This document discusses connecting Nokia and OLPC devices in a mesh network. It describes patching the drivers for the Nokia N810 and OLPC XO laptop to enable mesh networking between their different wireless adapters. A proof of concept was able to connect two systems via mesh using different wireless adapters. However, fully enabling mesh between the Nokia and OLPC devices requires further work, as their existing drivers do not currently support mesh networking.
The document discusses implementing a mesh network between Nokia Internet Tablets and OLPC/XO devices. It outlines upgrading the devices' mesh drivers and kernels to enable the heterogeneous mesh network, including patching other needed drivers. It then describes testing the mesh network by establishing IP connectivity between devices located close together and using intermediate devices to route packets for those further apart.
6LoWPAN enables the use of IPv6 in low power wireless networks by providing an adaptation layer between IEEE 802.15.4 and IPv6. It addresses issues like large IPv6 header sizes, fragmentation, and mobility through techniques like header compression and micro-mobility support. By allowing wireless embedded devices to connect using standard IPv6 protocols, 6LoWPAN helps foster interoperability and is an important foundation for enabling the Internet of Things.
The document provides an overview of networking in OpenStack with Neutron. It discusses:
- The history of cloud computing and OpenStack.
- An introduction to OpenStack and its core services.
- Neutron architecture and plugins that allow integration with different networking technologies.
- The process of instance creation and how Neutron components work together.
- Tips for troubleshooting common network issues like DHCP failures and connectivity problems.
6LoWPAN is a networking standard that allows IPv6 packets to be transmitted efficiently over low-power wireless networks like IEEE 802.15.4. It defines an adaptation layer that compresses IPv6 and UDP headers to address challenges of limited bandwidth and device resources. 6LoWPAN networks connect to the internet using edge routers and support applications through protocols like CoAP that are optimized for low-power devices.
The document discusses IPv6 over wireless personal area networks (6LoWPAN). It describes challenges like small IPv6 and UDP packet headers not fitting in 802.15.4 frames. It overviews how 6LoWPAN compresses headers, fragments packets, and allows IPv6 networks to connect over low power wireless links. Key concepts covered are 6LoWPAN dispatch codes, frame formats, header compression principles, and fragmentation/reassembly.
6LoWPAN is a standard that allows IPv6 packets to be sent over low-power wireless personal area networks (6LoWPANs). It enables interoperability between different IoT devices and sensors using IPv6 over IEEE 802.15.4 radio networks. 6LoWPAN addresses challenges like large IPv6 packet sizes, stateless address autoconfiguration, routing, security, and resource-constrained application protocols. It provides solutions like header compression, mesh routing trees, encryption standards, and adapting HTTP to the Constrained Application Protocol (CoAP). An example implementation uses an STM32L microcontroller running a 6LoWPAN stack to transmit sensor data over Sub-GHz radio frequencies.
This document discusses spanning tree protocols used in local area networks (LANs). It begins with an introduction to spanning tree concepts and how they address issues with redundant network paths such as broadcast storms and unstable MAC address tables. The document then covers various spanning tree protocols including IEEE 802.1D STP, PVST+, and Rapid PVST+. It describes the operation of each protocol including BPDU frame formats, port states, and how they select the root bridge and block redundant paths. Configuration of PVST+ and Rapid PVST+ in a switched LAN environment is also discussed.
The document discusses the setup and configuration of an intrusion prevention system (IPS) using Snort and iptables on a Linux-based system. It provides detailed instructions on installing necessary libraries, the Linux kernel, Snort, iptables, and Snort rulesets. The IPS can be configured in either inline or flex-response mode using Snort. Iptables is used to create packet queues that allow for mono-queue or multi-queue IPS configurations with single or multiple processing queues.
The document discusses implementing a mesh network between Nokia Internet Tablets and OLPC/XO devices. It outlines upgrading the devices' mesh drivers and kernels to enable the heterogeneous mesh network, including patching other needed drivers. It then describes testing the mesh network by establishing IP connectivity between devices located close together and using intermediate devices to route packets for those further apart.
6LoWPAN enables the use of IPv6 in low power wireless networks by providing an adaptation layer between IEEE 802.15.4 and IPv6. It addresses issues like large IPv6 header sizes, fragmentation, and mobility through techniques like header compression and micro-mobility support. By allowing wireless embedded devices to connect using standard IPv6 protocols, 6LoWPAN helps foster interoperability and is an important foundation for enabling the Internet of Things.
The document provides an overview of networking in OpenStack with Neutron. It discusses:
- The history of cloud computing and OpenStack.
- An introduction to OpenStack and its core services.
