The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
This presentation outlines the core functions of TCP - Transmission Control Protocol.
These comprise TCP Connection Control, TCP Flow Control, TCP Error Control, TCP Congestion Control, TCP Options and TCP Timers.
TCP/IP is the Internet core protocol that provides reliable, connection-oriented and stream-based communication service. Most of Internet traffic is carried in TCP connections, so scalability and reliability are crucial for a stable network on a global scale.
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
This presentation outlines the core functions of TCP - Transmission Control Protocol.
These comprise TCP Connection Control, TCP Flow Control, TCP Error Control, TCP Congestion Control, TCP Options and TCP Timers.
TCP/IP is the Internet core protocol that provides reliable, connection-oriented and stream-based communication service. Most of Internet traffic is carried in TCP connections, so scalability and reliability are crucial for a stable network on a global scale.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking.Carrier-sense multiple access with collision detection is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting.
In multicast communication, there is one source and a group of destination.
In multicasting, the router may forward the received packet through several of its interfaces.
The source address is a unicast address, but destination address is a group address.
Overview of UDP protocol.
UDP (User Datagram Protocol) is a simple extension of the Internet Protocol services. It basically provides simple packet transport service without any quality of service functions.
Unlike TCP, UDP is connection-less and packet-based. Application PDUs (application packets) sent over a UDP socket are delivered to the receiving host application as is without fragmentation.
UDP is mostly used by applications with simple request-response communication patterns like DNS, DHCP, RADIUS, RIP or RPC.
Since UDP does provide any error recovery such as retransmission of lost packets, the application protocols have to take care of these situations.
Network layer - design Issues ,Store-and-Forward Packet Switching, Services Provided to the Transport Layer, Which service is the best , Implementation of Service , Implementation of Connectionless Service , Implementation of Connection-Oriented Service
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow...IJECEIAES
The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.
Transport SDN & OpenDaylight Use Cases in KoreaJustin Park
In Korea, wired telecommunications carriers have been using assorted transport technologies with diverse network appliances. In order to reduce CAPEX and to avoid vendor lock-in, these transport networks are often comprised of multi-vendor and multi-domain equipment, which leads to high complexity and incompatibility. To overcome this obstacle, research organizations and local telecommunications carriers have been investigating and analyzing the feasibility of transport SDN technology. This talk dishes on the latest trend in Korea telecommunications carriers and the status of their transport SDN technology.
Review Paper on 802.11ax Scheduling and Resource Allocationijtsrd
Nowadays a fast remote Internet association is a need as opposed to a luxury. IEEE 802.11ax could be a revolution to present an improvement over this age of 802.11. 802.11ax has been accepted to convey next generation Wireless Local Area Network WLAN techniques. 802.11ax using multiple techniques as using modulation 1024 Quadrature Amplitude Modulation QAM , Orthogonal Frequency Division Multiple Access OFDMA , robust high efficiency signaling for better operation at a significantly lower Received Signal Strength Indication RSSI , Target Wakeup Time TWT where the station can request to wake up at any time in the future and more. 802.11ax achieves multiple benefits as enabling a more than 35 speed burst, reduce overhead and latency, and more. This paper gives a review of the IEEE 802.11ax resource allocation scheduling in both 1 Downlink DL data transfer 2 Uplink UL data transfer. Ibrahim Masri | Erdal Erdal | Atilla Ergüzen "Review Paper on 802.11ax Scheduling and Resource Allocation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38162.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/38162/review-paper-on-80211ax-scheduling-and-resource-allocation/ibrahim-masri
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has presented using Petrinet production model. We present the designed SCTP petrinet models and its analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect against different attack mentioned in literature. This paper depicts the SCTP performance analysis report which compares with existing techniques that are proposed to achieve authentication, authorization, security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has presented using Petrinet production model. We present the designed SCTP petrinet models and its analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization, security and intruder prevention.
Computer network is becoming more popular and common, the need to use the broadband connection services (e-learning - online training, video conferencing - online conference, IPTV - digital TV ...) of organizations and individuals is increasing. Multicast is an effective mechanism for the transmission of information and data to many recipients simultaneously. Multicast is a routing problem from a source node to a receiver node set, also known as the routing from one point to multipoint. The advances in technology and multimedia applications emerge quickly has provided great motivation for the application of new real-time multi-point. Many multi-point applications will not function properly if the QoS (quality of service) can not be guaranteed. Therefore, multi-point algorithms must be able to meet the QoS constraints (cost, reliability, bandwidth, jitter, delay...). The objective of multicast routing algorithms guarantee QoS is to provide routing algorithms have the ability to recognize the tree to satisfy the maximum of traffic streams with QoS requirements. Most multicast algorithms on MPLS (MultiProtocol Label Switching) considered the unique QoS constraint as bandwidth. The other QoS constraints can be converted into bandwidth efficiency. Starting from this reality, this paper research multicast routing algorithms guarantee bandwidth and propose new algorithm compares with existing ones.
