on our work in many industry sectors, we will share our experience of helping teams to improve the operability of their software systems through these straightforward, team-friendly techniques.
From a talk given at DevOpsCon Munich 2017 https://devopsconference.de/microservices/practical-team-focused-operability-techniques-for-distributed-systems/
The document discusses WebSockets as a new technology for real-time communication on the web. It presents jWebSocket, an open source framework that supports WebSockets and allows for bidirectional communication between web applications and servers. The framework offers features like messaging, streaming, security and supports multiple platforms and browsers. WebSockets enable use cases like chats, remote monitoring and collaboration that were previously difficult to implement on the web.
Bluetooth Low Energy (BLE) allows for low power communication between devices. BLE devices are typically powered by button cell batteries and have operating ranges of less than 40 meters. BLE is designed for low cost, low power consumption, and high deployment volumes for uses like the Internet of Things and personal area networks. The document discusses BLE architecture, usage models, services and characteristics that devices provide to communicate functionality, and the iOS Core Bluetooth framework for communicating with BLE devices from iOS apps. It provides demos of using an iPhone as a BLE peripheral and connecting to BLE devices like a key fob simulator and heart rate monitor.
This document provides an introduction to middleware and web service concepts. It defines middleware as software that connects software components across platforms and networks. The document then discusses key concepts of distributed middleware including serialization, data presentation, distributed garbage collection, localization and discovery, interaction models, wire protocols, service descriptions, target domains, and platform dependence. It also provides a classification of various middleware technologies such as RPC, transaction processing monitors, database access middleware, distributed tuples, distributed object technology, message-oriented middleware, web services, peer-to-peer middleware, and grid middleware. Finally, it compares some concepts across different middleware technologies.
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...Sandro Gauci
WebRTC is often considered to be secure by default - with most security concerns being around IP address leakage which is more of a privacy issue than anything. Well, I have news for you - the applications and infrastructure that handles WebRTC can be attacked. It may indeed have various types of security vulnerabilities which are often overlooked. This presentation is based on experiences gained through security testing of WebRTC applications with anecdotal stories to illustrate the dangers. We will also take a peek at Video Delivery mechanisms such as RIST and SRT and discuss what could possibly go wrong there too!
The document summarizes the CONNECT 2.4 webinar that took place on March 25th, 2010. It discusses the major changes and features in CONNECT 2.4 including support for updated NHIN specifications, performance improvements, progress towards IDE neutral build scripts, dynamic document assembly components, SoapUI updates, and research on asynchronous messaging. It also provides an overview of plans for CONNECT 3.0.
Unified Secure Channel (USC) is a collaborative project within OpenDaylight to enable a unified, secure, and high performance communication over many different protocols between SDN controllers and network elements across internet or unsecure public infrastructure.
The document discusses software-defined networking (SDN) and OpenFlow, including:
1) OpenFlow allows the control logic to be separated from the forwarding hardware by defining an open interface between the two. This enables more flexible and programmable networks.
2) OpenFlow works by defining flows that match packets and actions that are applied to the matched packets. The flows are populated and managed by an external controller through the OpenFlow protocol.
3) OpenFlow is being deployed in over 100 organizations and is enabling network innovation through its programmable and customizable nature.
The document discusses the effectiveness and efficiency of different types of network test solutions for identifying issues in video delivery. Stateful traffic testing that emulates real applications from layer 2-7 is more effective than stateless testing as it provides more accurate performance data and prediction of network issues. Using real sample traffic from multiple devices and formats allows more accurate modeling and understanding of network behavior under different conditions. Testing needs to evolve to address new video applications and protocols like IPv6.
This document provides a summary of Prateek's professional experience in software development for telecom and networking. Over 9.5 years, he has worked on projects involving optical networking, load balancing servers, protocol development, and customer support. His responsibilities have included technical lead roles, individual development work, design, testing, and system integration. He has strong skills in C, C++, Linux, networking protocols, data structures, and development tools like version control systems. His work experience includes roles at NEC Technology, Brocade Communication, Juniper Networks, and Huawei Technology where he contributed to projects involving network security, load balancing, network address translation, and more.
WebRTC provides a standardized profile for real-time communication that enables interoperability between browsers without plugins. It defines client-side APIs for audio and video calling as well as other real-time communication capabilities. The WebRTC architecture includes the API, codecs, transport mechanisms like STUN and TURN, and network I/O that allow real-time apps to run directly in browsers. Signaling is required to establish connections between users, and the standardization of WebRTC aims to improve interoperability compared to proprietary solutions. However, interoperability is not always in the best interests of businesses. Ultimately, the API is more important than the underlying protocols it uses.
Monitoring as an entry point for collaborationJulien Pivotto
This document summarizes a talk on using monitoring as an entry point for collaboration. It discusses using the Prometheus monitoring system to collect metrics and expose them using exporters. Grafana is then used to visualize the metrics and create dashboards focused on business metrics like requests, errors, and durations. These metrics provide observability across teams and enable alerting when business services are impacted.