- Neutron architecture and plugins that allow integration with different networking technologies.
- The process of instance creation and how Neutron components work together.
- Tips for troubleshooting common network issues like DHCP failures and connectivity problems.
6LoWPAN is a networking standard that allows IPv6 packets to be transmitted efficiently over low-power wireless networks like IEEE 802.15.4. It defines an adaptation layer that compresses IPv6 and UDP headers to address challenges of limited bandwidth and device resources. 6LoWPAN networks connect to the internet using edge routers and support applications through protocols like CoAP that are optimized for low-power devices.
The document discusses IPv6 over wireless personal area networks (6LoWPAN). It describes challenges like small IPv6 and UDP packet headers not fitting in 802.15.4 frames. It overviews how 6LoWPAN compresses headers, fragments packets, and allows IPv6 networks to connect over low power wireless links. Key concepts covered are 6LoWPAN dispatch codes, frame formats, header compression principles, and fragmentation/reassembly.
6LoWPAN is a standard that allows IPv6 packets to be sent over low-power wireless personal area networks (6LoWPANs). It enables interoperability between different IoT devices and sensors using IPv6 over IEEE 802.15.4 radio networks. 6LoWPAN addresses challenges like large IPv6 packet sizes, stateless address autoconfiguration, routing, security, and resource-constrained application protocols. It provides solutions like header compression, mesh routing trees, encryption standards, and adapting HTTP to the Constrained Application Protocol (CoAP). An example implementation uses an STM32L microcontroller running a 6LoWPAN stack to transmit sensor data over Sub-GHz radio frequencies.
This document discusses spanning tree protocols used in local area networks (LANs). It begins with an introduction to spanning tree concepts and how they address issues with redundant network paths such as broadcast storms and unstable MAC address tables. The document then covers various spanning tree protocols including IEEE 802.1D STP, PVST+, and Rapid PVST+. It describes the operation of each protocol including BPDU frame formats, port states, and how they select the root bridge and block redundant paths. Configuration of PVST+ and Rapid PVST+ in a switched LAN environment is also discussed.
The document discusses the setup and configuration of an intrusion prevention system (IPS) using Snort and iptables on a Linux-based system. It provides detailed instructions on installing necessary libraries, the Linux kernel, Snort, iptables, and Snort rulesets. The IPS can be configured in either inline or flex-response mode using Snort. Iptables is used to create packet queues that allow for mono-queue or multi-queue IPS configurations with single or multiple processing queues.
The document describes an automated tool called MDBCI that is used to create multi-configuration testing environments for database servers and proxy applications like MariaDB and Maxscale. It allows defining configuration templates that can deploy virtual machines across different providers with various Linux distributions, database versions, and topologies. MDBCI uses tools like Vagrant, Terraform, Ansible, and Chef to automate the deployment and configuration of the test environments from human-readable definition files. Developers find it useful for debugging by allowing direct access to the test environment machines.
Implementation of the new REST API for Open Source LBS-platform Geo2TagOSLL
The document discusses the implementation of a new REST API for the open source Geo2Tag LBS platform. The goals were to encourage 3rd party developers by simplifying the existing codebase and making the API more RESTful. This included rewriting the backend in Python with MongoDB, adding OAuth authorization, pagination support, and making all entities identifiable through URLs. It also describes adding plugins and data import capabilities to allow customization and ingesting open data through a new plugin system.
Massive open online courses (MOOCs) offer unlimited enrollment, 24/7 access to course materials, and automated testing to assess knowledge for software engineering and computer applications students. Upcoming improvements include adaptive teaching and analyzing student behavior through machine learning. MOOCs are provided through major platforms and can be supplemented with virtual labs for hands-on experience, with contacts available through the course coordinator.
This document summarizes a presentation about improving mesh networking on One Laptop Per Child (OLPC) laptops. It discusses the goals of reducing routing overhead on OLPC networks and implementing solutions on the laptops. The presentation covers analyzing different types of ad-hoc routing, comparing industrial and open source routing implementations, and proposing a solution that uses restricting the routing area, dynamic optimization radius selection, and defining routing overhead externally. It also provides a timeline for developing and testing the solutions through simulations and contributing code to OLPC laptops.
The document describes an SVG Player tool for analyzing results from xml-based and svg-based network simulations. The SVG Player allows viewing a set of SVG images in sequential order, navigating images forwards and backwards, declaring and saving image sets, and playing sets in direct and reverse order. It was developed using C++, Qt Framework, and Qt Creator and loads SVG images asynchronously in a separate thread to prevent rendering delays. While intended for viewing NS2 simulation results, the SVG Player can be used to play any SVG image series.
