Sensor networks are a fundamental building block of Internet of Things (IoT) applications, as they provide the interface to the physical world. In fact, many techniques used for resource-constrained IoT devices originated in the research area of Wireless Sensor Networks (WSNs). This talk will present the transition from research prototypes to standardized Internet protocols, give an overview how sensor networks are connected today (with a practical hands-on), and discuss a few challenges that need to be addressed in the future.
The Internet of Things (IoT) can be considered as a modern manifestation of Mark Weiser’s classic vision of ubiquitous computing where tiny networked computers become part of everyday objects interweaving the virtual world and the physical world. The concept of the IoT originated some 15 years ago from linking real-world artifacts to virtual counterparts through radio-frequency identification (RFID) tags. More recently, environments have become ‘smart’ by augmenting physical objects with sensing or actuation capabilities and networking them with digital services. The ongoing standardization of Internet protocols for such IoT devices enables the seamless integration of smart things into the Internet. This trend is expected to eventually result in hundreds of billions of connected devices that need to be programmed, managed, and maintained. It has been shown that Web technology can significantly ease this process by providing well-known patterns and tools for developers and users. The existing solutions are, however, often too heavyweight for highly resource-constrained IoT devices. Indeed, most connected devices are expected to remain resource-constrained, as progress in technology witnessed by Moore’s Law is primarily leveraged to minimize dimensions, power consumption, and unit costs.
This dissertation presents a comprehensive solution for the seamless integration of highly resource-constrained IoT systems into the World Wide Web. Our thesis is that existing protocols and programming models do not effectually meet the needs of the IoT. We identify two key challenges for the vision to succeed: application-layer interoperability and improved usability for both developers and users. Both requirements can be met by an approach that amalgamates results from the field of Wireless Sensor Networks and the World Wide Web. This leads to the research questions (i) how to scale Web technology down to resource-constrained devices, (ii) how to scale it up to hundreds of billions of devices, and (iii) how to use it to improve the usability of the tiny networked computers. Our work addresses the resulting challenges with the following contributions: Being actively involved in the design and standardization of the Constrained Application Protocol (CoAP) within the Internet Engineering Task Force (IETF), we (i) evaluate the new Web protocol in the different components of IoT systems, namely resource-constrained devices, Cloud-based services, and user interaction. Based on this, we (ii) propose system architectures and guidelines for an optimal implementation and utilization of CoAP. Furthermore, we (iii) present concepts and tools for Web-like software development for the IoT. To supportour thesis, we also (iv) provide working open source implementations of our concepts, which build the basis for several IoT projects in academia and industry.
Californium: Scalable Cloud Services for the Internet of Things with CoAPMatthias Kovatsch
The Internet of Things (IoT) is expected to interconnect a myriad of devices. Emerging networking and backend support technology not only has to anticipate this dramatic increase in connected nodes, but also a change in traffic patterns. Instead of bulk data such as file sharing or multimedia streaming, IoT devices will primarily exchange real-time sensory and control data in small but numerous messages. Often cloud services will handle these data from a huge number of devices, and hence need to be extremely scalable to support conceivable large-scale IoT applications. To this end, we present a system architecture for IoT cloud services based on the Constrained Application Protocol (CoAP), which is primarily designed for systems of tiny, low-cost, resource-constrained IoT devices. Along with our system architecture, we systematically evaluate the performance of the new Web protocol in cloud environments. Our Californium (Cf) CoAP framework shows 33 to 64 times higher throughput than high-performance HTTP Web servers, which are the state of the art for classic cloud services. The results substantiate that the low overhead of CoAP does not only enable Web technology for low-cost IoT devices, but also significantly improves backend service scalability for vast numbers of connected devices.
