The document summarizes the 6NEAT project which tested IPv6 multicast applications between networks in Europe and Korea. It describes how IPv6 tunnels were configured between ETRI in Korea and universities in Europe to test high-quality videoconferencing applications. Experiments showed good video quality with some delays over IPv4 tunnels. Native IPv6 tests between ETRI and another Korean university had no tunneling delays. The TEIN network provided an IPv6 infrastructure for testing next-generation Internet applications between Asia and Europe.
The document discusses IPv6 over wireless personal area networks (6LoWPAN). It describes challenges like small IPv6 and UDP packet headers not fitting in 802.15.4 frames. It overviews how 6LoWPAN compresses headers, fragments packets, and allows IPv6 networks to connect over low power wireless links. Key concepts covered are 6LoWPAN dispatch codes, frame formats, header compression principles, and fragmentation/reassembly.
DPWS & 6LoWPAN is a document that discusses connecting smart devices to enable new applications using IP networks. It introduces DPWS (Devices Profile for Web Services), which allows plug-and-play discovery of networked devices and their web services. 6LoWPAN is then described as a standard for using IPv6 over low-power wireless networks. It enables small, low-bandwidth devices to connect to IP networks. Finally, applications of 6LoWPAN are mentioned such as equipment monitoring, home automation, and security.
PRISTINE presentation at the Net-Tech Future Coordination meetingICT PRISTINE
RINA is an emerging programmable networking approach centered on Inter-Process Communication. The PRISTINE project developed a software development kit for implementing RINA, specified policies for congestion control, quality of service, and more. It also developed the first specification and implementation of a Distributed IPC Facility Management System and prototypes for distributed cloud, datacenter networking, and network service provider use cases. Future work may include enhancing performance, security, and a management framework to support virtual networks and alternative network architectures.
Transport SDN & OpenDaylight Use Cases in KoreaJustin Park
- The document summarizes a presentation on Transport SDN and use cases in Korea. It introduces the speaker and their research team working on Transport SDN. It describes problems with current transport networks and requirements for SDN solutions. It provides an overview of the OpenDaylight platform and how it is being used to develop a Transport SDN controller in Korea called Calamari. It briefly describes implementations with MPLS-TP and testbeds involving multiple vendors. It outlines use cases at two Korean telecom companies, SKT and KT, and concludes with future plans to expand the SDN research.
Firewalls control network traffic flow between networks and can operate at different layers. There are four main types of firewalls: packet filters at the network layer; circuit-level gateways at the session layer; application-level proxies that are application-specific; and stateful multilayer firewalls that combine aspects of the other three. Firewalls will continue advancing as attacks become more sophisticated.
NeXT gen wireless solutions with Polaris NetworksSantosh Nath
Polaris Networks, one of the global leaders in LTE test tools and emulators ventured into small cell market and private LTE enterprise sector through its LTE-in-a-box, virtual EPC and NetEPC products. NB-IOT emulators are available on latest releases. Check for more details on slides
Optimising nfv service chains on open stack using dockerAnanth Padmanabhan
Uploading slides presented in the OpenStack summit, at Austin in April, 2016. Here is the link to the video,
https://www.openstack.org/videos/video/optimising-nfv-service-chains-on-openstack-using-docker
The document summarizes the 6NEAT project which tested IPv6 multicast applications between networks in Europe and Korea. It describes how IPv6 tunnels were configured between ETRI in Korea and universities in Europe to test high-quality videoconferencing applications. Experiments showed good video quality with some delays over IPv4 tunnels. Native IPv6 tests between ETRI and another Korean university had no tunneling delays. The TEIN network provided an IPv6 infrastructure for testing next-generation Internet applications between Asia and Europe.
The document discusses IPv6 over wireless personal area networks (6LoWPAN). It describes challenges like small IPv6 and UDP packet headers not fitting in 802.15.4 frames. It overviews how 6LoWPAN compresses headers, fragments packets, and allows IPv6 networks to connect over low power wireless links. Key concepts covered are 6LoWPAN dispatch codes, frame formats, header compression principles, and fragmentation/reassembly.
DPWS & 6LoWPAN is a document that discusses connecting smart devices to enable new applications using IP networks. It introduces DPWS (Devices Profile for Web Services), which allows plug-and-play discovery of networked devices and their web services. 6LoWPAN is then described as a standard for using IPv6 over low-power wireless networks. It enables small, low-bandwidth devices to connect to IP networks. Finally, applications of 6LoWPAN are mentioned such as equipment monitoring, home automation, and security.
PRISTINE presentation at the Net-Tech Future Coordination meetingICT PRISTINE
RINA is an emerging programmable networking approach centered on Inter-Process Communication. The PRISTINE project developed a software development kit for implementing RINA, specified policies for congestion control, quality of service, and more. It also developed the first specification and implementation of a Distributed IPC Facility Management System and prototypes for distributed cloud, datacenter networking, and network service provider use cases. Future work may include enhancing performance, security, and a management framework to support virtual networks and alternative network architectures.
Transport SDN & OpenDaylight Use Cases in KoreaJustin Park
- The document summarizes a presentation on Transport SDN and use cases in Korea. It introduces the speaker and their research team working on Transport SDN. It describes problems with current transport networks and requirements for SDN solutions. It provides an overview of the OpenDaylight platform and how it is being used to develop a Transport SDN controller in Korea called Calamari. It briefly describes implementations with MPLS-TP and testbeds involving multiple vendors. It outlines use cases at two Korean telecom companies, SKT and KT, and concludes with future plans to expand the SDN research.
Firewalls control network traffic flow between networks and can operate at different layers. There are four main types of firewalls: packet filters at the network layer; circuit-level gateways at the session layer; application-level proxies that are application-specific; and stateful multilayer firewalls that combine aspects of the other three. Firewalls will continue advancing as attacks become more sophisticated.
