Modern IP networks are complex entities that require constant maintenance and care. Similarly, constructing a new network comes with a high amount of upfront cost, planning, and risk. Unlike the disciplines of software and hardware engineering, networking and IT professionals lack an expressive and useful certification language that they can use to verify that their work is correct. When installing and maintaining networks without a standard for describing their behavior, teams find themselves prone to making configuration mistakes. These mistakes can have real monetary and operational efficiency costs for organizations that maintain large networks.In this research, the Network Certification Description Language (NETCDL) is proposed as an easily human readable and writeable language that is used to describe network components and their desired behavior. The complexity of the grammar is shown to rank in the top 5 out of 31 traditional computer language grammars, as measured by metrics suite. The language is also shown to be able to express the majority of common use cases in network troubleshooting. A workflow involving a certifier tool is proposed that uses NETCDL to verify network correctness, and a reference certifier design is presented to guide and standardize future implementations.
- Prashant S. Soman has over 2 years of experience in the mobile and wireless communication industry, with expertise in network stack deployment, troubleshooting, and design of wireless and VoIP systems.
- He currently works as a Customer Engineer at Qualcomm Technologies, providing support to carriers and OEMs from solution design to product deployment.
- He led the invention of a patent-pending technology for power-efficient network search by mobile devices.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
This resume summarizes John Lee's background and experience. He has over 10 years of experience in embedded systems development involving both hardware and software. He has a PhD in wireless communications and has published several papers. His areas of expertise include wireless networks, security, and embedded device and VoIP product development. He is currently seeking new opportunities in Canada where he has immigrated to.
Juan Figueroa has over 10 years of experience in network administration and design. He is highly skilled in protocols like RIP, EIGRP, OSPF, MPLS, and BGP. He has managed mission-critical networks and holds certifications including CCNP, CCDP, CCNA Security, and CCIE Routing & Switching. Figueroa has extensive experience designing, implementing, and troubleshooting complex network infrastructures.
George Bates has over 20 years of experience in the IT and telecommunications fields. He has extensive expertise in networking, IP technologies, and mobility products integration and testing. Currently he works as the Transport Test Lead for Alcatel-Lucent, leading testing of small cell features and Ethernet, IPv4, IPv6, and IPsec transport. Previously he held roles testing LTE, CDMA, and EVDO technologies and networks. He has a proven track record of managing projects, resolving complex issues, and training others.
Hu Minfeng has over 20 years of experience in software development and system design. He has a Ph.D. in Electronic Science and Technology and expertise in C/C++, Golang, Linux, and databases. Currently he is a senior system designer at ZTE Corporation where he leads projects involving virtualization, Kubernetes, and NFV/SDN technologies. Previously he worked at Lucent Technologies and has comprehensive experience across the telecommunications field.
Robert L. Clark has over 30 years of experience in data systems, telecommunications, electronics engineering, and project management. He has held various roles including field engineer, senior field engineer, implementation specialist, senior consultant, and senior engineer. He has extensive experience designing, implementing, and managing networks and projects for companies such as Level 3, T-Mobile, Bell South, British Telecommunications, and Bank of America. He has expertise in IP networking, WAN technologies, routing, switching, and various networking protocols.
This individual has over 20 years of experience leading technology projects and managing complex IT infrastructure for government organizations. They have expertise in areas such as data center design, software installation, strategic planning, virtualization, and team leadership. Notable accomplishments include reducing government fees by over $100k and receiving awards for outstanding work from previous employers. Currently they are a lead engineer at Technica working on projects like upgrading infrastructure and encrypting workstation hard drives.
- Prashant S. Soman has over 2 years of experience in the mobile and wireless communication industry, with expertise in network stack deployment, troubleshooting, and design of wireless and VoIP systems.
- He currently works as a Customer Engineer at Qualcomm Technologies, providing support to carriers and OEMs from solution design to product deployment.
- He led the invention of a patent-pending technology for power-efficient network search by mobile devices.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
This resume summarizes John Lee's background and experience. He has over 10 years of experience in embedded systems development involving both hardware and software. He has a PhD in wireless communications and has published several papers. His areas of expertise include wireless networks, security, and embedded device and VoIP product development. He is currently seeking new opportunities in Canada where he has immigrated to.
Juan Figueroa has over 10 years of experience in network administration and design. He is highly skilled in protocols like RIP, EIGRP, OSPF, MPLS, and BGP. He has managed mission-critical networks and holds certifications including CCNP, CCDP, CCNA Security, and CCIE Routing & Switching. Figueroa has extensive experience designing, implementing, and troubleshooting complex network infrastructures.
George Bates has over 20 years of experience in the IT and telecommunications fields. He has extensive expertise in networking, IP technologies, and mobility products integration and testing. Currently he works as the Transport Test Lead for Alcatel-Lucent, leading testing of small cell features and Ethernet, IPv4, IPv6, and IPsec transport. Previously he held roles testing LTE, CDMA, and EVDO technologies and networks. He has a proven track record of managing projects, resolving complex issues, and training others.
Hu Minfeng has over 20 years of experience in software development and system design. He has a Ph.D. in Electronic Science and Technology and expertise in C/C++, Golang, Linux, and databases. Currently he is a senior system designer at ZTE Corporation where he leads projects involving virtualization, Kubernetes, and NFV/SDN technologies. Previously he worked at Lucent Technologies and has comprehensive experience across the telecommunications field.
Robert L. Clark has over 30 years of experience in data systems, telecommunications, electronics engineering, and project management. He has held various roles including field engineer, senior field engineer, implementation specialist, senior consultant, and senior engineer. He has extensive experience designing, implementing, and managing networks and projects for companies such as Level 3, T-Mobile, Bell South, British Telecommunications, and Bank of America. He has expertise in IP networking, WAN technologies, routing, switching, and various networking protocols.
This individual has over 20 years of experience leading technology projects and managing complex IT infrastructure for government organizations. They have expertise in areas such as data center design, software installation, strategic planning, virtualization, and team leadership. Notable accomplishments include reducing government fees by over $100k and receiving awards for outstanding work from previous employers. Currently they are a lead engineer at Technica working on projects like upgrading infrastructure and encrypting workstation hard drives.
Hegel Durocher has over 15 years of experience in IT support roles, including software support engineer, systems engineer, and network administrator. He is proficient in Windows server administration, SQL Server, virtualization software like VMware and Hyper-V, and networking. He currently works as a software support engineer for Siemens Energy USA, where he provides expert support for process safety software.
Donald Berk is a senior technical writer with over 15 years of experience in the telecommunications industry. He has worked for companies such as AT&T, Lucent Technologies, ZTE USA, and Ericsson, where he created and edited documentation for users, engineers, and customers. These documents include user guides, specifications, installation manuals, and presentations. Berk also has experience in quality assurance, automated testing, and project management. He holds a Ph.D. in Physics and technical certifications in IP networking.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document provides an overview of software engineering concepts covered in lecture notes. It discusses the software development life cycle (SDLC) which includes key stages like requirements gathering, design, coding, testing, integration and maintenance. The SDLC framework aims to develop software efficiently using a well-defined process. Software engineering principles like abstraction and decomposition are used to reduce complexity when developing large programs.
Ahmed Hassan Moustafa Mahmoud is seeking a job in the technology sector with experience in LTE protocol stack software engineering and embedded software development. He has over 9 years of experience in these fields, most recently as an LTE RRC protocol stack software engineer at Intel Mobile Communications in India and previously in Egypt. Prior to that, he held embedded software roles at El Sewedy Electrometer Egypt including as an embedded software team leader and senior embedded software engineer. He has a Bachelor's degree in Electronics and Communications Engineering from Cairo University.
Harvinder Singh has nearly 20 years of experience in project management, software development, and testing. He has managed teams of up to 70 people and led projects involving requirements gathering, design, development, testing and implementation. Some of his responsibilities have included planning projects, monitoring schedules and budgets, ensuring quality standards are met, and mentoring team members. He has deep experience in domains like telecommunications, networking, billing and cloud computing.
Sagar Ware has over 9 years of experience in the VOIP domain working with companies like TATA Elxsi, Avaya, and Polycom. He has extensive experience in C/C++ and networking protocols like SIP, H323, and BFCP. He has worked as a team lead and individual contributor on projects involving VOIP devices, telepresence solutions, and docking stations. His roles have included requirements gathering, documentation, estimates, implementations, testing, and customer support.
Ashish Ranjan Singh is seeking a middle level position utilizing his 2+ years of experience in telecom, IT software, and services. He has experience developing SIP networks and mapping, administering Cisco networks, understanding IMS, Linux, C++, Python, SQL, and has worked on projects involving intelligent networks and fiber to the home networks. His responsibilities included developing mappings, preparing test cases, enhancing existing systems, service deployment, administration, and generating reports.
This document is a resume for Torben Verdich, detailing his 20 years of experience in IT systems architecture, project management, and technical support. Some of the key experiences mentioned include managing upgrades to virtualize servers and encrypt hard drives for the FBI, software account management for the NGA, and leading engineering projects involving VMware, SCOM, and BigFix for various other government organizations. The resume emphasizes Verdich's leadership skills and experience with a wide range of technologies, platforms, and vendor products.
This document contains a summary of Bikram Kishor Rout's resume. It outlines his experience working as a Business Intelligence delivery specialist for 9 years. It lists his technical skills including programming languages like C, C++, Perl, and databases like Oracle. It also provides details of several projects he has worked on for clients like Infosys, DNB Bank, Neptune Oriented Lines, and Hitachi Network, focusing on areas like data warehousing, business intelligence, and network monitoring.
1. This position is for a NOC Linux Engineer in Bangalore, India with 2-4 years of experience. Key responsibilities include monitoring a network of 100,000 Linux servers using an internal management system, responding to alerts, troubleshooting issues, and escalating complex problems. Strong Linux and networking skills are required along with experience working in a NOC. The ideal candidate will have strong communication and problem-solving abilities.
2. This position is for an Instructional Designer in Bangalore, India. The role involves analyzing learning needs, designing training content using various methods, and developing materials using tools like Articulate and Captivate
Mohd. Arif Khan is a senior software engineer with over 3 years of experience seeking new opportunities. He has expertise in embedded software development, wireless communication systems, and Linux. Some of his key skills include C programming, Linux, networking protocols, and wireless technologies like 802.11 and LTE. He has worked on projects involving device driver development, protocol implementation, and integration of various communication modules.
James E. Biga has over 20 years of experience in logistics engineering and program management for space situational awareness and missile defense programs. He currently performs testing and evaluation of new OPIR systems at Falcon Shield in support of the JRDC contract. Previously, he served as the logistics/deployment lead for several space situational awareness programs, developing requirements documentation and overseeing system deployments. He has also held positions as a field engineer, depot manager, and assistant training manager on programs such as JTAGS, SBIRS, and ALERT.
DeAnna Regalbuto has over 30 years of experience in systems engineering, including managing software development projects and improving processes. She has worked on projects for NGC, Lockheed Martin, and Honeywell. She obtained a master's degree in systems engineering and is an Associate Systems Engineer Professional. She also advocated successfully for her daughter who had a birth defect.