CoAP for the Web of Things: From Tiny Resource-constrained Devices to the W...Matthias Kovatsch
The Constrained Application Protocol (CoAP) is a new Web protocol standardized by the IETF. It is not a mere compression of HTTP, but a re-design from scratch following the REST architectural style. Thus, its features are tailored for Internet of Things (IoT) applications and machine-to-machine (M2M) scenarios with highly resource-constrained devices. While this makes CoAP very interesting for the Web of Things (WoT) initiative, it is still detached from the Web world of browsers and intuitive user interaction. We present the first attempts to unite these two worlds, so that everyday objects endowed with tiny, low-cost computing devices can become first class citizens of the Web. Our Copper (Cu) project brings CoAP support to the Web browser and has been out in the wild since late 2010. Thus, we were able to conduct a user study among industry and research developers who know both, Web-based CoAP and earlier proprietary protocols for networked embedded systems. The result shows that industry developers and those with longer experience agree even more that Internet protocols and patterns from the Web ease application development for tiny, resource-constrained devices.
The Impact of Software-based Virtual Network in the Public CloudChunghan Lee
Today’s cloud network consists of sophisticated virtual
networks, and a virtual switch is a key element of these
networks. Although there is tremendous interest in measuring
cloud network performance, little is known about the impact
of software-based virtual network on latency. In this paper, we
conduct the impact of virtual network on latency in the public
cloud based on OpenStack. We measured the throughput of VMs
and simultaneously captured their packets on hosts. We analyzed
the traces by using well-known metrics, such as throughput and
RTT, and investigated the abrupt fluctuation of latency called as
‘the burstiness of latency’. We quantitatively clarify the impact of
software-based virtual network on latency. In our public cloud,
the latency is approximately 35.2% of RTT and 10% of burstiness
mainly contributes to the increased RTT. The total latency was
increased by the receiving side regardless of data and ACK
paths. Our analysis results, discussions, and implications can
not only help cloud researchers and developers design the next
generation of software-based virtual network but can also help
cloud operators improve the performance of virtual network.
The Internet of Things if growing, but how can you build your own connected objects?
Together with MQTT, CoAP is one of the popular IoT protocols. It provides answers to the typical IoT constraints: it is bandwidth efficient and fits in constrained embedded environment while providing friendly and discoverable RESTful API.
This tutorial aims at giving you a hands-on experience with CoAP by showing you the power and simplicity of the Eclipse Californium library for developing real world IoT application.
Agenda:
- Introduction to CoAP
- Live discovery of connected CoAP objects using the Copper plugin for Firefox
- Presentation of more advanced CoAP topics (proxy, resource directory, device management with LWM2M)
- Presentation of Eclipse Californium, a CoAP library for Java
- Exercise: complete the provided Java code to create your own Internet of Things... thing!
The Internet of Things (IoT) can be considered as a modern manifestation of Mark Weiser’s classic vision of ubiquitous computing where tiny networked computers become part of everyday objects interweaving the virtual world and the physical world. The concept of the IoT originated some 15 years ago from linking real-world artifacts to virtual counterparts through radio-frequency identification (RFID) tags. More recently, environments have become ‘smart’ by augmenting physical objects with sensing or actuation capabilities and networking them with digital services. The ongoing standardization of Internet protocols for such IoT devices enables the seamless integration of smart things into the Internet. This trend is expected to eventually result in hundreds of billions of connected devices that need to be programmed, managed, and maintained. It has been shown that Web technology can significantly ease this process by providing well-known patterns and tools for developers and users. The existing solutions are, however, often too heavyweight for highly resource-constrained IoT devices. Indeed, most connected devices are expected to remain resource-constrained, as progress in technology witnessed by Moore’s Law is primarily leveraged to minimize dimensions, power consumption, and unit costs.