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...OSLL
Abstract. Short-time traffic flow prediction in particular systems will expedite discovering of an optimal path for packet transmitting in dynamic wireless networks. The main goal is to predict traffic overload while changing a network topology. Machine learning techniques and process mining can help analyze traffic produced by several moving nodes. Several related approaches are observed. Research framework structure is presented. The idea of process mining approach is proposed.
Ceph является одной из мнообещающих архитектур для построения облачных хранилищ данных. В презентации приведены основные возможности, описана архитектура, дан краткий обзор команд CLI
Короткое знакомство с Mongo; Коротко про GeoJson; Какие данные можно хранить в Mongo; Как хранить геоданные в Mongo; Как индексировать геоданные; Как выполнять запросы к данным (поиск объектов рядом/внутри/на пересечении с областями); Примеры использования геовозможностей MongoDb в Geo2Tag
This document summarizes an open source implementation of the ZigBee wireless networking standard. It discusses applications of ZigBee networks in home automation and commercial buildings. It provides an overview of ZigBee nodes, topologies, and stack architecture. The presentation outlines a work plan to make the protocol layers independent, define socket interfaces, and develop a user-space library. Progress on a Wireshark dissector and socket interfaces is also summarized.
Linux Control Groups (Контрольные группы) -- механизм, позволяющий управлять группами процессов в Linux и их ресурсами. Это мощный инструмент о котором знают далеко не все. Презентация дает краткий обзор.
Виртуализация уровня операционной системы в Linux (так, называемые контейнеры) опирается на изоляцию ресурсов и на управление их использованием. Пространства имен в Linux (linux namespaces) тот инструмент, который позволяет изолировать ресурсы друг от друга на уровне имен. Например, именами процессов являются их идентификаторы (PIDs), которые можно организовать таким образом, что процессы никогда не могут узнать о существовании друг друга. Об этом и других интересных вещах рассказывается в презентации.
Virtual-HSM: Virtualization of Hardware Security Modules in Linux ContainersOSLL
In the report the technology of virtual security modules will be presented. It rely on Linux containers. The report should be interesting for those people who are planning (or already using) could services for building IT-infrastructure.
The document summarizes a seminar on the Geo2tag LBS platform. It includes an agenda covering an architecture overview, installation process, source code overview, JSON interface, client libraries, and practice with Qt. Key features of the current platform include basic geo-tagging, filtration, and load balancing. Planned features for 2012 include exporters and channel aggregation. The conceptual model diagram shows how data flows from devices through the HTTP/JSON interface to Lighttpd, PostgreSQL, and back.
Seven years ago at LCA, Van Jacobsen introduced the concept of net channels but since then the concept of user mode networking has not hit the mainstream. There are several different user mode networking environments: Intel DPDK, BSD netmap, and Solarflare OpenOnload. Each of these provides higher performance than standard Linux kernel networking; but also creates new problems. This talk will explore the issues created by user space networking including performance, internal architecture, security and licensing.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
The document describes an automated tool called MDBCI that is used to create multi-configuration testing environments for database servers and proxy applications like MariaDB and Maxscale. It allows defining configuration templates that can deploy virtual machines across different providers with various Linux distributions, database versions, and topologies. MDBCI uses tools like Vagrant, Terraform, Ansible, and Chef to automate the deployment and configuration of the test environments from human-readable definition files. Developers find it useful for debugging by allowing direct access to the test environment machines.
Implementation of the new REST API for Open Source LBS-platform Geo2TagOSLL
The document discusses the implementation of a new REST API for the open source Geo2Tag LBS platform. The goals were to encourage 3rd party developers by simplifying the existing codebase and making the API more RESTful. This included rewriting the backend in Python with MongoDB, adding OAuth authorization, pagination support, and making all entities identifiable through URLs. It also describes adding plugins and data import capabilities to allow customization and ingesting open data through a new plugin system.
Massive open online courses (MOOCs) offer unlimited enrollment, 24/7 access to course materials, and automated testing to assess knowledge for software engineering and computer applications students. Upcoming improvements include adaptive teaching and analyzing student behavior through machine learning. MOOCs are provided through major platforms and can be supplemented with virtual labs for hands-on experience, with contacts available through the course coordinator.
This document summarizes a presentation about improving mesh networking on One Laptop Per Child (OLPC) laptops. It discusses the goals of reducing routing overhead on OLPC networks and implementing solutions on the laptops. The presentation covers analyzing different types of ad-hoc routing, comparing industrial and open source routing implementations, and proposing a solution that uses restricting the routing area, dynamic optimization radius selection, and defining routing overhead externally. It also provides a timeline for developing and testing the solutions through simulations and contributing code to OLPC laptops.