Quantum provides a network connectivity service for OpenStack. It exposes an API for tenants to define logical network abstractions and connectivity between interfaces from other OpenStack services. Quantum uses a plugin architecture so multiple technologies can implement the logical abstractions. For the initial Diablo release, Quantum will focus on basic L2 connectivity and integrating with Nova and at least one other service via "edge bindings". Experimental plugins will demonstrate Quantum's capabilities while many design questions around advanced networking remain for future iterations.
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
Aidi, Laili; Markendahl, Jan; Tollmar, Konrad; Selvakumar, Ekambar; Huang, Jin; and Blennerud, Greger, In proceeding of: 12th International Conference on Mobile Business, Berlin 2013
In the telecom business, there has been a heavy competition from Internet, media and handset vendors companies. These over-the-top (OTT) players offer compiling telecom services, cause a transformation in the telecom business ecosystem, and the most challenging services posed here are media services. China, India and Indonesia, as world’s emerging markets in Asia, are predicted to take the largest share in the global mobile traffic explosion by 2015. It is critical for mobile network operators (MNOs) in this region to explore strategy for mobile media services, as mobile broadband is likely preferred
compared to fixed broadband.
In this paper, we analyze and compare mobile music business models used in these markets and structure the relation models between the key actors, using Actors, Relations and Business Activities (ARA) model. We present the economic models that are emerging, and an insight of why and how these multitudes actors are betting on currently. We found that the MNOs generally have a much stronger position compared to their counterparts in the developed markets, and the personalization services, like ring-back tone, are still a huge success. The actors tend to deliver the services by their own, rather than to collaborate in a horizontal business setting.
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
More Related Content
Similar to Condroid WSN/DTN Gateway - Verification Rest Report
Vlad Trifa - Final PhD Thesis Defense at ETH ZurichVlad Trifa
The final defense of my phd thesis at ETH Zurich. The final report will be posted soon on my personal Web site (vladtrifa.com), once accepted by the school commission and submitted.
This document is a resume for Sandip Bose providing contact information, education history, professional certifications, objective, qualifications, skills, work experience, and honors. Key details include an M.S. in Electrical Engineering from University of Nevada-Reno with a 4.0 GPA and various IT certifications. Current role is Apigee Infrastructure Engineer at Prudential with over 15 years of experience in DevOps, infrastructure engineering, and systems administration roles at AT&T.
You already have working infrastructure. You know the ins and outs of your video protocol.
Everything is working, but you feel like things could work even better. If so, this talk is for you!
This talk explores all the things WebRTC could unlock for you. There could be solutions for problems you didn't
even realize were fixable!
Netty @Apple: Large Scale Deployment/ConnectivityC4Media
Video and slides synchronized, mp3 and slide download available at URL http://bit.ly/1SIYyxQ.
Norman Maurer presents how Apple uses Netty for its Java based services and the challenges of doing so, including how they enhanced performance by participating in the Netty open source community. Maurer takes a deep dive into advanced topics like JNI, JVM internals, and others. Filmed at qconsf.com.
Norman Maurer is one of the core developers of Netty, a member of the Apache Software Foundation and a contributor to many Open Source Projects. He's a Senior Software Engineer for Apple, where he works on Netty and other projects.
This document provides an overview of the standards and technologies that underpin WebRTC. It describes how WebRTC allows real-time voice, video, and data sharing directly in the browser without plugins. Key points covered include:
- WebRTC is based on standards from the IETF and W3C for signaling, media protocols (like STUN, ICE, DTLS, SRTP), and JavaScript APIs.
- These standards address the challenges of peer-to-peer real-time communication over varied network environments like home networks and cellular data networks.
- WebRTC uses HTTP/HTTPS for signaling and peer-to-peer protocols for media to traverse NATs and firewalls. TURN servers are used
This document provides an overview of JSR82, the Java APIs for Bluetooth, including:
- A brief history and timeline of JSR82 from its inception in 2000 to current status at version 1.1.
- An overview of the core JSR82 APIs for device discovery, service discovery, connections between devices, and power management.
- Discussion of implementations of JSR82 and its use in developing Bluetooth applications.
- The evolving Bluetooth landscape including new developments like Ultra Low Power and how JSR82 could be enhanced to support these.
- Potential next steps for JSR82 such as a major update or new standard to build upon its foundations.
Practical, team-focused operability techniques for distributed systems - DevO...Matthew Skelton
In this talk, we explore five practical, tried-and-tested, real world techniques for improving operability with many kinds of software systems, including cloud, Serverless, Microservices, on-premise, and IoT. Based on our work in many industry sectors, we will share our experience of helping teams to improve the operability of their software systems through these straightforward, team-friendly techniques.
From a talk given at DevOpsCon Munich 2017 https://devopsconference.de/microservices/practical-team-focused-operability-techniques-for-distributed-systems/
The document discusses WebSockets as a new technology for real-time communication on the web. It presents jWebSocket, an open source framework that supports WebSockets and allows for bidirectional communication between web applications and servers. The framework offers features like messaging, streaming, security and supports multiple platforms and browsers. WebSockets enable use cases like chats, remote monitoring and collaboration that were previously difficult to implement on the web.