This dissertation presents a comprehensive solution for the seamless integration of highly resource-constrained IoT systems into the World Wide Web. Our thesis is that existing protocols and programming models do not effectually meet the needs of the IoT. We identify two key challenges for the vision to succeed: application-layer interoperability and improved usability for both developers and users. Both requirements can be met by an approach that amalgamates results from the field of Wireless Sensor Networks and the World Wide Web. This leads to the research questions (i) how to scale Web technology down to resource-constrained devices, (ii) how to scale it up to hundreds of billions of devices, and (iii) how to use it to improve the usability of the tiny networked computers. Our work addresses the resulting challenges with the following contributions: Being actively involved in the design and standardization of the Constrained Application Protocol (CoAP) within the Internet Engineering Task Force (IETF), we (i) evaluate the new Web protocol in the different components of IoT systems, namely resource-constrained devices, Cloud-based services, and user interaction. Based on this, we (ii) propose system architectures and guidelines for an optimal implementation and utilization of CoAP. Furthermore, we (iii) present concepts and tools for Web-like software development for the IoT. To supportour thesis, we also (iv) provide working open source implementations of our concepts, which build the basis for several IoT projects in academia and industry.
Californium: Scalable Cloud Services for the Internet of Things with CoAPMatthias Kovatsch
The Internet of Things (IoT) is expected to interconnect a myriad of devices. Emerging networking and backend support technology not only has to anticipate this dramatic increase in connected nodes, but also a change in traffic patterns. Instead of bulk data such as file sharing or multimedia streaming, IoT devices will primarily exchange real-time sensory and control data in small but numerous messages. Often cloud services will handle these data from a huge number of devices, and hence need to be extremely scalable to support conceivable large-scale IoT applications. To this end, we present a system architecture for IoT cloud services based on the Constrained Application Protocol (CoAP), which is primarily designed for systems of tiny, low-cost, resource-constrained IoT devices. Along with our system architecture, we systematically evaluate the performance of the new Web protocol in cloud environments. Our Californium (Cf) CoAP framework shows 33 to 64 times higher throughput than high-performance HTTP Web servers, which are the state of the art for classic cloud services. The results substantiate that the low overhead of CoAP does not only enable Web technology for low-cost IoT devices, but also significantly improves backend service scalability for vast numbers of connected devices.
CoAP for the Web of Things: From Tiny Resource-constrained Devices to the W...Matthias Kovatsch
The Constrained Application Protocol (CoAP) is a new Web protocol standardized by the IETF. It is not a mere compression of HTTP, but a re-design from scratch following the REST architectural style. Thus, its features are tailored for Internet of Things (IoT) applications and machine-to-machine (M2M) scenarios with highly resource-constrained devices. While this makes CoAP very interesting for the Web of Things (WoT) initiative, it is still detached from the Web world of browsers and intuitive user interaction. We present the first attempts to unite these two worlds, so that everyday objects endowed with tiny, low-cost computing devices can become first class citizens of the Web. Our Copper (Cu) project brings CoAP support to the Web browser and has been out in the wild since late 2010. Thus, we were able to conduct a user study among industry and research developers who know both, Web-based CoAP and earlier proprietary protocols for networked embedded systems. The result shows that industry developers and those with longer experience agree even more that Internet protocols and patterns from the Web ease application development for tiny, resource-constrained devices.
The Impact of Software-based Virtual Network in the Public CloudChunghan Lee
Today’s cloud network consists of sophisticated virtual
networks, and a virtual switch is a key element of these
networks. Although there is tremendous interest in measuring
cloud network performance, little is known about the impact
of software-based virtual network on latency. In this paper, we
conduct the impact of virtual network on latency in the public
cloud based on OpenStack. We measured the throughput of VMs
and simultaneously captured their packets on hosts. We analyzed
the traces by using well-known metrics, such as throughput and
RTT, and investigated the abrupt fluctuation of latency called as
‘the burstiness of latency’. We quantitatively clarify the impact of
software-based virtual network on latency. In our public cloud,
the latency is approximately 35.2% of RTT and 10% of burstiness
mainly contributes to the increased RTT. The total latency was
increased by the receiving side regardless of data and ACK
paths. Our analysis results, discussions, and implications can
not only help cloud researchers and developers design the next
generation of software-based virtual network but can also help
cloud operators improve the performance of virtual network.
