The following resources come from the 2009/10 BSc in Computer and Network Technologies (course number 2ELE0072) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objectives of this module are to Demonstrate within a private network environment:
• The implementation of a wireless local are networks (WLANs) topology with diverse physical parameters
• The real-time performance evaluation of the individual WLAN transmission characteristics in the presence of standard transport protocols.
This mini-project involves the implementation of an “infrastructure” wireless network, the generation and transmission of packets and the measurement of network performance for TCP transport protocols by means of the “Wireshark” benchmarking tool. Parameters most likely to affect network performance such as the transmission medium’s signal-to-noise ratio, the propagating signal’s latency and jitter and the packet loss rate will be determined.
At the core of architectural teaching is the Design Review or Critique in which students present their work to both their tutors and peers to receive immediate formative feedback.
Future Internet: Managing Innovation and TestbedShinji Shimojo
Innovation is a big key word for ICT research and development. However, a road toward innovation is facing full of uncertainties and there are many obstacles. key elements to overcome these obstacles seems to be agile management of people, software and hardware. In addition, we think involvement of users in R&D will have much effect on the management of uncertainty in R&D. In this talk, I talk on our approach to this user involvement in JGN-X, an international future internet testbed and Knowledge Capital, Osaka, an smart city experimental testbed.
The following resources come from the 2009/10 BSc in Computer and Network Technologies (course number 2ELE0072) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.
The objectives of this module are to Demonstrate within a private network environment:
• The implementation of a wireless local are networks (WLANs) topology with diverse physical parameters
• The real-time performance evaluation of the individual WLAN transmission characteristics in the presence of standard transport protocols.
This mini-project involves the implementation of an “infrastructure” wireless network, the generation and transmission of packets and the measurement of network performance for TCP transport protocols by means of the “Wireshark” benchmarking tool. Parameters most likely to affect network performance such as the transmission medium’s signal-to-noise ratio, the propagating signal’s latency and jitter and the packet loss rate will be determined.
At the core of architectural teaching is the Design Review or Critique in which students present their work to both their tutors and peers to receive immediate formative feedback.
Future Internet: Managing Innovation and TestbedShinji Shimojo
Innovation is a big key word for ICT research and development. However, a road toward innovation is facing full of uncertainties and there are many obstacles. key elements to overcome these obstacles seems to be agile management of people, software and hardware. In addition, we think involvement of users in R&D will have much effect on the management of uncertainty in R&D. In this talk, I talk on our approach to this user involvement in JGN-X, an international future internet testbed and Knowledge Capital, Osaka, an smart city experimental testbed.
Similar to Software Defined Networking for Community Network Testbeds (20)
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
22. Introduction
Architecture
Implementation
Evaluation
Conclusion
Decisions
Basic Infrastructure
Decision 1: OF Controller in Testbed Server
Testbed
Controller
Bob's OF
Controller
Bob
Alice's OF
Controller
Bob's Slice
Alice's Slice
Mgmt
Iface
Other Slices
Mgmt
Iface
Mgmt
Iface
Local
Iface
Local
Iface
Sliver 1
Sliver 2
Sliver 3
Testbed
Node
Local
Iface
Sliver 1
Sliver 2
Community
Node
Sliver 3
Testbed
Node
Add OF controller.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
14 / 37
23. Introduction
Architecture
Implementation
Evaluation
Conclusion
Decisions
Basic Infrastructure
Decision 2: OF Software Switches on the host side of testbed
Testbed
Controller
Bob's OF
Controller
Bob
Alice's OF
Controller
Bob's Slice
Alice's Slice
Mgmt
Iface
Other Slices
Mgmt
Iface
Mgmt
Iface
Local
Iface
Local
Iface
OF switch
Sliver 1
OF switch
Sliver 2
Sliver 3
Testbed
Node
OF switch
Local
Iface
Sliver 1
OF switch
Sliver 2
Community
Node
Sliver 3
Testbed
Node
Add OF switches.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
15 / 37
24. Introduction
Architecture
Implementation
Evaluation
Conclusion
Decisions
Functionality
Decision 3: L2 mesh routing protocol for multihop L2 connectivity
Testbed
Controller
Bob's OF
Controller
Bob
Alice's OF
Controller
Bob's Slice
Alice's Slice
Mgmt
Iface
L2 Overlay
L2
L2
L1
L1
Other Slices
L2.5 mesh
overlay
Mgmt
Iface
Mgmt
Iface
Local
Iface
Local
Iface
L3 mgmt
Options for L2
connectivity.