Pushpa Sarkar is a technical lead seeking a challenging position utilizing her 5 years of experience in C and Linux development for LTE core networks. She has expertise in GTP protocols, Linux, networking, and debugging performance issues. As technical lead for an MME project, she solves bugs and provides runtime support. Previously she developed SGW/PGW software and enhanced features like IPv6, HA, and lawful interception.
Raviprakash Singh has over 2 years of experience in software testing. He has expertise in manual testing, test automation using tools like JMeter and Rest Client, defect tracking with Jira, and preparing test cases and status reports. He has experience testing desktop virtualization, telecom gateway, and web services projects. Raviprakash holds a B.Tech in computer science and has skills in programming languages like C and Python, databases like MySQL, and protocols like SIP. He is proficient in test methodologies and the software development life cycle.
Unsustainable Regaining Control of Uncontrollable AppsCAST
The ever-growing cost to maintain systems continues to crush IT organizations robbing their ability to fund innovation while increasing risks across the organization. There are, however, some tactics to reduce application total ownership cost, reduce complexity and improve sustainability across your portfolio.
This document proposes an approach to creating cyber resiliency using emerging technologies and network architectures. It identifies key technologies like deep packet inspection, application performance management, and control plane architectures that can be leveraged to build more resilient networks. The document then illustrates an example architecture and proposes validating cyber resiliency solutions using academic network infrastructure to test solutions on real networks at scale.
A VNF modeling approach for verification purposesIJECEIAES
Network Function Virtualization (NFV) architectures are emerging to increase networks flexibility. However, this renewed scenario poses new challenges, because virtualized networks, need to be carefully verified before being actually deployed in production environments in order to preserve network coherency (e.g., absence of forwarding loops, preservation of security on network traffic, etc.). Nowadays, model checking tools, SAT solvers, and Theorem Provers are available for formal verification of such properties in virtualized networks. Unfortunately, most of those verification tools accept input descriptions written in specification languages that are difficult to use for people not experienced in formal methods. Also, in order to enable the use of formal verification tools in real scenarios, vendors of Virtual Network Functions (VNFs) should provide abstract mathematical models of their functions, coded in the specific input languages of the verification tools. This process is error-prone, time-consuming, and often outside the VNF developers’ expertise. This paper presents a framework that we designed for automatically extracting verification models starting from a Java-based representation of a given VNF. It comprises a Java library of classes to define VNFs in a more developer-friendly way, and a tool to translate VNF definitions into formal verification models of different verification tools.
This document provides a summary of Appaji Koppula's professional experience, including his current role as a Senior Software Development Engineer at Cisco Systems since January 2013. It also outlines his previous roles at Citrix R&D India, Juniper Networks, and Intoto Software, with descriptions of some representative projects he worked on in each role. These projects involved areas such as routing, virtual private networks, intrusion detection, and domain name resolution. The document concludes by listing Appaji Koppula's education qualifications, including a Master of Science in Software Systems from BITS Pilani and a Master of Business Administration from Icfai University.
Hegel Durocher has over 15 years of experience in IT support roles, including software support engineer, systems engineer, and network administrator. He is proficient in Windows server administration, SQL Server, virtualization software like VMware and Hyper-V, and networking. He currently works as a software support engineer for Siemens Energy USA, where he provides expert support for process safety software.
Donald Berk is a senior technical writer with over 15 years of experience in the telecommunications industry. He has worked for companies such as AT&T, Lucent Technologies, ZTE USA, and Ericsson, where he created and edited documentation for users, engineers, and customers. These documents include user guides, specifications, installation manuals, and presentations. Berk also has experience in quality assurance, automated testing, and project management. He holds a Ph.D. in Physics and technical certifications in IP networking.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document provides an overview of software engineering concepts covered in lecture notes. It discusses the software development life cycle (SDLC) which includes key stages like requirements gathering, design, coding, testing, integration and maintenance. The SDLC framework aims to develop software efficiently using a well-defined process. Software engineering principles like abstraction and decomposition are used to reduce complexity when developing large programs.
Ahmed Hassan Moustafa Mahmoud is seeking a job in the technology sector with experience in LTE protocol stack software engineering and embedded software development. He has over 9 years of experience in these fields, most recently as an LTE RRC protocol stack software engineer at Intel Mobile Communications in India and previously in Egypt. Prior to that, he held embedded software roles at El Sewedy Electrometer Egypt including as an embedded software team leader and senior embedded software engineer. He has a Bachelor's degree in Electronics and Communications Engineering from Cairo University.
Harvinder Singh has nearly 20 years of experience in project management, software development, and testing. He has managed teams of up to 70 people and led projects involving requirements gathering, design, development, testing and implementation. Some of his responsibilities have included planning projects, monitoring schedules and budgets, ensuring quality standards are met, and mentoring team members. He has deep experience in domains like telecommunications, networking, billing and cloud computing.
Sagar Ware has over 9 years of experience in the VOIP domain working with companies like TATA Elxsi, Avaya, and Polycom. He has extensive experience in C/C++ and networking protocols like SIP, H323, and BFCP. He has worked as a team lead and individual contributor on projects involving VOIP devices, telepresence solutions, and docking stations. His roles have included requirements gathering, documentation, estimates, implementations, testing, and customer support.
Ashish Ranjan Singh is seeking a middle level position utilizing his 2+ years of experience in telecom, IT software, and services. He has experience developing SIP networks and mapping, administering Cisco networks, understanding IMS, Linux, C++, Python, SQL, and has worked on projects involving intelligent networks and fiber to the home networks. His responsibilities included developing mappings, preparing test cases, enhancing existing systems, service deployment, administration, and generating reports.
This document is a resume for Torben Verdich, detailing his 20 years of experience in IT systems architecture, project management, and technical support. Some of the key experiences mentioned include managing upgrades to virtualize servers and encrypt hard drives for the FBI, software account management for the NGA, and leading engineering projects involving VMware, SCOM, and BigFix for various other government organizations. The resume emphasizes Verdich's leadership skills and experience with a wide range of technologies, platforms, and vendor products.
This document contains a summary of Bikram Kishor Rout's resume. It outlines his experience working as a Business Intelligence delivery specialist for 9 years. It lists his technical skills including programming languages like C, C++, Perl, and databases like Oracle. It also provides details of several projects he has worked on for clients like Infosys, DNB Bank, Neptune Oriented Lines, and Hitachi Network, focusing on areas like data warehousing, business intelligence, and network monitoring.
1. This position is for a NOC Linux Engineer in Bangalore, India with 2-4 years of experience. Key responsibilities include monitoring a network of 100,000 Linux servers using an internal management system, responding to alerts, troubleshooting issues, and escalating complex problems. Strong Linux and networking skills are required along with experience working in a NOC. The ideal candidate will have strong communication and problem-solving abilities.
2. This position is for an Instructional Designer in Bangalore, India. The role involves analyzing learning needs, designing training content using various methods, and developing materials using tools like Articulate and Captivate
Mohd. Arif Khan is a senior software engineer with over 3 years of experience seeking new opportunities. He has expertise in embedded software development, wireless communication systems, and Linux. Some of his key skills include C programming, Linux, networking protocols, and wireless technologies like 802.11 and LTE. He has worked on projects involving device driver development, protocol implementation, and integration of various communication modules.
James E. Biga has over 20 years of experience in logistics engineering and program management for space situational awareness and missile defense programs. He currently performs testing and evaluation of new OPIR systems at Falcon Shield in support of the JRDC contract. Previously, he served as the logistics/deployment lead for several space situational awareness programs, developing requirements documentation and overseeing system deployments. He has also held positions as a field engineer, depot manager, and assistant training manager on programs such as JTAGS, SBIRS, and ALERT.
DeAnna Regalbuto has over 30 years of experience in systems engineering, including managing software development projects and improving processes. She has worked on projects for NGC, Lockheed Martin, and Honeywell. She obtained a master's degree in systems engineering and is an Associate Systems Engineer Professional. She also advocated successfully for her daughter who had a birth defect.
Pushpa Sarkar is a technical lead seeking a challenging position utilizing her 5 years of experience in C and Linux development for LTE core networks. She has expertise in GTP protocols, Linux, networking, and debugging performance issues. As technical lead for an MME project, she solves bugs and provides runtime support. Previously she developed SGW/PGW software and enhanced features like IPv6, HA, and lawful interception.
Raviprakash Singh has over 2 years of experience in software testing. He has expertise in manual testing, test automation using tools like JMeter and Rest Client, defect tracking with Jira, and preparing test cases and status reports. He has experience testing desktop virtualization, telecom gateway, and web services projects. Raviprakash holds a B.Tech in computer science and has skills in programming languages like C and Python, databases like MySQL, and protocols like SIP. He is proficient in test methodologies and the software development life cycle.
Unsustainable Regaining Control of Uncontrollable AppsCAST
The ever-growing cost to maintain systems continues to crush IT organizations robbing their ability to fund innovation while increasing risks across the organization. There are, however, some tactics to reduce application total ownership cost, reduce complexity and improve sustainability across your portfolio.
This document proposes an approach to creating cyber resiliency using emerging technologies and network architectures. It identifies key technologies like deep packet inspection, application performance management, and control plane architectures that can be leveraged to build more resilient networks. The document then illustrates an example architecture and proposes validating cyber resiliency solutions using academic network infrastructure to test solutions on real networks at scale.
A VNF modeling approach for verification purposesIJECEIAES
Network Function Virtualization (NFV) architectures are emerging to increase networks flexibility. However, this renewed scenario poses new challenges, because virtualized networks, need to be carefully verified before being actually deployed in production environments in order to preserve network coherency (e.g., absence of forwarding loops, preservation of security on network traffic, etc.). Nowadays, model checking tools, SAT solvers, and Theorem Provers are available for formal verification of such properties in virtualized networks. Unfortunately, most of those verification tools accept input descriptions written in specification languages that are difficult to use for people not experienced in formal methods. Also, in order to enable the use of formal verification tools in real scenarios, vendors of Virtual Network Functions (VNFs) should provide abstract mathematical models of their functions, coded in the specific input languages of the verification tools. This process is error-prone, time-consuming, and often outside the VNF developers’ expertise. This paper presents a framework that we designed for automatically extracting verification models starting from a Java-based representation of a given VNF. It comprises a Java library of classes to define VNFs in a more developer-friendly way, and a tool to translate VNF definitions into formal verification models of different verification tools.
This document provides a summary of Appaji Koppula's professional experience, including his current role as a Senior Software Development Engineer at Cisco Systems since January 2013. It also outlines his previous roles at Citrix R&D India, Juniper Networks, and Intoto Software, with descriptions of some representative projects he worked on in each role. These projects involved areas such as routing, virtual private networks, intrusion detection, and domain name resolution. The document concludes by listing Appaji Koppula's education qualifications, including a Master of Science in Software Systems from BITS Pilani and a Master of Business Administration from Icfai University.
