The purpose of this study was to gather data to better understand the attributes of OpenStack users who remain on Nova Networking rather than migrating to Neutron, and their primary reasons for doing so.
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
This document proposes algorithms to detect wormhole attacks in wireless network coding systems. It first discusses how wormhole attacks can severely impact network coding protocols by disrupting routing and introducing unfair workload distributions. It then presents a centralized algorithm that uses a central node to detect wormholes by measuring changes in expected transmission counts. For distributed systems without a central node, it proposes DAWN, a distributed algorithm that examines the order nodes receive innovative packets and their expected transmission counts to detect wormholes. The algorithms aim to detect wormholes using only local information available from regular network coding protocols to keep overhead low. Extensive testing validated the effectiveness and efficiency of the proposed approaches.
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
In Wireless Sensor Networks (WSNs), most
of the existing key management schemes, establish shared
keys for all pairs of neighbor sensor nodes without
considering the communication between these nodes.
When the number of sensor nodes in WSNs is increased
then each sensor node is to be loaded with bulky amount
of keys. In WSNs a sensor node may communicate with a
small set of neighbor sensor nodes. Based on this fact, in
this paper, an energy efficient Traffic-Aware Key
Management (TKM) scheme is developed for WSNs,
which only establishes shared keys for active sensors
which participate in direct communication. The proposed
scheme offers an efficient Re-keying mechanism to
broadcast keys without the need for retransmission or
acknowledgements. Numerical results show that proposed
key management scheme achieves high connectivity. In
the simulation experiments, the proposed key
management scheme is applied for different routing
protocols. The performance evaluation shows that
proposed scheme gives stronger resilence, low energy
consumption and lesser end to end delay.
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: kitechsolutions.in@gmail.com
The document provides an overview of the Geeks Artificial Neural Network (G.A.N.N). G.A.N.N is an extension of classic artificial neural network models that aims to address some of their limitations. It uses a "black box" architecture with input and output sockets to manage data flow. The core is a neural network composed of interconnected GNeurons. Each GNeuron has dynamically generated input slots, a body that calculates an activation value based on weights and input values, and a single output. G.A.N.N aims to automate network construction and optimization processes and provide adaptive mathematical models, hiding complex internal procedures from the user.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
Abstract The key theory of our redundancy management is to achieve the tradeoff between energy consumption vs. the gain in timeliness, security, and reliability to increase the system useful lifetime. A Innovative probability model to analyze the best redundancy level in terms of source redundancy, path redundancy and as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation break under which the lifetime of a HWSN [Heterogeneous Wireless Sensor Network] is maximized. In redundancy management “badmouthing” is the major problem in managing the redundancy. This badmouthing is malicious node which will never drop the packet even after knowing that the packet has been sent already. In this paper we propose a new scheme to overcome the problem of badmouthing by weighted based voting, this protocol will weight (Success Rate) all the nodes in the network to find the non-malicious node in the network which having more packet drop. In “weighted voting” main function is to find trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. Keywords: Bad mouthing, Wireless Sensor Network, Weighted Based Voting, HWSN.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
This document summarizes a research paper that proposes a new scheme called weighted-based voting to overcome the problem of "badmouthing" attacks in wireless sensor networks with multipath routing. Badmouthing occurs when malicious nodes fail to drop packets even after knowing the packet was already delivered. The weighted-based voting protocol assigns weights based on success rates to identify trusted nodes. It uses weighted voting to make multipath routing decisions and remove malicious nodes detected by a distributed intrusion detection system based on votes from random voter nodes. The goal is to maximize network lifetime while satisfying quality of service requirements in heterogeneous wireless sensor networks.
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
This document proposes algorithms to detect wormhole attacks in wireless network coding systems. It first discusses how wormhole attacks can severely impact network coding protocols by disrupting routing and introducing unfair workload distributions. It then presents a centralized algorithm that uses a central node to detect wormholes by measuring changes in expected transmission counts. For distributed systems without a central node, it proposes DAWN, a distributed algorithm that examines the order nodes receive innovative packets and their expected transmission counts to detect wormholes. The algorithms aim to detect wormholes using only local information available from regular network coding protocols to keep overhead low. Extensive testing validated the effectiveness and efficiency of the proposed approaches.
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...IDES Editor
In Wireless Sensor Networks (WSNs), most
of the existing key management schemes, establish shared
keys for all pairs of neighbor sensor nodes without
considering the communication between these nodes.
When the number of sensor nodes in WSNs is increased
then each sensor node is to be loaded with bulky amount
of keys. In WSNs a sensor node may communicate with a
small set of neighbor sensor nodes. Based on this fact, in
this paper, an energy efficient Traffic-Aware Key
Management (TKM) scheme is developed for WSNs,
which only establishes shared keys for active sensors
which participate in direct communication. The proposed
scheme offers an efficient Re-keying mechanism to
broadcast keys without the need for retransmission or
acknowledgements. Numerical results show that proposed
key management scheme achieves high connectivity. In
the simulation experiments, the proposed key
management scheme is applied for different routing
protocols. The performance evaluation shows that
proposed scheme gives stronger resilence, low energy
consumption and lesser end to end delay.
Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. Mail to: kitechsolutions.in@gmail.com
The document provides an overview of the Geeks Artificial Neural Network (G.A.N.N). G.A.N.N is an extension of classic artificial neural network models that aims to address some of their limitations. It uses a "black box" architecture with input and output sockets to manage data flow. The core is a neural network composed of interconnected GNeurons. Each GNeuron has dynamically generated input slots, a body that calculates an activation value based on weights and input values, and a single output. G.A.N.N aims to automate network construction and optimization processes and provide adaptive mathematical models, hiding complex internal procedures from the user.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
Abstract The key theory of our redundancy management is to achieve the tradeoff between energy consumption vs. the gain in timeliness, security, and reliability to increase the system useful lifetime. A Innovative probability model to analyze the best redundancy level in terms of source redundancy, path redundancy and as well as the best intrusion detection settings in terms of the number of voters and the intrusion invocation break under which the lifetime of a HWSN [Heterogeneous Wireless Sensor Network] is maximized. In redundancy management “badmouthing” is the major problem in managing the redundancy. This badmouthing is malicious node which will never drop the packet even after knowing that the packet has been sent already. In this paper we propose a new scheme to overcome the problem of badmouthing by weighted based voting, this protocol will weight (Success Rate) all the nodes in the network to find the non-malicious node in the network which having more packet drop. In “weighted voting” main function is to find trust/reputation of neighbor nodes, as well as to tackle the “what paths to use” problem in multipath routing decision making for intrusion tolerance in WSNs. Keywords: Bad mouthing, Wireless Sensor Network, Weighted Based Voting, HWSN.
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
This document summarizes a research paper that proposes a new scheme called weighted-based voting to overcome the problem of "badmouthing" attacks in wireless sensor networks with multipath routing. Badmouthing occurs when malicious nodes fail to drop packets even after knowing the packet was already delivered. The weighted-based voting protocol assigns weights based on success rates to identify trusted nodes. It uses weighted voting to make multipath routing decisions and remove malicious nodes detected by a distributed intrusion detection system based on votes from random voter nodes. The goal is to maximize network lifetime while satisfying quality of service requirements in heterogeneous wireless sensor networks.
Seamless migration from nova network to neutron in e bay productionChengyuan Li
The document summarizes eBay's migration from Nova-network to Neutron networking in their OpenStack production environment. It describes migrating the control plane by setting up new OpenStack and NSX controller nodes, migrating databases, and creating Neutron networks. It then details migrating the data plane by installing Open vSwitch on hypervisors, removing interfaces from Linux bridges, and configuring OVS to connect to the NSX controller. It concludes by discussing post-migration changes needed for reboots and rollbacks.
Plantilla para evaluar recursos digitales asmedAsmed Trujillo
Este documento evalúa los recursos digitales de Cmap Tools utilizando una plantilla con criterios como la información de contacto, la fiabilidad del contenido, la distribución de la información, las opciones de acceso y la actualización. El recurso cumple con la mayoría de los criterios al proporcionar información de contacto, estar editado por una institución reconocida y estar relacionado con la especialidad del centro catalogador, aunque no cita sus fuentes de información ni otras referencias.
1. Arrays allow us to store multiple values of the same type in a single variable. We declare an array by specifying its type, name, and size.
2. The Math class contains commonly used mathematical functions like trigonometric, exponent, rounding, and random number generation methods.
3. We can pass arrays to methods in Java. When an array is passed as a parameter, any changes made to the array inside the method will be reflected outside the method.
Este documento presenta el menú especial de San Valentín del restaurante Manolín del 14 al 16 de febrero de 2014. El menú incluye una selección de aperitivos variados, una opción de segundo plato de carne o pescado, y postre. El precio por persona es de 20 euros e incluye agua y vino.
Content Marketing Strategy Attracts New BusinessSRIMedia
Content marketing attracts attention in a simple way. By delivering articles that enlighten, entertain and educate, your company builds relationships and instills credibility with key markets. Call us today to learn more our customized strategies for your business.
Taller de mediación en el colegio Europa de MontequintoCEIP Europa
Este documento presenta un taller de mediación implementado en el C.E.I.P Europa en Montequinto. El taller tiene como objetivo abordar los principales conflictos entre el alumnado de primaria a través de la mediación. Se describe el proceso de mediación, los roles de los estudiantes y profesores mediadores, y los pasos futuros para institucionalizar la mediación en la escuela.
La reunión mensual de socios del PMI Madrid Spain Chapter presentó varias ponencias sobre temas de gestión de proyectos. Se discutieron los perfiles de ingeniería más demandados, la gestión de la multiculturalidad, la actualización de varios microproyectos, y la implantación del voto electrónico. El presidente del capítulo dio las conclusiones y anunció eventos futuros.