The document describes an SVG Player tool for analyzing results from xml-based and svg-based network simulations. The SVG Player allows viewing a set of SVG images in sequential order, navigating images forwards and backwards, declaring and saving image sets, and playing sets in direct and reverse order. It was developed using C++, Qt Framework, and Qt Creator and loads SVG images asynchronously in a separate thread to prevent rendering delays. While intended for viewing NS2 simulation results, the SVG Player can be used to play any SVG image series.
E.Kalishenko, K.Krinkin, S.P.Shiva Prakash. Process Mining Approach for Traff...OSLL
Abstract. Short-time traffic flow prediction in particular systems will expedite discovering of an optimal path for packet transmitting in dynamic wireless networks. The main goal is to predict traffic overload while changing a network topology. Machine learning techniques and process mining can help analyze traffic produced by several moving nodes. Several related approaches are observed. Research framework structure is presented. The idea of process mining approach is proposed.
Ceph является одной из мнообещающих архитектур для построения облачных хранилищ данных. В презентации приведены основные возможности, описана архитектура, дан краткий обзор команд CLI
Короткое знакомство с Mongo; Коротко про GeoJson; Какие данные можно хранить в Mongo; Как хранить геоданные в Mongo; Как индексировать геоданные; Как выполнять запросы к данным (поиск объектов рядом/внутри/на пересечении с областями); Примеры использования геовозможностей MongoDb в Geo2Tag
This document summarizes an open source implementation of the ZigBee wireless networking standard. It discusses applications of ZigBee networks in home automation and commercial buildings. It provides an overview of ZigBee nodes, topologies, and stack architecture. The presentation outlines a work plan to make the protocol layers independent, define socket interfaces, and develop a user-space library. Progress on a Wireshark dissector and socket interfaces is also summarized.
Linux Control Groups (Контрольные группы) -- механизм, позволяющий управлять группами процессов в Linux и их ресурсами. Это мощный инструмент о котором знают далеко не все. Презентация дает краткий обзор.
Виртуализация уровня операционной системы в Linux (так, называемые контейнеры) опирается на изоляцию ресурсов и на управление их использованием. Пространства имен в Linux (linux namespaces) тот инструмент, который позволяет изолировать ресурсы друг от друга на уровне имен. Например, именами процессов являются их идентификаторы (PIDs), которые можно организовать таким образом, что процессы никогда не могут узнать о существовании друг друга. Об этом и других интересных вещах рассказывается в презентации.
Virtual-HSM: Virtualization of Hardware Security Modules in Linux ContainersOSLL
In the report the technology of virtual security modules will be presented. It rely on Linux containers. The report should be interesting for those people who are planning (or already using) could services for building IT-infrastructure.
The document summarizes a seminar on the Geo2tag LBS platform. It includes an agenda covering an architecture overview, installation process, source code overview, JSON interface, client libraries, and practice with Qt. Key features of the current platform include basic geo-tagging, filtration, and load balancing. Planned features for 2012 include exporters and channel aggregation. The conceptual model diagram shows how data flows from devices through the HTTP/JSON interface to Lighttpd, PostgreSQL, and back.
Seven years ago at LCA, Van Jacobsen introduced the concept of net channels but since then the concept of user mode networking has not hit the mainstream. There are several different user mode networking environments: Intel DPDK, BSD netmap, and Solarflare OpenOnload. Each of these provides higher performance than standard Linux kernel networking; but also creates new problems. This talk will explore the issues created by user space networking including performance, internal architecture, security and licensing.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity
This presentations gives basic overview about networking and in depth insights about Openstack Neutron component.
Covers understanding on VLAN,VXLAN,Openstack vSwitch
This document discusses using Java and LoRaWAN to create an IoT sensor network called SkopjePulse to monitor air pollution, noise levels, and flood risks in Skopje, Macedonia. The network would use low-cost sensors connected via LoRaWAN to The Things Network to send data to a backend hosted on SpringBoot microservices. The data would be stored in Apache Cassandra and analyzed to provide insights and warnings to improve environmental conditions in the city. Future additions may include forecasting air quality and water levels to provide more advanced notifications.
Network Virtualization for Cloud Services InfrastructureShahryar Ali
This document discusses network virtualization solutions for multi-tenant cloud infrastructures. It analyzes the limitations of traditional data center networks and explores network virtualization techniques like VXLAN, NVGRE, and STT. The document also examines the use of SDN/OpenFlow as a control plane for network virtualization and proposes integrating OpenStack for automated provisioning of virtual networks. Key goals are to understand network virtualization and limitations of multi-tenant data centers and analyze solutions like VXLAN, OpenFlow, and OpenStack.