The Internet of Things if growing, but how can you build your own connected objects?
Together with MQTT, CoAP is one of the popular IoT protocols. It provides answers to the typical IoT constraints: it is bandwidth efficient and fits in constrained embedded environment while providing friendly and discoverable RESTful API.
This tutorial aims at giving you a hands-on experience with CoAP by showing you the power and simplicity of the Eclipse Californium library for developing real world IoT application.
Agenda:
- Introduction to CoAP
- Live discovery of connected CoAP objects using the Copper plugin for Firefox
- Presentation of more advanced CoAP topics (proxy, resource directory, device management with LWM2M)
- Presentation of Eclipse Californium, a CoAP library for Java
- Exercise: complete the provided Java code to create your own Internet of Things... thing!
Using IO Visor to Secure Microservices Running on CloudFoundry [OpenStack Sum...IO Visor Project
As microservices grow, traditional firewall rules based on network ACLs are no longer scalable and fall short of providing fine-grained enforcement. Group Based Policy (GBP) is a flexible policy language that allows users to specify policy enforcement based on intent, independent of network infrastructure and IP addressing. Using micro-segmented virtual domains, administrators can define policies at a centralized location and use IO Visor technology for distributed enforcement. This provides infrastructure independent rules, template-based policy definitions, and scale-out policy enforcement for a solution that secures and scales with microservices. This session will be presented by members of the IO Visor community and will cover how IO Visor technology can be used to define and enforce GBP. The discussion will also cover using GBP for cloud foundry application spaces where microservices are deployed and need scalable, efficient security policies.
As containers are being deployed as part of multi tenant clusters, virtual multi layer switches become essential to interconnect containers while providing isolation guarantees. Assigning tenants their own private networks requires stateful network address translation (NAT) implemented in a scalable architecture to expose containers to public networks. Existing virtual switches integrated into the Linux kernel did not support stateful NAT so far. This presentation introduces a new virtual NAT service deployable as container built using existing kernel functionality such as network namespaces, routing rules and Netfilter to provide NAT services to existing virtual switches such as Open vSwitch and the Linux bridge but also the core L3 layer of Linux.
Modern Data Center Network Architecture - The house that Clos builtCumulus Networks
Presentation can be found at: http://go.cumulusnetworks.com/modern-data-center
Listen in on an engaging discussion about network architecture that underpins virtually all of the modern data center. We'll delve into why people chose this architecture and several interesting emergent behaviors that this architecture gives rise to. We will also discuss how the modern data center architecture eases DevOps, failure characteristics and characteristics of network boxes. Featuring Cumulus Networks Chief Scientist, Dinesh Dutt
More details on implementing broadcast/multicast messaging in IoT networking running Haystack + DASH7 networking software. Also implementing CBOR to enable queries over MQTT.
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Cloud Native Day Tel Aviv
Machine Learning is no doubt the hottest trend in IT nowadays. Deep Neural Network (DNN), a subfield of Machine Learning with mode of operation loosely inspired by the brain, allows us to solve complex problems such as image recognition that has been very difficult to solve using standard programming paradigms. DNN concepts are not new. However, and until recently, applying them in practice could not be realized due to their high computational demands. With the recent development in parallel computing, especially around GPU acceleration and high speed and efficient networking, DNN has become a reality in modern data centers. In this talk we will describe the system requirements to effectively run a machine learning cluster with popular frameworks such as TensorFlow. We will discuss how such a system can be deployed in an OpenStack-based cloud without compromises, enjoying high-performance DNN programming paradigm as well as the benefits of cloud and software-defined data centers.