Donation For Anna Hazare Movement in 2010 12Akash Agrawal
This document provides a summary of donations received by Common Cause in the years 2010-11 and 2011-12. In 2010-11, they received a total of ₹3853101 through cheques from various donors. They also received ₹34200 in cash and ₹309000 through online transactions. In 2011-12, they received ₹394412 in cash through various events and ₹394412 through cheques from donors.
El documento describe el estado actual de la sociedad digital y el comercio electrónico en España. Destaca que casi todos los accesos a Internet son de banda ancha, hay 23,6 millones de internautas y el 51% de los hogares están conectados. El comercio electrónico ha crecido más de un 70% y 8 millones de personas compran en línea principalmente desde casa. Las recomendaciones personales están ganando importancia para dar a conocer las tiendas online.
The document discusses customer service expectations and trends. It finds that 71% of customers value companies that respect their time. Customers now interact with companies across many channels like phone, email, chat and social media. Customers also move between these channels for their interactions. The document advocates for mobile-enabled customer service and keeping customers informed through different communication channels. It presents a vision for modern customer service that engages customers, empowers agents and allows companies to adapt quickly.
- The key Indian stock market indices gained modestly led by stocks in the realty, healthcare and power sectors. SBI and HDFC Bank rose 0.5-1% on hopes of strong loan demand during the festive season.
- Asian stocks were cautious following uncertainties around the US presidential election results. The Indian markets are expected to open cautiously, tracking cues from Asian markets.
- The Environment Ministry issued a notice to ONGC asking it to decommission an abandoned pipeline responsible for an oil leak in Tamil Nadu affecting marine and agricultural areas.
Lo que sí quiero mencionar son los JUVENILES, ¡estos si que tienen mérito! una
medalla de oro para ellos, empezaron de cero y han acabado siendo un equipo sólido,
estructurado, el año que viene tendremos a siete con los senior y un equipo ya con
experiencia en juveniles. FELICIDADES GUILLE Y ASPIROZ por el trabajo hecho.
Este manual fornece dicas sobre como adotar estilos de vida mais sustentáveis no dia a dia, abordando tópicos como transporte, alimentação, consumo consciente e cuidados com animais de estimação.
Este documento presenta las reglas básicas de la netiqueta, que son consejos para comportarse adecuadamente en internet. Algunas de estas reglas incluyen respetar el tiempo y espacio de los demás, ser breve y conciso, respetar la privacidad ajena, citar fuentes y respetar los derechos de autor. Si todos siguen estas reglas de cortesía en el ciberespacio, este será un lugar más seguro y agradable para todos.
Informe sobre el Perfil Biográfico del periodista peruano, Ángel Páez. Desde jovén inició su labor periodística en el diario "La República", que hasta hoy es su casa. Trabaja en la unidad de investigación.
Sig t01-modelos de datos-dominios-representacionGabriel Parodi
Este documento introduce los conceptos básicos de ILWIS, un software SIG y de teledetección desarrollado por ITC. Explica que ILWIS puede manejar datos espaciales vectoriales y raster, y que los datos deben estar asociados a dominios que definen sus posibles valores o clases. También describe las representaciones que definen cómo se visualizan los datos espaciales.
1) Floaters such as bubbles drift towards antinodes on a standing wave surface due to the wave elevator effect of the periodic vertical acceleration.
2) At low area fractions, the single floater drift force always pushes floaters towards antinodes, resulting in antinode clustering.
3) Attractive capillary interactions between floaters help maintain the antinode clusters. The cluster size increases and decreases periodically with the surface wave.
El documento describe un sistema de riego automatizado desarrollado para determinar el momento oportuno y cantidad de riego para un cultivo de calabaza. El sistema utiliza tres estrategias de riego: un lisímetro de pesada, un sensor para medir la humedad del suelo, y un método de balance hídrico climático. El sistema controla automáticamente el riego y fertilización mediante programas de cómputo, un datalogger y tecnologías de información. Los resultados mostraron que es posible automatizar el riego de acuer
Openstack User Research: What Have We Learnt?Ju Lim
OpenStack Summit Tokyo (Oct 2015) vBrownBag Talk. There is a YouTube recording for this at: https://www.youtube.com/watch?v=BFXJYq_68Dk&feature=youtu.be.
The presentation slides of my Ph.D. thesis. For more information - https://kkpradeeban.blogspot.com/2019/07/my-phd-defense-software-defined-systems.html
Seamless migration from nova network to neutron in e bay productionChengyuan Li
The document summarizes eBay's migration from Nova-network to Neutron networking in their OpenStack production environment. It describes migrating the control plane by setting up new OpenStack and NSX controller nodes, migrating databases, and creating Neutron networks. It then details migrating the data plane by installing Open vSwitch on hypervisors, removing interfaces from Linux bridges, and configuring OVS to connect to the NSX controller. It concludes by discussing post-migration changes needed for reboots and rollbacks.
Plantilla para evaluar recursos digitales asmedAsmed Trujillo
Este documento evalúa los recursos digitales de Cmap Tools utilizando una plantilla con criterios como la información de contacto, la fiabilidad del contenido, la distribución de la información, las opciones de acceso y la actualización. El recurso cumple con la mayoría de los criterios al proporcionar información de contacto, estar editado por una institución reconocida y estar relacionado con la especialidad del centro catalogador, aunque no cita sus fuentes de información ni otras referencias.