Bluetooth Low Energy (BLE) allows for low power communication between devices. BLE devices are typically powered by button cell batteries and have operating ranges of less than 40 meters. BLE is designed for low cost, low power consumption, and high deployment volumes for uses like the Internet of Things and personal area networks. The document discusses BLE architecture, usage models, services and characteristics that devices provide to communicate functionality, and the iOS Core Bluetooth framework for communicating with BLE devices from iOS apps. It provides demos of using an iPhone as a BLE peripheral and connecting to BLE devices like a key fob simulator and heart rate monitor.
This document provides an introduction to middleware and web service concepts. It defines middleware as software that connects software components across platforms and networks. The document then discusses key concepts of distributed middleware including serialization, data presentation, distributed garbage collection, localization and discovery, interaction models, wire protocols, service descriptions, target domains, and platform dependence. It also provides a classification of various middleware technologies such as RPC, transaction processing monitors, database access middleware, distributed tuples, distributed object technology, message-oriented middleware, web services, peer-to-peer middleware, and grid middleware. Finally, it compares some concepts across different middleware technologies.
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...Sandro Gauci
WebRTC is often considered to be secure by default - with most security concerns being around IP address leakage which is more of a privacy issue than anything. Well, I have news for you - the applications and infrastructure that handles WebRTC can be attacked. It may indeed have various types of security vulnerabilities which are often overlooked. This presentation is based on experiences gained through security testing of WebRTC applications with anecdotal stories to illustrate the dangers. We will also take a peek at Video Delivery mechanisms such as RIST and SRT and discuss what could possibly go wrong there too!
The document summarizes the CONNECT 2.4 webinar that took place on March 25th, 2010. It discusses the major changes and features in CONNECT 2.4 including support for updated NHIN specifications, performance improvements, progress towards IDE neutral build scripts, dynamic document assembly components, SoapUI updates, and research on asynchronous messaging. It also provides an overview of plans for CONNECT 3.0.
Unified Secure Channel (USC) is a collaborative project within OpenDaylight to enable a unified, secure, and high performance communication over many different protocols between SDN controllers and network elements across internet or unsecure public infrastructure.
The document discusses software-defined networking (SDN) and OpenFlow, including:
1) OpenFlow allows the control logic to be separated from the forwarding hardware by defining an open interface between the two. This enables more flexible and programmable networks.
2) OpenFlow works by defining flows that match packets and actions that are applied to the matched packets. The flows are populated and managed by an external controller through the OpenFlow protocol.
3) OpenFlow is being deployed in over 100 organizations and is enabling network innovation through its programmable and customizable nature.
The document discusses the effectiveness and efficiency of different types of network test solutions for identifying issues in video delivery. Stateful traffic testing that emulates real applications from layer 2-7 is more effective than stateless testing as it provides more accurate performance data and prediction of network issues. Using real sample traffic from multiple devices and formats allows more accurate modeling and understanding of network behavior under different conditions. Testing needs to evolve to address new video applications and protocols like IPv6.
This document provides a summary of Prateek's professional experience in software development for telecom and networking. Over 9.5 years, he has worked on projects involving optical networking, load balancing servers, protocol development, and customer support. His responsibilities have included technical lead roles, individual development work, design, testing, and system integration. He has strong skills in C, C++, Linux, networking protocols, data structures, and development tools like version control systems. His work experience includes roles at NEC Technology, Brocade Communication, Juniper Networks, and Huawei Technology where he contributed to projects involving network security, load balancing, network address translation, and more.
WebRTC provides a standardized profile for real-time communication that enables interoperability between browsers without plugins. It defines client-side APIs for audio and video calling as well as other real-time communication capabilities. The WebRTC architecture includes the API, codecs, transport mechanisms like STUN and TURN, and network I/O that allow real-time apps to run directly in browsers. Signaling is required to establish connections between users, and the standardization of WebRTC aims to improve interoperability compared to proprietary solutions. However, interoperability is not always in the best interests of businesses. Ultimately, the API is more important than the underlying protocols it uses.
Monitoring as an entry point for collaborationJulien Pivotto
This document summarizes a talk on using monitoring as an entry point for collaboration. It discusses using the Prometheus monitoring system to collect metrics and expose them using exporters. Grafana is then used to visualize the metrics and create dashboards focused on business metrics like requests, errors, and durations. These metrics provide observability across teams and enable alerting when business services are impacted.
Quantum provides a network connectivity service for OpenStack. It exposes an API for tenants to define logical network abstractions and connectivity between interfaces from other OpenStack services. Quantum uses a plugin architecture so multiple technologies can implement the logical abstractions. For the initial Diablo release, Quantum will focus on basic L2 connectivity and integrating with Nova and at least one other service via "edge bindings". Experimental plugins will demonstrate Quantum's capabilities while many design questions around advanced networking remain for future iterations.