Kernel advantages for Istio realized with CiliumCynthia Thomas
Istio brings a myriad of options to provide routing rules, encryption, and monitoring for microservices, typically in container environments. Cilium provides accelerated network security using a modern kernel technology called BPF. Put the two together and what do you get? A distributed security solution enabling microservices traffic management, security, and monitoring while enforcing policy as close to the microservices as possible.
Cynthia Thomas and Romain Lenglet discuss the architectural and performance benefits of using Cilium with Istio and provide a demo of this BPF-based, Linux kernel technology. Cilium provides an API-aware security solution that can make a decision on every single microservice flow, with the ability to enforce protocols such as HTTP, Kafka, and gRPC. By addressing security policy at the API layer, you can enforce policy efficiently with kernel capabilities while reducing the attack surface in a microservices deployment.
An Introduction to Eclipse Kura - Eclipse Day Florence 2014Eurotech
Deploying and configuring one device to act as a node in the Internet of Things is relatively easy. Doing the same for hundreds or thousands of devices is not so easy though. This is where the new Eclipse project Kura comes in.
Kura is a Java/OSGi-based container for M2M applications running in service gateways.
Kura was contributed to Eclipse by Eurotech who developed the original technology to run on everything from general purpose devices, rugged mobile computers, wearable devices, service gateways and vehicle consoles, all the way down to the Raspberry Pi.
Using IO Visor to Secure Microservices Running on CloudFoundry [OpenStack Sum...IO Visor Project
As microservices grow, traditional firewall rules based on network ACLs are no longer scalable and fall short of providing fine-grained enforcement. Group Based Policy (GBP) is a flexible policy language that allows users to specify policy enforcement based on intent, independent of network infrastructure and IP addressing. Using micro-segmented virtual domains, administrators can define policies at a centralized location and use IO Visor technology for distributed enforcement. This provides infrastructure independent rules, template-based policy definitions, and scale-out policy enforcement for a solution that secures and scales with microservices. This session will be presented by members of the IO Visor community and will cover how IO Visor technology can be used to define and enforce GBP. The discussion will also cover using GBP for cloud foundry application spaces where microservices are deployed and need scalable, efficient security policies.
As containers are being deployed as part of multi tenant clusters, virtual multi layer switches become essential to interconnect containers while providing isolation guarantees. Assigning tenants their own private networks requires stateful network address translation (NAT) implemented in a scalable architecture to expose containers to public networks. Existing virtual switches integrated into the Linux kernel did not support stateful NAT so far. This presentation introduces a new virtual NAT service deployable as container built using existing kernel functionality such as network namespaces, routing rules and Netfilter to provide NAT services to existing virtual switches such as Open vSwitch and the Linux bridge but also the core L3 layer of Linux.
Modern Data Center Network Architecture - The house that Clos builtCumulus Networks
Presentation can be found at: http://go.cumulusnetworks.com/modern-data-center
Listen in on an engaging discussion about network architecture that underpins virtually all of the modern data center. We'll delve into why people chose this architecture and several interesting emergent behaviors that this architecture gives rise to. We will also discuss how the modern data center architecture eases DevOps, failure characteristics and characteristics of network boxes. Featuring Cumulus Networks Chief Scientist, Dinesh Dutt
More details on implementing broadcast/multicast messaging in IoT networking running Haystack + DASH7 networking software. Also implementing CBOR to enable queries over MQTT.
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Cloud Native Day Tel Aviv
Machine Learning is no doubt the hottest trend in IT nowadays. Deep Neural Network (DNN), a subfield of Machine Learning with mode of operation loosely inspired by the brain, allows us to solve complex problems such as image recognition that has been very difficult to solve using standard programming paradigms. DNN concepts are not new. However, and until recently, applying them in practice could not be realized due to their high computational demands. With the recent development in parallel computing, especially around GPU acceleration and high speed and efficient networking, DNN has become a reality in modern data centers. In this talk we will describe the system requirements to effectively run a machine learning cluster with popular frameworks such as TensorFlow. We will discuss how such a system can be deployed in an OpenStack-based cloud without compromises, enjoying high-performance DNN programming paradigm as well as the benefits of cloud and software-defined data centers.