NeXT gen wireless solutions with Polaris NetworksSantosh Nath
Polaris Networks, one of the global leaders in LTE test tools and emulators ventured into small cell market and private LTE enterprise sector through its LTE-in-a-box, virtual EPC and NetEPC products. NB-IOT emulators are available on latest releases. Check for more details on slides
Optimising nfv service chains on open stack using dockerAnanth Padmanabhan
Uploading slides presented in the OpenStack summit, at Austin in April, 2016. Here is the link to the video,
https://www.openstack.org/videos/video/optimising-nfv-service-chains-on-openstack-using-docker
This presentations gives basic overview about networking and in depth insights about Openstack Neutron component.
Covers understanding on VLAN,VXLAN,Openstack vSwitch
Istio is an open-source service mesh that provides traffic management, telemetry and security for microservices. It works by injecting Envoy sidecar proxies into applications. The document provides an overview of Istio architecture, setup, and how it can be used for traffic management features like canary releases and advanced load balancing.
Pristine Intro SDN Concertation WorkshopICT PRISTINE
The PRISTINE project proposes a new approach to SDN using RINA as its foundation. The project aims to build a RINA SDK to allow experimentation with SDN in a way that addresses the limitations of current SDN approaches. It will develop RINA management systems and policies to create optimized DIFs for use cases like distributed cloud, datacenter networking, and network service providers. The goal is to leverage RINA's ability to maximize invariants and simplify protocols to provide programmability benefits for SDN.
Congresso Sociedade Brasileira de Computação CSBC2016 Porto Alegre (Brazil)
Workshop on Cloud Networks & Cloudscape Brazil
Tiago Salmito, R&D Directorate, RNP, Brazil
Funded jointly by the European Commission (EC) and the Ministry of Science, Technology and Innovation; Portuguese: Ministério da Ciência, Tecnologia e Inovação (MCTI) of Brazil, the EUBrasilCloudFORUM project supports EU-BR collaborative projects in the collection and promotion of their results and activities. The results will be used to draft a research Roadmap on cloud computing, identifying collaboration needs and opportunities between Europe and Brazil for the European Commission and to MCTI, thus contributing to the definition of future cooperation priorities between the two regions.
In computing ,a futex is a linux kernel system call that programmers can use to implement basic locking, or as a building block for higher-level locking abstractions such as posix mutexes or condition variables.
WebRTC Lights by Neil Stratford of Binary FenAlan Quayle
WebRTC can be used to control Internet of Things devices like LED lights that require low latency and diverse networking, allowing control from a web browser. A prototype was created using a Raspberry Pi with a Janus WebRTC server and plugin to communicate over WiFi with an Mbed microcontroller board, which bridges messages to control lights via a 1-wire protocol. WebRTC opens opportunities beyond telephony to integrate real-time control of devices into web applications.
This document provides an overview of firewall concepts including:
- Learning objectives around firewall types, functions, and deployment of policies.
- The basic types of firewalls: packet filtering, stateful packet inspection, application proxies, and hybrids.
- Details on packet filtering firewalls including pros, cons, and how they examine packets.
- Pros and cons of application proxies.
- Background on OSI and TCP/IP models, the three-way TCP handshake, common ports/services, and the STRIDE threat model.
- How to respond to threats and build a firewall port matrix.
- An introduction to iptables and examples of basic packet filtering rules.
- An overview of the network scanning
Open Middleware Technologies for Smart Robotics - a FIWARE Smart Fest present...eProsima
Discover in this presentation the basic aspects of what eProsima is doing nowadays in terms of developing open-source solutions for robotics, both in terms of giving access to resource-constrained devices to the robotics field and making several communication protocols available to talk between them, thus expanding their capabilities and interoperability.
Firewalls control network traffic flow and operate at multiple layers. There are different firewall environments including simple packet filter firewalls and complex environments with several firewalls and proxies. A DMZ environment can be created between two firewalls to protect servers. VPNs provide secure network links across networks using protocols like IPsec. Firewalls fall into categories like packet filters, circuit-level, application-level, and stateful multilayer firewalls. Firewalls will continue advancing as attacks become more sophisticated.
SCALE/SWITCHengines Update - Current and Possible SDN ApplicationsSimon Leinen
At the third Swiss SDN/OpenStack WG workshop in November 2014, I gave an update about SWITCH's efforts to build a cloud infrastructure for the Swiss academic/research community, with particular attention on how we use SDN techniques now and in the possible future.
This document discusses LinkBermuda's use of Zuora for metered cloud services billing. It provides an overview of LinkBermuda's company and cloud infrastructure, then discusses how they implemented usage-based billing for their Infrastructure as a Service (IaaS), Backup as a Service (BaaS), and Communication as a Service (CaaS) using Zuora. It describes exporting usage reports from their cloud platforms to Zuora and maintaining product catalogs. The document concludes with lessons learned, emphasizing the importance of planning, limiting initial scope, and deploying iteratively to learn from customer usage.
WebRTC Computer Vision, Andrey Zakharchenko Alan Quayle
WebRTC Computer Vision hack from Andrey Zakharchenko. Presented at TADHack mini London 11-12 April, using the Dialogic XMS server and Oracle WSC. Detects if someone is watching he video, and alerts if not.
IPv6 provides a much larger address space than IPv4 to accommodate continued growth on the internet. Sensor networks and other applications will need to support IPv6 to take advantage of its features like automatic configuration and mobility. While global IPv6 deployment is still low at around 1%, many countries like Brazil have over 45% deployment. Network operators are encouraged to implement dual-stack networks to support both IPv4 and IPv6 and allow a transition as IPv4 addresses run out. Developers are also encouraged to update applications to support IPv6.
