This document summarizes key points from Chapter 3 of the textbook "Wireless Mobile Computer Networks" by William Stallings. It discusses different types of communication networks including LANs, WANs, and MANs. It also covers circuit switching versus packet switching, components of public telecommunications networks, asynchronous transfer mode (ATM), and examples of ATM service categories.
Co-channel and adjacent-channel interference evaluation of an outdoor telecom...Konstantinos Stamatakis
The objective of the present paper is to evaluate the
impact of adjacent and co-channel interference on the
performance of some standard report systems that exists in an
outdoor telecommunications cabinet - base station (BS) (also
known as KV, from the acronym of the German word
Kabelverzweiger) and devices that technicians frequently use.
Specifically, the interference analyzed is between devices, such as
Bluetooth handset, laptop and measurement tools, that are
usually used during inspections and repairs by technicians and
wireless reporting systems installed inside BS that provide
information about BS’s condition and real time connection with
the help desk back office
Co-channel and adjacent-channel interference evaluation of an outdoor telecom...Konstantinos Stamatakis
The objective of the present paper is to evaluate the
impact of adjacent and co-channel interference on the
performance of some standard report systems that exists in an
outdoor telecommunications cabinet - base station (BS) (also
known as KV, from the acronym of the German word
Kabelverzweiger) and devices that technicians frequently use.
Specifically, the interference analyzed is between devices, such as
Bluetooth handset, laptop and measurement tools, that are
usually used during inspections and repairs by technicians and
wireless reporting systems installed inside BS that provide
information about BS’s condition and real time connection with
the help desk back office
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Neuro-symbolic is not enough, we need neuro-*semantic*
Wmcn ch.3
1. University of Jordan
Faculty of Engineering & Technology
Computer Engineering Department
Spring 2011
Summer 2009
(0907531) Wireless Mobile Computer Networks
Instructor: Dr. Anas N. Al-Rabadi
Resource: Book by William Stallings
Chapter 3
Communication Networks
2. Types of Communication
Networks
Traditional
Traditional local area network (LAN)
Traditional wide area network (WAN)
Higher-speed
High-speed local area network (LAN)
Metropolitan area network (MAN)
High-speed wide area network (WAN)
4. Characteristics of WANs
Covers large geographical areas
Circuits provided by a common carrier
Consists of interconnected switching nodes
Traditional WANs provide modest capacity
64000 bps common
Business subscribers using T-1 service – 1.544 Mbps
common
Higher-speed WANs use optical fiber and
transmission technique known as asynchronous
transfer mode (ATM)
10s and 100s of Mbps common
5. Characteristics of LANs
Like WAN, LAN interconnects a variety of
devices and provides a means for
information exchange among them
Traditional LANs
Provide data rates of 1 to 20 Mbps
High-speed LANS
Provide data rates of 100 Mbps to 1 Gbps
6. Differences between LANs and
WANs
Scope of a LAN is smaller
LAN interconnects devices within a single
building or cluster of buildings
LAN usually owned by organization that
owns the attached devices
For WANs, most of network assets are not
owned by same organization
Internal data rate of LAN is much greater
7. The Need for MANs
Traditional point-to-point and switched network
techniques used in WANs are inadequate for
growing needs of organizations
Need for high capacity and low costs over large
area
MAN provides:
Service to customers in metropolitan areas
Required capacity
Lower cost and greater efficiency than equivalent
service from telephone company
8. Switching Terms
Switching Nodes:
Intermediate switching device that moves data
Not concerned with content of data
Stations:
End devices that wish to communicate
Each station is connected to a switching node
Communications Network:
A collection of switching nodes
10. Observations of Figure 3.3
Some nodes connect only to other nodes (e.g., 5
and 7)
Some nodes connect to one or more stations
Node-station links usually dedicated point-to-point
links
Node-node links usually multiplexed links
Frequency-division multiplexing (FDM)
Time-division multiplexing (TDM)
Not a direct link between every node pair
11. Techniques Used in Switched
Networks
Circuit switching
Dedicated communications path between two
stations
E.g., public telephone network
Packet switching
Message is broken into a series of packets
Each node determines next leg of transmission
for each packet
12. Phases of Circuit Switching
Circuit establishment
An end to end circuit is established through switching
nodes
Information Transfer
Information transmitted through the network
Data may be analog voice, digitized voice, or binary
data
Circuit disconnect
Circuit is terminated
Each node deallocates dedicated resources
13. Characteristics of Circuit
Switching
Can be inefficient
Channel capacity dedicated for duration of connection
Utilization not 100%
Delay prior to signal transfer for establishment
Once established, network is transparent to users
Information transmitted at fixed data rate with
only propagation delay
14. Components of Public
Telecommunications Network
Subscribers - devices that attach to the network;
mostly telephones