This document provides a summary of Joseph Jakowitz's qualifications and experience as a Network Engineer. It outlines his extensive technical skills and certifications in networking, systems administration, and information security. His experience includes roles as a Network Engineer, Network Operations Lead, Field Service Engineer, and System Administrator for various companies while stationed in Japan and providing support to U.S. military clients. He has a proven track record of maintaining network uptime, implementing improvements, and ensuring compliance with Department of Defense regulations.
This document summarizes a student's paper on using reinforcement learning for anomaly detection in software defined networks. The student aims to use machine learning techniques, specifically reinforcement learning, to make network traffic control decisions given certain network attack scenarios. The student's methodology involves using network statistics collected from an OpenFlow switch to define states for a reinforcement learning algorithm. The algorithm is deployed on the application plane of an SDN architecture and aims to identify anomalous traffic flows based on features like flow size and packet counts, then take actions through the controller to stop anomalous traffic from affecting the network. Initial testing of the approach showed potential for detecting ping flood and SYN flood attacks on the simulated network.
This document provides a summary of Lucky Bhandari's work experience and qualifications. He has over 10 years of experience in IT and ITES industries providing support for products, services, and implementing information solutions. He has expertise in areas such as networking, Active Directory, Office 365, PowerShell scripting, and virtualization. His roles have included technical lead, technical engineer, and technical account manager for Microsoft technologies where he has designed, deployed, and administered network infrastructures and Active Directory environments for clients.
IRJET- Implementation of Dynamic Internetworking in the Real World it DomainIRJET Journal
This document summarizes a study that implemented a dynamic internetworking in a real-world IT domain. The study created a network topology for an organization using Cisco Packet Tracer with routers, switches, computers and a DHCP server. It configured routing protocols, access control lists, authentication, VLANs and inter-VLAN routing. DHCP was configured to automatically assign IP addresses. Routing protocols like RIP, OSPF and EIGRP were configured between routers. Access control lists were used to filter traffic and provide security. Authentication ensured security and remote access was provided using telnet. VLANs divided the network into broadcast domains and inter-VLAN routing allowed communication between VLANs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
STUDY ON EMERGING APPLICATIONS ON DATA PLANE AND OPTIMIZATION POSSIBILITIESijdpsjournal
By programming both the data plane and the control plane, network operators can adapt their networks to
their needs. Thanks to research over the past decade, this concept has more formulized and more
technologically feasible. However, since control plane programmability came first, it has already been
successfully implemented in the real network and is beginning to pay off. Today, the data plane
programmability is evolving very rapidly to reach this level, attracting the attention of researchers and
developers: Designing data plane languages, application development on it, formulizing software switches
and architecture that can run data plane codes and the applications, increasing performance of software
switch, and so on. As the control plane and data plane become more open, many new innovations and
technologies are emerging, but some experts warn that consumers may be confused as to which of the many
technologies to choose. This is a testament to how much innovation is emerging in the network. This paper
outlines some emerging applications on the data plane and offers opportunities for further improvement
and optimization. Our observations show that most of the implementations are done in a test environment
and have not been tested well enough in terms of performance, but there are many interesting works, for
example, previous control plane solutions are being implemented in the data plane.
STUDY ON EMERGING APPLICATIONS ON DATA PLANE AND OPTIMIZATION POSSIBILITIES ijdpsjournal
By programming both the data plane and the control plane, network operators can adapt their networks to
their needs. Thanks to research over the past decade, this concept has more formulized and more
technologically feasible. However, since control plane programmability came first, it has already been
successfully implemented in the real network and is beginning to pay off. Today, the data plane
programmability is evolving very rapidly to reach this level, attracting the attention of researchers and
developers: Designing data plane languages, application development on it, formulizing software switches
and architecture that can run data plane codes and the applications, increasing performance of software
switch, and so on. As the control plane and data plane become more open, many new innovations and
technologies are emerging, but some experts warn that consumers may be confused as to which of the many
technologies to choose. This is a testament to how much innovation is emerging in the network. This paper
outlines some emerging applications on the data plane and offers opportunities for further improvement
and optimization. Our observations show that most of the implementations are done in a test environment
and have not been tested well enough in terms of performance, but there are many interesting works, for
example, previous control plane solutions are being implemented in the data plane.
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsSchneider Electric
Change management, software configuration training, and human error all impact the cost associated with substation automation engineering. Object-oriented engineering approaches as defined in the IEC 61850 standard represent significant cost savings when compared to traditional methods using hardwire and Distributed Network Protocol (DNP3). New multivendor system configuration tools are described that further reduce substation automation engineering costs.
2. Final Project Currency Conversion• Resource Appendix A• D.docxeugeniadean34240
2. Final Project: Currency Conversion
• Resource: Appendix A
• Due Date: Day 7 [Individual] forum
• Consolidate all the sections of the Currency Conversion development documentation:
requirements, design, and testing.
• Incorporate any changes recommended by the instructor.
• Post the assignment as an attachment.
8
Running Head: LAN TOPOLOGY DESIGN AND CABLING SPECIFICATIONS
Appendix B: Network Design Project Template
LAN Topology Design and Cabling Specifications
Theresa A. Nordling
IT 230 Computer Networking
Jay Latona
September 14th, 2008
Executive Summary
{complete during Week Nine}
Write 3-4 paragraphs describing the goals of the network design project, assumptions, pros and cons of the proposed solutions, and project constraints.
Cabling Specifications
{complete during Week Two}
Local Area Network (LAN) Topologies
{complete during Week Two}
Wide Area Network (WAN) Design
{complete during Week Four}
Network Protocols
{complete during Week Six}
Network Remote Access
{complete during Week Six}
Network Business Applications
{complete during Week Six}
Backup and Disaster Recovery
{complete during Week Eight}
Network Security
{complete during Week Eight}
The fictitious company chosen will be a small organization that specializes in merchant services. The fictitious company will deal with check verification, online payments, debit cards, and credit cards. In order for this fictitious company to accomplish these services, the company has established partnerships with major banks and financial institutions, The gained partnerships with the major banks and financial institutions allows access to the partner’s databases. The databases contain listings of people who are known to write bad checks and have abused the banks and other financial institutions online payment services. The company’s ability to access its partner’s databases is imperative to its success; ability in assisting merchants with payment processing at the point of sales. The specialized check verification process will prevent anywhere from 50 to 75% of returned checks, thus reducing fraud and returned checks before they happen. In addition to their check verification services, its online verification software has refined controls to inhibit people from stealing other client’s identities.
The small organization (company) is comprised of four separate departments, these four departments are essential in running an efficient, reliable, and secure network system These departments will be able to communicate with each other efficiently and keep the daily operations running successfully and accurate. The company will need to keep in mind the prevention of fraud, which is why the company designs a strong and reliable network security program. In case of program failure the networking program must provide network access to the majority of its employees through segment and sufficient cabling, thus eliminating the possibility of a decrease of productivity. With all.
This document provides a summary of a candidate's skills and experience. They have strong technical skills across both software and hardware, including experience with a wide range of platforms and technologies. They have worked effectively in both individual and leadership roles on various projects in different industries. Their expertise includes areas like networking, virtualization, cloud computing, IoT, and mobile development.
The document discusses implementing a hybrid SDN network at RAF Company by introducing SDN functionality into the wireless network segment. A Floodlight controller was installed on a virtual machine to optimize traffic forwarding and provide flexible allocation of wireless resources. Applications were developed to dynamically manage network security and control user throughput. The benefits of SDN for enterprises include network programmability, simplified management, reduced costs, and the ability to accelerate services to meet business needs.
1 SDEV 460 – Homework 4 Input Validation and BusineVannaJoy20
1
SDEV 460 – Homework 4
Input Validation and Business Logic Security Controls
Overview:
This homework will demonstrate your knowledge of testing security controls aligned with Input
validation and business logic. You will also use the recommended OWASP testing guide reporting format
to report your test findings.
Assignment: Total 100 points
Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions
or discussion:
1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)
The OWASP site list multiple approaches and examples for blackbox testing reflected XSS
vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and
describe 4 different examples that could be used for testing. Be sure to conduct additional
research for each example to provide your own unique test example. This most likely means you
will need to conduct some research on Javascript to make sure your syntax is correct.
2. Testing for Stored Cross site scripting (OTG-INPVAL-002)
The OWASP site list multiple approaches and examples for blackbox testing Stored XSS
vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2
different examples that could be used for testing. Be sure to conduct additional research for
each example to provide your own unique test example. This most likely means you will need to
conduct some research on Javascript to make sure your syntax is correct.
3. Testing for SQL Injection (OTG-INPVAL-005)
SQL Injection remains a problem in applications yet could easily fixed. The following SQL
statement is in an HTML form as code with the $ variables directly input from the user.
SELECT * FROM Students WHERE EMPLID='$EMPLID' AND EMAIL='$email'
Would a form or application that includes this code be susceptible to SQL Injection? Why?
What specific tests would you perform to determine if the applications was vulnerable?
How would you fix this problem? Be specific be providing the exact code in a Language of your choice.
(e.g. Java, PHP, Python …)
4. Test business logic data validation (OTG-BUSLOGIC-001)
While reviewing some Java code, an analysis provided the following code snippets that contain
logic errors. For each example, describe the issue and provide code that would fix the logical
error:
a.
2
int x;
x = x + 1;
System.out.println("X = " + x);
b.
for (i=1; i<=5; i++) ; {
System.out.println("Number is " + i);
}
c.
if ( z > d) ; {
System.out.println("Z is bigger");
}
d.
String m1="one";
String m2="two";
if(m1 == m2) {
System.out.println(“M1 is equal to M2”);
}
e. The formula for the area of a trapezoid is:
A = (b1+b2)/2 * h
The following Java code is the implementation. Fix the logical error
double area;
double base1 = 2.3;
double base2 = 4.8;
double height = 12.5;
area = base1 + base2/2.0 * ...
Advanced infrastructure for pan european collaborative engineering - E-collegXavier Warzee
This article presents challenges, visions, and solutions for a true Pan-
European collaborative engineering infrastructure that is a target of the IST project
E-COLLEG. The consortium aims at the definition of a transparent infrastructure
that will enable engineers from various domains to collaborate during the design of
complex heterogeneous systems.
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
This document contains a resume for Rajesh Chandra seeking a position utilizing his strong technical knowledge and skills developing codes. It summarizes his professional experience including over 4 years in IT with expertise in network administration, implementation, and troubleshooting. It also lists his qualifications including a Bachelor of Technology in Computer Science, 2 Master's degrees, and various technical certifications and training.
MPLS/SDN 2013 Intercloud Standardization and Testbeds - SillAlan Sill
This talk givens an overview of several multi-SDO and cross-SDO activities to promote and spur innovation in cloud computing. The focus is on API development and standardization, including testbeds, test use cases, and collaborative activities between organizations to create and carry out development and testing in this area. The focus is on work being pursued through the Cloud and Autonomic Computing Center at Texas Tech University, which is part of the US National Science Foundation's Industry/University Cooperative Research Center, and on work being done by standards organizations such as the Open Grid Forum, Distributed Management Task Force, and Telecommunications Management Forum in which the CAC@TTU is involved. A summary is also given of work to produce a new round of more detailed use cases suitable for testing by the US National Institute of Standards and Technology's Standards Acceleration to Jumpstart Adoption of Cloud Computing (SAJACC) working group, with brief mention also given to other related work going on in this area in other parts of the world. Background and other standards work is also mentioned.
