This document is a seminar report submitted by Shubham Madhukar Rokade to North Maharashtra University in partial fulfillment of a bachelor's degree in computer engineering. The report discusses Sky X technology, which overcomes limitations in TCP performance over satellite links by replacing TCP with a custom protocol optimized for satellite conditions. Key aspects of Sky X addressed include its gateway operation, protocol design features like efficient acknowledgment and dynamic window sizing, and its performance benefits.
The Sky X technology transparently enhances performance for users on a satellite network. It increases web performance by 3 times and file transfer speeds by 10 to 100 times by overcoming limitations of TCP protocols over satellite connections. The Sky X gateway replaces TCP with the Xpress Transport Protocol for the satellite link, improving throughput while remaining transparent to users and compatible with internet infrastructure. The Sky X system maximizes available bandwidth and is well-suited for satellite communication and remote network access.
The document discusses Sky X technology, which uses a gateway and client/server system to replace TCP with the Sky X protocol for transmissions over satellite links. This optimizes performance for satellite conditions like long latency and asymmetric bandwidth. The Sky X gateway intercepts TCP connections and converts data to the Xpress Transport Protocol (XTP) for transmission via satellite. On the other side, it translates data back to TCP. This improves performance while remaining transparent to end users. The Sky X system can increase web and file transfer speeds by 3x and 10-100x respectively over satellites.
The document discusses the Sky X gateway technology which improves data transmission performance over satellite networks. The Sky X gateway replaces TCP with XTP for satellite segments, improving throughput by 3 times. It consists of gateways, clients, and servers that split TCP into segments, using XTP over satellites to enhance performance without requiring client/server modifications. The Sky X protocol utilizes efficient acknowledgment and rate control algorithms to maximize throughput.
The document summarizes Sky X technology, which is a product family developed by Mentat to improve the performance of TCP/IP networks over satellite connections. The Sky X Gateway intercepts TCP connections and converts data to the Xpress Transport Protocol, which is optimized for satellite conditions. This can increase web performance by 3 times and file transfer speeds by 10 to 100 times. The Sky X Client/Server also helps enhance performance of internet and private networks over satellites. Testing has confirmed Sky X dramatically improves satellite network performance for both public and private access.
The document discusses how satellites can provide internet access over long distances but standard internet protocols like TCP are not optimized for satellite conditions. It introduces the Sky X system which replaces TCP over satellite links with a new protocol called Xpress Transport Protocol (XTP) that is optimized for satellite networks. The Sky X Gateway intercepts TCP connections and converts the data to XTP for transmission over the satellite. On the other side, it translates the data back to TCP. This allows for much better performance over satellites while being transparent to end users and compatible with existing internet infrastructure.
The document discusses Sky X technology, which uses the Xpress Transport Protocol (XTP) instead of TCP to improve performance over satellite networks. It works by intercepting TCP connections through a Sky X gateway that converts data to XTP for transmission over the satellite and back to TCP on the other side, remaining transparent to end users. Key benefits include 3 times faster web performance, no client or server modifications required, and efficient multicast file transfers. Sky X technology is best suited for satellite communications as it helps take full advantage of available bandwidth.
Manoj Datt presented on the Sky X technology for improving performance over satellite links. The Sky X system uses Xpress Transport Protocol (XTP) and a Sky X Gateway to optimize data transfer speeds over satellites. TCP is not well suited for satellite conditions that involve long delays and high bit errors. The Sky X Gateway replaces TCP with XTP for the satellite hop and back to TCP on the ground, improving speeds by 3-10x without any changes needed to end devices and applications. This Sky X architecture provides fully reliable, fast transmissions over satellites.
The Sky X technology transparently enhances performance for users on a satellite network. It increases web performance by 3 times and file transfer speeds by 10 to 100 times by overcoming limitations of TCP protocols over satellite connections. The Sky X gateway replaces TCP with the Xpress Transport Protocol for the satellite link, improving throughput while remaining transparent to users and compatible with internet infrastructure. The Sky X system maximizes available bandwidth and is well-suited for satellite communication and remote network access.
The document discusses Sky X technology, which uses a gateway and client/server system to replace TCP with the Sky X protocol for transmissions over satellite links. This optimizes performance for satellite conditions like long latency and asymmetric bandwidth. The Sky X gateway intercepts TCP connections and converts data to the Xpress Transport Protocol (XTP) for transmission via satellite. On the other side, it translates data back to TCP. This improves performance while remaining transparent to end users. The Sky X system can increase web and file transfer speeds by 3x and 10-100x respectively over satellites.
The document discusses the Sky X gateway technology which improves data transmission performance over satellite networks. The Sky X gateway replaces TCP with XTP for satellite segments, improving throughput by 3 times. It consists of gateways, clients, and servers that split TCP into segments, using XTP over satellites to enhance performance without requiring client/server modifications. The Sky X protocol utilizes efficient acknowledgment and rate control algorithms to maximize throughput.
The document summarizes Sky X technology, which is a product family developed by Mentat to improve the performance of TCP/IP networks over satellite connections. The Sky X Gateway intercepts TCP connections and converts data to the Xpress Transport Protocol, which is optimized for satellite conditions. This can increase web performance by 3 times and file transfer speeds by 10 to 100 times. The Sky X Client/Server also helps enhance performance of internet and private networks over satellites. Testing has confirmed Sky X dramatically improves satellite network performance for both public and private access.
The document discusses how satellites can provide internet access over long distances but standard internet protocols like TCP are not optimized for satellite conditions. It introduces the Sky X system which replaces TCP over satellite links with a new protocol called Xpress Transport Protocol (XTP) that is optimized for satellite networks. The Sky X Gateway intercepts TCP connections and converts the data to XTP for transmission over the satellite. On the other side, it translates the data back to TCP. This allows for much better performance over satellites while being transparent to end users and compatible with existing internet infrastructure.
The document discusses Sky X technology, which uses the Xpress Transport Protocol (XTP) instead of TCP to improve performance over satellite networks. It works by intercepting TCP connections through a Sky X gateway that converts data to XTP for transmission over the satellite and back to TCP on the other side, remaining transparent to end users. Key benefits include 3 times faster web performance, no client or server modifications required, and efficient multicast file transfers. Sky X technology is best suited for satellite communications as it helps take full advantage of available bandwidth.
Manoj Datt presented on the Sky X technology for improving performance over satellite links. The Sky X system uses Xpress Transport Protocol (XTP) and a Sky X Gateway to optimize data transfer speeds over satellites. TCP is not well suited for satellite conditions that involve long delays and high bit errors. The Sky X Gateway replaces TCP with XTP for the satellite hop and back to TCP on the ground, improving speeds by 3-10x without any changes needed to end devices and applications. This Sky X architecture provides fully reliable, fast transmissions over satellites.
The Sky X technology uses Sky X gateways and the XTP protocol to improve bandwidth utilization over satellite networks. The Sky X gateway intercepts TCP connections and converts data to XTP for transmission over the satellite link. It then converts data back to TCP for delivery. This architecture enhances performance without any changes to end clients or servers. Using XTP and optimizations, Sky X can increase web and file transfer speeds by 3-100 times over standard satellite internet connections. It provides a fully transparent and reliable way to access more of the available satellite bandwidth.
Securing the Onion: 5G Cloud Native InfrastructureMyNOG
1) The document discusses securing 5G cloud native infrastructure using the Service Proxy for Kubernetes (SPK) and Secure Communication Proxy (SCP).
2) SPK provides ingress and egress services for telco protocols like HTTP/2, Diameter, and SIP to secure Kubernetes deployments. SCP simplifies and secures communications between network functions.