Apache MINA2 is a Java open-source network application framework that provides an asynchronous, non-blocking infrastructure for developing network applications. It features reusable and extensible components like IoSession for connections, IoService for servers/clients, IoFilters for cross-cutting concerns, and ProtocolCodecFilters for encoding network protocols. MINA supports various network protocols and data types and provides an elegant way to build scalable and manageable network applications.
Designed for IT professionals looking to expand their OpenStack Networking knowledge, “Navigating OpenStack Networking” is a comprehensive and fast-paced session which provides an overview of OpenStack Networking, its history, its predecessor (Nova Networks), its components and then dives deep into the architecture, its features and plugin model and its role in building an OpenStack Cloud.
Talk from the inaugural workshop of the Swiss SDN working group in October 2013. In the context of a green-field "cloud" infrastructure build, the talk looks at three areas where "SDN" techniques seem useful: To scale the internal network fabric across many racks; to realize a cost-effective high-bandwidth uplink connection to the Internet; to support "virtual private cloud" services using tunneling.
Project Calico provides layer 3 networking and network isolation between workloads using BGP routing. It integrates with Apache Mesos to provide each Mesos container with its own IP address, ending port conflicts and making dynamic port assignment obsolete while allowing for DNS service discovery. Using Calico with Mesos provides simple operation, high scalability and fine-grained network isolation.
Direct carrier billing (DCB) has witnessed significant traction. Initially, the concept was introduced to make purchasing ringtones and wallpapers more convenient. Direct carrier billing is being used for a variety of functions, ranging from purchasing air tickets to paying parking fees.
Billing Direct provides an automated billing and payment processing system for businesses through ChampionsWay. Key features include low processing rates for electronic payments, acceptance of multiple payment methods, automated billing and collections, and payment reminders. The service is registered under the business's own account and processes payments through various partners depending on location, taking 2-3 days for credit cards and 6-7 days for electronic transfers to post to accounts. Setting up the service takes approximately 2 weeks in the US or 4 weeks in Canada after submitting the required application forms.
This presentations gives basic overview about networking and in depth insights about Openstack Neutron component.
Covers understanding on VLAN,VXLAN,Openstack vSwitch
Istio is an open-source service mesh that provides traffic management, telemetry and security for microservices. It works by injecting Envoy sidecar proxies into applications. The document provides an overview of Istio architecture, setup, and how it can be used for traffic management features like canary releases and advanced load balancing.
Pristine Intro SDN Concertation WorkshopICT PRISTINE
The PRISTINE project proposes a new approach to SDN using RINA as its foundation. The project aims to build a RINA SDK to allow experimentation with SDN in a way that addresses the limitations of current SDN approaches. It will develop RINA management systems and policies to create optimized DIFs for use cases like distributed cloud, datacenter networking, and network service providers. The goal is to leverage RINA's ability to maximize invariants and simplify protocols to provide programmability benefits for SDN.
Congresso Sociedade Brasileira de Computação CSBC2016 Porto Alegre (Brazil)
Workshop on Cloud Networks & Cloudscape Brazil
Tiago Salmito, R&D Directorate, RNP, Brazil
Funded jointly by the European Commission (EC) and the Ministry of Science, Technology and Innovation; Portuguese: Ministério da Ciência, Tecnologia e Inovação (MCTI) of Brazil, the EUBrasilCloudFORUM project supports EU-BR collaborative projects in the collection and promotion of their results and activities. The results will be used to draft a research Roadmap on cloud computing, identifying collaboration needs and opportunities between Europe and Brazil for the European Commission and to MCTI, thus contributing to the definition of future cooperation priorities between the two regions.
In computing ,a futex is a linux kernel system call that programmers can use to implement basic locking, or as a building block for higher-level locking abstractions such as posix mutexes or condition variables.
WebRTC Lights by Neil Stratford of Binary FenAlan Quayle
WebRTC can be used to control Internet of Things devices like LED lights that require low latency and diverse networking, allowing control from a web browser. A prototype was created using a Raspberry Pi with a Janus WebRTC server and plugin to communicate over WiFi with an Mbed microcontroller board, which bridges messages to control lights via a 1-wire protocol. WebRTC opens opportunities beyond telephony to integrate real-time control of devices into web applications.
This document provides an overview of firewall concepts including:
- Learning objectives around firewall types, functions, and deployment of policies.
- The basic types of firewalls: packet filtering, stateful packet inspection, application proxies, and hybrids.
- Details on packet filtering firewalls including pros, cons, and how they examine packets.
- Pros and cons of application proxies.
- Background on OSI and TCP/IP models, the three-way TCP handshake, common ports/services, and the STRIDE threat model.
- How to respond to threats and build a firewall port matrix.
- An introduction to iptables and examples of basic packet filtering rules.
- An overview of the network scanning
Open Middleware Technologies for Smart Robotics - a FIWARE Smart Fest present...eProsima
Discover in this presentation the basic aspects of what eProsima is doing nowadays in terms of developing open-source solutions for robotics, both in terms of giving access to resource-constrained devices to the robotics field and making several communication protocols available to talk between them, thus expanding their capabilities and interoperability.
Firewalls control network traffic flow and operate at multiple layers. There are different firewall environments including simple packet filter firewalls and complex environments with several firewalls and proxies. A DMZ environment can be created between two firewalls to protect servers. VPNs provide secure network links across networks using protocols like IPsec. Firewalls fall into categories like packet filters, circuit-level, application-level, and stateful multilayer firewalls. Firewalls will continue advancing as attacks become more sophisticated.
