IS-IS uses three types of adjacencies - L1, L2, and L1/2. Adjacencies are established through a three-way handshake and can be in one of three states: down, initializing, or up. Key IS-IS operations include routers discovering neighbors through hello messages, establishing adjacencies, building LSPs, flooding LSPs to neighbors, running SPF to build routing tables. DIS is elected to reduce the mesh in broadcast networks and is chosen based on priority and MAC address.
VRRP (Virtual Router Redundancy Protocol) is a computer networking protocol that provides for
automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the
availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.
The Virtual Router Redundancy Protocol (VRRP) eliminates the single point of failure inherent in the
static default routed environment. VRRP specifies an election protocol that dynamically assigns
responsibility for a virtual router (a VPN 3000 Series Concentrator cluster) to one of the VPN
Concentrators on a LAN. The VRRP VPN Concentrator that controls the IP address(es) associated with a
virtual router is called the Master, and forwards packets sent to those IP addresses.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
OSPF is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
VRRP (Virtual Router Redundancy Protocol) is a computer networking protocol that provides for
automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the
availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.
The Virtual Router Redundancy Protocol (VRRP) eliminates the single point of failure inherent in the
static default routed environment. VRRP specifies an election protocol that dynamically assigns
responsibility for a virtual router (a VPN 3000 Series Concentrator cluster) to one of the VPN
Concentrators on a LAN. The VRRP VPN Concentrator that controls the IP address(es) associated with a
virtual router is called the Master, and forwards packets sent to those IP addresses.
Segment routing is a technology that is gaining popularity as a way to simplify MPLS networks. It has the benefits of interfacing with software-defined networks and allows for source-based routing. It does this without keeping state in the core of the network and needless to use LDP and RSVP-TE.
This slide contains concept about MPLS_VPNs specially L3_VPN protocol, according to the latest version of Cisco books(SP and R&S) and i taught it at IRAN TIC company.
In the next slide, i prepare title about MPLS L3_VPN Services and VPLS (MPLS L2_VPN)
BGP (Border Gateway Routing Protocol) is a standardized exterior gateway protocol designed to
exchange routing and reachability information between autonomous systems (AS) on the Internet. The
Border Gateway Protocol makes routing decisions based on paths, network policies or rule-sets
configured by a network administrator, and are involved in making core routing decisions.
BGP is a very robust and scalable routing protocol, as evidenced by the fact that BGP is the routing
protocol employed on the Internet.
OSPF is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF Version 2 for IPv4. The updates for IPv6 are specified as OSPF Version 3. OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks.
“MPLS is that it’s a technique, not a service.”
The fundamental concept behind MPLS is that of labeling packets. In a traditional routed IP network,
each router makes an independent forwarding decision for each packet based solely on the packet’s
network-layer header. Thus, every time a packet arrives at a router, the router has to “think through”
where to send the packet next.
Basically it contains information about the OSPF routing protocol. As much as possible the information was tried to be summarized and a slideshow of visual weight was made.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
2. • There are three types adjacency in IS-IS Protocol.These are:
• – Level 1 routers form L1 adjacency with L1 and L1/2 Routers
– Level 2 routers form L2 adjacency with L2 and L1/2 Routers
– Level 1/2 routers form L1/2 adjacency with L1/2 Routers
3. • There is no neighbour ship between L1 and L2 routers.
• In IS-IS Protocol, adjacency is established with 3-way handshake mechanism.
There are three states in IS-IS adjacency. Let’s check the adjacency states of IS-IS
Protocol.
• In the first place the router adjacency is in Down State. One of the routers, here
Router A sends a Hello PDU. When the router B receive this Hello including the
MAC address of the sending node Router A, it goes to Initialize State and sends
Hello to Router A too. Again, when Router A receives Hello including the MAC
address of Router B, bidirectional communication established. And the name of
this state is Up State.