Similar to Condroid WSN/DTN Gateway - Verification Rest Report (20)
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
Aidi, Laili; Markendahl, Jan; Tollmar, Konrad; Selvakumar, Ekambar; Huang, Jin; and Blennerud, Greger, In proceeding of: 12th International Conference on Mobile Business, Berlin 2013
In the telecom business, there has been a heavy competition from Internet, media and handset vendors companies. These over-the-top (OTT) players offer compiling telecom services, cause a transformation in the telecom business ecosystem, and the most challenging services posed here are media services. China, India and Indonesia, as world’s emerging markets in Asia, are predicted to take the largest share in the global mobile traffic explosion by 2015. It is critical for mobile network operators (MNOs) in this region to explore strategy for mobile media services, as mobile broadband is likely preferred
compared to fixed broadband.
In this paper, we analyze and compare mobile music business models used in these markets and structure the relation models between the key actors, using Actors, Relations and Business Activities (ARA) model. We present the economic models that are emerging, and an insight of why and how these multitudes actors are betting on currently. We found that the MNOs generally have a much stronger position compared to their counterparts in the developed markets, and the personalization services, like ring-back tone, are still a huge success. The actors tend to deliver the services by their own, rather than to collaborate in a horizontal business setting.
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
Public version of my presentation slide as guess lecturer at Politeknik Telkom, Bandung, May 4, 2013, discussing about "Internet of Things" Feel free to comment and/or download
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed and validated the result with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed the result with one sample T-tests and validated it with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Nowadays, more and more we see the collaboration between the Music industry Players with other Players in other industries. It started decade ago by the collaboration with the Internet industry (such as iTunes), and then recently expanded to the collaboration with the players in the different industries.
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
This presentation outlines a master's thesis proposal on developing business models for profitable mobile broadband media services in Indonesia. The proposal discusses background on shifting usage patterns and expectations for mobile broadband. It defines the problem of making these media services sustainable businesses while addressing common and unique market challenges in Indonesia. The methodology will use a mixed qualitative and quantitative approach including literature review, data collection from experts and users, and analysis of the broadband ecosystem and value networks. The expected results are identification of strategies by assessing existing business models and Indonesia's telecom landscape, understanding the market by analyzing user characteristics, and providing recommendations to feasibility test solutions and highlight suitable options.
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
This project figure out the pattern of the bytes in the stego file and how steganalysis tool can identify the bytes appended to the truck file by steganography tool. This analysis is based on basic theory of steganography and steganalysis, and using a hex editor in order to check what kind of bytes that the steganography tool appends to the truck file.
---
Please contact to lailiaidi at gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Laili Aidi
This report contains discussion of the radio access network design and the cost structure analysis of different deployment options of Radio Access Technologies (RATs). The objective is to provide specific amount of user, with specific traffic demand and deployment scenario.
--
Please contact trough lailiaidi at gmail.com for download request
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
This document contains implementation report of a system that is able to monitor the network using SNMP and identify the specific possible attacks (DoS and port scan) using a cluster analysis. In the first task, the program discovers the topology of the network. After successful discovery phase, it will be able to monitor the link utilization (network link-states) for a specified period of time, and then detect the anomaly, using k-means clustering scheme [1]. These anomalies will be analyzed to recognize the attack. Moreover, this program also provides an advance feature, which is defined as optional task, as it executes online monitoring and detects the attacks using Davies-Bouldin Index as quality scoring measurement [2].
--
Please contact trough lailiaidi at gmail.com for download request
This document discusses the actors involved in Sweden's telecom markets and their roles. The key actors identified are: the telecom regulator (Post- och telestyrelsen), mobile network operators such as Telia and Tele2 who own infrastructure, mobile virtual network operators like Easy Telecom who operate on other networks, mobile virtual network enablers like Spinbox AB who provide backend services, mobile phone companies, network equipment vendors, outsourcing companies, mobile software providers, and card vendors. Examples of companies in each category that operate in Sweden are provided.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
1. !
!"#$%&#'()&*!)+''
,*-./.0)&.1#'&*"&'
-*21-&'
! ,*-".1#'345'
2011
!"#$%&'()%*+(,%+-%"( !"#$%&'(&#*&.(
' (
'
Lan Sun (lansun@kth.se), 15 ECTS (((((/#*&.(*01(2"#$%&'(#30%"(
Hervé Ntareme
Qing An (qinga@kth.se), 15 ECTS
/#4&#*&.(
Michel Hognerud
Jun Gao (jungao@kth.se), 15 ECTS
/.*+25#0(
Laili Aidi (aidi@kth.se), 18 ECTS
Björn Pehrson!
Yasir Ali (yasireal@kth.se), 15 ECTS
SUMMER CSD
2. WSN/DTN Gateway Verification Test Report V.1.0
!
Revision History
Version Date Responsible Change
V1.0 2011-10-13 Laili Aidi Initial version of the document
2
4. WSN/DTN Gateway Verification Test Report V.1.0
!