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
Aidi, Laili; Markendahl, Jan; Tollmar, Konrad; Selvakumar, Ekambar; Huang, Jin; and Blennerud, Greger, In proceeding of: 12th International Conference on Mobile Business, Berlin 2013
In the telecom business, there has been a heavy competition from Internet, media and handset vendors companies. These over-the-top (OTT) players offer compiling telecom services, cause a transformation in the telecom business ecosystem, and the most challenging services posed here are media services. China, India and Indonesia, as world’s emerging markets in Asia, are predicted to take the largest share in the global mobile traffic explosion by 2015. It is critical for mobile network operators (MNOs) in this region to explore strategy for mobile media services, as mobile broadband is likely preferred
compared to fixed broadband.
In this paper, we analyze and compare mobile music business models used in these markets and structure the relation models between the key actors, using Actors, Relations and Business Activities (ARA) model. We present the economic models that are emerging, and an insight of why and how these multitudes actors are betting on currently. We found that the MNOs generally have a much stronger position compared to their counterparts in the developed markets, and the personalization services, like ring-back tone, are still a huge success. The actors tend to deliver the services by their own, rather than to collaborate in a horizontal business setting.
Public version of my presentation slide as guess lecturer at Politeknik Telkom, Bandung, May 4, 2013, discussing about "Internet of Things" Feel free to comment and/or download
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed and validated the result with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed the result with one sample T-tests and validated it with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Nowadays, more and more we see the collaboration between the Music industry Players with other Players in other industries. It started decade ago by the collaboration with the Internet industry (such as iTunes), and then recently expanded to the collaboration with the players in the different industries.
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
This project figure out the pattern of the bytes in the stego file and how steganalysis tool can identify the bytes appended to the truck file by steganography tool. This analysis is based on basic theory of steganography and steganalysis, and using a hex editor in order to check what kind of bytes that the steganography tool appends to the truck file.
---
Please contact to lailiaidi at gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Laili Aidi
This report contains discussion of the radio access network design and the cost structure analysis of different deployment options of Radio Access Technologies (RATs). The objective is to provide specific amount of user, with specific traffic demand and deployment scenario.
--
Please contact trough lailiaidi at gmail.com for download request
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
Abstract—The development and rollout of WiMAX introduces several regulatory and policy issues. This paper highlights the WiMAX Regulation in South Korea, as a country that is already more mature and had become the first to implement Wireless Broadband Access (WBA) of its kind (WiBro) in the world, and Indonesia, as a country that is still in the process of formulating the reconcilable regulation. The paper begins with a brief overview of the technologies behind WiMAX and compared the market situation relative to broadband and 3G mobile networks. Next, the paper examines the potentially significant specific policy and regulatory issues for regulator in each country and competition climate between stockholders. Finally, this data was used to obtain recommendations to overcome the said problems. We found out that WiMAX may prove to be a disruptive technology for existing telecommunication and Internet sector, but careful policy effectuation can ensure that the disruption could create the maximum benefit possible in the society and market.
---
Please contact trough lailiaidi at gmail.com for download request
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
This document contains implementation report of a system that is able to monitor the network using SNMP and identify the specific possible attacks (DoS and port scan) using a cluster analysis. In the first task, the program discovers the topology of the network. After successful discovery phase, it will be able to monitor the link utilization (network link-states) for a specified period of time, and then detect the anomaly, using k-means clustering scheme [1]. These anomalies will be analyzed to recognize the attack. Moreover, this program also provides an advance feature, which is defined as optional task, as it executes online monitoring and detects the attacks using Davies-Bouldin Index as quality scoring measurement [2].
--
Please contact trough lailiaidi at gmail.com for download request
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. 2
Stream Control Transmission Protocol (SCTP)
Laili
Aidi
–
Candidacy
at
Employer_X
Jakarta,
June
12,
2013
Transport
layer
is
responsible
for
process-‐to-‐process
delivery.—the
delivery
of
a
packet,
part
of
a
message,
from
one
process
to
another.