Similar to NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGE (20)
THE USE OF VIRTUAL PRIVATE NETWORK IN THE CONTEXT OF “BRING YOUR OWN DEVICE” ...ijcsitcejournal
Using a Virtual Private Network (VPN) for remote work provides an added layer of security by encrypting
the internet connection. It helps protect sensitive data and prevents unauthorized access. With a VPN,
employees can securely access company resources and files from anywhere in the world. This allows for
greater flexibility in work arrangements and enables employees to collaborate seamlessly. Implementing a
VPN as a remote workplace solution can lead to cost savings for businesses. It eliminates the need for
physical office space and reduces expenses associated with commuting and travel.
While VPNs offer numerous benefits for remote work, it is crucial for organizations to implement proper
security measures and educate employees on best practices to realize this technology's full potential. This
article explores the change in the use of VPNs during and after the Covid-19 pandemic era. A short
literature review precedes the opinion of the information security community about the usage and role of
VPNs in efficiently securing information and information systems.
PANDEMIC INFORMATION DISSEMINATION WEB APPLICATION: A MANUAL DESIGN FOR EVERYONEijcsitcejournal
The aim of this research is to generate a web application from an inedited methodology with a series of
instructions indicating the coding in a flow diagram. The primary purpose of this methodology is to aid
non-profits in disseminating information regarding the COVID-19 pandemic, so that users can share vital
and up-to-date information. This is a functional design, and a series of screenshots demonstrating its
behaviour is presented below. This unique design arose from the necessity to create a web application for
an information dissemination platform; it also addresses an audience that does not have programming
knowledge. This document uses the scientific method in its writing. The authors understand that there is a
similar design in the bibliography; therefore, the differences between the designs are described herein; it
is very important to point out that this proposal can be taken as an alternative to the design of any web
application.
Library Information Retrieval (IR) System of University of Cyprus (UCY)ijcsitcejournal
Building an effective Information Retieval (IR) System for such a complex sector like a library, is indeed a challenging task. Creating this kind of applications, one must be aware of basic IR methodologies and structures used, as well as the User’s Experience requirements. Combining different technologies for creating different kinds of applications has been one of the major problems in software reuse. However, in recent years, many frameworks that offer a complete suite for developing cross-platform applications have been developed. In this paper, we present a combination of breakthrough technologies and frameworks for developing a Python based RestAPI, an Administrator’s side desktop application and a cross-platform application powered by Ionic, Angular, HTML and CSS, as the main IR tool of UCY’s library.
In this paper, a fruit image data set is used to compare the efficiency and accuracy of two widely used Convolutional Neural Network, namely the ResNet and the DenseNet, for the recognition of 50 different kinds of fruits. In the experiment, the structure of ResNet-34 and DenseNet_BC-121 (with bottleneck layer) are used. The mathematic principle, experiment detail and the experiment result will be explained through comparison.
PREDICTIVE MODEL FOR LIKELIHOOD OF DETECTING CHRONIC KIDNEY FAILURE AND DISEA...ijcsitcejournal
Fuzzy logic is highly appropriate and valid basis for developing knowledge-based systems in medicine for different tasks and it has been known to produce highly accurate results. Examples of such tasks include syndrome differentiation, likelihood survival for sickle cell anaemia among paediatric patients, diagnosis and optimal selection of medical treatments and real time monitoring of patients. For this paper, a Fuzzy logic-based system is untaken used to provide a comprehensive simulation of a prediction model for determining the likelihood of detecting Chronic Kidney failure/diseases in humans. The Fuzzy-based system uses a 4-tuple record comprising of the following test taken: Blood Urea Test, Urea Clearance Test, Creatinine Clearance test and Estimated Glomerular Filtrate
ate(eGFR).Understanding of the test was elicited from a private hospital in Ibadan through the help of an experienced and qualified nurse which also follows same test according to National Kidney Foundation. This knowledge was then used in the developing the simulated and rule-base prediction model using MATLAB software. The paper also follows the 3 major stages of Fuzzy logic. The results of fuzzification of variables, inference, model testing and defuzzification of variables was also presented. This in turn simplifies the complication involved in detecting Chronic Kidney failure/disease using Fuzzy logic based model.
NEURO-FUZZY APPROACH FOR DIAGNOSING AND CONTROL OF TUBERCULOSISijcsitcejournal
Tuberculosis is the second leading cause of death from an infectious disease worldwide, after the human
immunodeficiency virus. The main aim of this research work is to develop a Neuro-Fuzzy system for diagnosing tuberculosis. The system is structured with to accept symptoms with the help of three domain Medical expertise as inputs that are used to automatically generate rules that are injected in to the knowledge based where the system would use to make decisions and draw a conclusion. MATLAB 7.0 is used to implement this experiment using fuzzy logic and Neural Network toolbox. In this experiment linguistic variables are evaluated using Gaussian membership function. This system will offer potential assistance to medical practitioners and healthcare sector in making prompt decision during the diagnosis of tuberculosis. In this work basic emblematic approach using Neuro-fuzzy methodology is presented that describes a technique to forecast the existence of mycobacterium and provides support platform to researchers in the related field.
A STUDY ON OPTICAL CHARACTER RECOGNITION TECHNIQUESijcsitcejournal
Optical Character Recognition (OCR) is the process which enables a system to without human intervention
identifies the scripts or alphabets written into the users’ verbal communication. Optical Character
identification has grown to be individual of the mainly flourishing applications of knowledge in the field of
pattern detection and artificial intelligence. In our survey we study on the various OCR techniques. In this
paper we resolve and examine the hypothetical and numerical models of Optical Character Identification.
The Optical character identification or classification (OCR) and Magnetic Character Recognition (MCR)
techniques are generally utilized for the recognition of patterns or alphabets. In general the alphabets are
in the variety of pixel pictures and it could be either handwritten or stamped, of any series, shape or
direction etc. Alternatively in MCR the alphabets are stamped with magnetic ink and the studying machine
categorize the alphabet on the basis of the exclusive magnetic field that is shaped by every alphabet. Both
MCR and OCR discover utilization in banking and different trade appliances. Earlier exploration going on
Optical Character detection or recognition has shown that the In Handwritten text there is no limitation
lying on the script technique. Hand written correspondence is complicated to be familiar through due to
diverse human handwriting style, disparity in angle, size and shape of calligraphy. An assortment of
approaches of Optical Character Identification is discussed here all along through their achievement.
The International Journal of Computational Science, Information Technology an...ijcsitcejournal
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes articles on computational science, mathematical modeling, information technology, computer science, control and automation engineering. The goal of the journal is to bring together researchers from academia and industry in these fields and establish new collaborations. The journal focuses on technical and practical aspects of scientific computing, modeling and simulation, information technology, computer science, networks, communication engineering, control theory and automation.
SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERF...ijcsitcejournal
This paper proposes a semi-structured information retrieval model based on a new method for calculation
of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents)
method to quantify how two given texts are similar. This new method identifies elements of semi-structured
documents using elements descriptors. Each semi-structured document is pre-processed before the
extraction of a set of descriptors for each element, which characterize the contents of elements.It can be
used to increase the accuracy of the information retrieval process by taking into account not only the
presence of query terms in the given document but also the topology (position continuity) of these terms.
ON INCREASING OF DENSITY OF ELEMENTS IN A MULTIVIBRATOR ON BIPOLAR TRANSISTORSijcsitcejournal
In this paper we consider an approach to increase density of elements of a multivibrator on bipolar transistors.
The considered approach based on manufacturing a heterostructure with necessity configuration,
doping by diffusion or ion implantation of required areas to manufacture the required type of conductivity
(p or n) in the areas and optimization of annealing of dopant and/or radiation defects to manufacture more
compact distributions of concentrations of dopants. We also introduce an analytical approach to prognosis
technological process.
DESIGN OF FAST TRANSIENT RESPONSE, LOW DROPOUT REGULATOR WITH ENHANCED STEADY...ijcsitcejournal
Design and implementation of control systems for power supplies require the use of efficient techniques that
provide simple and practical solutions in order to fulfill the performance requirements at an acceptable cost.
Application of manual methods of system identification in determining optimal values of controller settings is
quite time-consuming, expensive and, sometimes, may be impossible to practically carry out. This paper
describes an analytical method for the design of a control system for a fast transient response, low dropout
(LDO) linear regulated power supply on the basis of PID compensation. The controller parameters are
obtained from analytical model of the regulator circuit. Test results showed good dynamic characteristics
with adequate margin of stability. This study shows that PID parameter values sufficiently close to optimum
can easily be obtained from analytical study of the regulator system. The applied method of determining
controller settings greatly reduces design time and cost.
OPTIMIZATION OF MANUFACTURING OF LOGICAL ELEMENTS "AND" MANUFACTURED BY USING...ijcsitcejournal
In this paper we introduce an approach to decrease dimensions of logical elements "AND" based on fieldeffect
heterotransistors. Framework the approach one shall consider a heterostructure with specific structure.
Several specific areas of the het
CHAOS CONTROL VIA ADAPTIVE INTERVAL TYPE-2 FUZZY NONSINGULAR TERMINAL SLIDING...ijcsitcejournal
In this paper, a novel robust adaptive type-2 fuzzy nonsingular sliding mode controller is proposed to
stabilize the unstable periodic orbits of uncertain perturbed chaotic system with internal parameter
uncertainties and external disturbances. This letter is assumed to have an affine form with unknown
mathematical model, the type-2 fuzzy system is used to overcome this constraint. A global nonsingular
terminal sliding mode manifold is proposed to eliminate the singularity problem associated with normal
terminal sliding mode control. The proposed control law can drive system tracking error to converge to
zero in finite time. The adaptive type-2 fuzzy system used to model the unknown dynamic of system is
adjusted on-line by adaptation law deduced from the stability analysis in Lyapunov sense. Simulation
results show the good tracking performances, and the efficiently of the proposed approach.