OF switch
Sliver 1
OF switch
Sliver 2
Sliver 3
Testbed
Node
OF switch
Local
Iface
Sliver 1
Community
Node
OF switch
Sliver 2
Sliver 3
Testbed
Node
Local L2 mesh routing.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
16 / 37
25. Introduction
Architecture
Implementation
Evaluation
Conclusion
Decisions
Functionality
Decision 4: Control plane through management interface, data
plane through local interface
Control Plane
Data Plane
Data Plane in
Control Packets
Testbed
Controller
Bob's OF
Controller
Bob
Alice's OF
Controller
Bob's Slice
Alice's Slice
Mgmt
Iface
Other Slices
Mgmt
Iface
Mgmt
Iface
Local
Iface
Local
Iface
OF switch
Sliver 1
OF switch
Sliver 2
Sliver 3
Testbed
Node
OF switch
Local
Iface
Sliver 1
OF switch
Sliver 2
Community
Node
Sliver 3
Testbed
Node
Differentiate control and data plane.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
17 / 37
26. Introduction
Architecture
Implementation
Evaluation
Conclusion
Decisions
Optimizations
Decision 5: Use OF in proactive mode
Testbed
Controller
Control Plane
Data Plane
Bob's OF
Controller
Bob
Alice's OF
Controller
Bob's Slice
Alice's Slice
Mgmt
Iface
Other Slices
Mgmt
Iface
Mgmt
Iface
Local
Iface
Local
Iface
OF switch
Sliver 1
OF switch
Sliver 2
Sliver 3
Testbed
Node
OF switch
Local
Iface
Sliver 1
OF switch
Sliver 2
Community
Node
Sliver 3
Testbed
Node
OF in proactive mode.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
18 / 37
27. Introduction
Architecture
Implementation
Evaluation
Conclusion
Decisions
Optimizations
Decision 6: Local Proxy OF controller in testbed nodes
Testbed
Controller
Control Plane
Data Plane
Bob's OF
Controller
Bob
Alice's OF
Controller
Bob's Slice
Alice's Slice
Mgmt
Iface
Other Slices
Mgmt
Iface
Proxy OF Controller
Proxy OF Controller
OF switch
Sliver 1
Local
Iface
Local
Iface
Mgmt
Iface
OF switch
Sliver 2
Sliver 3
Testbed
Node
OF switch
Local
Iface
Sliver 1
OF switch
Sliver 2
Community
Node
Sliver 3
Testbed
Node
Local proxy OF.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
19 / 37
29. Introduction
Architecture
Implementation
Evaluation
Conclusion
Software Developed
Poxy
Poxy implements a proxy for the controller-switch OFP connection,
on top of the POX OF controller.
Normal OpenFlow
Scenario
Poxy OpenFlow
Scenario
OpenFlow Controller
OpenFlow Controller
Poxy
OpenFlow Connection
OpenFlow Switch
OpenFlow Switch
Nodes
Nodes
Basic idea of Poxy
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
21 / 37
32. Introduction
Architecture
Implementation
Evaluation
Conclusion
External Software
External Software
• CONFINE Software: CONFINE Node Software System,
CONFINE Controller Software
• Open vSwitch: a FOSS licensed software that implements an
advanced edge switch
Advance Edge Switching
• Batman-adv: a FOSS Linux kernel module implementing he
B.A.T.M.A.N. advanced L2 routing protocol
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
23 / 37
33. Introduction
Architecture
Implementation
Evaluation
Conclusion
Overview
Implementation Overview
Bob
Community-Lab
Server
HTTPS
CONFINE Controller Software
Bob's Pongo
REST
Alice's Pongo
OF
REST
OF
OFP Control Plane
New Components/
New Software
mgmt0
REST traffic
Bob's Slice
batman-adv traffic
Alice's Slice
Data Plane
Other Slices
Management
Network
HTTPS
mgmt0
mgmt0
Poxy
CONFINE Node Software
Open Vswitch
Sliver 1
Open Vswitch
Sliver 2
Sliver 3
Community-Lab
Node
Poxy
bat0
bat0
CONFINE Node Software
Local
Island
Open Vswitch
bat0
Sliver 1
Open Vswitch
Sliver 2
Community
Node
Sliver 3
Community-Lab
Node
Overview of the implementation design.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
24 / 37
38. Introduction
Architecture
Implementation
Evaluation
Conclusion
Performance Analysis
Communication Overhead: Management Overlay
Bob
Community-Lab
Server
HTTPS
CONFINE Controller Software
Bob's Pongo
REST
Alice's Pongo
OF
REST
OF
OFP Control Plane
mgmt0
REST traffic
Bob's Slice
batman-adv traffic
Alice's Slice
Data Plane
Other Slices
Management
Network
HTTPS
mgmt0
mgmt0
Poxy
CONFINE Node Software
Open Vswitch
Sliver 1
Open Vswitch
Sliver 2
Sliver 3
Community-Lab
Node
Poxy
bat0
bat0
CONFINE Node Software
Local
Island
Open Vswitch
bat0
Sliver 1
Open Vswitch
Sliver 2
Community
Node
Sliver 3
Community-Lab
Node
Management Overlay Communication
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
29 / 37
39. Introduction
Architecture