Two
processes
communicate
in
a
client/server
relaKonship.
Data
Delivery:
Transport Layer
3. 3
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
Port Numbers
Laili
Aidi
–
Candidacy
at
Employer_X
4. 4
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
IP Address and Port Numbers
Socket
Address
Laili
Aidi
–
Candidacy
at
Employer_X
5. 5
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
New Transport Protocols
Many
applicaKons
need
reliable
message
delivery
–
use
TCP
stream
TCP
provides
both
strict-‐ordering
and
reliability
–
many
may
not
need
both
Need
new
protocol
to
reduce
user-‐perceived
latency
and
improve
throughput
Laili
Aidi
–
Candidacy
at
Employer_X
6. 6
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
What is SCTP
SCTP
is
a
message-‐oriented,
reliable
protocol
(RFC
2960)
On
top of a connectionless packet network
Perform
beXer
in
the
presence
of
losses:
no
strictly
ordered
delivery
Designed
for
new
Internet
applicaKons:
ISDN
over
IP
(IUA),
SS7
signaling
(M2UA,
M3UA),
Media
gateway
control
(H.248),
IP
Telephony
(H323,
SIP),
etc
MulK-‐homing
support
MulK-‐stream
support
Unordered
data
delivery
opKon
Reliable
data
transfer
with
SACK
Flow
Control
CongesKon
control
Message
fragmentaKon
Reliable
data
transfer
with
SACK
Flow
Control
CongesKon
control
Message
fragmentaKon
Laili
Aidi
–
Candidacy
at
Employer_X
7. 7
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
Multi-Homing
Two
fundamental
concepts
in
SCTP:
-‐
Endpoints
(communicaKng
parKes)
-‐
AssociaKons
(communicaKon
relaKonships)
SCTP
associaKon
allows
mulKple
IP
addresses
for
each
end
point.
This
can
be
represented
as
a
pair
of
SCTP
endpoints:
-‐
assoc
=
{
[10.1.61.11
:
2223],
[161.10.8.221,
120.1.1.5
:
80]}
160.15.82.20
161.10.8.221
Laili
Aidi
–
Candidacy
at
Employer_X
8. 8
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
Multi-Streams
SCTP
associaKon
can
involve
mulKple
streams.
Reduces
unnecessary
head-‐of-‐line
blocking
Laili
Aidi
–
Candidacy
at
Employer_X
9. 9
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
SCTP Packet
TCP has segments; SCTP has packets.
Data chunks are identified by 3items:
- TSN: cumulative number defines the association
- SI: defines the stream
- SSN: defines the chunk in a stream
Control
informaKon
&
data
informaKon
are
carried
in
separate
chunks.
Laili
Aidi
–
Candidacy
at
Employer_X
10. 10
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
SCTP Packet
Control
informaKon
and
data
informaKon
are
carried
in
separate
chunks
Laili
Aidi
–
Candidacy
at
Employer_X
11. 11
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
Handshake
SCTP
uses
a
four-‐way
handshake
to
set
up
an
associaKon
-‐
Cookie
to
defense
against
TCP
SYN-‐
aXack
Laili
Aidi
–
Candidacy
at
Employer_X
12. 12
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
Simple Data Transfer
Only DATA chunks consume TSNs;
DATA chunks are the only chunks that are acknowledged.
Acknowledgment
defines
the
cumulaKve
TSN,
The
TSN
of
the
last
data
chunk
received
in
order.
Laili
Aidi
–
Candidacy
at
Employer_X
13. 13
Stream Control Transmission Protocol (SCTP)
Jakarta,
June
12,
2013
Simple Data Transfer
Associa<on
Termina<on
Acknowledgment
defines
the
cumulaKve
TSN,
The
TSN
of
the
last
data
chunk
received
in
order.
Laili
Aidi
–
Candidacy
at
Employer_X
14. Thank
You
References:
N.
Gupta,
S.
Kumar,
R.
Rajamani,
“SCTP
v/s
TCP
–
A
Comparison
of
Transport
Protocols
for
Web
Traffic”
Cisco,
“A
detailed
overview
of
the
protocol
and
a
examinaKon
of
the
socket
API”
Forouzan,
“Process-‐to-‐Process
Delivery:
UDP,
TCP,
and
SCTP”,
Chapter
16
and
23
Karl-‐Johan
Grinnemo,
“Advanced
Internetworking,
Transport
Layer"