3) SCP and SPK work together to provide a secure "onion model" architecture for distributed 5G core deployments using mutual TLS and traffic management capabilities.
Bringing AI research to wireless communication and sensingQualcomm Research
AI for wireless is already here, with applications in areas such as mobility management, sensing and localization, smart signaling and interference management. Recently, Qualcomm Technologies has prototyped the AI-enabled air interface and launched the Qualcomm 5G AI Suite. These developments are possible thanks to expertise in both wireless and machine learning from over a decade of foundational research in these complementing fields.
Our approach brings together the modeling flexibility and computational efficiency of machine learning and the out-of-domain generalization and interpretability of wireless domain expertise.
In this webinar, Qualcomm AI Research presents an overview of state-of-the-art research at the intersection of the two fields and offers a glimpse into the future of the wireless industry.
Qualcomm AI Research is an initiative of Qualcomm Technologies, Inc.
Speakers:
Arash Behboodi, Machine Learning Research Scientist (Senior Staff Engineer/Manager), Qualcomm AI Research Daniel Dijkman, Machine Learning Research Scientist (Principal Engineer), Qualcomm AI Research
Fog computing provide security to data in cloud pptpriyanka reddy
This document discusses fog computing and a proposed system to improve security of data stored in the cloud. It proposes using decoy technology to monitor for abnormal access patterns and generate fake documents to confuse attackers. The system would profile user behavior to validate authorized access and deploy decoys when abnormal access is detected. This helps prevent attackers from distinguishing real user data from fake data.
This document discusses the Internet Group Management Protocol (IGMP), which allows hosts to report their multicast group memberships to neighboring multicast routers. It describes the different versions of IGMP, including IGMPv1, IGMPv2, and IGMPv3. It also covers IGMP messages like membership queries, reports, and leaves. IGMP snooping is defined as a switch feature that optimizes multicast traffic delivery by only forwarding traffic to ports with interested receivers. Multicast Listener Discovery (MLD) serves a similar purpose for IPv6 as IGMP does for IPv4.
Dask is a Python library for parallel computing that allows users to scale existing Python code to larger datasets and clusters. It provides parallelized versions of NumPy, Pandas, and Scikit-Learn that have the same interfaces as the originals. Dask can be used to parallelize existing Python code with minimal changes, and it supports scaling computations from a single multicore machine to large clusters with thousands of nodes. Dask's task-scheduling approach allows it to be more flexible than other parallel frameworks and to support complex computations and real-time workloads.
Top 5 Event Streaming Use Cases for 2021 with Apache KafkaKai Wähner
Apache Kafka and Event Streaming are two of the most relevant buzzwords in tech these days. Ever wonder what the predicted TOP 5 Event Streaming Architectures and Use Cases for 2021 are? Check out the following presentation. Learn about edge deployments, hybrid and multi-cloud architectures, service mesh-based microservices, streaming machine learning, and cybersecurity.
On-demand video recording: https://videos.confluent.io/watch/XAjxV3j8hzwCcEKoZVErUJ
Delay tolerant networks (DTNs) allow communication in networks with intermittent connectivity by using a store-carry-forward approach. DTNs employ a set of protocols that store messages during network disconnections and forward them when connectivity is available. They can provide communication even when end-to-end paths do not exist. Key properties of DTNs include high latency, low data rates, disconnection, long queuing delays, short contact ranges, and dynamic topologies. Potential applications of DTNs include telemedicine in remote areas, social networking, communication under censorship, file sharing, and sharing cellular minutes.
Fog computing is a paradigm that extends cloud computing and services to the edge of the network, similar to cloud but providing data computation, storage, and application services closer to users. This helps address issues with cloud like limited bandwidth, latency, and security vulnerabilities. Fog computing uses techniques like user behavior profiling and decoy systems to detect unauthorized access and secure data in the cloud from attackers. It has a decentralized architecture with fog devices acting as intermediaries between user devices and the cloud. Potential applications and scenarios of fog computing include smart grids, smart traffic lights, software defined networks, and the Internet of Things.
description of the services to the networks .
how to apply quality of service
how to improve the networks
summary in personal point of view
please don't hesitate if you have further question
Cloud computing involves clusters of servers connected over a network that allow users to access computational resources and pay only for what they use. While cloud computing provides advantages like flexibility and cost savings, security is a main concern as user data is stored remotely. Fog computing is a new technique that extends cloud computing by providing additional security measures and isolating user data at the network edge to enhance privacy. It aims to place data closer to end users to improve security in cloud environments.
Building Streaming Data Pipelines with Google Cloud Dataflow and Confluent Cl...HostedbyConfluent
We will demonstrate how easy it is to use Confluent Cloud as the data source of your Beam pipelines. You will learn how to process the information that comes from Confluent Cloud in real time, make transformations on such information and feed it back to your Kafka topics and other parts of your architecture.
The document provides a software requirements specification for a prison management system with the following key features:
1. It describes the purpose, scope, definitions, references, and technologies to be used for the system.
2. The system will include modules for nominal roll, case register, release diary, parole register, duty register, and interview requests.
3. Users like administrators, police officers, and data managers will be able to view, enter, and manage prisoner data through the system.
Passive Optical Networks (PON) technology
brings an evolution in the industry of Telecommunication for the
provisioning of High Speed Internet (HSI) and Triple Play
bundled Services that includes Voice, Data, and Video Streaming
throughout the world. In Pakistan most of the service providers
are offering broadband services on traditional copper OSP
(Outside Plant) network since 2000. Demand for the high speed
internet and broadband is increasing rapidly, it is desired with
great need to migrate from traditional copper based OSP network
to PON – FTTx (Fiber To The x) infrastructure. Considering the
geographical requirements in Pakistan a scalable fiber network is
required which can be optimized as per the user’s requirements
and demands with high speed bandwidth efficiency, involving the
minimum losses and with ideal capital expenditure (CAPEX). In
this work a platform for migration from copper to fiber access
network with a scalable and optimized PON – FTTx
infrastructure in green field and dry field areas of Pakistan have
been proposed using Geographic Information system (GIS). In
any developing country like Pakistan having the same cultural
and geographical topology, this platform can be used to migrate
from copper to fiber access network to provide the PON based
telecom services. The developed platform for migration from
copper to PON based fiber has been studied, planned, and then
simulated on a selected geographical area of Pakistan with
physical execution that showed better and efficient results with
reduction in capital and operational expenditures. A factual plan
without ambiguities assists the operators of Pakistan to
analyze/forecast bandwidth requirements of an area, optimized
network planning along with the in time and efficient
deployment.
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveMyNOG
1) Data centers play a critical role in supporting modern technological infrastructure and the increasing demands of the digital world by providing centralized data storage, powerful computational resources, and connectivity hubs.
2) Current connectivity challenges for data centers include limited bandwidth, high costs, long deployment times, and ensuring secure and private data transmission.
3) To future-proof their connectivity, data centers need scalable, redundant, and resilient network infrastructure with flexible connectivity options that allow for growth, hybrid architectures, and efficient management.
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
The document discusses the Sky-X technology, which replaces TCP with the Xpress Transport Protocol (XTP) for satellite communication. The Sky-X gateway intercepts TCP connections and converts data to XTP for transmission over the satellite link, then back to TCP. This improves performance over satellite links by optimizing for high loss environments compared to TCP. The Sky-X system allows networks to take full advantage of satellite bandwidth and provides fast, reliable data transfer and multicast file transfers without requiring client/server modifications.