Kernel advantages for Istio realized with CiliumCynthia Thomas
Istio brings a myriad of options to provide routing rules, encryption, and monitoring for microservices, typically in container environments. Cilium provides accelerated network security using a modern kernel technology called BPF. Put the two together and what do you get? A distributed security solution enabling microservices traffic management, security, and monitoring while enforcing policy as close to the microservices as possible.
Cynthia Thomas and Romain Lenglet discuss the architectural and performance benefits of using Cilium with Istio and provide a demo of this BPF-based, Linux kernel technology. Cilium provides an API-aware security solution that can make a decision on every single microservice flow, with the ability to enforce protocols such as HTTP, Kafka, and gRPC. By addressing security policy at the API layer, you can enforce policy efficiently with kernel capabilities while reducing the attack surface in a microservices deployment.
An Introduction to Eclipse Kura - Eclipse Day Florence 2014Eurotech
Deploying and configuring one device to act as a node in the Internet of Things is relatively easy. Doing the same for hundreds or thousands of devices is not so easy though. This is where the new Eclipse project Kura comes in.
Kura is a Java/OSGi-based container for M2M applications running in service gateways.
Kura was contributed to Eclipse by Eurotech who developed the original technology to run on everything from general purpose devices, rugged mobile computers, wearable devices, service gateways and vehicle consoles, all the way down to the Raspberry Pi.
Building IoT Mashups for Industry 4.0 with Eclipse Kura and Kura WiresEclipse Kura
The presentation contains a real Industry 4.0 use cases that will take advantage of sensors connected through Modbus and mapped in Kura Wires with corresponding Assets. A complete dataflow model will also be presented
"One network to rule them all" - OpenStack Summit Austin 2016Phil Estes
Presentation at IBM Client Day by Kyle Mestery and Phil Estes, OpenStack Summit 2016 - Austin, Texas on April 26, 2016. "Open, Scalable and Integrated Networking for Containers and VMs" covering Project Kuryr, Docker's libnetwork, and Neutron & OVS and OVN network stacks
Presentation from Embedded Linux Conference 2015 in Dublin, where Tieto presented a concept of an Intelligent Home IoT Gateway, the session received a very good feedback. Authors: Andrzej Wieczorek and Bartosz Markowski
www.tieto.com
A presentation about UCS and usNIC to the Math & Computer Science and Leadership Computing Facility divisions at Argonne National Laboratory (ANL). Presented to ANL by Dave Goodell (Cisco) on 2014-09-02.
Challenges and experiences with IPTV from a network point of viewbrouer
OpenSource IPTV MPEG2-TS analyzer.
This presentation was given at OpenSourceDays 2010 (and in earlier stages of the project at Bifrost Workshop 2009 and 2010)
A Practical Media-over-IP Network Design Considering Debuggability and Extens...Koji Oyama
One of the biggest issues when implementing SMPTE ST-2110-based broadcasting facilities is the shortage of MoIP network design engineers who understand both broadcasting and IP network technologies. Over the past years, I have been designing MoIP networks myself, while also continuing to teach other engineers the techniques and know-how that I have obtained.
At the NAB2022, IBC2022, and NAB2023 IPShowcases, I have introduced the basics that network engineers should know, such as basic terms, elemental technologies, and case studies of issues. Then at this time, in order to make it more practical, I would like to focus on IP addressing and debugging methods, which a network engineer should consider in design phase. Therefore, the main target audience for this presentation is broadcast engineers who have some experience and basic knowledge of MoIP network design and implementation.