1. Arrays allow us to store multiple values of the same type in a single variable. We declare an array by specifying its type, name, and size.
2. The Math class contains commonly used mathematical functions like trigonometric, exponent, rounding, and random number generation methods.
3. We can pass arrays to methods in Java. When an array is passed as a parameter, any changes made to the array inside the method will be reflected outside the method.
Este documento presenta el menú especial de San Valentín del restaurante Manolín del 14 al 16 de febrero de 2014. El menú incluye una selección de aperitivos variados, una opción de segundo plato de carne o pescado, y postre. El precio por persona es de 20 euros e incluye agua y vino.
Content Marketing Strategy Attracts New BusinessSRIMedia
Content marketing attracts attention in a simple way. By delivering articles that enlighten, entertain and educate, your company builds relationships and instills credibility with key markets. Call us today to learn more our customized strategies for your business.
Taller de mediación en el colegio Europa de MontequintoCEIP Europa
Este documento presenta un taller de mediación implementado en el C.E.I.P Europa en Montequinto. El taller tiene como objetivo abordar los principales conflictos entre el alumnado de primaria a través de la mediación. Se describe el proceso de mediación, los roles de los estudiantes y profesores mediadores, y los pasos futuros para institucionalizar la mediación en la escuela.
La reunión mensual de socios del PMI Madrid Spain Chapter presentó varias ponencias sobre temas de gestión de proyectos. Se discutieron los perfiles de ingeniería más demandados, la gestión de la multiculturalidad, la actualización de varios microproyectos, y la implantación del voto electrónico. El presidente del capítulo dio las conclusiones y anunció eventos futuros.
Donation For Anna Hazare Movement in 2010 12Akash Agrawal
This document provides a summary of donations received by Common Cause in the years 2010-11 and 2011-12. In 2010-11, they received a total of ₹3853101 through cheques from various donors. They also received ₹34200 in cash and ₹309000 through online transactions. In 2011-12, they received ₹394412 in cash through various events and ₹394412 through cheques from donors.
El documento describe el estado actual de la sociedad digital y el comercio electrónico en España. Destaca que casi todos los accesos a Internet son de banda ancha, hay 23,6 millones de internautas y el 51% de los hogares están conectados. El comercio electrónico ha crecido más de un 70% y 8 millones de personas compran en línea principalmente desde casa. Las recomendaciones personales están ganando importancia para dar a conocer las tiendas online.
The document discusses customer service expectations and trends. It finds that 71% of customers value companies that respect their time. Customers now interact with companies across many channels like phone, email, chat and social media. Customers also move between these channels for their interactions. The document advocates for mobile-enabled customer service and keeping customers informed through different communication channels. It presents a vision for modern customer service that engages customers, empowers agents and allows companies to adapt quickly.
- The key Indian stock market indices gained modestly led by stocks in the realty, healthcare and power sectors. SBI and HDFC Bank rose 0.5-1% on hopes of strong loan demand during the festive season.
- Asian stocks were cautious following uncertainties around the US presidential election results. The Indian markets are expected to open cautiously, tracking cues from Asian markets.
- The Environment Ministry issued a notice to ONGC asking it to decommission an abandoned pipeline responsible for an oil leak in Tamil Nadu affecting marine and agricultural areas.
Lo que sí quiero mencionar son los JUVENILES, ¡estos si que tienen mérito! una
medalla de oro para ellos, empezaron de cero y han acabado siendo un equipo sólido,
estructurado, el año que viene tendremos a siete con los senior y un equipo ya con
experiencia en juveniles. FELICIDADES GUILLE Y ASPIROZ por el trabajo hecho.
Este manual fornece dicas sobre como adotar estilos de vida mais sustentáveis no dia a dia, abordando tópicos como transporte, alimentação, consumo consciente e cuidados com animais de estimação.
Este documento presenta las reglas básicas de la netiqueta, que son consejos para comportarse adecuadamente en internet. Algunas de estas reglas incluyen respetar el tiempo y espacio de los demás, ser breve y conciso, respetar la privacidad ajena, citar fuentes y respetar los derechos de autor. Si todos siguen estas reglas de cortesía en el ciberespacio, este será un lugar más seguro y agradable para todos.
Informe sobre el Perfil Biográfico del periodista peruano, Ángel Páez. Desde jovén inició su labor periodística en el diario "La República", que hasta hoy es su casa. Trabaja en la unidad de investigación.
Sig t01-modelos de datos-dominios-representacionGabriel Parodi
Este documento introduce los conceptos básicos de ILWIS, un software SIG y de teledetección desarrollado por ITC. Explica que ILWIS puede manejar datos espaciales vectoriales y raster, y que los datos deben estar asociados a dominios que definen sus posibles valores o clases. También describe las representaciones que definen cómo se visualizan los datos espaciales.
1) Floaters such as bubbles drift towards antinodes on a standing wave surface due to the wave elevator effect of the periodic vertical acceleration.