SCALE/SWITCHengines Update - Current and Possible SDN ApplicationsSimon Leinen
At the third Swiss SDN/OpenStack WG workshop in November 2014, I gave an update about SWITCH's efforts to build a cloud infrastructure for the Swiss academic/research community, with particular attention on how we use SDN techniques now and in the possible future.
This document discusses LinkBermuda's use of Zuora for metered cloud services billing. It provides an overview of LinkBermuda's company and cloud infrastructure, then discusses how they implemented usage-based billing for their Infrastructure as a Service (IaaS), Backup as a Service (BaaS), and Communication as a Service (CaaS) using Zuora. It describes exporting usage reports from their cloud platforms to Zuora and maintaining product catalogs. The document concludes with lessons learned, emphasizing the importance of planning, limiting initial scope, and deploying iteratively to learn from customer usage.
WebRTC Computer Vision, Andrey Zakharchenko Alan Quayle
WebRTC Computer Vision hack from Andrey Zakharchenko. Presented at TADHack mini London 11-12 April, using the Dialogic XMS server and Oracle WSC. Detects if someone is watching he video, and alerts if not.
IPv6 provides a much larger address space than IPv4 to accommodate continued growth on the internet. Sensor networks and other applications will need to support IPv6 to take advantage of its features like automatic configuration and mobility. While global IPv6 deployment is still low at around 1%, many countries like Brazil have over 45% deployment. Network operators are encouraged to implement dual-stack networks to support both IPv4 and IPv6 and allow a transition as IPv4 addresses run out. Developers are also encouraged to update applications to support IPv6.
Apache MINA2 is a Java open-source network application framework that provides an asynchronous, non-blocking infrastructure for developing network applications. It features reusable and extensible components like IoSession for connections, IoService for servers/clients, IoFilters for cross-cutting concerns, and ProtocolCodecFilters for encoding network protocols. MINA supports various network protocols and data types and provides an elegant way to build scalable and manageable network applications.
Designed for IT professionals looking to expand their OpenStack Networking knowledge, “Navigating OpenStack Networking” is a comprehensive and fast-paced session which provides an overview of OpenStack Networking, its history, its predecessor (Nova Networks), its components and then dives deep into the architecture, its features and plugin model and its role in building an OpenStack Cloud.
Talk from the inaugural workshop of the Swiss SDN working group in October 2013. In the context of a green-field "cloud" infrastructure build, the talk looks at three areas where "SDN" techniques seem useful: To scale the internal network fabric across many racks; to realize a cost-effective high-bandwidth uplink connection to the Internet; to support "virtual private cloud" services using tunneling.
Project Calico provides layer 3 networking and network isolation between workloads using BGP routing. It integrates with Apache Mesos to provide each Mesos container with its own IP address, ending port conflicts and making dynamic port assignment obsolete while allowing for DNS service discovery. Using Calico with Mesos provides simple operation, high scalability and fine-grained network isolation.
Direct carrier billing (DCB) has witnessed significant traction. Initially, the concept was introduced to make purchasing ringtones and wallpapers more convenient. Direct carrier billing is being used for a variety of functions, ranging from purchasing air tickets to paying parking fees.
Billing Direct provides an automated billing and payment processing system for businesses through ChampionsWay. Key features include low processing rates for electronic payments, acceptance of multiple payment methods, automated billing and collections, and payment reminders. The service is registered under the business's own account and processes payments through various partners depending on location, taking 2-3 days for credit cards and 6-7 days for electronic transfers to post to accounts. Setting up the service takes approximately 2 weeks in the US or 4 weeks in Canada after submitting the required application forms.
Telecoms & WebRTC: Opposites attract?!
- Are Telecoms and WebRTC opposites?
- The diversity of interpretation of WebRTC in Telecoms.
- Why is WebRTC so attractive for operators?
- How can operators be attractive for WebRTC developers?
Presented at the WebRTC Summit Europe in Berlin, Germany
Intelligent broadband traffic management ensures that all broadband subscribers connected to the same local exchange have an equal share of bandwidth. This arrangement provides a unique end-to-end quality of service (QoS) differentiation with content adaptation, caching and distributed delivery.
Operator Insights: Thoughts, Experiences, Real-World Challenges Around WebRTCSebastian Schumann
Operator Insights: Thoughts, Experiences, Real-World Challenges Around WebRTC
- Misconceptions around WebRTC related to operator-thinking
- How is WebRTC perceived within different operator units
- Lessons learned from internal development
Presented at the Upperside WebRTC conference in Paris, France in December 2014
Big data combines information sources for an end-to-end view of the subscriber-operator interactions. To leverage big data, operators must modify how they gather, verify & make use of the information available.
http://blog.mahindracomviva.com/strategies-monetizing-big-data/
Cube based summaries of large association rule setsPapa Cheikh Cisse
Ce travail est la contribution de Marie Ndiaye, Cheikh T. Diop du Laboratoire d'Analyse Numérique et d'Informatique de l'Université Gaston Berger de Saint Louis et de Arnaud Giacometti, Patrick Marcel et Arnaud Soulet du Laboratoire d'Informatique de l'Université François Rabelais de Tours aux problèmes de l'extraction et de la représentation du trop grand nombre de règles d'association issues des algorithmes d'extraction de données. Dans le cadre d'un cours d'extraction de connaissances, j'ai juste eu à faire une présentation des différents concepts et méthodes qui y sont exposés.
All You Need To Know About Network InteroperabilityMahindra Comviva
"Network Interoperability is the continuous ability to send and receive data among the interconnected networks, providing the quality level expected by the end user. It becomes indispensable in order to achieve end-to-end connectivity. The more diverse networks exist, the greater becomes the need to ensure that they can interoperate. Network interoperability being the ability of two networks to communicate can be achieved in two ways: either by having the two networks confirm to a common protocol standard or by defining a standard interface to which all networks need to adhere, or by providing a gateway that translates between the two protocols."