Summary
This document describes the Verification test of the WSN/DTN Gateway, which was done during Week 40 –
Week 41, October 3, 2011 to October 13, 2011.
4
5. WSN/DTN Gateway Verification Test Report V.1.0
!
Abbreviation
Abbreviations used in this document:
Abbreviation Description
MySQL An Open source Relational database management system (RDBMS)
ALIX Board Single board computer capable of running operating systems
SunSPOT Embedded microprocessor that runs Java
Voyage Linux GNU/Linuxderived distribution that is best run on a x86 embedded platforms
Barkeley DB Software library that provides embedded database for key/value data
USB Universal Serial Bus
WPA Wi-Fi Protected Access
Wi-Fi Trademark of a product based on IEEE 802.11
Apache HTTP Server
PHP Hypertext Preprocessor, Server-side HTML embedded scripting language
WPA Wi-Fi Protected Access
Dnsmasq Lightweight version to configure DNS forwarder and DHCP server.
JDK Java Development Environment
Apache Ant XML-based build scripting language
Hald HAL Daemon
SunSPOT Embedded microprocessor that runs Java
DHCP Dynamic Address Allocation Protocol
AP Access-Point
DNS Domain Name System
ProPHET Probabilistic Routing Protocol using History of Encounters and Transitivity
Wi-Fi Trademark of a product based on IEEE 802.11
DTN Delay Tolerant Network / Delay Disruptive Network
WSN Wireless Sensor Network
DTN Delay Tolerant Network / Delay Disruptive Network
WPA Wi-Fi Protected Access
Bytewalla Implementation of DTN in the Android platform.
5
6. WSN/DTN Gateway Verification Test Report V.1.0
!
1. Introduction
The main objective of this document is to verify the WSN/DTN Gateway, which is a part of the Condroid
project objective. The verification is mainly focus on 4 elements, which are listed as below:
a. Hardware Verification
b. Bottom-ware software verification
c. Middle-ware software verification
d. Upper-ware software verification
Table 1. Project Identification
Project Name Project Number Project Manager Project Owner Date Created
Condroid 1 Laili Aidi Hervé Ntareme 2011-06-13
Project Sponsor Program Manager Verificator
Laili Aidi
KTH/ICT/TSLAB Björn Pehrson
Qing An
6
7. WSN/DTN Gateway Verification Test Report V.1.0
!
2. Hardware Verification
The simulation of WSN/DTN Gateway environment needs several main equipments, which should be met in
order to set up, make it work and tested properly. The Verification components are based on the WSN/DTN
Gateway System Architecture & Requirement [1]:
Table 2. Hardware Verification Matrix
Verification
No Status Specification Amount Detail / Comment
Element
Type: ALIX2d13
• CPU: 500 MHz AMD Geode LX800
• RAM: 256 MB DDR DRAM
• Storage: CF socket, 44 pin IDE header
• Power: DC jack or passive POE, min. 7V to max.
20V
• Network Interface: 3 Ethernet channels (Via 3
VT6105M 10/100)
• I/O: DB9 serial port, dual USB port
• Casing: For 6x6" board size, Silver color
• WiFi Antenna: Black 25 cm, 2.4 GHz, 5dBI indoor The WiFi Antenna
1 ALIX Board Pass Omni, RSMA female connector and cable has been installed in
• Power cable with adapter all the ALIX boards
Type: ALIX2d2
• CPU: 500 MHz AMD Geode LX800
• RAM: 256 MB DDR DRAM
• Storage: CF socket, 44 pin IDE header
• Power: DC jack or passive POE, min. 7V to max.
1
20V
• Network Interface: 2 Ethernet channels (Via
VT6105M 10/100)
• I/O: DB9 serial port, dual USB port
• Casing: For 6x6" board size, Silver color
7
8. WSN/DTN Gateway Verification Test Report V.1.0
!
• WiFi Antenna: Black 15 cm, 2.4 GHz, 5dBI indoor
Omni, RSMA female connector and cable
• Power cable with adapter
Compact Flash 4 GB 1 The CFs have been
2 Compact Flash Pass Compact Flash Reader 1 installed on all the
USB Connector 1 ALIX boards
Switch – Netgear 1 -
3 Switch Set Pass UTP Cables 7 -
Adaptor – Netgear 12 V 1 -
HTC Tatoo (IMEI: 358355027509369 and
2 The SD Card in
Pass 358355020235012) + 2 GB SD Card
Phone with IMEI
4 Android Phone with HTC Nexus One + Power charging adaptor
1 358355020235012 is
note (EMEI: 354957037701540)
broken
USB Connector 3
8
9. WSN/DTN Gateway Verification Test Report V.1.0
!