2) At low area fractions, the single floater drift force always pushes floaters towards antinodes, resulting in antinode clustering.
3) Attractive capillary interactions between floaters help maintain the antinode clusters. The cluster size increases and decreases periodically with the surface wave.
El documento describe un sistema de riego automatizado desarrollado para determinar el momento oportuno y cantidad de riego para un cultivo de calabaza. El sistema utiliza tres estrategias de riego: un lisímetro de pesada, un sensor para medir la humedad del suelo, y un método de balance hídrico climático. El sistema controla automáticamente el riego y fertilización mediante programas de cómputo, un datalogger y tecnologías de información. Los resultados mostraron que es posible automatizar el riego de acuer
Openstack User Research: What Have We Learnt?Ju Lim
OpenStack Summit Tokyo (Oct 2015) vBrownBag Talk. There is a YouTube recording for this at: https://www.youtube.com/watch?v=BFXJYq_68Dk&feature=youtu.be.
The presentation slides of my Ph.D. thesis. For more information - https://kkpradeeban.blogspot.com/2019/07/my-phd-defense-software-defined-systems.html
This document summarizes a research project on applying nanotechnology to cognitive radio and electronic warfare. It outlines the project members and faculty leads, problem statement, approach, and schedule. The problem aims to identify how nanotechnology can address spectrum sensing requirements for cognitive radio. The approach includes a literature review on integrating nanotechnology into wireless networks and studying the role of GPU technology in nanocomputing. Students conducted this research and a workshop on robotics and cybersecurity for high school students.
The document summarizes a student project to build a model that can efficiently represent nodes in large social networks as low-dimensional vectors. The model is based on the LINE algorithm presented in the baseline paper. The students implement both first-order and second-order proximity models in Torch, using the same node representations for both. Their model achieves F1 scores between 39-42% on the BlogCatalog dataset. The project took 5 weeks and challenges included understanding the baseline paper's mathematics and debugging neural networks in Lua.
Understanding Large Social Networks | IRE Major Project | Team 57 | LINERaj Patel
The document summarizes a student project to build a model that can efficiently represent nodes in large social networks as low-dimensional vectors. The model is based on the LINE paper, which learns embeddings by optimizing for first-order and second-order proximity. For their project, the students implemented the LINE approach in Torch, using the same node representations for both proximities and evaluating on the BlogCatalog dataset. Their model achieved F1 scores between 39-41% for node classification.
This document analyzes a Wikipedia voting network dataset to determine if the Request for Adminship (RfA) process is fair. Descriptive statistics show the network has a long-tailed degree distribution, indicating a few hubs with many connections and many nodes with few connections, exhibiting preferential attachment. Graph partitioning reveals a dense, central core of highly connected nodes surrounded by a periphery of less connected nodes. While each vote technically counts the same, administrators' votes may influence their large personal networks, allowing current administrators to retain control over decisions. The analysis found the RfA process is fair in principle but flawed in practice, as administrators leverage their network positions to influence outcomes.
The document discusses a thesis on monitoring networks using Nagios. It outlines the objectives to understand the basic theory behind network monitoring tools, identify the functionalities a monitoring system should have, and examine if Nagios is suitable for small to medium organizations. A mixed methodology is used including literature review and lab experiments. Findings from questionnaires and the experiment show that Nagios complies with industry standards and meets the monitoring needs of small/medium organizations with no significant costs. Future work is proposed to extend Nagios' monitoring capabilities to additional network devices and servers.
Show and Tell - Data and Digitalisation, Digital Twins.pdfSIFOfgem
The document summarizes several projects presented at a webinar on the Strategic Innovation Fund's "Data & Digitalisation" challenge.
- The EN-twin-e project aims to develop a digital twin of the electricity distribution network to provide greater visibility of distributed energy resources. This will help the ESO make more effective balancing decisions.
- The Digi-GIFT project seeks to build an integrated cybersecurity system and shared data infrastructure. This will help manage data quality, integrity and security while supporting applications like digital twins.
- Cost-benefit analyses were conducted for a shared data infrastructure, an integrated cyber intrusion defense system, and quantifying flexibility services. The analyses found savings from data sharing and
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET Journal
This document discusses optimization techniques for wireless sensor networks to improve energy efficiency and extend network lifetime. It summarizes swarm optimization techniques like ant colony optimization, particle swarm optimization, and genetic algorithms. The key points are:
1) Wireless sensor networks are constrained by limited battery power of nodes, so routing protocols need to efficiently manage energy usage.
2) Clustering is a common technique where sensor nodes send data to cluster heads which then forward to the base station, reducing energy spent on long-distance transmissions.
3) Swarm optimization techniques like ant colony optimization, particle swarm optimization, and genetic algorithms can be applied to clustering algorithms to further improve energy efficiency and extend network lifetime.