This service maps a fixed number to a mobile number purely based on calling line identification. It is based on a self-developed API, Nexmo for handling SMS, and Restcomm for handling fixed line calls and their authentication logic.
An overview of standards and related technology in web servicesPapa Cheikh Cisse
Ce document présente brièvement des standards et autre normes des Services Web. Pour cela, il expose d'abord le concept de Service Web en parlant de son modèle et des avantages. Ensuite, il énonce des technologies telles que le triplet WSDL/UDDI/SOAP et ebXML. Enfin, une conclusion est faite après avoir fait ressortir les défis techniques rencontrés dans l'implémentation des Services Web.
Lecture describing evolution from legacy terminal access on IMS towards flexible browser-based communication.
Includes mandatory content such as IMS components & signaling, VoLTE, etc. but deducts reasoning from carrier evolution and transformations seen in practise. A few words about Internet based communication services and WebRTC should support discussion.
Presented 2015-12-09 at Slovak University of Technology
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...Sebastian Schumann
This paper describes an implementation for monitoring the QoS and expecting the QoE of a voice communication in a Real-time Transport Protocol (RTP) based telecommunication environment. The resulting QoS parameters are evaluated; the QoE is determined with the E-Model and processed for graphical presentation. With the use of some open-source programming libraries, the presented prototype can be a helpful alternative for expensive measurement devices and is ready to be deployed in a widespread telecom environment at low cost. Presented at NGMAST 2011 in Cardiff, UK.
The document provides an overview of project management. It defines a project as a temporary endeavor undertaken to create a unique product or service. It discusses project characteristics, examples of IT and non-IT projects, and compares projects to operations. The document also covers the project management triangle, stakeholders, the need for projects, project constraints, and the roles and responsibilities of a project manager. Finally, it discusses project environments, organizations, and compares functional, matrix and projectized organizational structures.
This document provides an overview of the IMS service control model. It discusses why operators are offering more services like IP telephony, presence, and video on demand. It then introduces the IMS as a flexible, standard platform that simplifies developing and deploying new services. The IMS provides a common service infrastructure and increases control and profitability through a unified service environment. Key components of the IMS service control model are also summarized, including service invocation using SIP application servers and initial filter criteria.
When a device has multiple paths to reach a destination, it always selects one path by preferring it over others. This selection process is termed as Routing. Routing is done by special network devices called routers or it can be done by means of software processes.The software based routers have limited functionality and limited scope.In case there are multiple path existing to reach the same destination, router can make decision based on Hop Count, Bandwidth, Metric, Prefix-length or Delay. Routing decision in networks, are mostly taken on the basis of cost between source and destination. Hop count plays major role here. Shortest path is a technique which uses various algorithms to decide a path with minimum number of hops. Common shortest path algorithms are Dijkstra's algorithm, Bellman Ford algorithm or Floyd algorithm. This presentation simplifies Floyd's algorithm with pictures and example.
The document describes the core network architecture of 3GPP's LTE wireless communication standard known as System Architecture Evolution (SAE). SAE features an all-IP network with simplified architecture and support for higher throughput, lower latency radio access networks. It consists of four main components: the Mobility Management Entity (MME) which handles mobility and security, the Serving Gateway (SGW) which manages user plane mobility, the Packet Data Network Gateway (PGW) which acts as an anchor point for external networks, and the Policy and Charging Rules Function (PCRF) which supports policy enforcement and charging control.
Future Internet: Managing Innovation and TestbedShinji Shimojo
Innovation is a big key word for ICT research and development. However, a road toward innovation is facing full of uncertainties and there are many obstacles. key elements to overcome these obstacles seems to be agile management of people, software and hardware. In addition, we think involvement of users in R&D will have much effect on the management of uncertainty in R&D. In this talk, I talk on our approach to this user involvement in JGN-X, an international future internet testbed and Knowledge Capital, Osaka, an smart city experimental testbed.
Jacques Magen - Future Internet Research and Experimentation (FIRE): Successf...FIA2010
FIRE is a European initiative to support experimentally-driven research for future internet technologies through large-scale experimental facilities. It has two dimensions: long-term visionary research and building testbeds to support both medium and long term research. Existing FIRE facilities have been used for experiments in areas like overlay routing, cognitive radio, open flow, IMS, services on clouds and grids, and the internet of things. New FIRE facilities provide unique opportunities for experiments involving dynamic service orchestration, wireless sensor networks, and software-defined networking.
Supporting Virtualized Telco Applications with OpenStackBruce Davie
This document discusses network function virtualization (NFV) and the role of network virtualization using OpenStack. NFV aims to virtualize network functions like firewalls and gateways to allow them to be deployed on commercial off-the-shelf hardware. OpenStack Neutron provides network virtualization and service chaining capabilities for NFV, but has some limitations. Open Virtual Networking (OVN) is being developed to provide native virtual networking for OpenStack that can help address Neutron's limitations and better support advanced NFV use cases like mobile core networks and virtual customer premises equipment.
VNF (Virtual Network Function) testing and “validation” as a network service for providers. NFV provides opportunities for providers to decrease time to market for new services and save money when rolling out an and managing the services. This will show a solution allowing providers to bring in VNFs and provide a flexible testing and validation framework.
WISEBED is an experimental federated wireless sensor network testbed infrastructure consisting of over 1500 heterogeneous sensor nodes across 9 European sites. It allows researchers to deploy large numbers of different sensor node types in various environments and topologies to evaluate algorithms, protocols, and wireless sensor network systems at large scale. The federated testbeds are interconnected via the Internet and provide a virtual unifying laboratory for remote access testing and benchmarking of wireless sensor networks.