- OpenStack provides network virtualization and automation capabilities through projects like Neutron, Heat, and plugins like Midonet.
- Neutron evolved networking in OpenStack to allow pluggable networking models beyond the initial Nova networking. It supports overlay technologies and network automation.
- Heat allows you to define infrastructure like servers, networks, and their relationships in templates that can be deployed through the OpenStack API. This provides automation of virtual network deployment.
- Plugins like Midonet provide distributed virtual networking models to improve scalability and performance over overlay approaches like OVS. They also allow automation of physical network configuration.
This document provides an overview of computer networking concepts including network types (LAN, MAN, WAN), networking devices (hubs, switches, routers), network topologies (bus, star, ring), IP addressing, and Active Directory. Some key points include:
- A network allows connected computers to share resources and communicate. Common network types include local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).
- Networking devices like hubs, switches, and routers are used to connect computers in a network and enable communication. Hubs broadcast data to all ports while switches transmit only to the target computer. Routers connect different network types.
- Popular network top
This document provides an outline for a TinyOS tutorial that introduces the TinyOS operating system and development environment. It covers the hardware primer, introduction to TinyOS, installation and configuration, NesC syntax, network communication, sensor data acquisition, debugging techniques, and concludes with an overview of the Agilla mobile agent system. The outline includes 10 sections that will guide students through understanding the TinyOS hardware platforms, programming model, components, interfaces, and building/installing applications.
The document discusses the history and progress of OpenFlow and SDN. It traces OpenFlow from its origins in academia in 2007 to its growing adoption by major tech companies and standardization through the Open Networking Foundation by 2011. It outlines how OpenFlow allows centralized control of network traffic through software-defined controllers that programmatically configure flow-based forwarding using the OpenFlow protocol in switches.
The document provides an overview of a training session on clustering 101 and the Rocks cluster distribution. It discusses cluster types, components, pioneers in the field, interconnect technologies, sample applications and benchmarks, cluster software options, challenges of managing clusters, and the philosophy and approach of the Rocks distribution for easily building clusters.
The document provides information about Cisco certifications including the CCNA exam requirements and benefits, describes common networking devices like hubs, switches, routers and their functions, and explains basic networking concepts such as topologies, protocols, and the layered OSI model which is important for understanding network communication. It covers a wide range of foundational networking topics in preparation for Cisco certification exams.
An Introduce of OPNFV (Open Platform for NFV)Mario Cho
OPNFV is Open Platform for Network Function Virtualization.
It lecture are talk on Open Software Conference 2015.
The Lecture of OPNFV explain OPNFV sub-software technology like The Linux Kernel, Virtualization, Software Defined Network, OpenStack, OpenDaylight, and Network Function Virtualization.
The document discusses running IEEE 802.15.4 low-power wireless networks under Linux. It describes the linux-wpan project, which provides native support for 802.15.4 radio devices and the 6LoWPAN standard in the Linux kernel. It also discusses the wpan-tools userspace utilities. The document outlines how to set up basic communication between Linux, RIOT and Contiki operating systems for IoT devices using the virtual loopback driver or USB dongles. It also covers link layer security, IPv6 routing protocols like RPL, and areas for future work such as mesh networking support.
Here I am describing general topics about :
1) Brief about 802.11 standard.
2) MAC layer frames
3) MLME
4) SoftMAC and HardMAC
5) Broadcom bcm43xx chipsets
6) Tx path and Rx path of brcmsmac driver
7) Mac80211 debugfs
8) Live demonstration
The document discusses how Calico interprets various Neutron API objects differently than a traditional OpenStack deployment. It explains that in Calico, Neutron networks simply contain subnets and do not define layer 2 connectivity domains. Security groups provide both packet filtering and connectivity limiting functions. Layer 3 routing objects like routers and floating IPs are not supported in Calico. Load balancers also do not function in a Calico network.
This document provides information about networking and Microsoft Certified Systems Engineer (MCSE) certification. It defines what a network is and discusses the benefits of networking such as sharing resources, software, and licenses. It also describes different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Additionally, it discusses networking devices like hubs, switches, routers, and network interface cards. The document also covers topics such as network topologies, IP addressing, implementing TCP/IP, and Active Directory.