On optimization ofON OPTIMIZATION OF DOPING OF A HETEROSTRUCTURE DURING MANUF...ijcsitcejournal
We introduce an approach of manufacturing of a p-i-n-heterodiodes. The approach based on using a δ-
doped heterostructure, doping by diffusion or ion implantation of several areas of the heterostructure. After
the doping the dopant and/or radiation defects have been annealed. We introduce an approach to optimize
annealing of the dopant and/or radiation defects. We determine several conditions to manufacture more
compact p-i-n-heterodiodes
A H YBRID C RITICAL P ATH M ETHODOLOGY – ABCP (A S B UILT C RITICAL P ...ijcsitcejournal
The edge detection in an image has become an imminent process, with the edge of an image containing the
important information related to a particular image such as the pixel intensity value, m
inimal path
deciding factors, etc. This requires a specific methodology to guide in the detection of the edges, assign a
Critical Path with a minimal path set and their respective energy partitions. The basis for this approach is
the Optimized Ant Colony A
lgorithm [2], guiding through the various optimized structure in the edge
detection of an image. Here we have considered the scenario with respect to a Medical Image, as the
information contained in the obtained medical image is of high value and requires
a redundant loss in
information pertaining to the medical image obtained through various modalities. A proper plan with a
minimal set as Critical Path, analysis with respect to the Power partitions or the Energy partitions with the
minimal set, computation
of the total time taken by the algorithm to detect an edge and retrieve the data
with respect to the edge of a medical image, cumulatively considering the cliques, trade
-
offs in the intensity
and the number of iterations required to detect an edge in an
image, with or without the presence of
suitable noise factors in the image are the necessary aspects being addressed in this paper. This paper
includes an efficient hybrid approach to address the edge detection within an image and the consideration
of vari
ous other factors, including the Shortest path out of the all the paths being produced during the
traversing of the ants within a medical image, evaluation of the time duration empirically produced by the
ants in traversing the entire image. We also constr
uct a hybrid mechanism called ABCP (As Built Critical
Path) factor to show the deviation produced by the algorithm in covering the entire medical image, for the
metrics such as the shortest paths, computation time stamps obtained eventually and the planne
d
schedules.
A N APPROACH TO MODEL OPTIMIZATION OF MA N- UFACTURING OF EMI T TER - COUPLE...ijcsitcejournal
In this paper we consider an approach to optimiz
e
manufacturing elements of emitter
-
coupled logic. The
optimization
leads
to decreas
ing
dimensions of these elements.
Framework this pa
per we consider man
u-
facturing
these
elements of emitter
-
coupled logic
framework
a heterostructure with required configur
a
tion
.
After grown the heterostructure
the
required areas
have been doped
by diffusion or ion implant
a
tion
.
It is
attracted an interest
optimization of annealing of dopant and/or radiation defects
to decrease dimensions
of the considered elements
.
We co
n
sider
an approach
to make the optimization.
The modeling part based
on modified method of functional corrections, which
gives us possibili
ty to analyzed manufacturing the
elements of emitter
-
coupled logic
without crosslinking of solutions on interfaces between layers of heter
o-
stru
c
ture
A N E XQUISITE A PPROACH FOR I MAGE C OMPRESSION T ECHNIQUE USING L OSS...ijcsitcejournal
The imminent evolution in the field of medical imaging, telehealth and teleradiology services has been on a
significant rise with a dire need for a proficient structure for the compression of a DICOM (Digital
Imaging and Communications
in Medicine) standard medical image obtained through various modalities,
with clinical relevance and digitized clinical data, and various other diagnostic phenomena and the
progressive transmission of such a medical image over varying bandwidths. The data
loss redundancy
during the process of compression is to be maintained below the alarming level, meaning it is to be under
scanner without the loss of data/information. In this paper we present an efficient time bound algorithm
that utilizes a process flow
wherein multiple ROI sectors as well as the Non
-
ROI sector of the DICOM
image are considered in the algorithmic machine and the compression is done based upon a hybrid
compression algorithm by LZW & SPIHT encoder & decoder machines. The paper provides a m
agnitude of
the overall compression ratio involved in thus compressing the DICOM standard image. It also provides a
brief description about the PSNR values obtained after suitably compressing the image. We analyze the
various encoder scenarios and have pro
jected a suitable hybrid lossless compression algorithm that helps
in the retrieval of the data/information related to the image.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
NETCDL : THE NETWORK CERTIFICATION DESCRIPTION LANGUAGE
1. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
DOI: 10.5121/ijcsitce.2018.5301 1
NETCDL : THE NETWORK CERTIFICATION
DESCRIPTION LANGUAGE
Cody Hanson and Kristen R. Walcott
University of Colorado, Colorado Springs
ABSTRACT
Modern IP networks are complex entities that require constant maintenance and care. Similarly,
constructing a new network comes with a high amount of upfront cost, planning, and risk. Unlike the
disciplines of software and hardware engineering, networking and IT professionals lack an expressive and
useful certification language that they can use to verify that their work is correct. When installing and
maintaining networks without a standard for describing their behavior, teams find themselves prone to
making configuration mistakes. These mistakes can have real monetary and operational efficiency costs for
organizations that maintain large networks.
In this research, the Network Certification Description Language (NETCDL) is proposed as an easily
human readable and writeable language that is used to describe network components and their desired
behavior. The complexity of the grammar is shown to rank in the top 5 out of 31 traditional computer
language grammars, as measured by metrics suite. The language is also shown to be able to express the
majority of common use cases in network troubleshooting. A workflow involving a certifier tool is proposed
that uses NETCDL to verify network correctness, and a reference certifier design is presented to guide and
standardize future implementations.
KEYWORDS
Physical Network Testing, Automated Testing, Integration Testing
1. INTRODUCTION
Internet Protocol (IP) networks are complex entities that exist in a chaotic and dynamic
environment. A network is comprised of many pieces of advanced equipment, including routers,
switches, firewalls, and wireless access points. Other often overlooked components of a network
are the physical interconnects between devices, which include copper, fiber-optic cabling, and
wireless spectrum. Whether installing a new network, or maintaining and expanding an existing
one, ensuring that all devices are configured properly and in compliance with the intended
network design is not a trivial task. The network designer must carefully specify every aspect of
network construction, including routing protocols, IP subnetting and VLANs, link bandwidth
capacities, packet filtering and firewall rules, etc. Because of the myriad configuration options
available on modern equipment, it is highly likely that something will become misconfigured
during an install or upgrade, or business requirements were not clearly communicated to the
installation team. Networks are also subject to entropy as physical cabling degrades, hosts are
added and removed, additional routing and switching is deployed, and new traffic patterns
2. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
2
emerge. As a result, keeping a network in top shape is a process that takes a large amount of
energy and attention from talented IT and networking professionals.
High visibility into the state of a network, and high confidence that the information is accurate,
can be a great advantage for any organization. Visibility enables organizations to be more
effective in maintaining a highly performant network. Nearly all parts of a modern business rely
on network connectivity, and downtime at a site can be a costly loss of productivity. Maintaining
a detailed and accurate picture of a network is difficult in practice. As with any large system,
complexity invades and employees do their best to `just keep it working'. This introduces risk for
the network owner in the form of expensive downtime, poor performance, and difficulty in
upgrading and expanding their investment in the network. If an employee is afraid that they will
break something by working on an established network component, their effectiveness is
diminished. When undocumented and informal `tribal knowledge' about the state of the network
grows, teams become less effective as they grow and churn.
There currently does not exist an accessable tool that allows a network administrator to
systematically verify that a network or points of connectivity are behaving as intended.
Verification of proper network behavior is largely done with ad-hoc testing and improvised tools,
or troubleshot only as problems surface. It is common for a network team to plug their laptop or
workstation into a problem area and manually diagnose and triage problems. Sometimes
misconfigurations may lie unknown for a long time, until after a serious availability or security
incident. There are tools and software packages available that attempt to fill this niche, but they
often fall short on usability, and become their own costly system to maintain.
Professionals in the software and hardware design industries have been using Domain Specific
Languages (DSL's) for many years. From Hardware Description Languages (HDL's) that allow a
circuit designer to clearly define how they want their integrated circuit to behave, to a software
engineer who uses an automated test suite that can check for defects and regressions, these
languages help to encode the intent of a human expert into a format that can be consumed by a
machine. The machine can then assist with implementation, or verification of correctness, in a far
more efficient manner than a human.
In this work, we present the Network Certification Description Language (NETCDL), and an
associated network certification workflow. NETCDL is a DSL designed to allow a user to
expressively describe how a network should behave. A user of NETCDL expresses her
requirements as a NETCDL specification document, which is a series of statements that describe
the desired state of network connectivity. The document is then the input to a NETCDL certifier,
the software that can parse the NETCDL language and verify the document's assertions against a
live network connection.
The NETCDL language's simplicity and expressiveness are key metrics for evaluation. This is
because the intention is for NETCDL statements and certifiers to replace ad-hoc verification
methods that are often based on difficult to maintain programs and scripts. Network engineers do
not need to be programming experts in order to use NETCDL to check their networks for
correctness. NETCDL statements are simple and declarative, which removes the need for
complex syntax and program logic, and certifier software abstracts away the specifics of verifying
assertions about network states. Certifier design must ensure that certification is quick and
reliable, important properties for successful use on a live job site.
3. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
3
This research makes the following contributions:
• Developing a new technique for rigorous certification of network behavior;
• Describing the NETCDL language, and how it enables certification of networks;
• Demonstrating that the language is simple to understand, and supports the majority of
common use cases;
• Proposing a reference design for a NETCDL certifier, and how certifiers can become
important tools for network engineers.
In this work, the systems described are intended to be a new open standard which can be built
upon and extended by others. In order to meet this goal of openness, guides and resources for
implementers have been included, such as certifier standards and language grammars.
2. RELATED WORK
There has been a large amount of research in developing techniques for diagnosing problems and
improving operations. We will present several prior works that have influenced the creation of the
NETCDL language and certification concept.
Hardware Description Languages. Some of the most indispensable tooling used by hardware
engineers are Hardware Description Languages (HDL's), such as Verilog and VHDL. These
languages allow a hardware designer to assert how they want their circuit to behave. Languages
like Verilog [1] describe digital logic. The designer can assert that a block has the properties of an
adder, multiplier, memory, and many other fundamental units without needing to be concerned
about how they are implemented internally. The HDL file eventually will be input to a
synthesizer program which will translate the logical design into a physical circuit that can then be
manufactured. It is this high level of abstraction that network engineers could also find useful
while designing and maintaining their systems.
Software Testing. For many years the software development industry has enjoyed expressive and
useful languages that let engineers and designers describe how their software should behave.
Tests for software allow for unlimited flexibility when it comes to creating synthetic input data,
mocking and injecting dependencies, and making assertions about the outputs of a function or
system. Most common programming languages have their own ecosystem of tools for enabling
the user to write tests against the rest of their code.
A standout among these testing tools is one that allows software specifications to be written in
natural language. This tool is called Cucumber [14], a Behavior Driven Development (BDD)
framework mainly used for integration and feature acceptance testing. It allows product planners
and software designers to specify requirements in plain English, which are then matched to
sections of executable code that perform the test. Cucumber matches plain English descriptions
with the appropriate test definition files via pattern matching and regular expressions. These test
definition files are the computer code which actually performs the test.
Another software testing tool that seeks to be expressive and easy to use is Should.js [18], an
assertion library for Javascript that lets the user chain together english phrases that make testing
clear and easy to understand. Should.js is a clever and useful library that helps to bridge the gap
4. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
4
between computers and their human operators but remains a technical tool that would be difficult
for non-programmers to use and understand.