Sky X is a new technology that overcomes bandwidth restrictions in satellite networks. It works by replacing TCP with the Xpress Transport Protocol (XTP) for satellite connections. This allows users to take full advantage of available bandwidth. The Sky X Gateway intercepts TCP connections and converts data to XTP for transmission over satellites, then translates it back to TCP for delivery. This significantly increases web and file transfer speeds without any changes needed to end clients or servers. Future enhancements may further optimize Sky X for emerging concepts requiring high data transmission capabilities over long distances.
The Sky X technology uses Sky X gateways and the XTP protocol to improve bandwidth utilization over satellite networks. The Sky X gateway intercepts TCP connections and converts data to XTP for transmission over the satellite link. It then converts data back to TCP for delivery. This architecture enhances performance without any changes to end clients or servers. Using XTP and optimizations, Sky X can increase web and file transfer speeds by 3-100 times over standard satellite internet connections. It provides a fully transparent and reliable way to access more of the available satellite bandwidth.
Securing the Onion: 5G Cloud Native InfrastructureMyNOG
1) The document discusses securing 5G cloud native infrastructure using the Service Proxy for Kubernetes (SPK) and Secure Communication Proxy (SCP).
2) SPK provides ingress and egress services for telco protocols like HTTP/2, Diameter, and SIP to secure Kubernetes deployments. SCP simplifies and secures communications between network functions.
3) SCP and SPK work together to provide a secure "onion model" architecture for distributed 5G core deployments using mutual TLS and traffic management capabilities.
Bringing AI research to wireless communication and sensingQualcomm Research
AI for wireless is already here, with applications in areas such as mobility management, sensing and localization, smart signaling and interference management. Recently, Qualcomm Technologies has prototyped the AI-enabled air interface and launched the Qualcomm 5G AI Suite. These developments are possible thanks to expertise in both wireless and machine learning from over a decade of foundational research in these complementing fields.
Our approach brings together the modeling flexibility and computational efficiency of machine learning and the out-of-domain generalization and interpretability of wireless domain expertise.
In this webinar, Qualcomm AI Research presents an overview of state-of-the-art research at the intersection of the two fields and offers a glimpse into the future of the wireless industry.
Qualcomm AI Research is an initiative of Qualcomm Technologies, Inc.
Speakers:
Arash Behboodi, Machine Learning Research Scientist (Senior Staff Engineer/Manager), Qualcomm AI Research Daniel Dijkman, Machine Learning Research Scientist (Principal Engineer), Qualcomm AI Research
Fog computing provide security to data in cloud pptpriyanka reddy
This document discusses fog computing and a proposed system to improve security of data stored in the cloud. It proposes using decoy technology to monitor for abnormal access patterns and generate fake documents to confuse attackers. The system would profile user behavior to validate authorized access and deploy decoys when abnormal access is detected. This helps prevent attackers from distinguishing real user data from fake data.
This document discusses the Internet Group Management Protocol (IGMP), which allows hosts to report their multicast group memberships to neighboring multicast routers. It describes the different versions of IGMP, including IGMPv1, IGMPv2, and IGMPv3. It also covers IGMP messages like membership queries, reports, and leaves. IGMP snooping is defined as a switch feature that optimizes multicast traffic delivery by only forwarding traffic to ports with interested receivers. Multicast Listener Discovery (MLD) serves a similar purpose for IPv6 as IGMP does for IPv4.
Dask is a Python library for parallel computing that allows users to scale existing Python code to larger datasets and clusters. It provides parallelized versions of NumPy, Pandas, and Scikit-Learn that have the same interfaces as the originals. Dask can be used to parallelize existing Python code with minimal changes, and it supports scaling computations from a single multicore machine to large clusters with thousands of nodes. Dask's task-scheduling approach allows it to be more flexible than other parallel frameworks and to support complex computations and real-time workloads.
Top 5 Event Streaming Use Cases for 2021 with Apache KafkaKai Wähner
Apache Kafka and Event Streaming are two of the most relevant buzzwords in tech these days. Ever wonder what the predicted TOP 5 Event Streaming Architectures and Use Cases for 2021 are? Check out the following presentation. Learn about edge deployments, hybrid and multi-cloud architectures, service mesh-based microservices, streaming machine learning, and cybersecurity.
On-demand video recording: https://videos.confluent.io/watch/XAjxV3j8hzwCcEKoZVErUJ
Delay tolerant networks (DTNs) allow communication in networks with intermittent connectivity by using a store-carry-forward approach. DTNs employ a set of protocols that store messages during network disconnections and forward them when connectivity is available. They can provide communication even when end-to-end paths do not exist. Key properties of DTNs include high latency, low data rates, disconnection, long queuing delays, short contact ranges, and dynamic topologies. Potential applications of DTNs include telemedicine in remote areas, social networking, communication under censorship, file sharing, and sharing cellular minutes.
Fog computing is a paradigm that extends cloud computing and services to the edge of the network, similar to cloud but providing data computation, storage, and application services closer to users. This helps address issues with cloud like limited bandwidth, latency, and security vulnerabilities. Fog computing uses techniques like user behavior profiling and decoy systems to detect unauthorized access and secure data in the cloud from attackers. It has a decentralized architecture with fog devices acting as intermediaries between user devices and the cloud. Potential applications and scenarios of fog computing include smart grids, smart traffic lights, software defined networks, and the Internet of Things.
description of the services to the networks .
how to apply quality of service
how to improve the networks
summary in personal point of view
please don't hesitate if you have further question
Cloud computing involves clusters of servers connected over a network that allow users to access computational resources and pay only for what they use. While cloud computing provides advantages like flexibility and cost savings, security is a main concern as user data is stored remotely. Fog computing is a new technique that extends cloud computing by providing additional security measures and isolating user data at the network edge to enhance privacy. It aims to place data closer to end users to improve security in cloud environments.
Building Streaming Data Pipelines with Google Cloud Dataflow and Confluent Cl...HostedbyConfluent
We will demonstrate how easy it is to use Confluent Cloud as the data source of your Beam pipelines. You will learn how to process the information that comes from Confluent Cloud in real time, make transformations on such information and feed it back to your Kafka topics and other parts of your architecture.
The document provides a software requirements specification for a prison management system with the following key features:
1. It describes the purpose, scope, definitions, references, and technologies to be used for the system.
2. The system will include modules for nominal roll, case register, release diary, parole register, duty register, and interview requests.
3. Users like administrators, police officers, and data managers will be able to view, enter, and manage prisoner data through the system.
Passive Optical Networks (PON) technology
brings an evolution in the industry of Telecommunication for the
provisioning of High Speed Internet (HSI) and Triple Play
bundled Services that includes Voice, Data, and Video Streaming
throughout the world. In Pakistan most of the service providers
are offering broadband services on traditional copper OSP
(Outside Plant) network since 2000. Demand for the high speed
internet and broadband is increasing rapidly, it is desired with
great need to migrate from traditional copper based OSP network
to PON – FTTx (Fiber To The x) infrastructure. Considering the
geographical requirements in Pakistan a scalable fiber network is
required which can be optimized as per the user’s requirements
and demands with high speed bandwidth efficiency, involving the
minimum losses and with ideal capital expenditure (CAPEX). In
this work a platform for migration from copper to fiber access
network with a scalable and optimized PON – FTTx
infrastructure in green field and dry field areas of Pakistan have
been proposed using Geographic Information system (GIS). In
any developing country like Pakistan having the same cultural
and geographical topology, this platform can be used to migrate
from copper to fiber access network to provide the PON based
telecom services. The developed platform for migration from
copper to PON based fiber has been studied, planned, and then
simulated on a selected geographical area of Pakistan with
physical execution that showed better and efficient results with
reduction in capital and operational expenditures. A factual plan
without ambiguities assists the operators of Pakistan to
analyze/forecast bandwidth requirements of an area, optimized
network planning along with the in time and efficient
deployment.