Learn more about how today's service provider's networks are built to deliver yesterday's services and how the Next generation service require a new approach with our Evolved Programmable Network's offerings will enable business transformation for new service deliveries.
George Riley presented on network simulation with ns-3. He began with an overview of network simulation basics like discrete event simulation and how simulations model events, topology, and data demand. He then surveyed existing network simulation tools before focusing on details of ns-3, including its design goals and key features. Riley concluded by discussing recent releases of ns-3, planned future work, and a new NSF award to develop frameworks to enhance usability and experiment automation.
OpenStack Neutron Havana Overview - Oct 2013Edgar Magana
Presentation about OpenStack Neutron Overview presented during three meet-ups in NYC, Connecticut and Philadelphia during October 2013 by Edgar Magana from PLUMgrid
Open Source as Reference Implementation for Next Gen Network ServicesCharles Eckel
Open source and open standards are coming together to maximize the pace and relevance of both. Come learn about the IETF hackathon and MEF's LSO Hackathons and how open source projects such as OpenDaylight, OpenStack, and OPNFV are being enhanced and applied to create reference implementation of emerging standards.
This document contains the resume of Syed Shakeeb Sadiq. It summarizes his work experience in telecommunications, embedded systems development, and enterprise software development using various programming languages and frameworks. It also lists his technical skills, education information including a Master's degree from University of Oulu in Finland, projects, certifications and hobbies.
OpenStack and the Transformation of the Data Center - Lew TuckerLew Tucker
This document summarizes a presentation by Lew Tucker of Cisco on OpenStack and the transformation of the data center. The key points are:
1) OpenStack is heralding the creation of a new software layer that spans the entire data center and provides a unified compute, storage, and networking infrastructure.
2) Networking is evolving in OpenStack from simple flat networking in Nova to the separate Neutron networking service, which is designed to abstract specific vendor implementations.
3) Neutron is being extended through projects like Network Functions Virtualization (NFV) and group-based policy abstractions to provide dynamically scalable network services and allow developers to control network access and traffic through policy definitions.
Edge Device Multi-unicasting for Video StreamingTal Lavian Ph.D.
Multicast data stream from a server to multiple clients at the application level.
Overlay network structure must be constructed at the application layer to connect participating end systems
Mechanisms for adapting the overlay structure are necessary to provide and maintain adequate level of QoS of the application
Yoid – generic structure for overaly networks for content distribution
Overcast – single-source multicast
End System Multicast – small-scale multicast for teleconference
ALMI – an ALM infrastructure for multi-sender multicast that scales to a large number of groups with small number of members
Edge devices form overlay structure
Edge devices can replicate and multi-unicast to multiple clients
Overcome bottleneck problem over access link
NTT Communications is taking several steps to implement SDN/OpenFlow networks and provide commercial services:
1. They have already launched an "Enterprise Cloud" service using virtualized network technology with OpenFlow switches.
2. They are currently testing interconnectivity between enterprise clouds using OpenFlow switches and automating connections to VPN networks using SDN controllers and APIs.
3. Future plans include developing an orchestrator to manage cloud and network resources across layers, expanding SDN/OpenFlow networks to WANs, and using network functions virtualization.
OpenStack and OpenDaylight Workshop: ONUG Spring 2014mestery
This was a presentation I gave at the Open Networking Users Group (ONUG), Spring 2014. This talk covers some background on OpenStack and OpenDaylight, walks through Group Based Policy and OpFlex, and ends with a tutorial walk through of installing and using OpenStack with OpenDaylight.
This document summarizes network softwarization trends, challenges, and research efforts. It discusses how telecommunications companies are shifting their focus from hardware-centric to software-centric networks. This allows for more flexible and agile networks through technologies like Network Functions Virtualization (NFV) and Software-Defined Networking (SDN). NFV aims to virtualize network functions on commodity hardware, while SDN separates the control and data planes for increased programmability. The document outlines trends driving these changes, challenges faced by network operators, and several ongoing research projects exploring NFV, SDN, and their synergies to realize the benefits of software-defined networks.
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
This document discusses performance analysis of Voice over IP (VoIP) communication between two systems. It introduces VoIP technology and explores problems that can occur when sending voice and data packets over different windows. The proposed work evaluates performance of open source VoIP software tools like Linphone for clients, OpenSIPS for the server, and NS-2 for network traffic analysis. Two systems are configured as clients and one as the server to simulate a VoIP call between Client A and B routed through the server.
The document provides an overview of networking in OpenStack with Neutron. It discusses:
- The history of cloud computing and OpenStack.
- An introduction to OpenStack and its core services.
- Neutron architecture and plugins that allow integration with different networking technologies.
- The process of instance creation and how Neutron components work together.
- Tips for troubleshooting common network issues like DHCP failures and connectivity problems.
Dr. Christos Kolias – Senior Research Scientist
Keynote Title: “NFV: Empowering the Network”
Keynote Abstract: Network Functions Virtualization (NFV) envisions and promises to change the service provider landscape and has emerged as one of one of today’s significant trends. Although less than two years old, NFV has garnered the industry’s full attention and support. Moving swiftly, a number of key accomplishments have already taken place, and a lot more work is currently under way within ETSI NFV while we are embarking on its future phase. Various proofs-of-concepts (ranging from vEPC to vCPE, vIMS and vCDN) are being developed while issues such as open source and SDN are becoming key ingredients as the can play a pivotal role.
Dr. Christos Kolias' Bio: Christos Kolias is a senior research scientist at Orange Silicon Valley (a subsidiary of Orange). Christos is a co-founder of the ETSI NFV group and had led the formation of ONF’s Wireless & Mobile working group. He has lectured on NFV and SDN at several events. Christos has more than 15 years of experience in networking, he is the originator of Virtual Output Queueing (VOQ) used in packet switching. He holds a Ph.D. in Computer Science from UCLA.