Openstack Networking Internals - first partlilliput12
Openstack Networking Internals - first part
Description of the Virtual Network Infrastructure inside an OpenStack cluster
The pictures of the VNI were taken with the "Show my network state" tool
https://sites.google.com/site/showmynetworkstate/
This document discusses low cost supercomputing using Linux clusters. It begins with an introduction to parallel processing and clustering. Clusters offer a way to use multiple computers together as a single system for higher performance and lower costs. The document then covers parallel processing schemes and provides a conceptual overview of clusters. It discusses cluster design considerations including topology, hardware specifications, and software requirements. Linux is identified as a suitable operating system for clustering. The document outlines features and benefits of clustering, such as data sharing and parallel processing. It provides examples of clustering applications in fields like web serving, simulation, and science.
About the author: Priya Autee is software engineer at Intel working on various leading edge IA features and Intel(R) RDT expert. She is focused on prototyping and researching open source APIs like DPDK, Intel(R) RDT etc. to support NFV/compute sensitive requirements on Intel Architecture. She holds Masters in Computer Science from Arizona State University, Arizona.
The document describes a SLAM constructor framework for ROS that aims to speed up SLAM research. It provides common components that can be assembled to implement SLAM algorithms. The current version uses laser scans and odometry, but ongoing work includes adding support for graph-based SLAM, extra sensors, and feature-based SLAM methods. The framework is open source on GitHub and implements some existing SLAM methods as a starting point.
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015OSLL
Nowadays the big challenge in simultaneous local-
ization and mapping (SLAM) of mobile robots is the creation
of efficient and robust algorithms. Significant Number of SLAM
algorithms rely on unique features or or use artificial landmarks
received from camera images. Feature points and landmarks
extraction from images have two significant drawbacks: CPU
consumption and weak robustness depending on environment
conditions. In this paper we consider performance issues for
landmark detection, introduce a new artificial landmark design
and fast algorithm for detecting and tracking them in arbitrary
images. Also we provide results of performance optimization for
different hardware platforms.
В презентации описан опыт создания робота с нуля на базе Raspberry Pi и недорогих актуаторов и сенсоров. Представлены примеры двух разработанных поколений роботов, детально описана одна из последних версий, собранная на базе деталей конструктора Trik. Описанная модель имеет дифференциальное управление (используются два мотора с энкодерами), ультразвуковой сенсор, камеру. Питание организовано от 11.1V батареи через UBEC. Прошивка робота реализована на базе ROS и состоит из нескольких модулей.
The document describes a source code analyzer tool that allows users to visualize code structure through objects and connections in a graph. It can define objects from text, files, or hex editors, connect objects, annotate objects, and support object filtering. The tool uses Qt, Source-highlight-qt, and SQLite and has features like external tool support, usability improvements, object grouping, performance analysis, and automatic graph generation. Contact information is provided for the Ubuntu app center, GitHub repository, and developers.
This document discusses the implementation of the 802.11s Power Save Mode in the NS-3 network simulator. It begins with background on 802.11s mesh networking and power saving approaches. It describes the objectives of developing a routing algorithm based on 802.11s PSM aspects and implementing it in NS-3. Details are provided on extending NS-3's mesh and energy models to support this work. The document outlines next steps of creating a PSM infrastructure, implementing the routing algorithm, and testing the implementation.
SECR'13 Lightweight linux shared libraries profilingOSLL
This document summarizes a presentation on developing a lightweight profiler called ElfPerf for Linux embedded systems. ElfPerf allows profiling function calls in shared libraries without recompilation or relinking. It uses call redirection and wrapping mechanisms to intercept function calls and collect profiling statistics. ElfPerf works by modifying the dynamic linker (ld-linux.so) and dynamic loading library (libdl.so) to integrate the profiling library (libelfperf.so). This allows non-invasive profiling of dynamically linked and loaded functions on x86/x64 platforms.
The document discusses integrating the Smart-M3 and Geo2Tag platforms to develop technology for efficient geocoded smart spaces. The goal is to develop an integration architecture and agent to connect the platforms. Smart-M3 is an open source semantic web sharing platform, while Geo2Tag is a centralized geo-tagging database. A layered architecture is proposed with interfaces, integration, domain engines, and a data backend. Use cases include geotagging smart objects, spatial/temporal filtering, and providing extra geo-tagged information. A prototype has been developed without the cloud backend, which is still in progress along with testing and optimizations.
The document provides an overview of the Tizen Web Runtime and Device APIs. It describes new HTML5 elements, JavaScript APIs for drawing, media, offline web, drag and drop, file access, and geolocation. It then summarizes the main Tizen Device APIs, including communication, social, content, input/output, system, application, and user interface APIs. It provides examples for filters, applications, downloading content, filesystems, message ports, calendars, and device orientation.