FUTURE-PROOFING DATA CENTRES from Connectivity PerspectiveMyNOG
1) Data centers play a critical role in supporting modern technological infrastructure and the increasing demands of the digital world by providing centralized data storage, powerful computational resources, and connectivity hubs.
2) Current connectivity challenges for data centers include limited bandwidth, high costs, long deployment times, and ensuring secure and private data transmission.
3) To future-proof their connectivity, data centers need scalable, redundant, and resilient network infrastructure with flexible connectivity options that allow for growth, hybrid architectures, and efficient management.
Next Generation Network Architecture, by Sunny Yeung.
A presentation given at APRICOT 2016’s Opening Ceremony and APRICOT Plenary 1 session on 22 February 2016.
The document discusses the Sky-X technology, which replaces TCP with the Xpress Transport Protocol (XTP) for satellite communication. The Sky-X gateway intercepts TCP connections and converts data to XTP for transmission over the satellite link, then back to TCP. This improves performance over satellite links by optimizing for high loss environments compared to TCP. The Sky-X system allows networks to take full advantage of satellite bandwidth and provides fast, reliable data transfer and multicast file transfers without requiring client/server modifications.
Sky X is a new technology that overcomes bandwidth restrictions in satellite networks. It works by replacing TCP with the Xpress Transport Protocol (XTP) for satellite connections. This allows users to take full advantage of available bandwidth. The Sky X Gateway intercepts TCP connections and converts data to XTP for transmission over satellites, then translates it back to TCP for delivery. This significantly increases web and file transfer speeds without any changes needed to end clients or servers. Future enhancements may further optimize Sky X for emerging concepts requiring high data transmission capabilities over long distances.
Capsule endoscopy provides a non-invasive method to examine the small intestine using a pill-sized camera that is swallowed. It takes and transmits images that are recorded for physicians to review. Previous endoscopy methods could not fully examine the small intestine. Research shows capsule endoscopy can diagnose certain gastrointestinal diseases. The document discusses the
Sky X is a new technology that overcomes restrictions of using TCP/IP over satellite networks by using a new protocol called Xpress Transport Protocol (XTP). It works by splitting connections and compressing data at Sky X gateways on the client and server sides, translating between XTP and TCP transparently. This improves performance over satellite networks by 3-10x. Future enhancements involving XipLink will further improve Sky X's ability to handle large amounts of data transmission expected with developing technologies.
In February 2012 Annika Naschitzki presented to both Wellington and Auckland audiences about Optimal Usability's new eye tracker, and what it can do. Here is the presentation, however if you would like Anni to come into your organisation to do the presentation please get in touch: anni@optimalusability.com
This document summarizes a research paper titled "EyePhone: Activating Mobile Phones With Your Eyes". It discusses the following key points:
1. The paper proposes a system called EyePhone that allows users to control their mobile phone with eye movements and blinks detected by the front-facing camera. EyePhone tracks the user's eye on the display and detects blinks to emulate mouse clicks.
2. EyePhone works in four phases - eye detection, open eye template creation, eye tracking, and blink detection. It uses template matching and thresholding techniques to detect eyes, track eye movements, and determine when the user blinks.
3. The system was evaluated for accuracy of eye tracking and blink
The document discusses a pill camera, which is a capsule endoscopy device used to examine the small intestine. It consists of a pill-sized capsule containing a camera, light source, and transmitter. Patients swallow the capsule, which passes naturally through the digestive tract while transmitting thousands of images. These images are received by a sensor array worn by the patient and recorded for physicians to review on specialized software. The capsule does not require sedation and allows examination of the entire small intestine, providing a more complete evaluation than other endoscopic methods. Key advantages include it being non-invasive, comfortable for patients, and providing better imaging of hard to reach areas of the digestive tract.
The document provides guidance on conducting a literature review. It discusses that a literature review aims to convey previous knowledge and facts established on a topic by summarizing, evaluating, and integrating primary sources. The literature review is conducted in 5 stages - annotating relevant sources, organizing sources thematically, additional reading, writing individual sections, and integrating all sections. When writing the literature review, an introduction defining the topic, a body summarizing and grouping sources thematically, and a conclusion evaluating the current state of research and identifying gaps are essential elements to include.
The document discusses the Eye Gaze system, which allows people with physical disabilities to control devices with their eyes. It describes how the system works by tracking a user's eye movements to select on-screen options. The document outlines who can benefit from the system, its various components and menus, applications, and future advancements like improved portability and tracking for limited eye control. It concludes that eye tracking interfaces can aid application control if used sensibly given the voluntary and involuntary nature of eye movements.
The document discusses a proposed new urban transportation system called Sky Bus. Some key points:
1) Sky Bus is a suspended railway system that operates on an elevated track parallel to existing roads, without interfering with traffic below. It is intended to provide pollution-free, noise-free, and air-conditioned transit.
2) The system consists of lightweight coaches running on an enclosed box-like track supported by columns. It can carry a high volume of passengers and cargo at speeds up to 100 kmph.
3) Stations require less space than conventional subway stations. Entry is via electronic swiping cards. The system can shift between routes using traverser arrangements.
4) Sky Bus is
The capsule camera is a pill-sized device that can be swallowed to take pictures of the digestive tract as it passes through. It contains a camera, lights, transmitter and batteries. Images are transmitted wirelessly to a recorder and over 2,600 high quality images can be captured. The capsule allows non-invasive imaging of the small intestine to diagnose conditions like Crohn's disease. It is painless for the patient but cannot be controlled and could get obstructed, though newer models aim to overcome these limitations. The capsule camera has revolutionized digestive imaging.
The document discusses brain-computer interface (BCI) technology, also known as brain chip technology. It begins with an introduction and overview of BCI, including block diagrams showing the translation of brain signals into device commands. The document then covers different types of BCI, such as invasive and non-invasive methods, as well as various BCI projects including BrainGate and using thought to control devices like robots and games. Potential advantages of BCI are discussed, such as helping paralyzed patients control prosthetics, as well as disadvantages like the crudeness of current technology and issues with electrodes. In conclusion, BCI technology allows communication based on neural activity and provides paralyzed individuals new ways to interact with their environments through a direct
How to Make Awesome SlideShares: Tips & TricksSlideShare
Turbocharge your online presence with SlideShare. We provide the best tips and tricks for succeeding on SlideShare. Get ideas for what to upload, tips for designing your deck and more.
SlideShare is a global platform for sharing presentations, infographics, videos and documents. It has over 18 million pieces of professional content uploaded by experts like Eric Schmidt and Guy Kawasaki. The document provides tips for setting up an account on SlideShare, uploading content, optimizing it for searchability, and sharing it on social media to build an audience and reputation as a subject matter expert.
This document is a main project report submitted by 4 students from the Department of Computer Science and Engineering at Government College of Engineering, Kannur in March 2014. The project develops a distributed traffic management framework using fuzzy logic control that aims to enhance network performance compared to existing protocols. Routers are deployed with intelligent data rate controllers to regulate traffic. Unlike protocols relying on estimated network parameters, the fuzzy logic controller directly measures router queue size.
This document is the thesis submitted by Anurag Mondal to the Indian Institute of Technology Kharagpur for the degree of Master of Technology in Telecommunication Systems Engineering. The thesis focuses on improving TCP performance during vertical handovers between heterogeneous wireless networks using a cross-layer approach. It provides background on vertical handovers and TCP, analyzes existing vertical handover algorithms and proposes a new cross-layer algorithm to increase TCP throughput during handovers. The thesis was conducted under the guidance of Prof. Rajashri Roy and presents simulation results showing the proposed approach improves metrics like data rate, congestion window and packet drop compared to existing techniques.