A Personalized Software Assistant Framework To Achieve User GoalsPradeep K. Venkatesh
The document proposes a personalized software assistant framework to help users achieve their goals. It extracts behavioral patterns from IoT device usage data to understand user behavior. The framework interacts with users through dialog to better understand goals and recommends relevant services. It was tested on 12 users across two domains and found to outperform baselines in recommending questions, with user contexts being the most important learning feature. Users agreed the framework was helpful in achieving goals and finding personalized services efficiently.
This document discusses VPN types, vulnerabilities, and solutions. It begins by introducing VPNs and their purpose of maintaining privacy and security when communicating over public networks. It then outlines the research objectives to prove that VPN networks are more secure and reliable than WAN networks, but also still need updates. The document discusses why organizations use VPNs over WANs for flexibility, scalability, and outsourcing. It also covers how VPNs work and the main types of VPN connections. The proposed research method is to use vulnerability scanning tools to quantitatively compare the security of VPNs versus WANs.
The document discusses the rise of network virtualization and software-defined networking (SDN). It describes early research projects on campus networks like Ethane in 2007 that led to the OpenFlow specification in 2008. This allowed experiments with new network protocols. The document outlines the founding of Nicira in 2007 and the company's product launch of the Network Virtualization Platform in 2012, which used SDN to virtualize networks.
El 24 de novembre ha tingut lloc al CSUC aquesta presentació sobre el funcionament del nou node M-Lab (Measurement Lab) instal·lat al Punt Neutre d'Internet a Catalunya (CATNIX).
La conferència, que ha anat a càrrec de Collin Anderson, investigador d'M-Lab, ha tingut per objectiu mostrar com funciona aquesta plataforma oberta mesura de xarxa. A més de presentar-la i descriure el seu funcionament, també ha mostrat quines mesures es poden fer contra aquests nodes per treure'n el màxim rendiment.
WTF is a Microservice - Rafael Schloming, DatawireAmbassador Labs
Rafael Schloming, Chief Architect at Datawire and AMQP spec author breaks down an understanding of microservices into People, Processes, and Technology, and when adopting microservices recommends starting with People first, rather than starting with Technology.
This document summarizes a presentation on applying nanotechnology principles to cognitive radio. It outlines the project members, problem statement, approach, and current status. The problem is applying nanotechnology to address spectrum sensing requirements for cognitive radio. The approach includes a literature review on integrating nanotechnology into wireless networks and relating nanotechnology, GPUs, and cognitive radio networks. Students studied these topics and neural networks concepts. Results show GPUs can speed calculations for real-time cognitive radio applications. Current research includes papers and book chapters on related topics. The scheduled is outlined through March 2014 to develop a nanocomputing solution for cognitive radio networks.
This document is a thesis submitted by Suneth Namal Karunarathna for the degree of Master of Engineering in Information and Communication Technologies. It discusses technology challenges for context aware multimedia services. The key challenges identified are providing seamless service continuity, context awareness in multimedia applications, content delivery in ubiquitous environments, and cross-layer adaptation for multimedia applications. The document also discusses threats to context collectors like limited resources, communication unavailability, and unattended operation. It proposes using analytic hierarchical process for context reasoning and develops models to evaluate performance and service continuity in multimedia services.
Network Access Control as a Network Security SolutionConor Ryan
This document presents a project investigating Network Access Control (NAC) as a network security solution. It provides background on NAC, describing how it controls network access through policies that assess devices. The project implements the PacketFence NAC solution in three phases: setting up the network and PacketFence appliance; configuring policies through the web GUI; and testing administration and user access. Other NAC technologies are briefly discussed. The conclusion evaluates PacketFence and the project phases, noting limitations and recommendations.
Similar to OpenStack Nova Network to Neutron Migration: Survey Results (20)
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
OpenStack Nova Network to Neutron Migration: Survey Results
1. OpenStack Nova Network to Neutron Migration:
Survey Results
OpenStack UX Team
● Ju Lim, Red Hat
● Melissa Meingast, HPE
● Piet Kruithof, HPE
1 December 2015
2. Background
The purpose of this study was to gather data to better understand the attributes of OpenStack
users who remain on Nova Networking rather than migrating to Neutron, and their primary
reasons for doing so.
● Initial interviews conducted with 5 OpenStack Cloud Operators which helped create a
community survey, that was then distributed to a larger group of OpenStack users to
ensure representation by the larger community to validate findings and gather additional
feedback
○ Initial interviews (July - August 2015)
○ Survey (September - October 2015)
● Effort between HP, Red Hat, and the OpenStack Foundation
3. Executive Summary
● Nova Network use is decreasing
o Currently 16% of OpenStack deployments (OpenStack October 2015 User Survey)
● Still a fair number of users with simple, flat networking needs
● Overall both Nova Network and Neutron users are satisfied with their networking choice,
though Neutron users felt their organizations’ needs were better met vs. Nova Network
users
● For simple, flat networking needs, Nova Network still meets a very high majority of Nova
Network users’ end-users’ needs
● Neutron complexity and scalability perceived as biggest barriers to Neutron adoption by
Nova Network users
● Scalability and HA are the biggest concerns by Neutron users
4. Recommendations
● Develop tools to facilitate migration to Neutron
o Develop tooling to assist with Neutron migration (especially with ability to keep the
same floating IPs and fixed IPs assigned without having to reassign them as part of the
migration) while minimizing downtime and impact to instances (end-user impact)
o Publish guide / best practices for migration
● Publish 1:1 comparison of features in Nova Networks and Neutron
o Ideally targeted towards most common user’s network configuration / use cases
● Expand documentation to cover other common plug-ins being used, e.g. Linux Bridge (for