This document summarizes a presentation about the Geo2tag platform for location-based services and geo-tagging. It introduces the architecture, features, and APIs of the Geo2tag system. Key points include an overview of the REST API and JSON interface, client libraries for Android and Qt, and demonstrations of functionality like user authentication, tag writing and loading, and channel management in the Android and Qt clients.
The document describes a RESTful JSON API for a geo-tagging application called Geo2tag. It outlines the goals of REST, defines JSON and its grammar, provides API usage examples using cURL, and details the API endpoints for user management, channel management, and working with geo tags. The API uses HTTP requests, JSON payloads, and authentication tokens to allow clients to interact with the Geo2tag service in a stateless and scalable way.
Introduction to geo-tagging and geo2tag platformOSLL
This document introduces location based services (LBS) and geo-tagging. It defines key terms like geo-tagging, tags, and channels. It describes the main features of a geo-tagging system for accessing, classifying, filtering, and processing massive amounts of tagged data. It outlines the architecture of the Geo2tag LBS platform, including its client/server design with session caching, query engine, and backend database. It provides development resources and describes the JSON/REST API for user management, channel management, and working with tags through functions like login, writeTag, and loadTags.
1. Approach to a problem
of mesh‐connectivity between
XO laptops and Nokia MAEMO devices
Arina Rudakova
(Saint-Petersburg Elelectrotechnical University «LETI»,
Open Source Linux Lab)
4rd FRUCT seminar
Tampere
29 November 2008
2. Introduction
Problem definition
Nokia N8x0 and OLPC XO interaction
(heterogeneous mesh network)
Steps
Mesh driver and kernel driver
upgrade
in Nokia Internet Tablet
in OLPC XO
Other drivers patching for mesh-
interconnection enabling
2
3. OLPC XO configuration
Dimensions: 242mm × 228mm × 32mm
CPU x86-compatible processor AMD Geode LX-
700 433 Mhz, 64KB each L1 I and D cache; at least
128KB L2 cache
DRAM memory: 256 MiB dynamic RAM
BIOS: 1024KiB SPI-interface flash ROM
Mass storage: 1024 MiB SLC NAND flash, high-
speed flash controller
Wireless Networking:
integrated 802.11b/g (2.4GHz) interface;
Mesh networking is supported by
Marvell Libertas wireless chipset,
88W8388 controller and 88W8015 radio.
3
5. 802.11s and OLPC-mesh
Wireless chipset: Libertas - FullMAC driver - enables Wi-Fi and
mesh support.
Libertas is the Marvel 88w838X series of wireless chipsets.
FullMAC drivers can't be used by the mac80211 module.
The IEEE802.11s draft is mostly followed in Libertas, but it's an
old version of draft.
Differences OLPC-mesh from 802.11s standard:
Main differences: Non implemented features:
- Path asymmetry - Link establishment
- Metrics - Security
- Medium a protocol
- Congestion Control
- Power Savings mode
5
7. Kernels' features
Nokia announced mac80211-based driver – stlc45xx.
Nokia and XO use different kernel's modules for their wireless
adapters.
old kernels:
− missing Mesh support in Nokia N8xx kernel
− support IEEE802.11s v0.1(current version is 2.0) in XO
new Linux kernel of 2.6.26 version supports mesh
7
8. Plan
Proof of concept
Patch stcl45xx driver for Nokia N810
Setup libertas_tf on XO
Connect N810 and XO via mesh
8
9. Proof of concept
Trying to connect two different adapters via wireless
mesh network using 2.6.27 kernel
Result
Two system based on kernel 2.6.27 with wireless
adapters rt73usb-based and b43-based send and
receive pings from each other
9
10. Patch stlc45xx-driver for N810
Trying to include stlc45xx-driver, which was
published by Maemo, in 2.6.27 kernel
Result
Following the driver set-up instructions lead to
permanent device reboot
Installing driver in clear kernel with busybox doesn't
give a working driver
10
11. Setup libertas_tf on XO
Trying to include libertas_tf driver from wireless-
testing kernel branch, in 2.6.27 kernel
Result
libertas_tf is initialized
mac80211 doesn't call libertas_tf
11
12. Connect N810 and XO via mesh
Trying to connect N810 and XO, using 2.6.27 kernel
and required drivers
Result
Network didn't start as drivers didn't work
Potentially the connection should work once drivers
are tuned because of proof of concept step
12
13. Problems
Existing mesh-drivers organization is unknown
Network packet format is unknown
13
14. Future
Traffic control in Mesh Networks
Mesh network infrastructure model development
QoS control
Dynamic topology reconfiguration
Management traffic volume control
Load balancing
Routing algorithm development
Open source implementation
14
The next presentation is about the approach to a problem of mesh-connectivity between XO laptops and Nokia MAEMO devices.