This thesis proposes and evaluates several SDN-enabled traffic engineering solutions:
1. An OVX Testing Framework to test the OpenVirteX network hypervisor which virtualizes OpenFlow networks.
2. A Command Line Interface for the ONOS Segment Routing application to retrieve switch statistics and configure tunnels/policies.
3. An emulation of packet-optical networks using ONOS as a multi-layer SDN controller to optimize traffic flow across packet and optical domains.
4. A Maximum Weighted Alpha scheduling algorithm for input queued switches to provide throughput optimality under hybrid data traffic loads. Performance is evaluated in an SDN testbed.
The document is a thesis submitted by Maryam Hamidirad for the degree of Master of Applied Science. It proposes a cooperative mechanism to reduce energy consumption in the downlink channel of LTE networks for multicast video transmission. The mechanism clusters users based on distance from the base station. A cluster header is chosen using a utility function and receives data directly from the base station. Cluster headers then relay the data to other users in their cluster using WLAN. Simulations show the approach reduces base station power consumption by 5-25% compared to conventional multicast transmission.
This document is a final report from 1993 on modelling and designing scalable parallel computing systems. It details the development of a fractal parallel computer topology that can extend to fill a wafer. Algorithms were developed for routing and load balancing, and a simulation program tested a 64-node network using UNIX and PC workstations. Benchmarking of a 16-node example network demonstrated scalability. The report discusses implementing hardware control to support applications using wafer-scale integration.
1) The document describes a TCP traffic monitoring and debugging tool created as a bachelor's thesis project. The tool aims to help cloud providers better understand application needs by determining metrics and statistics of TCP connections.
2) Key aspects of the tool include inferring important TCP connection variables like congestion window, combining these with socket-level traffic logs, and a Linux kernel module. Sendbuffer advertising is used to test the tool's accuracy in detecting application-limited connections.
3) The tool seeks to identify network problems by monitoring TCP connections and determining the limiting factor (bandwidth, latency etc.). It displays statistics like RTT, retransmissions and other counters to help cloud operators optimize traffic.
This PhD thesis proposes methods for distributed iterative decoding and processing in wireless cooperative networks. It presents a block structure layered design for jointly designing channel encoders across all nodes in a wireless network. It also develops a generic implementation framework for sum-product algorithm message passing on factor graphs, using a proposed Karhunen-Loeve transform message representation. This framework can be applied to receiver processing in wireless networks. The thesis aims to advance both the global design of channel codes across network nodes, and the receiver processing of individual nodes, to better support wireless cooperative networks.
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdfYAAKOVSOLOMON1
This document is a dissertation submitted by Yue Li for the degree of Doctor of Philosophy at the University of Victoria. The dissertation focuses on improving transmission efficiency for machine-type communication (MTC) devices in 5G cellular systems. Specifically, it proposes applying network coding and device-to-device communications to MTC devices to improve efficiency. It also proposes using floating relays deployed via unmanned aerial vehicles to proactively improve channel quality for MTC devices experiencing high shadowing. The dissertation provides theoretical analyses and performance evaluations of the proposed approaches.
Performance assessment of the MASQUE extension for proxying scenarios in the ...AlessandroNuzzi1
This thesis evaluates the performance of the MASQUE protocol in proxy scenarios. MASQUE allows proxying of UDP and IP traffic over HTTP, enabling the tunneling of QUIC datagrams. The thesis assesses the performance impact of using a MASQUE proxy to provide privacy guarantees like hiding the client IP. Experimental results show that while TCP proxying has best throughput and performance, MASQUE usage has a relatively modest performance cost for contexts already using QUIC. The results reveal that MASQUE could be a suitable choice in some scenarios, though TCP proxying generally performs better.
Large Scale Data center Solution Guide: eBGP based designDhiman Chowdhury
Network Automation provides IT administrators and network operators significant benefits. This solution guide
describes an approach to build data centers using Layer3 BGP routing protocol.
It also summarizes on some design philosophies for data center and why E-BGP is better suited.
■ Large-scale data center requirements
■ Large-scale data center topologies
■ Large-scale data center routing
■ EBGP-routed large-scale Clos topology-based data cente
This document describes the radio interface protocol architecture for 3G mobile networks. It defines the layer 1 and layer 2 services and functions, including transport channels, logical channels, and their mapping. It also describes the data flows through layer 2 for different logical channels mapped to various transport channels. The document is intended for future development work within 3GPP and does not constitute an approved standard.
Extended LTE Coverage for Indoor Machine Type Communication.pdfYAAKOVSOLOMON1
This document discusses extending LTE coverage for indoor machine type communication. It proposes using repetition to increase coverage without requiring hardware upgrades. Simulations show that with a 20 dB coverage increase through repetition, coverage can be almost complete for inter-site distances up to 2500 m, where standard LTE has gaps. Higher resource usage is required but the number of supported users is limited more by coverage at longer distances than resources. Uplink performance is also evaluated through link and system level simulations.
This document is a project report that proposes developing a web application to securely store files on a cloud server using hybrid cryptography. It aims to address data security and privacy issues for cloud storage. The application would use a hybrid cryptography technique combining symmetric and asymmetric encryption to encrypt files before uploading them to the cloud. Only authorized users with decryption keys would be able to access and download encrypted files from the cloud server. The report outlines the problem statement, objectives, methodology, design, and implementation of the proposed application to provide secure file storage on the cloud.
Paper describes optimization of bandwidth using dynamic creation and deletion of MPLS LSPs all managed by the router.
Builds on a unique concept to automatically manage and elastically grow and contract LSPs
The document is a project report submitted by Kedar Khandeparkar for the partial fulfillment of the requirements for the degree of Master of Technology. It discusses the design and implementation of communication, storage, and archival of an IEEE C37.118 standard based Wide Area Measurement System (WAMS). WAMS uses Phasor Measurement Units (PMUs) to collect synchronized phasor measurements across the power grid to provide improved monitoring capabilities compared to traditional SCADA systems. The report covers the components of WAMS, communication protocols, existing WAMS implementations, and use of databases for storage and archival of PMU/PDC data.
This document analyzes the past, present, and future of enterprise data center networking. It discusses physical network topologies like common bus, ring, star, and mesh. It then covers routing methods like Spanning Tree Protocol (STP) that were commonly used but have limitations. Newer protocols like Transparent Interconnection of Lots of Links (TRILL) and Shortest Path Bridging (SPB) aim to improve performance over STP. Software Defined Networking (SDN) provides another option to overcome STP's weaknesses by controlling switches from a centralized server.
This thesis proposes methods for semantically enabling and verifying compositions of geospatial web services. It develops RESTful implementations of OGC services using JSON and describes services using Hydra vocabulary. A type system and algorithms are defined for static syntactic verification and Hoare logic is extended for dynamic verification. Semantic descriptions are propagated through compositions and JSON-W is created to describe compositions in JSON. The services are implemented to demonstrate semantic discovery, verification and execution of compositions.