Implementation
Evaluation
Conclusion
Performance Analysis
Communication Overhead: Local Mesh Network
Bob
Community-Lab
Server
HTTPS
CONFINE Controller Software
Bob's Pongo
REST
Alice's Pongo
OF
REST
OF
OFP Control Plane
mgmt0
REST traffic
Bob's Slice
batman-adv traffic
Alice's Slice
Data Plane
Other Slices
Management
Network
HTTPS
mgmt0
mgmt0
Poxy
CONFINE Node Software
Open Vswitch
Sliver 1
Open Vswitch
Sliver 2
Sliver 3
Community-Lab
Node
Poxy
bat0
bat0
CONFINE Node Software
Local
Island
Open Vswitch
bat0
Sliver 1
Open Vswitch
Sliver 2
Community
Node
Sliver 3
Community-Lab
Node
Local Mesh Network Communication
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
30 / 37
44. Introduction
Architecture
Implementation
Evaluation
Conclusion
Future Work
Future Work
• Perform proposed experiments
• Explore distributed properties
i.e. eventual consistency in dynamic rule changes
• Research distributed OpenFlow controllers (HyperFlow,
Helios)
• Research SDN management for CNs based on this work
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
35 / 37
45. Introduction
Architecture
Implementation
Evaluation
Conclusion
Future Work
Bibliography
[1]
I. Akyildiz and X. Wang, “A survey on wireless mesh networks,” Communications Magazine, IEEE, vol. 43,
no. 9, pp. S23–S30, 2005.
[2]
A. Neumann, I. Vilata, X. Leon, P. Garcia, L. Navarro, and E. Lopez, “Community-lab: Architecture of a
community networking testbed for the future internet,” in Wireless and Mobile Computing, Networking and
Communications (WiMob), 2012 IEEE 8th International Conference on, pp. 620–627, 2012.
[3]
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner,
“Openflow: enabling innovation in campus networks,” SIGCOMM Comput. Commun. Rev., vol. 38,
pp. 69–74, Mar. 2008.
[4]
Scott Shenker et al.
The future of networking, and the past of protocols.
Open Networking Summit, 2011.
[5]
P. Dely, A. Kassler, and N. Bayer, “Openflow for wireless mesh networks,” in Computer Communications and
Networks (ICCCN), 2011 Proceedings of 20th International Conference on, pp. 1–6, 2011.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
36 / 37
47. Tackling the Challenges
CN Example
Advanced Edge Switching
Part I
Appendix
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
38 / 37
48. Tackling the Challenges
CN Example
Advanced Edge Switching
Tackling the Challenges
CN Example
Advanced Edge Switching
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
1/7
49. Tackling the Challenges
CN Example
Advanced Edge Switching
Part 1
Challenge 1: Link Quality Instability
Decision 3: L2 mesh routing protocol for multihop L2 connectivity
Challenge 2: Link Capacity
Decision 5: Use OF in proactive mode
Decision 6: Local Proxy OF controller in testbed nodes
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
2/7
50. Tackling the Challenges
CN Example
Advanced Edge Switching
Part 2
Challenge 3: Device and Protocol Diversity
Decision 3: L2 mesh routing protocol for multihop L2 connectivity
Challenge 4: Communication with Non-Testbed Nodes
Decision 3: L2 mesh routing protocol for multihop L2 connectivity
Challenge 5: No Out-of-band Channels
Decision 4: Control plane through management interface, data
plane through local interface
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
3/7
51. Tackling the Challenges
CN Example
Advanced Edge Switching
Tackling the Challenges
CN Example
Advanced Edge Switching
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
4/7
52. Tackling the Challenges
CN Example
Advanced Edge Switching
Ninux
Ninux: An example Community Network.6
6
Source: Ninux Roma, The Routing Architecture, May, 2012 - Version 0
blog.ninux.org/wp-content/uploads/2012/06/NinuxRoma-RoutingArchitecture-DocumentVersion0.pdf
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
5/7
53. Tackling the Challenges
CN Example
Advanced Edge Switching
Tackling the Challenges
CN Example
Advanced Edge Switching
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
6/7
54. Tackling the Challenges
CN Example
Advanced Edge Switching
Advanced Edge Switching
Advanced Edge Switching.7
7
Source: Pettit, Justin, et al. ”Virtual switching in an era of advanced edges.”
2nd Workshop on Data CenterConverged and Virtual Ethernet Switching (DC-CAVES), ITC. Vol. 22. 2010.
E. Dimogerontakis, I. Vilata, L. Navarro
SDN for CN Testbeds
CNBuB, 2013
7/7