Subscriber line - link between subscriber and
network
Also called subscriber loop or local loop
Exchanges - switching centers in the network
A switching centers that support subscribers is an end
office
Trunks - branches between exchanges
15. How Packet Switching Works
Data is transmitted in blocks, called packets
Before sending, the message is broken into
a series of packets
Typical packet length is 1000 octets (bytes)
Packets consists of a portion of data plus a
packet header that includes control information
At each node en route, packet is received,
stored briefly and passed to the next node
18. Packet Switching Advantages
Line efficiency is greater
Many packets over time can dynamically share the
same node to node link
Packet-switching networks can carry out data-rate
conversion
Two stations with different data rates can exchange
information
Unlike circuit-switching networks that block calls
when traffic is heavy, packet-switching still
accepts packets, but with increased delivery delay
Priorities can be used
19. Disadvantages of Packet
Switching
Each packet switching node introduces a delay
Overall packet delay can vary substantially
This is referred to as jitter
Caused by differing packet sizes, routes taken and
varying delay in the switches
Each packet requires overhead information
Includes destination and sequencing information
Reduces communication capacity
More processing required at each node
20. Packet Switching Networks -
Datagram
Each packet treated independently, without
reference to previous packets
Each node chooses next node on packet’s path
Packets don’t necessarily follow same route and
may arrive out of sequence
Exit node restores packets to original order
Responsibility of exit node or destination to detect
loss of packet and how to recover
21. Packet Switching Networks –
Datagram
Advantages:
Call setup phase is avoided
Because it’s more primitive, it’s more flexible
Datagram delivery is more reliable
22. Packet Switching Networks –
Virtual Circuit
Preplanned route established before packets sent
All packets between source and destination follow
this route
Routing decision not required by nodes for each
packet
Emulates a circuit in a circuit switching network
but is not a dedicated path
Packets still buffered at each node and queued for
output over a line
23. Packet Switching Networks –
Virtual Circuit
Advantages:
Packets arrive in original order
Packets arrive correctly
Packets transmitted more rapidly without
routing decisions made at each node
25. Effect of Packet Size on
Transmission
Breaking up packets decreases transmission time
because transmission is allowed to overlap
Figure 3.9a
Entire message (40 octets) + header information (3
octets) sent at once
Transmission time: 129 octet-times
Figure 3.9b
Message broken into 2 packets (20 octets) + header (3
octets)
Transmission time: 92 octet-times
26. Effect of Packet Size on
Transmission
Figure 3.9c
Message broken into 5 packets (8 octets) + header (3
octets)
Transmission time: 77 octet-times
Figure 3.9d
Making the packets too small, transmission time starts
increases
Each packet requires a fixed header; the more packets,
the more headers
27. Asynchronous Transfer Mode
(ATM)
Also known as cell relay
Operates at high data rates
Resembles packet switching
Involves transfer of data in discrete chunks, like packet
switching
Allows multiple logical connections to be multiplexed
over a single physical interface
Minimal error and flow control capabilities
reduces overhead processing and size
Fixed-size cells simplify processing at ATM nodes
28. ATM Terminology
Virtual channel connection (VCC)
Logical connection in ATM
Basic unit of switching in ATM network
Analogous to a virtual circuit in packet switching
networks
Exchanges variable-rate, full-duplex flow of fixed-size
cells
Virtual path connection (VPC)
Bundle of VCCs that have the same end points
29. Advantages of Virtual Paths
Simplified network architecture
Increased network performance and
reliability
Reduced processing and short connection
setup time
Enhanced network services
31. Virtual Channel Connection Uses
Between end users
Can carry end-to-end user data or control
signaling between two users
Between an end user and a network entity
Used for user-to-network control signaling
Between two network entities
Used for network traffic management and
routing functions
32. Virtual Path/Virtual Channel
Characteristics
Quality of service
Specified by parameters such as cell loss ratio and cell
delay variation
Switched and semipermanent virtual channel
connections
Cell sequence integrity
Traffic parameter negotiation and usage
monitoring
Virtual channel identifier restriction within a VPC
33. ATM Cell Header Format
Generic flow control (GFC) – 4 bits, used only in
user-network interface
Used to alleviate short-term overload conditions in
network
Virtual path identifier (VPI) – 8 bits at the user-
network interface, 12 bits at network-network
interface
Routing field
Virtual channel identifier (VCI) – 8 bits
Used for routing to and from end user
34. ATM Cell Header Format
Payload type (PT) – 3 bits
Indicates type of information in information
field
Cell loss priority (CLP) – 1 bit
Provides guidance to network in the event of
congestion
Header error control (HEC) – 8 bit
Error code
35. ATM Service Categories
Real-time service
Constant bit rate (CBR)
Real-time variable bit rate (rt-VBR)
Non-real-time service
Non-real-time variable bit rate (nrt-VBR)
Available bit rate (ABR)
Unspecified bit rate (UBR)