This thesis examines considerations for deploying software-defined networks (SDN) in telecommunication networks. It discusses strategies for migrating networks to allow both SDN and legacy devices to interoperate during an incremental deployment. The thesis formulates an automated process for bootstrapping newly deployed forwarding devices onto the network in an emulated environment. It also reviews solutions for programming forwarding devices, performing topology discovery, and providing secure remote management of devices located in untrusted environments.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes and Domino License Cost Reduction in the World of DLAU
Sky X Tech Report
1. A
Seminar-I Report
on
SKY X TECHNOLOGY
Submitted in Partial Fulfillment of
the Requirements for the Third Year
of
Bachelor of Engineering
in
Computer Engineering
to
North Maharashtra University, Jalgaon
Submitted by
Shubham Madhukar Rokade
Under the Guidance of
Mr.Vijay Ingle Sir
DEPARTMENT OF COMPUTER ENGINEERING
SSBT’s COLLEGE OF ENGINEERING AND TECHNOLOGY,
BAMBHORI, JALGAON - 425 001 (MS)
2015 - 2016
2. SSBT’s COLLEGE OF ENGINEERING AND TECHNOLOGY,
BAMBHORI, JALGAON - 425 001 (MS)
DEPARTMENT OF COMPUTER ENGINEERING
CERTIFICATE
This is to certify that the Seminar-I entitled Sky X Technology, submitted by
Shubham Madhukar Rokade
in partial fulfillment of the Third Year of Bachelor of Engineering in Computer Engi-
neering has been satisfactorily carried out under my guidance as per the requirement
of North Maharashtra University, Jalgaon.
Date: April 14, 2016
Place: Jalgaon
Mr.Vijay Ingle Sir
Guide
Prof. Dr. Girish K. Patnaik Prof. Dr. K. S. Wani
Head Principal
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) i
3. Acknowledgements
At the outset, I thank God for making my endeavour a success. I also express my gratitude
to Dr.G.K.Patnaik , Head of the Department for providing me with adequate facilities, ways
and means by which I was able to complete this seminar-I. I express my sincere gratitude
to my Seminar-I Guide Mr.Vijay Ingle Sir,for his constant support and valuable suggestions
without which the successful completion of this seminar would not have been possible.
I express my immense pleasure and thankfulness to all the teachers and staff of the Depart-
ment of Computer Engineering,SSBT’ COET,Jalgaon for their cooperation and support.
Last but not the least,I thank all others,and specially my classmates and my family.
Shubham Madhukar Rokade
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) ii
7. Abstract
Satellites are attractive option for carrying internet and other IP traffic to many locations
across the globe where terrestrial options are limited or [censored] prohibitive. But data
networking on satellite is faced with overcoming the large latency and high bit error rate
typical of satellite communications as well as the asymmetric bandwidth design of most
satellite network. Satellites are ideal for providing internet and private network access over
long distance and to remote locations. However the internet protocols are not optimized
for satellite conditions. So the throughput over the satellite networks is restricted to only a
fraction of available bandwidth, the leading supplies of TCP/IP to the computer industry
have overcome their limitations with the development of the Sky X product family.
The Sky X system replaces TCP over satellite link with a protocol optimized for the long
latency, high loss and asymmetric bandwidth conditions of the typical satellite communica-
tion. The Sky X family consists of Sky X Gateway, Sky X Client/Server and Sky X OEM
products. Sky X products increase the performance of IP over satellite by transparency
replacing. The Sky X Gateway works by intercepting the TCP connection from client and
converting the data to Sky X protocol for transmission over the satellite. The Sky X Client
/Server product operates in a similar manner except that the Sky X client software is in-
stalled on each end users PC Connection from applications running on the PC is intercepted
and send over the satellite using the Sky X protocol.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 1
8. Chapter 1
Introduction
In This Chapter,Discuss about the general things related with the Sky X Technology.Satellites
are ideal for providing internet and private network access over long distance and to remote
locations. However the internet protocols are not optimized for satellite conditions and
consequently the throughput over the satellite networks is restricted to only a fraction of
available bandwidth. We can overcome these restrictions by using the Sky X protocol.
In section 1.1 discuss the Why sky x Technology,The Performance Of Tcp Over Satellite
are explain in section 1.2.
1.1 Why sky x Technology ?
• Internet protocols(TCP/IP) are not optimized for satellite conditions so the throughput
over the satellite networks decreases to only a fraction of available bandwidth.
• Satellites are ideal for providing internet & private network over long distance.
• The satellite conditions adversely interact with a number of elements of the TCP
architecture, including its window sizing, congestion avoidance algorithms & data ac-
knowledgment mechanisms.
• Thus the advantages achieved by TCP in LAN’s are no longer effective in the satellite
link. So it was desirable to design a separate protocol for communication through the
satellite to eliminate the disadvantages of using TCP over satellite.
Thus We need sky x technology.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 2
9. Figure 1.1: Sky X Technology
1.2 Performance Of Tcp Over Satellite
Satellites are an attractive option for carrying Internet and other IP traffic to many locations
across the globe where terrestrial options are limited or price prohibitive. However data net-
working over satellites is faced with overcoming the latency and high bit error rates typical
of satellite communications, as well as the asymmetric bandwidth of most satellite networks
Communication over geosynchronous satellites, orbiting at an altitude of 22,300 miles has
round trip times of approximately 540 m/s, an order of magnitude larger than terrestrial
networks.
The journey through the atmosphere can also introduce bit errors into the data stream. These
factors, combined with backchannel bandwidth typically much smaller than that available
on the forward channel, reduce the effectiveness of TCP which is optimized for short hops
over low-loss cables or fiber.Eventhough the TCP is very effective in the local network con-
nected by using cables or optical fibers by using its many features such as LPV6, LPsec and
other leading-edge functionality. Also it will work with real time operating systems.TCP
is designed for efficiency and high performance ,and optimized for maximum throughput
and the highest transaction speeds in local networks. But the satellite conditions adversely
interact with a number of elements of the TCP architecture, including it s window sizing,
congestion avoidance algorithms, and data acknowledgment mechanisms, which contribute
to severely constrict the data throughput that can be achieved over satellite links. Thus the
advantages achieved by TCP in LANs are no longer effective in the satellite link. So it is
desirable to design a separate protocol for communication through the satellite to eliminate
the disadvantages of using TCP over the satellite link. The adverse effects of using TCP
over satellite link in its various features are as follows:
1.2.1 Window Size
TCP utilizes a sliding window mechanism to limit the amount of data in flight. When the
window becomes full, the sender stops transmitting until it receives new acknowledgement.
Over satellite networks, where acknowledgements are slow to return, the TCP window size
gradually sets a hard limit on the maximum throughput rate. The minimum window size
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 3
10. needed to fully utilize an error-free link known as the bandwidth-delay product is 100 KB
for a T1 satellite link and 675 KB for a 10 Mbps link. However many implementations
of TCP are limited to maximum window size of 64 KB and most operating systems use a
default window size of only 8 KB , imposing a maximum throughput rate over a satellite
link of only 128 Kbps per connection , regardless of the bandwidth available. So the high
bandwidth available in the network is no longer effective, thus the data availability in a
client is restricted to a small fraction of the available bandwidth. Thus the window sizing
mechanism of the TCP limits the rate of flow of data through satellite link. The simple,
heuristic data acknowledgment scheme used by TCP does not adapt well to long latency
or highly asymmetric bandwidth conditions. This algorithm does not respond well over
satellite networks where the round-trip time is long and error rates can be high. Further,
this constant stream of acknowledgments wastes precious back channel bandwidth and if
the back channel is small, the return of the acknowledgments to the sender can become the
system bottleneck. The acknowledgements and error messages will always dominate the data
transfer and the rate of flow reduces very much.