It is rare for a single large broadcasting facility to be designed from scratch, and most facilities are often converted to a MoIP network in stages starting from a portion of the facility. In case that you design such MoIP network facility, if you don't consider that the entire facility will eventually be all MoIP networked from the beginning and have a design with scalability and extensibility, you will have to use unexpected equipment later, and/or you will be forced to make major design changes. In particular, it is necessary to assign a unique IP address to each device and port within the facility. In anticipation of that, it is necessary to think about IP address rules to be assigned to some facilities from the beginning.
The more complex the MoIP network, the more unexpected it may happen. In that case, it is possible to grasp the situation by displaying the status at that time to some extent with network switches, but it may be difficult to grasp the chronological movement. Sometimes, it is necessary to use packet capture software such as WireShark to capture the IGMP and PIM packets that control the multicast streams and monitor what is happening. In order to be able to measure such things, we need to consider the debuggability from the initial design stage as well as the whole network and the connection of the equipment for monitoring it.
I would like this presentation to explain how it should be designed at the design stage through specific examples when you build a network with extensibility and debuggability as described above. I believe that best practice I will explain is very helpful not only for engineers and network architects experienced in MoIP network design, but also for project managers.
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)Jakub Botwicz
Presentation about Cotopaxi toolkit from Black Hat Asia 2019 Arsenal session. Author: Jakub Botwicz
https://www.blackhat.com/asia-19/arsenal/schedule/index.html#cotopaxi-iot-protocols-security-testing-toolkit-14325
Couch to OpenStack: Neutron (Quantum) - August 13, 2013 Featuring Sean WinnTrevor Roberts Jr.
Tuesday, August 13th session of the vBrownBag OpenStack Sack Lunch Series: Couch to OpenStack. With Sean Winn's help, we cover Neutron, the OpenStack Networking Service formerly known as Quantum. Neutron configures network access and services for your OpenStack instances. Credit to Ken Pepple for the OpenStack Project Diagram, and to Dan Wendlandt and the VMware Team for the workflow used in the lab
Server-side Intelligent Switching using vyattaNaoto MATSUMOTO
Server-side Intelligent Switching using vyatta. (10 oct, 2012)
for Japan Vyatta Users Meeting 2012 Autumn in Tokyo.
SAKURA Internet Research Center.
Senior Researcher / Naoto MATSUMOTO
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
5. Connecting Sensor Networks | 5
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
First Proposals for Low-power IPv4 in 2003
A. Dunkels. Full TCP/IP for 8-bit Architectures.
In Proceedings MobiSys, San Francisco, CA, USA, 2003
Z. Shelby, P. Mahonen, J. Riihijarvi, O. Raivio, and P.
Huuskonen. NanoIP: The Zen of Embedded Networking.
In Proceedings ICC, Anchorage, AK, USA, 2003
http://contiki-os.org
7. Connecting Sensor Networks | 7
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Low-power IP Stack
Layer Protocol
Application CoAP
Transport UDP
Network IPv6
Adaption 6LoWPAN
MAC CSMA
Radio Duty Cycling IEEE 802.15.4e / ContikiMAC
Physical IEEE 802.15.4
8. Connecting Sensor Networks | 8
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Low-power IP Stack
Layer Protocol
Application CoAP
Transport UDP
Network IPv6 ( + RPL routing protocol )
Adaption 6LoWPAN
MAC CSMA
Radio Duty Cycling IEEE 802.15.4e / ContikiMAC
Physical IEEE 802.15.4
9. Connecting Sensor Networks | 9
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Low-power IP Stack
Layer Protocol
Application CoAP
Transport UDP
Network IPv6
Adaption 6LoWPAN
MAC CSMA
Radio Duty Cycling IEEE 802.15.4e / ContikiMAC