simple networking needs
o Current documentation focuses primarily on Open vSwitch today
5. Recommendations (contd.)
● Publish scalability guidelines and limitations for Neutron
o “Neutron scalability and limitations not documented and perceived to be largely
unknown except to Neutron Developers”
● Improve community involvement and engagement
o Publish case studies and/or reference architectures based on proven customer’s
production deployments
● Improve scalability of Neutron
7. Approach
● Survey respondents recruited through a variety of
channels -- LinkedIn, Email Distribution Lists and
IRC
● 71 individuals completed the survey
● More were using Neutron than were running Nova
Network
o 53 Neutron users (75%)
→ 51 run Neutron in their production
environment
→ 2 run Neutron only in test, as they did
not have OpenStack running in production
o 18 Nova users (25%)
→ 16 run Nova Networking in their
production environments
→ 2 run Openstack only in test, and using
Nova
8. Approach (contd.)
● Size of survey participants’ clouds varied
● A range of OpenStack versions were being run in production
● 19 were running a more current release in their test environments
Neutron Users Nova Users
1-20 nodes 8 2
21-50 nodes 7 7
51-80 nodes 3 1
81-100 nodes 4 0
101-500 nodes 25 3
501+ nodes 6 4
Unknown 0 1
Neutron Users Nova Users
Kilo 22 6
Juno 17 2
Icehouse 11 7
Havana 0 2
Grizzly or earlier 1 0
Not in production 2 1
9. Meeting Customers’ Needs
Neutron users reported greater satisfaction with their needs
being met compared with Nova Network users
● Neutron users ( (M = 4.2; SD = 0.65) reported
being significantly more satisfied with their
networking solution compared with Nova
Network (M = 3.5; SD = 1.19) users,
at the p = .05 level (t (21) = -2.3; p = 0.027)
● Results were analyzed using an independent
samples t-test assuming unequal variances
How well does (Nova or Neutron) meet your organization's needs?
#ofRespondents
Very well
Very poorly
Comparison of Means
Neutron N = 53
Nova Network N = 18
10. Perceived Stability of Neutron
Individuals currently using Neutron perceived it a more
stable solution than those still using Nova Network
● Neutron users ( (M = 5.5; SD = 1.0) rated Neutron
as significantly more stable compared with
current Nova Network users (M = 4.5; SD = 1.3)
users, at the p = .05 level (t (24) = -2.9; p = 0.007)
● Results were analyzed using an independent
samples t-test assuming unequal variances
Based on your current knowledge, how stable do you feel Neutron
is?
#ofRespondents
Highly Stable
Highly Unstable
Comparison of Means
Neutron N = 53
Nova Network N = 18
11. Perceived Maturity of Neutron
No difference in the perception of Neutron’s maturity was
detected between individuals currently using Neutron and
those still using Nova Network
● The analysis failed to reveal a significant
difference in Neutron users ( (M = 5.1; SD = 1.3)
and Nova Network users (M = 4.4; SD = 1.2) users,
at the p = .05 level (t (31) = -1.9; p = .06)
● Results were analyzed using an independent
samples t-test assuming unequal variances
Based on your current knowledge, how mature do you feel
Neutron is?
#ofRespondents
Highly Mature
Highly Immature
Comparison of Means
Neutron N = 53
Nova Network N = 18
12. Perceived Quality of Neutron
Individuals currently using Neutron perceived it a higher
quality solution than those still using Nova Network
● Neutron users ( (M = 3.6; SD = 0.74) rated Neutron
as having a higher quality compared with current
Nova Network users (M = 3.1; SD = 0.8) users, at
the p = .05 level (t (28) = -2.6;
p = 0.02)
● Results were analyzed using an independent
samples t-test assuming unequal variances
Based on your current knowledge, how would you rate Neutron's
overall quality?
#ofRespondents
Very High Quality
Very Low Quality
Comparison of Means
Neutron N = 53
Nova Network N = 18
13. Satisfaction with Networking Solution
Nova Network and Neutron users were equally satisfied
with their current OpenStack networking solution
● The analysis failed to reveal a significant
difference in Neutron users ( (M = 4.0; SD = .78)
and Nova Network users (M = 3.7; SD = 1.1) users,
at the p = .05 level (t (23) = -1.3; p = 0.2)
● Results were analyzed using an independent
samples t-test assuming unequal variances
Overall, how satisfied are you with (Neutron/Nova Network)?
#ofRespondents
Very Satisfied
Highly Unsatisfied
Comparison of Means
Neutron N = 53
Nova Network N = 18
15. Top Reasons for Not Migrating to Neutron
What are the primary reasons that you have not migrated to Neutron?