---------------------------------------------------
★ Resources ★
Zerista: http://lcu14.zerista.com/event/member/137765
Google Event: https://plus.google.com/u/0/events/cpeksim4hr4ghhuufv5ic4viirs
Video: https://www.youtube.com/watch?v=tFDnj_342n4&list=UUIVqQKxCyQLJS6xvSmfndLA
Etherpad: http://pad.linaro.org/p/lcu14-400a
---------------------------------------------------
★ Event Details ★
Linaro Connect USA - #LCU14
September 15-19th, 2014
Hyatt Regency San Francisco Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Similar to ngnlab.eu - A Virtualized Laboratory Infrastructure (20)
Challenges Consuming Programmable Telecoms from the Developer’s PerspectiveSebastian Schumann
Challenges Consuming Programmable Telecoms from the Developer’s Perspective
- App development: I just want to make a call
- Consuming APIs: It’s all fine as long as you know what you want and have done it before
- App development vs. Telecom App development
Presented 2019-11-19 at TADSummit in London, UK
Programmable Telecoms is hard - Working on the toughest transformations in Telecoms
- immmr’s achievements
- immmr’s strengths, weaknesses, opportunities and threats as
a Telco funded start-up
- immmr’s journey, what we’ve learned over the past 2 years, what we would do differently
- The TADS story continues...
Presented 2018-11-14 at TADSummit in Lisbon, Portugal
immmr - a hybrid operator model explained
- Concept of a hybrid operator - or how to experience the best of both worlds
- Bridging a gap unconventionally and with the latest technical approaches
- Beyond the basics and how the TAD ecosystem can be of help.
Presented 2016-11-16 at TADSummit in Lisbon, Portugal
This document discusses how immmr is bringing traditional voice capabilities together with modern IP-based voice and video communications to create new communication experiences. Key points include:
- Immmr virtualizes mobile numbers and allows voice/video communication beyond phones through IP networks.
- This enables a hybrid service combining traditional and IP-based calling/video in one service with new business models.
- Immmr is working with Magenta to white-label its platform and conducted a UK trial of its "Orbit" product for additional numbers and communication abilities.
- Challenges remain in fully replacing telco stacks but benefits of an Internet-based approach can be realized while integrating with legacy networks.
Post-launch experiences from a locally developed internal proof of concept im...Sebastian Schumann
Post-launch experiences from a locally developed internal
proof of concept implementation
- Service description
- Used technologies and integration challenges
- Lessons learned
Presented at the 2nd annual WebRTC Global Summit in London, UK
Revision for 2015 from the IMS services & signaling course. The lecture was part of the communication protocols class delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
Expanding Service Providers’ Reach With WebRTC
- “Quickly brush up the old and focus on the new”
- “WebRTC is much more than a technology for operators”
- “Proper enablers are more important than fully standardized services”
- “Just do it – it’s easier than ever to innovate!”
Presented at the 14th Annual Broadband World Forum (BBWF) 2014 in Amsterdam, The Netherlands
What is the current service provider involvement with WebRTC?
- What are the WebRTC options for Telco's: Not just IMS
- How does WebRTC fit with PSTN / IMS / RCS / VoLTE strategies?
- Developing WebRTC + Telco-OTT initiatives
- How will WebRTC be deployed in the mobile world?
Presented at IIR Telecom APIs 2014 in London, UK
Third revision of IMS signaling course. The lecture was part of the communication protocols class 2014 delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
Slovak Telekom Case Study - Enabling enhanced services through IMS technology
- Mobile integration status
- Overview of new IP based services
- Evolution of the integration platform
Presented at IMS World Forum 2013 in Barcelona, Spain.
Integration of Rich Communication Services:
- Converged (fixed/mobile) operator requirements
- Integration of rich communications as an enabler for advanced IPTV services
- Use cases and business perspectives of selected scenarios
Presented at Rich Communication 2012 in Berlin, Germany.
Next Generation Services. The operator’s dream - The OTT’s reality?Sebastian Schumann
Presentations stimulating a discussion about Telco services and their future compared to over the top (OTT) services. Presented at ngnlab.eu workshop 2011 in Delft, The Netherlands.
The Potential of Consolidating SIP and XMPP Based Communication for Telecomm...Sebastian Schumann
This paper describes an approach for combining Session Initiation Protocol (SIP) based voice communication with Extensible Messaging and Presence Protocol (XMPP) based presence enhancements. The actual role of SIP and XMPP in the Internet Protocol (IP) based communication was analyzed, especially from the telecommunication carrier (Telco) point of view.
The proposed infrastructure extends a typical SIP infrastructure with XMPP for presence status integration. XMPP will be used as instant messaging and presence (IM/P) service infrastructure, the presence information will be extended with SIP phone status information of telecommunication endpoints. A first prototype has been developed and tested successfully. Presented at ONIT 2010 in Berlin, Germany.
Personalization of Internet Protocol Television (IPTV) Services in Next-Gener...Sebastian Schumann
This paper evaluates the existing NGN based IPTV architecture and services in the context of IPTV service personalization within multi-user environment at home network and user equipment. Advanced scenarios of IPTV for providing fully personalized and interactive IPTV services using existing and new mechanisms in Converged NGN based IPTV architectures are proposed within this paper. The services can improve the quality of experience (QoE) and user expectation via new personalized IPTV service behavior. Presented at MoMM 2010 in Paris, France.