Physical IEEE 802.15.4
10. Connecting Sensor Networks | 10
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Low-power IP Stack
Layer Protocol
Application CoAP
Transport UDP
Network IPv6
Adaption 6LoWPAN
MAC CSMA
Radio Duty Cycling IEEE 802.15.4e / ContikiMAC
Physical IEEE 802.15.4
11. Connecting Sensor Networks | 11
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Edge Networks
LoWPAN Local
server
Border Router
6LoWPAN adaption
PC
Backbone (LAN)
Internet
Router Server
19. Connecting Sensor Networks | 19
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Firmware with good IPv6 support
Pick one that supports your model
Find lots of support online (flash router, DD-WRT, Tomato, …)
For instance
Tomato by Shibby (continuation of TomatoUSB)
http://tomato.groov.pl/
Good old WRT54GL has not enough flash
for good IPv6 builds
Model list
http://tomato.groov.pl/?page_id=69
Router
22. Connecting Sensor Networks | 22
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Perform a hard reset
with the “30/30/30”
Use the Web interface
to upload new binary
Search for help
firmware name + router model
Flash Firmware
24. Connecting Sensor Networks | 24
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
ip -6 r add 2001:470:cafe:10::/64 via 2001:470:cafe::10
6LoWPAN prefix Gateway with
border router
25. Connecting Sensor Networks | 25
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
ip6tables -A FORWARD -p udp --dport 5683
–d 2001:470:cafe:10:<mote EUI-64> -j ACCEPT
See ip6tables manual for more options
(e.g., source filtering)
26. Connecting Sensor Networks | 26
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Raspberry Pi
Shortcut: Use a Linux PC (avoids cross-compiling)
Beagle Bone (Black)
Gateway
27. Connecting Sensor Networks | 27
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
SSH or direct connection
Add static IPv6 address for routing (see slide 24)
sudo ip -6 a add 2001:470:cafe::10 dev eth0
Enable routing in the kernel
echo "1" > /proc/sys/net/ipv6/conf/all/forwarding
Install the border router
Gateway Configuration
29. Connecting Sensor Networks | 29
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Get Contiki
git clone https://github.com/contiki-os/contiki
Relevant projects are in contiki/examples/ipv6/
Seek further help online
https://github.com/contiki-os/contiki/wiki
http://www.openmote.com/getting-started-with-contiki-and-openmote/
Check the 6lbr project by Cetic
http://cetic.github.io/6lbr/
Contiki OS
30. Connecting Sensor Networks | 30
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
Old RPL border router
rpl-border-router running on the mote
make TARGET=sky border-router.upload
tunslip6 (in contiki/tools/) running on the gateway
make tunslip6 (compile on gateway or with cross-compiler)
New native border router (recommended)
slip-radio running on the mote
make TARGET=sky slip-radio.upload
native-border-router running on the gateway
make border-router (compile on gateway or with cross-compiler)
Projects in contiki/examples/ipv6/
31. Connecting Sensor Networks | 31
Matthias Kovatsch
http://people.inf.ethz.ch/mkovatsc
sudo ./{tunslip6|border-router.native} 2001:470:cafe:10::1/64
Opens tun0 interface
Adds route into 6LoWPAN subnet
Starting the Border Router
$ sudo ./border-router.native 2001:470:cafe:10::1/64
Contiki 3.x started with IPV6, RPL
Rime started with address 1.2.3.4.5.6.7.8
MAC nullmac RDC br-rdc NETWORK sicslowpan
Tentative link-local IPv6 address fe80:0000:0000:0000:0302:0304:0506:0708
RPL-Border router started
********SLIP started on ``/dev/ttyUSB0''
opened tun device ``/dev/tun0''
ifconfig tun0 inet `hostname` up
ifconfig tun0 add 2001:470:cafe:10::1/64
ifconfig tun0
tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:127.0.1.1 P-t-P:127.0.1.1 Mask:255.255.255.255
inet6 addr: 2001:470:cafe:10::1/64 Scope:Global
[…]
Setting prefix 2001:470:cafe:10::1
created a new RPL dag
Server IPv6 addresses:
0x806a6b8: =>2001:470:cafe:10:212:7400:da0:d748
0x806a6d8: =>fe80::212:7400:da0:d748
Border router address