NETCDL aims to bring the expressiveness of Cucumber to a simple imperative language that
does not require the user to interact with computer code at all. Cucumber uses natural language in
addition to requiring computer code to be written, while NETCDL is only natural language. It is
preferrable for our plain language statements to be simply declarative in nature, and that software
be allowed to handle the details instead of a programmer. This is the purpose of the NETCDL
certifier software, to carry out the certification according to the statements defined by the user.
IT Automation and Behavior Driven Infrastructure. Behavior Driven Infrastructure (BDI) [16] is
the notion that rather than performing ad-hoc and incremental changes to get the computing and
network equipment into the required state, an administrator should instead describe how it should
behave with an IT automation framework. There are many of these frameworks to choose from,
and they each have their own dialect with which one can describe how machines and network
devices should be configured. The benefit of this approach is that the framework takes care of the
details of configuring the infrastructure, in order to conform to the specification. Examples of
these BDI frameworks include Chef [6], Puppet [20], SaltStack [24], and Ansible [5]. These have
all seen wide use within the system administration, operations, and developer communities.
BDI is an attractive deployment methodology, especially for large deployments, because it
automates and standardizes the mechanisms by which machines are managed and configured. If
attended to individually, servers might not have the right version of software, network
configurations could be incorrect, and distributed systems might not be wired together properly.
BDI and software testing tools can be used together [15]. Like Cucumber, BDI tools often do not
hide all of the complexity of what is being described. In order for BDI tools to function properly,
computer code must still be written and technical details must be attended to.
Existing Network Certification Tools and Software. Since networks and computers have existed,
tools have existed to help troubleshoot their problems. Some of these tools are dedicated
hardware. Others are software tools that are deployed on a general purpose computer and are
available with either commercial or open-source licenses. Nagios [11], for example, is a long
established and popular open-source framework that allows the user to set up monitoring and
alerting for the network services that they care about. The project cucumber-nagios [17] combines
the network monitoring capabilities of Nagios, with the expressiveness of Cucumber. Cucumber-
nagios is a Ruby library that allows the user to write Cucumber statements about how a network
resource should behave, and then have the test run with the output being in a format compatible
with an existing Nagios system. At the time of this writing, Cucumber-nagios appears to be
limited to testing with HTTP servers, and Secure Shell (SSH).
RANCID (the Really Awesome New Cisco Config Differ) [25] is a software system that can
monitor the configuration texts of a machine (such as a router) and alert users when something
about those configurations has changed. The information RANCID provides enables teams that
are better equipped to manage the complexity of a changing and dynamic set of configurations.
Changelog diffs and recored history provide extra information on on-the-fly configurations.
Network engineers often need to use interactive command line interfaces when configuring and
troubleshooting equipment. The interactive nature of these interfaces makes reliable large scale
5. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
5
configuration automation a challenge. It can be difficult to write a program that can simluate the
way a human would use an interactive command line program. Expect [21] is a technique
developed to solve this difficulty. An example use case for Expect would be to log in to many
devices and add a new firewall rule to all of them at once. This saves time and reduces the chance
of errors compared to manual configuration. Expect is a great example of a purpose built
language and technique that helps engineers better manage complexity in their networks, i.e.,
expect scripting.
Some commercially available tools designed to fill the network verification niche include the
LinkSprinter [8] and the OneTouch AT [9]. Both of these products partially accomplish what
NETCDL seeks to enable. The LinkSprinter has a simple `plug and play' model, where a small
number of essential connectivity checks are performed for each port that is tested, and tests
results are then sent to a central database for later analysis. The OneTouch AT has the ability to
visually" script various network connectivity checks that can be run quickly in a repeatable way.
Available checks on the OneTouch AT include ping, port open, HTTP server availability,
performance testing, and many others. A limitation of the OneTouch AT is that complex
assertions beyond the tests offered by the manufacturer are not possible. The LinkSprinter is
limited by the small number of checks it can perform, making it suitable only for basic
verification. NETCDL improves upon these products by giving the design of more complex tests
to the user, in addition to being an open standard.
Existing Network and Service Description Languages. The Network Description Language
(NDL) [26] uses the Resource Description Framework (RDF) [7] to create a standardized way to
model network connectity in IP networks. The NDL has three main entities: locations, devices,
and interfaces. Each of these have further properties describing them and how they relate to the
rest of the network topology.
Large and detailed XML documents, while a very useful tool for machines and automated
systems, are difficult for humans to read, and almost impossible to write correctly without some
computer support. The reason that tools like Cucumber have enjoyed success is that they are easy
to read and understand. NDL and the Network Markup Language are better suited to detailed
structural descriptions of networks, rather than the day to day troubleshooting and verifying of
their behavior, which are key use cases that NETCDL enables.
3. THE NETCDL LANGUAGE DESIGN
Certifying that a network conforms to a detailed specification enables network owners to have
confidence that their infrastucture will be available, performant, and secure. A key design goal of
NETCDL was to make this certification capability accessable to those without a background in
computer programming, or other technical languages. This is accomplished by designing the
language grammar to resemble English sentences and phrases, and limiting the use of special
symbols and other syntax typical of most programming languages. Complex multi-line statements
and expressions are also deliberately not included in the grammar.
3.1. Writing a NETCDL Specification
NETCDL statements let users describe how their network should behave. Each statement asserts
a single condition. A user collects many NETCDL statements into a NETCDL specification
6. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
6
document. This document then defines the aggregate behavior that will be evaluated by NETCDL
Certifier software, which is discussed in Section.
The user can tailor their specification documents to their specific needs. One user might create a
specification document per client connection point, such as each wall jack on an office floor, or
each WiFi access point in a building. This would afford very targeted and specific certification,
customized for each particular client machine. A different user might choose to write a smaller
number of NETCDL documents, one for each class of network access, or network device type.
These different classes could represent an unpriviledged user, an employee, or a highly
priviledged network administrator. Guest connectivity could be verified to be appropriately
limited, while a network administrator can be assured that all necessary access is present for them
to perform their duties.
Like most computer languages, NETCDL allows comment statements that are ignored by parsing
software, as well as the use of whitespace to group and organize statements. The format of a
comment is a line prefixed with #, similar to Python. NETCDL documents are great candidates to
be stored in a version control system because the history of a document and the associated
comments can inform the user of how the network is changing over time, and why.
Figure 1: Example Usage of the Define Statement
Sometimes it is important to verify that a particular network condition can not occur. To enable
negative assertions, most NETCDL statements can be negated using the should not phrase.
Negative assertions can be used to make sure certain machines cannot connect to each other, or
that sensitive network traffic is isolated. This is useful in the case of security auditing where
access restrictions need to be verified.
3.2. NETCDL Statements
Define Statements. Networking documentation is often studded with obscure notation, including
IP addresses, network ranges, and hostnames. Repeating these can clutter a specification
document and make it less maintainable. Like other languages with macros or named variables,
NETCDL enables the user to create their own aliases for important hosts and networks for
commonly referenced network locations.
Define statements start with the define keyword, followed by the define type: host or network.
The rest of the statement aliases two strings to each other. In the example in Figure 1,
192.168.1.1 is defined as MyRouter, MyPrinter will be translated to 192.168.1.2,
and HomeNetwork will be translated to the network prefix 192.168.1.0/24.
Once a user has defined an alias for a network or host, that alias can be used in any valid
grammar context where a domain name or IP address would be allowed, such as the target of a
7. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
7
ping test. Adding a layer of indirection helps to future-proof the certification document against IP
address changes.
VLAN and Link Statements. Certain misconfigurations such as VLAN and link mis-
configurations are easy to fix, but can prevent all other network operations from proceeding. If
these settings are misaligned with what the connecting device expects, performance of the link
could suffer, or the transmission of traffic may be interrupted. Any connectivity troubleshooting
or verification should begin with checking these fundamental settings. VLAN and link Statements
help to verify these basic layer-2 configurations.
Connected link bitrate and duplex refer to auto-negotiated settings for how traffic is transmitted
through the transmission medium. Verifying duplex and bitrate are important because they ensure
that the link behaves optimally. NETCDL allows the user to specify two duplex modes (full or
half), and a bitrate specified in megabits per second (the most common settings being 100 Mb/s
and 1000 Mb/s).
VLAN's are logical partitions of an IP network. Modern networking hardware can have a
different VLAN assigned to every single port, so it is a common mistake to have a port belonging
to the wrong access VLAN. Verifying the access VLAN of a client port is useful because it can
have adverse security or connectivity implications. VLAN's are identified by an integer VLAN
ID, either in the header of a packet or by special broadcasts sent from routers and switches.
Figure 2: Example Usage of Link statements
Figure 3: Example Usage of DHCP Statements
In Figure 2 we can see that the desired access VLAN ID is 500, and expected duplex and speed
are specified as full and 1000 Mb/s. These statements can be easily negated using the should not
phrase in place of the keyword should.
DHCP Statements. Dynamic Host Configuration Protocol (DHCP) is commonly used to assign a
client machine an IP address, a default gateway (router), and DNS servers. When DHCP is
misconfigured or unavailable, these critical settings do not get set on the client, and connectivity
fails. DHCP servers are also extremely common (almost every consumer WiFi router contains a
8. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
8
DHCP server), and unauthorized ones can appear in a controlled environment when they are not
wanted.
DHCP Statements in NETCDL ensure that DHCP information comes from the correct source,
and that it is accurate. Verifying the identity of the DHCP server is important as well, because an
unauthorized DHCP server on a network that is responding to DHCP DISCOVER probes can
cause networks to behave erratically, and potentially be a security risk.
DHCP statements begin with the dhcp keyword, followed by the type of DHCP information to
verify: gateway, server, dns, or network. Then the common should or should not
phrase asserts the value of the DHCP element.
IPv4 network ranges are specified using the common notation format of network
number/bitmask, where bitmask is the number of mask bits in the network mask. IPv6 is not
officially supported in the initial version of the NETCDL grammar.
In Figure 3, a common home networking scenario is verified, along with a useful host define
statement.
DNS Statements. The Domain Name System (DNS) translates common network and domain
names into the underlying IP addresses that end up in the IP headers of packets. If DNS is
unavailable or misconfigured, even though the connection to the internet is established, most
users would be unable to complete their tasks.
NETCDL DNS statements can ensure that important names resolve, either to any address at all,
or to a specific address. This is important to verify that DNS records have propagated correctly
throughout the DNS system hierarchy, as well as to verify that the designated DNS servers are
reachable by clients.
Figure 4: Example Usage of DNS Statements
Figure 5: Example Usage of ping Statements
DNS statements begin with the domain name keyword, followed by the network name that will
be resolved using the DNS protocol. Then the user can specify if the name should resolve or not,
and optionally specify what they expect the name to resolve to. Finally, the IP, domain name, or
9. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
9
alias of the DNS server to use for the lookup is provided. Examples of the usage can be seen in
Figure 4.
Ping Statements. ping (ICMP Echo) is a commonly used technique for checking connectivity
between two hosts. The NETCDL ping statements let the user specify the ping target, and if the
ping should succeed or not. A user might want to use the ping statement in the negative case to
verify that a server is not reachable from an unsecured network. A ping is considered a success if
at least one response packet is received from the target. If no response is received, or a message
about the traffic being undeliverable or rejected, then ping is considered to have failed. While
ping is in some ways inferior to a Port Open test because ICMP Echo packets are often blocked
on modern networks, it remains a common tool that is often used by those in the networking field.