Concern # of Respondents Percentage
Concerns with complexity of migrating to Neutron 13 72%
Concerns with manageability and troubleshooting in Neutron 11 61%
Insufficient time and/or resources to migrate to Neutron 10 56%
Our networking needs are being met by Nova Network 7 39%
The features that Neutron offers are not of interest or benefit to us 6 33%
Unsure which Neutron plug-in to deploy 6 33%
No plans to migrate to Neutron unless Nova Network is deprecated 5 28%
Concerns about stability 2 11%
Neutron does not scale as well as Nova 1 6%
Nova Network N = 18
16. Top Barriers for Not Migrating to Neutron
Have any of the following kept you from moving from Nova Network to Neutron?
Concern # of Respondents Percentage
Neutron scalability 10 56%
Concerns around feature parity and scalability with Nova Network 9 50%
The need that end-users have to setup Neutron virtual networks and security groups as part
of the Launch Instance workflow
8 44%
Limited high availability for L3 agents 7 39%
Distributed virtual routing (DVR) limitations for environments with limited IPv4 addresses 5 28%
Lack of ability to swap out plug-ins easily 4 22%
Limited scalability of security groups 4 22%
Uses up more IP addresses vs. Nova Network 3 17%
Inability to have Layer 2 domain scoped to a certain group of hosts, and be able to define
that in Neutron
3 17%
Lack of partitioning mechanism for cells 2 11%
Limited high availability for LBaaS 2 11%
Inability to share networks by subset of projects 2 11%
Inability to map multiple floating IPs to an instance 2 11%
Inability to specify primary IP for a host 2 11%
Inability to share security groups for re-use between projects 1 6%
Concerns with regard to IPAM support 0 0%
Nova Network N = 18
17. Neutron Users: Drivers Used
Open vSwitch is the most common choice for Neutron drivers for Neutron users
18. Nova Network to Neutron Migration Drivers
Nova Network N = 18
Concern # of Respondents Percentage
We started with Neutron and never used Nova Network 26 49
The features that Neutron offers were of interest/benefit to us 23 43
We were concerned that Nova would be deprecated 23 43
Our networking needs were not being met by Nova Network 19 36
It was part of our regular upgrade cycle 6 11
19. Neutron Issues
Have any of the following been issues for you since moving to Neutron?
Issue
# of
Respondents Percentage
Neutron scalability 25 47%
Limited high availability for L3 agents 22 42%
Inability to share networks by subset of projects 18 34%
Inability to have Layer 2 domain scoped to a certain group of hosts, and be able to define that
in Neutron 16 30%
Limited scalability of security groups 16 30%
Limited high availability for LBaaS 15 28%
Lack of partitioning mechanism for cells 14 26%
Concerns with regard to IPAM support 12 23%
Inability to share security groups between projects 10 19%
The requirement that end-users setup virtual networks and security groups as part of Launch
Instance workflow 10 19%
Lack of ability to swap out plug-ins easily 9 17%
Distributed virtual routing (DVR) limitations for environments with limited IPv4 addresses 9 17%
Inability to specify primary IP for a host 9 17%
Inability to map multiple floating IPs to an instance 7 13%
Uses up more IP addresses vs. Nova Network 4 8%
Concerns around feature parity and scalability with Nova Network 3 6%
20. Neutron Adoption
Knowing what you know today, would you still migrate to Neutron, if you had it to do over again?
● A significant number of Neutron
users (93%) would still migrate to
Neutron today if they had to do it
again
● A very small percentage of existing
Neutron users are doubtful
whether they would migrate to
Neutron today
21. Would You Recommend Neutron?
20% of Neutron users hesitant on recommending Neutron
Explanations for “it depends”:
• Plug-ability provides the option of L2 and L3 overlays. This allows you to pick the
best option for your requirements.
• If all one needs is just to "give networking" to instances then there's no point in
paying the price of switching to Neutron.
• It depends on deployment size, and use cases -- many use cases are still solved by
simple, flat networking.
• It depended on the features they used and what features they were looking to get
out of Neutron.
• I don't know all the specific of why people are still using nova-network. Unless I
understand his needs, I wouldn't make a recommendation.
If a peer in your industry was considering migrating from Nova to Neutron, would you recommend
that they do so?
• It seems like over-time nova-network is not going away and in the past 1+ years has gained some features so, if nova-networking will
do everything they want out of the box - it would be hard to recommend the additional complexity of neutron to them.
• Wholeheartedly, I'd recommend starting with Neutron and never building a new cloud with nova-network. I have never tested
migrating from one to the other though, and hear that may be difficult, so I'd be more reluctant to actually recommend that.
• It depends upon their needs and skill level to support it.
23. ● OpenStack UX Wiki: https://wiki.openstack.org/wiki/UX
● Mailing List: openstack-dev@lists.openstack.org with the (email) subject
using the tag [UX]
● IRC: #openstack-ux
● Bi-weekly Friday meetings @ 1500 UTC
○ https://wiki.openstack.org/wiki/Meetings/UX
More Info? User Research Requests?