4. • As a summary:
• No IS-IS neighbour (Down State)
• RTRA Sends Hello (Initializing
State)
• RTRB records MAC address f
RTRA and Sends Hello too. RTRA
sees MAC address of RTRB.
Bidirectional communication
established (Up State)
5. IS-IS Protocol Operation
• Beginning with IS-IS adjacency establishment, to
the RoutingTable establishment, IS-IS Operation
has some steps.
6. We can summarize IS-IS operation in 6 steps.
These IS-IS operation steps are given below:
1. IS-IS Routers are send Hello PDUs to discover the neighbours and establish the
adjacency.
2. IS-IS adjacency is established ( mainly authentication, IS-type, MTU must
match)
3. LSPs are build by routers about their self and the learned adjacent routers
4. Routers send the LSPs to the adjacent routers.
5. All routers build their LSDB according to these LSPsBy SPF algorithm best
paths are calculated and routing table is build.
7. DIS (Designated IS)
• In ISIS network, LSDB databases must be syntonized. To do this, full mesh or
another solution is required. So, in IS-IS Protocol, one router is selected as DIS
(Designated IS)and DIS is used to reduce the adjacency in areas. It is like DR in
OSPF.
• Router with the highest priority and then the highest MAC address is elected as
DIS. The default DIS priority is 64. There is no BDR like OSPF. And like OSPF, if
you want to prevent the router to be DIS, you can set the priority 0. If a new router
added to the ISIS network, the election occurs again.This is not like this in OSPF.
8. IS-IS Protocol DIS Election
• DIS is used on multipoint-
to-multipoint topologies.
It is not used in point-to-
point topologies.
Separate DISs are
selected for Level 1 and
Level 2.
9. IS-IS Protocol NetworkTypes
• IS-IS Protocol supports two types of networks.These network are :
– Broadcast networks
– Point-to-Point networks
The other network types that is used in OSPF is not used in IS-IS Protocol.
• Different IIH Hellos are used for different network types while establishing
neighbour ship.
• In Broadcast networks IS-IS Protocol requires a full mesh topology. By selecting
DIS, full mesh is eliminated. DIS election is used in IS-IS broadcast networks.
10. IS-IS Cost
• Default IS-IS Protocol cost is 10 for all IS-IS Protocol links. But these costs can be
set to a different value per interface. For an interface, normally maximum 63 is
accepted as cost. But you an set this as 16,777,215 with the wide
metrics command.
Cost is advertised by the TLV fields in PDU.
Two routers can set different cost values to reach each other.
11. IS-IS Protocol Administrative Distance
• The administrative distance of all IS-IS routes are 115 for Cisco . But for Alcatel-
Lucent and Juniper, these administrative distance (preference) value is different.
Both vendor use four different value for both Level 1 and Level 2 routers and for
both internal and external routes.These are:
– IS-IS Level 1 internal route = 15
– IS-IS Level 2 internal route = 18
– IS-IS Level 1 external route = 160
– IS-IS Level 2 external route = 165
• If you want one route not to be used in the route calculation, you can set the the
administrative distance manually to 255.
12. IS-IS Protocol Authentication
• In IS-IS Protocol, by default there is no authentication. But you can set two types
of authentication.These authentications types are:
– Simple
– MD5
• With authentication in Hello packets, you can secure Hello Packets and it
determines whether a adjacency is established or not between these routers.
• With authentication in LSPs, it allows the remote router to read theTLV fields and
according to this information it does the SFP calculation.
13. IS-IS ProtocolTimers
• IS-IS Protocol has some timers like other routing protocols. In IS-IS Protocol,
modifying default timer settings is recommended because modifying these timers
make your IS-IS Protocol better.
These timers are given below:
– Lsp-refresh timer
– Max-lsp-lifetime
– Prc-interval
– Spf-interval
– Hello-interval
– Hello-multiplier
– Isis-retransmit-interval
– Csnp-interval