An example usage of the ping statement is demonstrated in Figure 5.
Port Open Statements. The majority of all network connected software operates using the
concept of `ports'. Port numbers direct traffic to the appropriate software listening on a server.
Ports are often `closed' by default (meaning that they reject traffic), and are commonly
misconfigured on the host machine. Many operating systems have all ports closed by default, as a
security practice. The most common protocols that use ports are the transport layer protocols TCP
and UDP.
TCP and UDP ports can be tested for connectivity on a server using the Port Open statement. This
is useful to verify because even if a server is reachable more generally (for example with an
ICMP Echo, or ping), traffic to a given application port may not be possible due to firewalls, or
software misconfiguration. Verifying a port is reachable, however, does not imply that the
underlying software that uses the port is configured properly. For example, if a host is reachable
on port 80, it does not necessarily ensure that the HTTP server functions correctly. Despite these
caveats, the Port Open statement is an important step in verifying proper network application and
firewall operation.
Figure 6: Example Usage of Port Open Statements
Figure 7: Example Usage of iperf Statements
Port Open statements are demonstrated in Figure 6. They specify the destination host, transport
protocol, and port number. Transport refers to either the TCP or UDP protocols. The standard
should/should not phrase also applies.
10. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
10
Bandwidth Testing Statements. Even if all connectivity is achieved, servers are up and running,
and all else is working perfectly, a network can suffer from poor throughput. This is especially
harmful for high bandwidth applications such as voice and video. Though available bandwidth
can depend on network utilization, router and switch misconfigurations can cause insufficient
bandwidth even on an idle network.
Bandwidth testing statements allow the user to specify an iperf [19] test to an Iperf server. iperf is
a widely used open-source tool that allows point-to-point bandwidth testing. An iperf test consists
of two hosts, one acting as server and the other as client. A client initiates a test by contacting the
server and specifying the parameters of the test, such as transport protocol, duration, target
bitrate, and direction. While iperf supports testing both TCP and UDP streams, NETCDL does
not specify the protocol in the language, so TCP is assumed. The target server is assumed to be
running a copy of the Iperf3 software on the default ports, or similar software that conforms to the
Iperf3 protocol.
iperf statements begin with the iperf keyword, followed by the direction of the test,
download or upload. Download means that the traffic flows from server to client, and upload
means the inverse. NETCDL certifiers are always iperf clients. Next, the Iperf server is
specified, followed by a should/should not clause. Finally, the expected bitrate of the transfer is
specified, in addition to a threshold clause, which specifies if the measured bitrate should be
higher or lower than the expected bitrate. Example usage can be seen in Figure 7.
A user might write statements like these to ensure that network performance is adequate for users.
In a different situation, such as a guest or shared network, the user might ensure that bandwidth
limits are being enforced, to prevent a single user from monopolizing network resources unfairly.
File Fetch Statements. NETCDL File Fetch Statements allow the user to exercise three of the
most common file transfer protocols, HTTP, FTP, and TFTP. HTTP and FTP are important
protocols to verify the operation of, because they are very popular among end users. TFTP can be
important to verify because it is commonly used to bootstrap and upgrade network equipment like
routers and switches.
File Fetch Statements begin with the protocol name and the keyword server, followed by the
location of the server, either an IP address, host alias, or DNS name. Next is a standard
`hould/should not clause. After that, the serve keyword along with the expected filename that
should be fetched from the remote server appear. Finally, the port number to connect on can be
specified, if desired. If no port is specified the default ports for the specific protocol are used.
Example usage can be found in Figure 8.
These statements are important because they can simulate the entire end to end user experience
for common network services. Merely verifying that a server is listening on the correct port does
not gaurantee that files can be served as expected. Security devices such as packet-inspecting
firewalls also can be fully exercised and tested by simulating real application layer traffic.
11. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
11
Figure 8: Example Usage of File Fetch Statements
Figure 9: Example Usage of traceroute Statement
Traceroute Statements. One of the more complex parts of computer networking is routing
between IP networks. Many routing protocols run on routers to dynamically build the forwarding
tables. Ensuring that routing behaves optimally is an important part of network verification. A
common tool used for this purpose is traceroute that probes and discovers the path by which the
traffic to a given destination travels. A network engineer can then determine if traffic is flowing
along the expected pathways.
NETCDL traceroute statements enable assertions about the path that a packet takes on its
way to a destination. This is useful for verifying that routing tables are configured properly, or to
ensure that no extra hops or loops are encountered. To use this statement, the user specifies the
traceroute target, and an ordered list of consecutive hops to verify, starting from the first hop.
traceroute for NETCDL is based on TCP, using decrementing time-to-live (TTL) counters in the
packet headers.
traceroute statments begin with the traceroute to keywords, followed by the target of
the test, a hostname, IP address, or host alias. Next the keywords should traverse are then
followed by an ordered, space-delimited list of routing hops, which can be hostnames, IP
addresses, or host aliases. Example usage can be seen in Figure 9.
Packet Capture Statements. One of the most powerful (and time consuming) techniques
network engineers have in their arsenal is to capture packets from a network and inspect them.
This gives a raw and unfiltered look at exactly what happened in a given network. Some common
questions that packet inspections can answer are: Did a machine respond with any packets at all?
Are certain types of packets detected? Are TCP/UDP port numbers configured properly? Is
outgoing application layer traffic properly formed?
12. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
12
Figure 10: Example Usage of Packet Capture Statements
Packet inspection is an indispensible tool for advanced users, but can often be difficult to wield
for less experienced users. NETCDL Packet and Frame statements allow the user to make
assertions about network traffic captured in a network. Assertions can be made about the presence
of:
• IP packet source and destination fields
• IP packet source or destination network ranges.
• IP packet type field values.
• TCP and UDP source and destination ports.
• Ethernet frame ethertype values.
There are four classes of statements: IP Packet Type assertions, Ethertype assertions, IP Packet
source/destination address assertions, and Transport protocol port assertions. Example usage can
be seen in Figure 10. A packet of a certain type is "seen" if it is present in the array of captured
packets and frames. The absence of a packet from a capture does not necessarily guarantee that a
packet of that type would never arrive. NETCDL Certifier implementation will determine the
packet capture duration. Longer captures are more likely to obtain a representative sample of
packets, but could cause certification to take more time.
For a complete overview of the NETCDL grammar and all available language features, please
refer to our website.
4. CERTIFIER DESIGN AND IMPLEMENTATION
Most computer languages are intended to be executed or evaluated in some way, whether by a
compiler, interpreter, or other software. For the NETCDL language this software is known as a
NETCDL Certifier. A certifier is a critical part of the workflow for NETCDL because it is the
agent by which the statements in a NETCDL document are evaluated in the real world. A user
provides a NETCDL document as input to a certifier that has a link to the network location under
test. The certifier parses the document, develops a plan to evaluate the assertions, and then carries
them out against the network interface. As certification proceeds, the certifier can render a
'pass/fail' verdict on whether the specification of the input document was met. This workflow is
illustrated in Figure 11.
13. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
13
Figure 11: NETCDL Certification Workflow
A well designed certifier should:
• Minimize the time required to evaluate the specification.
• Be as non-invasive as possible to the network under test (i.e. be a good steward of limited
resources).
• Provide helpful feedback to the user about network problems detected.
The initial reference implementation of the NETCDL certifier is meant to showcase the use of the
NETCDL Language and illustrate the new concept of certifying network connectivity. It is also
meant to serve as a guide for future certifier implementations. Others are encouraged to
implement their own certifier, taking into account the NETCDL Certifier Standards document
available on our website.
4.1. Certifier Operation
The certifier has three main tasks: (1) parse and verify the input as valid NETCDL statements, (2)
for each assertion in the input document, render a Pass/Fail result in a time efficient manner, and
(3) report the results of certification to the user.
After parsing the input according to the NETCDL grammar, the certifier will have everything it
needs to evaluate each NETCDL assertion. As seen in Figure 12, some tests can be considered
'active' while others would be 'passive', or 'non-active'. An example of an active test would be a
ping test (derived from the NETCDL ping statement); Traffic must be sent out the network
interface to attempt to elicit a response. An example of a passive test would be looking for the
presence of a particular type of packet. This passive test is merely searching through data that is
already collected. A key enabler for passive tests is the packet capture component. Every packet
and frame traversing the network interface under test is collected to be input for the Packet
Capture NETCDL statements. It is a smart optimization to listen for packets the entire duration of
certification, to gather as much traffic as possible to be data for the packet and frame assertions.
All test results (which are the truth values for the assertions of the specification document) are
collected into a final report to be displayed to the user, such as the one seen in Figure 13. In a
simple implementation, results may be printed to a console window, with color-coding to
correspond to 'green/passing' and 'red/failing'. More advanced implementations could be
presented to the user as well, including interactive diagnostic print-outs, or other useful graphical
user interfaces.
14. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
14
Another component of Figure 12 worth mentioning is the depiction of multiprocessing. It is a
common technique to divide work units in software amongst child processes or threads in order to
parallelize the workload, and take advantage of multiple CPU cores.
Figure 12: NETCDL Certifier Software Block Diagram
Figure 13: Example Certifier Command Line Output With Failing and Passing Statements
After certification is complete, the software should close all connections, release IP addresses,
and relinquish other resources that could be needed by real clients. It should also 'reset' itself in
order to be ready to carry out certification again on the next network connection point.
Reference Certifier Design Philosophy. In conjunction with the development of the NETCDL
language, this work presents a reference implementation of the first NETCDL certifier software.
Reference implementations are important because they provide a starting point for future work to
leverage, and a philosophical guide for future designs. The goal of this implementation was to
15. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
15
represent a 'minimum viable product' which sufficiently demonstrates all of the important
concepts of NETCDL.
The software was implemented using Python. While Python is cross platform, the initial version
of the software targets standard tooling available on the GNU/Linux Operating System.
Development of the software was done using Ubuntu 14.04. For full software version notes, see
our website.
4.2. Design Challenges
Optimizing Certification Performance. Fast and reliable certification is important for applications
in large networks and new installations. The number of connections that need to be certified could
be in the thousands. At this scale, if the software were able to reduce certification time by 15
seconds per link, for 1000 links, over four hours of idle time could be recouped. This is especially
important if the number of certifiers on a job site is limited, and certification tasks cannot be split
up among workers.
Fast certification speed is achieved by executing as many tasks in parallel as possible. This is
important because as the software needs to send packets to elicit responses from remote
machines, it is possible that we must wait for a timeout in case of no response. If dozens of
requests had to time out sequentially, certification would be unacceptably slow. Separate child
processes are used, rather than threads, one per Active Test. Multiple processes allow the tasks to
fail independently if necessary, which provides resilience. Inter-process message queues are used
to move data between the parent and child processes.