3. Network Architecture & Configuration Verification
During the verification process, the network configuration of the WSN/DTN Gateway environment has been
set up as follow:
! 1 WSN/DTN Gateway with City / Receiver mode (Identification: WSN/DTN Gateway 2):
• WLAN0 Interface, activated as AP with the specification: IP Address 192.168.2.1, SSID “Bytewalla-
Voyage2”, lease IP Addresses with range 192.168.2.35 - 192.168.2.50. Multicast is enabled in this
interface
• Eth0 Interface, activated as DHCP client
• Eth1 Interface, IP Address 192.168.24.2. The default route is enabled in this interface, and it is
connected directly with Ethernet LAN to WSN/DTN Gateway 4
• Eth2 Interface, IP Address 192.168.22.1
! 2 WSN/DTN Gateways with Village / Sender mode:
1. The Village node 1 (Identification: WSN/DTN Gateway 3)
• WLAN0 Interface, activated as AP with the specification: IP Address 192.168.3.1, SSID: “Bytewalla-
Voyage3”, lease IP Addresses with range 192.168.3.35 - 192.168.3.50. Multicast is enabled in this
interface to allow the Core-Engine SunSPOT running on the OS.
• Eth0 Interface, activated as DHCP client.
• Eth1 Interface, IP Address 192.168.13.1
• Eth2 Interface, IP Address 192.168.23.1.
2. The Village node 2 (Identification: WSN/DTN Gateway 4):
• WLAN0 Interface, activated as AP with the specification: IP Address 192.168.4.1, SSID “Bytewalla-
Voyage4”, lease IP Addresses with range 192.168.4.35 - 192.168.4.50. Multicast is enabled in this
interface to allow the Core-Engine SunSPOT running on the OS.
• Eth0 Interface, activated as DHCP client.
• Eth1 Interface, IP Address 192.168.14.1
• Eth2 Interface, IP Address 192.168.24.1. The default route is enabled in this interface, and it is
connected directly with Ethernet LAN to WSN/DTN Gateway 2
9
10. WSN/DTN Gateway Verification Test Report V.1.0
!
In order to isolate the system, we also have set so the Village nodes able to connect directly to City node with
Ethernet LAN connection with the IP arrangement described above. Thus we can say this configuration has
been meet up the requirement as it is fit to simulate the Network Architecture specification that is described in
the WSN/DTN Gateway System Architecture & Requirement [1].
Figure 1. WSN/DTN Gateway Test-Bed Network Architecture
10
11. WSN/DTN Gateway Verification Test Report V.1.0
!
3. Bottom-ware Software Verification
The Bottom-ware software verification contains the verification for the elements below:
• Voyage OS verification
• DTN2 verification
This verification is based on the procedure that is described in Voyage & DTN2 Installation & Configuration
Guide On ALIX Board [2]. The result of this verification are listed in the table below:
Table 3. Bottom-ware Software Verification Matrix
Verification
No Status Specification Detail / Comment
Element
1 Voyage OS Pass Voyage OS 0.75 Voyage OS 0.75 is installed in all 4 ALIX boards
The latest version of dependencies
packages for DTN2 installation found
in the system:
The libdb is not the latest version because
build-essential, autoconf, g++,
libdb5.1 is currently not stable when this
libavahi-compat-libdnssd-dev,
2 DTN2 Pass procedure is done, and there is no BarkeleyDB
libdb4.6, libdb4.6-dev, libxerces-c2-
4.8 available on the website, thus we fall back to
dev, libxerces-c28, libexpat1-dev,
libdb4.7
mono-1.0-devel, tcl8.4, tcl8.4-dev,
tcllib, tclreadline, tclx8.4-dev, tclx8.4,
zlib1g-dev, libdb4.7
Berkeley DB version 4.7 with AES encryption
Berkeley DB (13M). The path can be found in environment
variable in root/usr/local/BerkeleyDB.4.7/lib
Oasys version 1.4 (Oasys-1.4.0) is found in
Oasys
root/dtn2/oasys/
11
12. WSN/DTN Gateway Verification Test Report V.1.0
!
DTN version 2.7 (DTN-2.7.0) is found in
DTN2 root/dtn2/DTN2/ and the configuration is
found in /usr/voyagedtn/dtn.conf
The WSN/DTN Gateways have been
configured with Dynamic Route proPHET
routing. However, it seems the proPHET
routing implementation in Voyage OS is not
table yet. Thus sometime the DTN cannot
discover the link to the other DTN node event
Pass they are directly connected. To solve this, we
3 with DTN Configuration have to delete the BarkeleyDB file in
note /usr/voyagedtn/db and
/usr/voyagedtn/bundles, then initiate the
database again with
/dtn2/DTN2/daemon/dtnd -c
/usr/voyagedtn/dtn.conf --init-db. After this is
done, all the node can send and receive simple
DTN message and file transfer
HTC Tatoo (IMEI: 358355027509369
and 358355020235012) + 2 GB SD
Card The SD Card in HTC Tatoo Phone with IMEI
Pass
358355020235012 is broken, thus we did not use
4 Android Phone with HTC Nexus One + Power charging
it. The Bytewalla software versions 4 have been
note adaptor
installed to the phones.
(EMEI: 354957037701540)
USB Connector
12
13. WSN/DTN Gateway Verification Test Report V.1.0
!