Presence Service Integration Using Interconnected IP Multimedia Core NetworksSebastian Schumann
This paper describes the integration of the presence management service into existing IP Multimedia Subsystem (IMS) laboratory infrastructures. Both laboratories – NGNlab in Bratislava and the laboratory in Leipzig – use the Fraunhofer OpenIMS as core components for their testing IMS environment (i.e. Call Session Control Functions (CSCF), Home Subscriber Server (HSS)). The virtualization of these components will be described in this paper. Furthermore, the layer 3 interconnection and hence the possibility to share different applications between the locations will be discussed.
The presence management service has been deployed in a state where it is ready to be used with current IMS clients, for both presence information sharing via the Session Initiation Protocol (SIP) and user authorization via Extended Markup Language (XML) Configuration Access Protocol (XCAP). Presented at ONIT 2009 in Berlin, Germany.
Lecture notes (summarizing a more extensive lecture) about IMS Signaling. The notes evolved; this is the latest version. This lecture has been presented in 2010 in Bratislava, Slovakia.
Voice over IP (VoIP) Speech Quality Measurement with Open-Source Software Com...Sebastian Schumann
This paper proposes an alternative to expensive means for VoIP speech quality measurement. While current applications and measurement devices on the market are very expensive, the authors propose a solution based on open-source components that allows the determination of the Mean Opinion Score (MOS) value according the Perceptual Evaluation of Speech Quality (PESQ) test methodology. Presented at Elmar 2010 in Zadar, Croatia.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
2. Facts
} Next generation communication infrastructure on STU Bratislava
(shared deployment of faculties for electronics and informatics)
} Playground to implement results of research in the area of IP
based services
Vision
} Open and transparent server and service infrastructure
} Cost-efficient investment that offers high-end open
communication environment
An Example
} Presenting of how far we went already in the world of standard
compliant and free software
} Showing that the use of open-source software in education can
be tremendously supportive
} Shocking operators in what some pieces of hardware can do
2
3. } Virtual laboratory, just with a wider distribution
of the used infrastructure in the community
} More partners massively increase the efficiency
of all ngnlab.eu members
◦ Re-use the existing deployment and know-how
◦ Distribute core components to simulate real multi-
operator infrastructures (security, network parameter)
◦ Integrate and cross-test new applications
} 1st step proofs feasibility: Long term successful
STU+ST cooperation in ngnlab.eu project
4. } Complete SIP based communication
infrastructure
◦ Basic SIP services (registrar, proxy)
◦ NAT traversal, media relay
◦ Integrated voice mail system, conferencing engine
◦ Media gateway through VoIP trunk
◦ Presence service
} We can in fact become a small VoIP operator.
4
5. } Complete IMS service infrastructure
◦ IMS core (P/I/S/E-CSCF), HSS
◦ Integrated presence management
◦ XDMS (ft. authorization, resource lists)
◦ SIP application server
} IMS integrated IPTV
◦ Three channels
◦ Network based video recorder (nPVR)
◦ IPTV messaging
◦ Broadcasts
5
6. Hardware
} A rack each site
} A couple of servers
} Some basic switches
} UPS
6
Courtesy of ScriS (www.flickr.com)
8. } Everything running on STU servers is OSS
◦ Operating system
◦ Virtualization software
◦ SIP server, media server
◦ IMS core
◦ Application server
◦ IPTV solution
8
9. } "the act of virtualizing"
} … to run a program in virtual storage
} … to simulate some effect or condition on a
computer
} Virtual: defined in philosophy as "that which
is not real"
Courtesy of Wiktionary (www.wiktionary.com)
10. } “Virtual laboratory”
◦ Deployment of physical infrastructure on two sites
at the university in Bratislava and one site at Slovak
Telekom, a.s.
} “Virtual servers”
◦ Each physical server hosts several virtual machines
} “Virtual networking”
◦ Virtual LANs to separate network traffic for security
and research (monitoring)
◦ Not restricted to physical connections
DateAuthor / Presentation title 10
11. } FEI lab
◦ 5 physical servers (all running GNU/Linux)
◦ 1 management switch, 1 traffic switch (L3)
} FIIT lab
◦ 4 physical server (all running GNU/Linux)
◦ Connected to university switch
◦ Routing, management etc. through Linux router
} ST lab
◦ 2 physical server (VMWare ESX, Solaris)
◦ Shared NAS server
12. } Several virtualization techniques are used
◦ Full virtualization
– ST: VMWare ESX Server 3.0.1
– STU: Xen 3.2 (hardware-assisted virtualization, HVM)
◦ Paravirtualization
– STU lab: Xen 3.2
◦ OS-level virtualization
– ST: Solaris 10 Containers
} Oracle VirtualBox and VMWare server used on
notebooks to emulate several client instances
13. } Distributed labs interconnected with OpenVPN
◦ Linux routers on STU and a dedicated virtual
machine on ST run the software
◦ IPTables used to solve NAT problem
} Within each lab configured VLANs to separate
traffic and enforce security policies
◦ Native VMWare ESX and Solaris 10 feature
◦ Xen servers use user mode enhancements for kernel
14. } Traffic separation according
◦ Connection type
– Network traffic
– Management of physical and virtual machines
◦ Service
– Each service has own VLANs (VoIP, IMS, IPTV)
◦ Protocol
– Signaling: SIP, XMPP, Diameter
– Media: RTP, RTMP
} Easy enforcement of security policies and
network traffic monitoring
17. Sebastian Schumann
schumann@ktl.elf.stuba.sk
Disclosure
Sebastian works for Slovak Telekom, a.s. in the development and design department. He is a senior
application designer in the area of voice services, IP Multimedia Subsystem, and converged applications.
On the Slovak University of Technology, Sebastian is currently in his 3rd year of his PhD studies. He focuses
on next generation identity management and its potential in service personalization and collaboration.
Slovak Telekom, a.s. and the Slovak University of Technology are members of the ngnlab.eu initiative.
17All registered trademarks are property of their respective owners.