Further tuning for speed can be accomplished by minimizing timeout periods for non-responsive
servers, or building more advanced heuristics for knowing when a test is guaranteed to fail, and
then skip those tests. A test that talks to a web server would be guaranteed to fail for example if
our local router was unreachable.
The reference certifier implementation is open source and can be found on Github [12].
5. EVALUATION
The framework is evaluated with respect to two criteria: NETCDL Grammar Complexity, and
NETCDL Language Expressiveness.
A key goal of NETCDL is to be an approachable and simple to learn DSL. One way to
objectively measure these properties is to examine the language grammar. Grammars can be
analyzed by tools that generate standardized metrics which quantify the size, structure, and
complexity of a grammar. Because existing alternatives to NETCDL are mostly programming
and scripting languages, it is useful to make comparisons between their grammars.
Another important property of any tool is the ability to support common use cases within the
target domain and user base. We refer to this property as “Language Expressiveness." An
expressive language allows the speaker or writer to easily and fluently encode their ideas. In this
domain, these ideas are assertions about network behaviors that are important to network
engineers.
16. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
16
5.1. Evaluation of Language Complexity
Prior work in Grammar Engineering [4] show how we can take an objective approach to
designing and evaluating computer languages. Taking a quantitative approach to analyzing the
NETCDL language grammar and comparing it to other well known computer languages is a good
way to estimate how difficult the new language is to read and write for a human. The SdfMetz [3]
project provides software that can gather complexity metrics from a grammar expressed in the
Syntax Definition Formalism (SDF) [13] format. An SdfMetz environment was built using notes
and instructions from this prior research. Then the NETCDL Grammar was re-written using SDF,
in order to be compatible with the tools. SdfMetz was then used to analyze this equivalent SDF
grammar. To see the SDF version of the NETCDL grammar, please refer to our website.
Figure 14: NETCDL Grammar Diagram - Generated by SdfMetz
An initial depiction of grammar structure as evaluated by SdfMetz can be observed in Figure
14. This graphic of the NETCDL SDF grammar visualizes which grammar units are available,
and which rely on each other (indicated by lines with arrows). For example, the ShouldExpr
(should expression) is an important part of the language because it is relied on by many other
parts of the language, whereas the TraceRouteStatement is not relied on by any other parts
of the language. The width and height of this tree can also give us a qualitative view of the
grammar structure.
The most interesting analysis that SdfMetz can provide us about a grammar are the quantitative
metrics. Descriptions of the definitions and practical meaning of these metrics can be found in
Figure ??. These metrics were chosen as the ones for comparison because they are well known
and have been used historically to describe context free grammars. SdfMetz does support other
metrics, which were not used are part of the evaluation. Figure 15 contains the raw output of the
SdfMetz tool, including the abbreviations and descriptions of each metric.
To get an understanding of what these numbers mean in a practical sense, it is useful to compare
them to metrics from other well-known languages. Also present in the SdfMetz research is a data
set for other grammars that were examined by the tool. They include well known languages such
as C, C++, Java, PHP, Javascript, and Verilog, among others. The full dataset of 30 grammars,
was the standard of comparison for the NETCDL grammar metrics.
Table 1 summarizes the results of this comparison. The languages were ranked out of 31, with a
'lower' ranking denoting a better performance in a particular metric category. Another useful
comparison is to look at languages that were similar in score to NETCDL for a particular metric.
17. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
17
This lets us use our experience with these languages to get a sense of the complexity of NETCDL
in a qualitative way. For example, for the HEI metric, NETCDL was comparable to BibTex and
MatLab. These comparisons are also included in Table 1.
NETCDL metrics compared favorably to the majority of languages in the comparison dataset
from the SdfMetz research, and consistently ranked in the top 5 least complex languages for a
particular grammar. This lets us conclude that the NETCDL grammar achieved the goal of being
simpler than most popular programming languages. One reason that the TERM metric was one of
the worst performing metrics for NETCDL is due to the lack of use of symbols to denote syntax.
The higher number of terminals in NETCDL is due to the fact that NETCDL is almost entirely
made of English sentences, rather than relying on curly braces which are more easily `reused'
(thus keeping the terminal count low). While a quantitative approach cannot describe everything
about how a language feels to a user, by succeeding in minimizing the key indicators of language
complexity, NETCDL is in good position to be received as an easy to understand language.
18. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
18
5.2. Evaluation of Language Expressiveness
A language is only useful if it can be used by writers and speakers to convey their ideas. The
ideas in this context are the common network conditions that need to be certified. To objectively
measure this quality, we can compute the percentage of common use cases that the language
supports. To gather common use cases that network engineers and technicians might encounter in
the real world, authoritative texts on network design and troubleshooting were surveyed.
Figure 16: Selected Grammar Complexity Metrics and Meanings
Table 1: NETCDL Grammar Performance vs SdfMetz Grammar
Figure 17: Common Network Troubleshooting Use Cases
19. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
19
Two main bodies of networking expertise were referenced while gathering use cases. The first
was Interconnecting Cisco Network Devices, Part 1 and 2 [22], [23]. These are core training
materials that many network engineers reference while preparing for common industry
certifications, such as those offered by Cisco. They cover basics of network design and
construction, including theory that applies to networking in general. The second text that was
referenced was the Network Maintenance and Troubleshooting Guide [2], a book that represents
decades of expertise in network troubleshooting.
Table 17 summarizes the findings from the most common use cases found in the reference
network troubleshooting texts. Each row represents a common networking use case, and includes
a description, sources, and most importantly, whether the NETCDL Grammar as initially
designed supports it. A use case was considered supported if the language grammar could exprese
the case in addition to the reference certifier being able to evaluate it. For example, the
'Ping/ICMP Echo' use case is enabled by the NETCDL Ping statement and can be carried out by
the certifier.
By examining column 4 of Table 17 it can be seen that the NETCDL language was able to cover
68% (13/19) of the common use cases identified. The reason that some use cases were not able to
be supported was in part due to time limitations in development time, and in part due to hardware
limitations for the reference certifier. For example, it is difficult to conduct a full 'Physical
Cabling Fitness' test with consumer hardware. These measurements require complex and
expensive time-domain reflectometry devices, such as those produced by Fluke Networks [10].
Overall, NETCDL was able to cover a majority of the important networking tasks that network
engineers use in their daily work.
6. CONCLUSION AND FUTURE WORK
In this work, we develop the Network Certification Description Language (NETCDL), which
applies software systems that are well-known for their ease of use and adapts them for network
needs. In addition to the language, a reference design for a NETCDL certifier was presented,
along with guidelines and patterns for future implementers to leverage. We demonstrate that the
language meets the goals of simplicity and expressiveness. Objective measures of the language
grammar complexity compared favorably with the grammars of other well known computer
languages. These results support the claim that NETCDL was designed to be easy for humans to
read and write by minimizing relevant metrics. NETCDL was shown to support a majority of
common use cases as defined by well regarded network troubleshooting texts and guides, thus
supporting the claim of high language expressiveness.
In the tradition of other computer languages, advanced tooling may be developed that utilizes
NETCDL, such as automatic router and switch configuration. More broadly, as computers
continue to be critical to the lives of every person, natural language computing languages could
expand into other domains such as home automation and smart devices.
20. The International Journal of Computational Science, Information Technology and Control Engineering
(IJCSITCE) Vol.5, No.3, July 2018
20
REFERENCES
[1] Ieee standard for verilog hardware description language. IEEE Std 1364-2005 (Revision of IEEE Std
1364-2001), pages 1{560, 2006.
[2] N. Allen. Network Maintenance and Troubleshooting Guide: Field-tested Solutions for Everyday
Problems, 2nd Edition. Addison Wesley, Upper Saddle River, NJ, USA, 2010.
[3] T. L. Alves and J. Visser. Sdfmetz: Extraction of metrics and graphs from syntax definitions. on
Language Descriptions, Tools, and Applications, page 101, 2007.
[4] T. L. Alves and J. Visser. A case study in grammar engineering. In Software Language Engineering,
pages 285{304. Springer, 2008.
[5] Ansible. Ansible. http://www.ansible.com/home, October 2014.
[6] I. Chef Software. Chef - automation for web-scale it. http://www.getchef.com/chef, October 2014.
[7] W. W. W. Consortium. Resource description framework - w3c spec.
http://www.w3.org/TR/2014/REC-rdf11-concepts-20140225/, February 2014.
[8] F. Corporation. Linksprinter. http://www.linksprinter.com/, October 2014.
[9] F. Corporation. Onetouch at. http://www.flukenetworks.com/enterprise-network/network-
testing/OneTouch-AT-Network-Assistant, October 2014.
[10] F. Corporation. Versiv dsx-5000. http://www.flukenetworks.com/datacom-cabling/Versiv/DSX-5000-
Cableanalyzer, January 2017.
[11] N. Enterprises. Nagios - the industry standard in it infrastructure monitoring. http://www.nagios.org/,
November 2014.
[12] C. Hanson. Netcdl reference certifier. https://github.com/netcdl/netcdl, January 2017.
[13] J. Heering, P. R. H. Hendriks, P. Klint, and J. Rekers. The syntax definition formalism sdfreference
manual. ACM Sigplan Notices, 24(11):43{75, 1989.
[14] A. Hellesy. Cucumber: behaviour driven development with elegance and joy. http://cukes.info/,
October 2014.
[15] L. Holmwood. Behaviour driven infrastructure through cucumber.
http://fractio.nl/2009/11/09/behaviour-driven-infrastructure-through-cucumber/,November 2009.
[16] L. Holmwood. Behaviour driven infrastructure. http://www.slideshare.net/auxesis/behaviour-driven-
infrastructure, January 2011.
[17] L. Holmwood. Cucumber-nagios. https://github.com/auxesis/cucumber-nagios/, November 2014.
[18] T. Holowaychuk. Should.js. https://github.com/shouldjs/should.js, November 2016.
[19] E. B. N. Laboratory. iperf3. http://software.es.net/iperf/, November 2016.
[20] P. Labs. Puppet - automate it. http://puppetlabs.com/puppet/puppet-open-source, October 2014.
[21] D. Libes. expect: Curing those uncontrollable fits of interaction. In USENIX Summer, pages
183{192, 1990.
[22] S. McQuerry. Interconnecting Cisco Network Devices, Part 1 (ICND1). Cisco Press, Indianapolis IN,
USA, 2008.
[23] S. McQuerry. Interconnecting Cisco Network Devices, Part 2 (ICND2). Cisco Press, Indianapolis IN,
USA, 2008.
[24] Saltstack. Saltstack - fast, scalable and
exible systems management software for data center automation, cloud orchestration, server
provisioning, configuration management and more. http://www.saltstack.com, October 2014.
[25] I. Shrubbery Networks. Rancid - really awesome new cisco config differ.
http://www.shrubbery.net/rancid/, January 2014.
[26] J. J. Van der Ham, F. Dijkstra, F. Travostino, H. Andree, and C. T. de Laat. Using rdf to describe
networks. Future Generation Computer Systems, 22(8):862{867, 2006.