1.2.2 Congestion Avoidance
In order to avoid the possibility of congestive network meltdown, TCP usually assumes that
all data loss is caused by congestion and responds to this by reducing the transmission
rate. However, over satellite links, TCP misinterprets the long round-trip time and bit
errors as congestion and responds inappropriately. Similarly, the TCP Slow Start algorithm,
which over the terrestrial infrastructure prevents new connections from flooding an already
congested network, forces an excessively long ramp-up period for each new connection over
satellite. While these congestion avoidance mechanisms are vital in routed environments,
they are ill-suited to single-path satellite links. So the congestion avoidance mechanisms
used by TCP is also not suited for the satellite link since it reduces the data flow through
the network and thus reduces the overall rate of data transfer.
1.3 Summary
In This Chapter,Discuss Why sky x Technology important,The Performance Of Tcp Over
Satellite in that to avoid the possibility of congestive network meltdown, TCP usually as-
sumes that all data loss is caused by congestion and responds to this by reducing the trans-
mission rate.Next chapter Sky X System.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 4
11. Chapter 2
Sky X System
In previous Chapter,Discuss about the general things related with the Sky X Design.The
Performance Of Tcp Over Satellite in that to avoid the possibility of congestive network
meltdown, TCP usually assumes that all data loss is caused by congestion and responds to
this by reducing the transmission rate.
In this Chapter,Discuss about the Sky X System.In section 2.1 discuss the Sky X Technol-
ogy Overcomes TCP Performance Limitations,The Sky X Gateway Operation are explain in
section 2.2
2.1 Sky X Technology Overcomes TCP Performance
Limitations
Sky X products increase the performance of IP over satellite through a combination of pro-
tocol connection-splitting, data compression, and Web pre-fetching, while remaining entirely
transparent to end users. The Sky X gateway works by transparently replacing TCP con-
nections from the client and converting the data to Xpress Transport protocol (XTP) for
the hop over the satellite link which is the protocol optimized for satellite conditions.
Figure 2.1: Sky X Gateway Operation
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 5
12. 2.2 Sky X Gateway Operation
The Sky X gateway works by intercepting the TCP connection from the client and converting
the data to the Xpress Transport Protocol (XTP) for transmission over the satellite. The
Sky X gateway on the opposite side of the satellite link translates the data back to TCP
for communication with the server. This architecture offers vastly improved performance
while remaining entirely transparent to the end user and fully compactable with the internet
infrastructure. No changes are required to the client or server and all applications continue
to function without modification. This architecture is also referred to as TCP Performance
Enhancing Proxy (TCP-PEP) and is compactable with IETF RFC 3135.
2.3 Summary
In This Chapter,Discuss about the Sky X System,Sky X Technology Overcomes TCP Per-
formance Limitations,The Sky X Gateway Operation.TCP connections from the client and
converting the data to Xpress Transport protocol (XTP) for the hop over the satellite link
which is the protocol optimized for satellite conditions. Next chapter is Sky X Protocol
Design.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 6
13. Chapter 3
Sky X Protocol Design
In previous Chapter,Discuss about the general things related with the Sky X System. The
Sky X protocol is designed to respond efficiently to typical satellite latency, bit errors and
asymmetric bandwidth conditions and to take advantage of optimizations possible on a
single-path link with known bandwidth.
In this Chapter,Discuss about the Sky X Protocol Design.In section 3.1 discuss the Efficient
Acknowledgment Algorithm,Dynamic Window Sizing are explain in section 3.2.
3.1 Efficient Acknowledgment Algorithm
The Sky X Protocol utilizes a highly efficient selective retransmission algorithm for the
acknowledgment of data. Because there is only a single path over the satellite with no
intermediate routing, any gaps in the packet sequence can be assumed to be data loss due
to corruption rather than network congestion. Because the Sky X Protocol does not use
acknowledgments as the primary means of identifying lost data, it requires only infrequent
acknowledgments to confirm data arrival and clear buffers. In contrast, TCP sends a constant
stream of acknowledgments over the reverse channel. The sky X Protocol reduces back
channel usage by 75% for Web traffic and up to 99% for file transfers, thereby dramatically
increasing the performance of networks where limited back channel bandwidth is the system
bottleneck.
3.2 Dynamic Window Sizing
The large Sky X Protocol window removes the dependency of the network on the bandwidth-
delay product, allowing high throughput independent of the TCP window size of the end
nodes. The Sky X Protocol dynamically adjusts the window size based on the link bandwidth,
delay, and number of simultaneous connections to optimize utilization of the bandwidth.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 7
14. 3.2.1 Rate Control
TCP uses Slow Start and Congestion Avoidance algorithms to determine a safe transmission
rate based on how quickly acknowledgments return. This wastes available bandwidth when
it transmits at too low a rate, and causes unnecessary retransmissions when it transmits
at a rate higher than the bandwidth of the link. Instead, the Sky X gateway uses a rate
control mechanism to explicitly set the transmission rate to exactly the bandwidth of the
link, thereby providing the maximum throughput possible at all times.
3.2.2 Web Prefetch
The Sky X system further enhances the performance of HTTP over the satellite link by
proactively retrieving the many embedded objects on the web page along with requested
HTML page.The Sky X Protocol dynamically adjusts the window size based on the link
bandwidth, delay, and number of simultaneous connections to optimize utilization of the
bandwidth. The Sky X system delivers the web objects to the client side of the satellite link
where they can be served locally when requested by the browser ,there by avoiding satellite
delay.
3.2.3 Fast Start Web Acceleration
In addition to TCP performance enhancement, Sky X products include HTTP specific op-
timizations to further accelerate web downloads. Fast Start saves one full round trip time
for each new web connection by reducing the handshaking required to establish each new
HTTP connection.
3.2.4 Data Compression
Integrated on-the-fly data compression functionality, offering lossless compression ratios of
up to 5:1, increase4s the amount of data that can be sent over the link.
3.3 Summary
In This Chapter,Discuss about the Sky X Protocol Design.In this discuss the Efficient Ac-
knowledgment Algorithm,Dynamic Window Sizing.The Sky X system further enhances the
performance of HTTP over the satellite link by proactively retrieving the many embedded
objects on the web page along with requested HTML page. Next chapter is Sky X Working.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 8
15. Chapter 4
Sky X Working
In previous Chapter,Discuss about the general things related with the Sky X Protocol De-
sign.Sky X products do combinations of connection-splitting & data compression.The Sky
X system delivers the Web objects to the Sky X gateway on the client side of the satellite
link where they can be served locally when requested by the browser, avoiding the satellite
delay.
In this Chapter,Discuss about the Sky X Working.In section 4.1 discuss the Xpress Trans-
port Protocol,Sky X Gateway are explain in section 4.2.
Sky X Working is Mainly Depend on Two components:
• XTP
• X-Gateway
4.1 Xpress Transport Protocol
• Xpress Transport Protocol (XTP) is a transport layer protocol for high-speed networks
promoted by the XTP Forum developed to replace TCP.
• XTP provides protocol options for error control, flow control, and multicast mode.
Instead of separate protocols for each type of communication, XTP controls packet
exchange patterns to produce different models.
4.2 Sky X Gateway
• The Sky X gateways works by replacing TCP connections from the client & converting
the data to Xpress Transport protocol (XTP).
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 9
16. • Translates the data back to TCP for communication with the server. This architecture
offers vastly improved performance while remaining entirely transparent to the end
user and fully compactable with the internet infrastructure.
• No changes are required to the client or server and all applications continue to function
without modification.
4.3 Summary
In this Chapter,Discuss about the Sky X Working, Xpress Transport Protocol,Sky X Gate-
way. XTP provides protocol options for error control, flow control, and multicast mode.