4. Middle-ware Software Verification
The Middle-ware software verification contains the verification for the elements below:
• DNS service
• DHCP server and client service
• Web server service
• PHP5
• Database server service
• HALD service
• Java
• Ant
• Sunspot
This verification is based on the procedure that is described in WSN/DTN Gateway Middleware Installation
and Configuration Guide On ALIX Board [3]. The result of this verification are listed in the table below:
Table 4. Middle-ware Software Verification Matrix
Verification
No Status Specification Detail / Comment
Element
DNS service is set up with DNSMAQ, it is running
DNS Server
properly in all 3 WSN/DTN Gateways.
1 DNS Service Pass Kernel IP routing table & resolv.conf configuration are
DNS Client set up properly and 3 WSN/DTN Gateways can connect
to the Internet.
DHCP server service is set up with DNSMAQ, it is
running properly in all 3 WSN/DTN Gateways:
• City Node: lease IP Addresses with range
192.168.2.35 - 192.168.2.50
2 DHCP DHCP Server
• Village Node 1: lease IP Addresses with range
192.168.3.35 - 192.168.3.50
• Village Node 2: lease IP Addresses with range
192.168.4.35 - 192.168.4.50
13
14. WSN/DTN Gateway Verification Test Report V.1.0
!
DHCP client service is running properly, and all 3
DHCP Client WSN/DTN Gateways can connect the KTH network
and get the IP address in its Eth0 interface
2 Apache Pass Apache service -
3 PHP Pass PHP version 5 -
MySQL Server is running properly in all 3 WSN/DTN
4 MySQL Pass MySQL version 5.1 Gateways with sunspot account exist to be used by
WSN/DTN Gateway Upper-ware platform.
5 Java Pass JDK version 6 -
6 Ant Pass Apache Ant version 1.8 -
7 HALD Pass - -
SunSPOT SDK Yellow is found in all 3 WSN/DTN
Pass
Gateways, in /root/SunSPOT/sdk-yellow-101117-1, but
8 SunSPOT with SunSPOT SDK
it unable to get socket connection in Voyage OS opened
note
to connect with the Base station.
14
15. WSN/DTN Gateway Verification Test Report V.1.0
!
5. Upper-ware Software Verification
The Upper-ware software verification contains the verification for the elements below:
• WSN/DTN Spot Application
• WSN/DTN Core-Engine Receiver
• WSN/DTN Core-Engine Sender
• WSN/DTN Web-base Admin
This verification is based on the procedure that is described in WSN/DTN Gateway Engine Installation Guide
& User Manual [4]. The result of this verification are listed in the table below:
a. Verification WSN/DTN Spot Application
Table 5. WSN/DTN Spot Application Verification Matrix
Verification
No Status Specification Detail / Comment
Element
The spot application that is used in
HALD Service able to detect the connected
WSN/DTN Gateway can be deployed
SPOT mote. The Application can be found
1 Installation Pass to SunSPOT mote from any
in /root/core-
WSN/DTN Gateways using it’s USB
engine/WSNDTNSpotEngine/
interfaces
The SPOT application able to read the
The temperature, humidity, battery status and
2 Functionalities Pass sensor as specified and broadcasts that
time when the data is gathered is sent
to any Base station in its range
15
16. WSN/DTN Gateway Verification Test Report V.1.0
!
b. Verification WSN/DTN Core-Engine Sender Application
Table 6. WSN/DTN Sender Engine Verification Matrix
Verification
No Status Specification Detail / Comment
Element
The Application can be found in /root/core-
Application can run in WSN/DTN
1 Deployment Pass Gateway engine/WSNDTNCoreEngine-Sender/ and
run using this command: ant host-run
The DTN module able to be run
Pass DTN Daemon module
automatically from the application
The WSN module unable to run and read the
Pass sensor data broadcasted by the Mote(s), as
with WSN Daemon module the Voyage OS can not granted the
note application to open the socket connection to
Basic the Base station
2
functionalities
The application can respond the instruction
set by user trough WSN/DTN Web base
GUI, which are:
Pass Instruction aware module • The specification of WSN/DTN Gateway
(DTN node name, DTN receiver name)
• Starting / Stopping service (DTN sending
& WSN data receiving from the mote)
Data The application can compress the file contain
3 distribution Pass Compression module WSN data before it is sent as DTN Bundle,
functionalities using simple tar.gz data compression
16
17. WSN/DTN Gateway Verification Test Report V.1.0
!
The application can trigger scheduler
distribution of DTN send; using dtncp
command, in every specific span time, in this
simulation it is set statically every 1m.
Scheduler distribution module
Application can check if there is any new
data in the database that is not distributed yet
and trigger compression module before send
it as DTN bundle
The application can response to the
controlled distribution instruction from user
that is set trough WSN/DTN Web base
Controlled distribution module GUI. Application can check if there is any
new file created by Web base GUI that is not
distributed yet and trigger compression
module before send it as DTN bundle
Application can receive the data from the
Spot application, but because the Voyage OS
cannot grant any socket connection to be
opened by the application to make
Not connection to the Base station, the
Data receiving module
pass application cannot read any data from the
Data Logging
4 Spot application from its attached Base
Functionalities
station. However, this module is running
properly in other OS (MacOS, Ubuntu,
Windows).