Mesh networks are becoming more and more popular. Many companies produce new devices supporting mesh interconnections. It is very convenient to use different devices in one heterogeneous mesh network. Here the problem of their interoperability comes. We considered this problem on the example of Nokia Internet Tablet and OLPC XO interaction. The OSLL team updated mesh-drivers and kernels in Nokia Tablet and XO in order to make them interact with each other. Also some other drivers of simple devices were patched and checked for the ability to interact.
There are some technical characteristics of OLPC XO. This laptop has low-power processor and is rather short of dynamic memory. Wireless networking in XO is supported by Marvell Libertas wireless chipset.
Lets refresh our memory about what mesh is. Mesh network is a self-organizing fully connected network. It is also self-healing, self-managed and large scaling. The network uses optimal traffic routing. An optimal route can be, for example, the shortest one, or the route with low load ratio. There are 3 main types of mesh networks. They are infrastructure, client and hybrid networks. In infrastructure network mesh routers are not mobile and form an infrastructure for mobile clients. In client network there are only client nodes able to act both as a router and as an access point to the network. Hybrid networks have infrastructure and mobile nodes where part of mobile nodes are also able to act as a router. We are concerned with client networks.
This slide shows what kind of mesh is there in OLPC XO. The laptop has the Marvell Libertas wireless chipset. It is a FullMAC wireless card so it has its own implementation of MAC Management Entity (MLME) and it cannot work with mesh mac-layer interface of the IEEE 802.11s draft. Libertas follows an older variant of the draft so there are some differences from the current version. Main differences lay in path asymmetry and metrics. In OLPC XO paths are considered to be asymmetric so a path between S and D is not assumed to be also a good path between D and S. And it can be quite true for radio transmissions. But in new variant of draft these paths are considered to be of equal quality. The calculation of link cost is also very different. In new draft it is counted from the time needed to successfully transmit a frame. So such metric includes the probability of error. While in XO a link cost is derived only from the data rate of each received route request. This metric doesn't account for the probability of error. Some features from mesh draft are not implemented in XO. First of all, there is no link establishment. XO doesn't check whether a link is still active. An active neighbour will be a one hop distant neighbour from the forwarding table, and nothing else. The next point is security. Currently no security mechanism is implemented at the link layer. Another lacking feature is medium access protocol. XO uses the Distributed Coordination Function while the draft uses new coordination function called Mesh Deterministic Access. XO also lacks any congestion control mechanism and power saving mode.
Here you can see how two Libertas editions developed for different Linux kernels. XO laptop uses old kernel with Libertas driver. It enables mesh interconnections on physical, MAC and radio frequency layers. The new 2.6.27 kernel uses an alternative thin driver - called Libertas_tf - based on mac-layer mesh stack.
Lets have a look at current Nokia Internet Tablet and OLPC XO kernels and at the newest Linux kernel as well. Nokia announced an opensource mac80211-based driver but OLPC XO uses another wireless driver so these devices cannot interoperate. Also new Nokia driver is not supported in its current kernel which lacks mac80211 stack. New Linux kernel solves both the problem of mesh functioning in these devices and the problem of their interoperability by providing the same mesh interface.
The plan of problem solving consists of 4 steps. First of all it is needed to prove the concept of using new kernel on the example of other drivers. The next steps are patching new Nokia mesh-driver and installing Libertas_tf on XO. The last step is checking the connection between Nokia810 and XO.
The first step is the proof of concept based on two different adapters. It succeeded as the systems can send and receive pings from each other.
At first we tried to include driver in new kernel following the instructions but driver starting leads to rebooting. Then we tried to install driver in clear kernel with the help of only busybox. After that the device was trying to join an infrastructure network and not to organise mesh. Some problem with the firmware was detected.
Libertas_tf was installed and initialized but it doesn't work properly on XO. Its function of network interface creation isn't called by the mac80211 stack.
We experience some problems while organizing the Nokia-XO connection what slows down the work. Still the finish of drivers tuning is close.
After having created an acting heterogeneous network it will be possible to work on its efficient usage. So the next goal is to control traffic in Mesh Networks. For doing this the stages are already planned and partly done. These steps are an infrastructure model development, routing algorithm development and open source realization. The network model should be able to control QoS, to reconfigure network's topology dynamically, to control management traffic volume and to balance network's load.