Instead of separate protocols for each type of communication, XTP controls packet exchange
patterns to produce different models.Next chapter is Sky X Performance.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 10
17. Chapter 5
Sky X Performance
In previous Chapter,Discuss about the general things related with the Sky X Working.XTP
provides protocol options for error control, flow control, and multicast mode. Instead of
separate protocols for each type of communication, XTP controls packet exchange patterns
to produce different models.
In this Chapter,Discuss about the Sky X Performance. In section 5.1 discuss the Window
Size and Link Speed vs. Throughput,Round-Trip Delay vs. Throughput are explain in
section 5.2In section 5.3 discuss the Bit Error Rate vs. Throughput,Web Performance are
explain in section 5.4
5.1 Window Size and Link Speed vs. Throughput
Without performance enhancement, a default window size of 8 KB limits TCP throughput
to less than 100 Kbps over satellite. As the graph on the left illustrates, even on server
operating systems using a 32 KB window, TCP is only able to reach a through-put of
440 Kbps. Sky X gateway overcomes this limitation, taking full advantage of the available
bandwidth regardless of the window size of the client or server. For compressible data, Sky
X can provide throughput rates far greater than the link bandwidth.
Figure 5.1: Sky X Accelator
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 11
18. 5.2 Round-Trip Delay vs. Throughput
The Sky X gateway system removes the dependency of TCP on the round-trip time of the
link. The figure below shows the measured throughput on an error-free, 10 Mbps link. These
results illustrate that TCP throughput drops rapidly as the round-trip time increases. In
contrast, Sky X is able to maintain full usage of the link regardless of the round-trip time.
For compressible text, Sky X consistently delivers throughput rates greater than the actual
bandwidth.
5.3 Bit Error Rate vs. Throughput
The Sky X system overcomes the high sensitivity of TCP to the bit error rate of the link.
The graph given below shows the throughput as a function of the bit error rate for a 10
Mbps satellite link using a 1 MB TCP window. Even at low error rates, TCP is able to
deliver only 1.5 Mbps, while at an error rate of 110-5, TCPs throughput drops to less than
0.03 Mbps. Sky X fully saturates the link at low error rates and even at an error rate of
110-5, achieves 5.1 Mbps without compression and up to 15.8 Mbps for compressible data.
5.4 Web Performance
Unlike file transfers which typically consist of a single, large download, Web traffic is char-
acterized by large numbers of short connections. Mentats innovative Fast Start feature
specifically optimizes Web performance by reducing time required to establish new connec-
tion. Sky X fully saturates the link at low error rates and even at an error rate of 110-5,
achieves 5.1 Mbps without compression and up to 15.8 Mbps for compressible data. The
Web stone HTTP benchmark shows that for an 8 Mbps error-free link, the average response
time for a mixture of 50 simultaneous web connections using the sky X gateway is between
0.7 and 1.1 seconds depending on the compressibility of the data, compared to 3.0 seconds
with TCP.
5.5 Summary
In this Chapter,Discuss about the Sky X Performance.The Window Size and Link Speed vs.
Throughput,Round-Trip Delay vs. Throughput,The Bit Error Rate vs. Throughput,Web
Performance. The Sky X system overcomes the high sensitivity of TCP to the bit error rate
of the link. Next chapter is Literature Survey.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 12
19. Chapter 6
Literature Survey
In previous Chapter,Discuss about the Sky X Performance.The Window Size and Link Speed
vs. Throughput,Round-Trip Delay vs. Throughput,The Bit Error Rate vs. Throughput,Web
Performance.
In this Chapter,Discuss about the Literature Survey. In section 6.1 discuss the Sky X
Merits,Sky X Demerits are discuss in section 6.2 and Applications are explain in section 6.3
6.1 Sky X Merits
• Increased Performance
The SkyX Gateway increases the throughput rate by 3 times or more for Web traffic
and up to 10 to 100 times for file downloads.
• Reduced FEC Usage
The SkyX Gateway offers high levels of performance even at bit error rates that reduce
TCP performance to near zero. Improved response to bit errors reduces the effects of
rain fade and lowers the level of forward error correction encoding required.
• Easy Installation
The XH45 includes two 10/100baseT Ethernet ports for easy installation into any
standard TCP/IP network.
• High Performance
The Sky X Gateway enhances the performance of Internet, intranet, extranet, private
network, or any other TCP/IP connections over satellite links.
• Web-Based Monitoring Console
Performance of the XH45 can be monitored through a Web-based console, accessible
from any browser.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 13
20. 6.2 Sky X Demerits
• It is costly as Compare to TCP protocol installation.
• It is very sensitive and greatly effect on working in changing environment.
6.3 Application
• Use for Satellite Communication.
• Use for Accessing Web in fastest Speed.
• Use for Data Transfer,File Transfer Efficiently.
6.4 Summary
In this Chapter,Discuss about the Sky X Merits,Sky X Demerits and Applications. The Sky
X Gateway enhances the performance of Internet, intranet, extranet, private network, or
any other TCP/IP connections over satellite links. Next chapter is Future Enhancement.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 14
21. Chapter 7
Future Enhancement
In previous Chapter,Discuss about The Sky X Merits,Sky X Demerits and Applications.The
Sky X Gateway enhances the performance of Internet, intranet, extranet, private network,
or any other TCP/IP connections over satellite links.
In this Chapter,Discuss about the Future Enhancement in Sky X Technology.
• XipLink developed by Xiplink incorporation which is underdevelopment will enhance
the Sky X more.
• The sky x technology is capable of handling bulk of data which will be there in future
as we are now talking aboutBP05
1. Smarter planet.
2. Infomation super highway.
7.1 Summary
In this Chapter,Discuss about the Future Enhancement in Sky X Technology The XH45
includes two 10/100baseT Ethernet ports for easy installation into any standard TCP/IP
network.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 15
22. Conclusion
The sky X gateway is the leading solution for overcoming the limitations of TCP/IP over
satellite. ISPs, corporations, governments, and military organizations around the world
rely on sky X gateway to enhance the performance of their satellite networks.Testing by
independent third parties including INTELSAT and NASA confirms that the sky X Gateway
dramatically improves performance for the internet and private access over satellite networks.
The world is reducing to a global village by the use of satellite communication and so the
improvement in the rate of information interchange through satellite is a must and thus sky
X technology becomes unavoidable.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 16
23. Bibliography
[1] Buyya, R., 2009, Cloud computing and emerging IT platforms: Vision, hype, and reality
for delivering computing as the 5th utility, Future Generation Computer Systems, Vol. 25,
No. 6, June 2009, pp. 599-616.
[2] Buyya, R., Ranjan, R., and Calheiros, R.N., 2009, Modeling and Simulation of Scalable
Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportuni-
ties, Proc. of the 7thHigh Performance Computing and Simulation Conference (HPCS09),
IEEE Computer Society.
[3] Casady, C.R., Iyob, I.M., Schneider, K., and Pohl, E.A., 2005, A Generic Model of
Equipment Availabilty under Imperfect Maintenance, IEEE Transactions on Reliabilty,
Vol. 54, No. 4, pp. 564-571.
[4] Cliff, D., 2002, Evolution of Market Mechanism through a Continuous Space of Auction-
types, Honolulu, HI, USA: IEEE Computer Society, vol. 2, pp. 20292034.
[5] Fayek, M.B.E., Talkhan, A.I., and El-Masry, L.S., 2009, GAMA (Genetic Algorithm
driven Multi-Agents) for e-Commerce Integrative Negotiation, in GECCO09: Proceedings
of the 11th Annual Conference on Genetic and Evolutionary Computation. Montreal,
Quebec, Canada: ACM, pp. 18451846.
SSBT’s College of Engineering and Technology, Bambhori, Jalgaon (MS) 17