The application can inject the data to its
Pass Data Injection module
database
17
18. WSN/DTN Gateway Verification Test Report V.1.0
!
c. Verification WSN/DTN Core-Engine Receiver Application
Table 7. WSN/DTN Receiver Engine Verification Matrix
Verification
No Status Specification Detail / Comment
Element
The Application can be found in /root/core-
engine/WSNDTNCoreEngine-Receiver/
Application can run in WSN/DTN and run using this command:
1 Deployment Pass Gateway
Java –jar “core-
engine/WSNDTNCoreEngine-Receiver/
dist/WSNDTNCoreEngine-Receiver.jar”
The DTN module able to be run
DTN Daemon module
automatically from the application
The application can respond the instruction
Basic set by user trough WSN/DTN Web base
2 Pass
functionalities GUI, which are:
Instruction aware module • The specification of WSN/DTN Gateway
(DTN node name)
• Starting / Stopping service (DTN receiving
module)
The application can trigger scheduler
receiving of DTN receive; using dtncpd
command, in every specific span time, in this
Scheduler receiving module
simulation it is set statically every 1s. So
Data
application will check if there is any new file
3 distribution Pass
received from other DTN node
functionalities
The application can uncompress the file
Compression module
received from DTN contain WSN data
18
19. WSN/DTN Gateway Verification Test Report V.1.0
!
Application can read the WSN data from the
Pass DTN File reading module
file received as DTN bundle
The Application can check if the data in the
Data Logging
4 Pass Data redundancy checking file receive as DTN bundle is already in the
Functionality
its database or not
The application can inject the data to its
Pass Database Data Injection module
database
d. Verification WSN/DTN Web-base Admin Application
Table 8. WSN/DTN Web-base Admin Verification Matrix
Verification
No Status Specification Detail / Comment
Element
The PHP file can be found in
Application can run in WSN/DTN /root/var/www and the web page can be
1 Deployment Pass Gateway
accessed in all network interfaces of the
WSN/DTN Gateway
Management User can set the mode of the gateway, either
2 WSN/DTN Gateway Mode
functionalities as Village (Sender) or City (Receiver)
Pass
User can set the name of the gateway. This
WSN/DTN Gateway name data is also used to set the dtn node of this
gateway and put in dtn.conf file as EID name
User can set the name of the gateway receiver
Pass WSN/DTN Gateway Receiver name. This data is also used in dtn.conf file
as route in proPHET routing
19
20. WSN/DTN Gateway Verification Test Report V.1.0
!
User can control the core-engine to running
Pass Start/Stop Core-Engine module the WSN data receiving from the SPOT
motes and DTN data sending / receiving
The application can create new DTN
configuration file (dtn.conf) based on data
Pass DTN configuration module
that is set by user in Management Gateway
page
User can see the detail of the running Core-
Monitoring Engine, either it is as Village (Sender) or City
3 Pass -
functionality (Receiver), and the detail about the DTN
bundle (transferred, pending, received, etc)
User can see the WSN data in the table,
Pass Data Display module
organized based on Gateway ID and spot ID
Data User can generate the graphs (temperature,
Processing & Pass Graphing Data module humidity, battery level) form specific spot,
4 during specific range time, in specific gateway
Analyzing Sub-
System
User can download the data (temperature,
Pass Data Download humidity, battery level) form specific spot,
during specific range time, in specific gateway
Data User can choose to distribute specific data as
5 distribution Pass Controlled distribution module DTN bundle form specific spot, during
functionalities specific time range
20
21. WSN/DTN Gateway Verification Test Report V.1.0
!
6. Conclusion
Based on the verification elements that have been done to the WSN/DTN Gateway both as Village (Sender)
and City (Receiver) mode, we can conclude that the concept in this system is feasible to be deployed in real-life
scenario, and the platform that has been deployed in this project meet the requirement to make the system run.
However, there are still some issues rise and it is necessary to add several modules in order to improve the
features of this WSN/DTN gateway, including the improvement in Core-Engine, Bytewalla, DTN2 and
SunSPOT Deployment issues in Voyage OS.
21
22. WSN/DTN Gateway Verification Test Report V.1.0
!
7. Reference
[1] WSN/DTN Gateway System Architecture & Requirement Version 1.0
http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-analysis-design Last visited: October,
2011
[2] Voyage & DTN2 Installation & Configuration Guide On ALIX Board Version 1.4
http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-development Last visited: October
2011
[3] WSN/DTN Gateway Middleware Installation and Configuration Guide On ALIX Board Version
1.2 http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-development Last visited: October
2011
[4] WSN/DTN Gateway Engine Installation Guide & User Manual Version 1.1
http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-deployment-testing Last visited:
October 2011
22