SynchroKnot vSoC [Virtual System On Chip] Software.

Decentralized Cloud And Data Center [Data Decenter] In Minutes.

- COMPLETE ALTERNATIVE for VMware, OpenStack, Hyper-V, Routers, Switches & Storage [SAN/NAS] -

RAPID TRANSFORMATION OF YOUR BUSINESS IN MINUTES.



Transforming Traditional Cloud And Data Center To Data Decenter @ The EDGE With ONE vSoC + SoC.






Connect Each Hardware System On Chip [SoC] DIRECTLY TO EACH-OTHER.







- SynchroKnot vSoC 1.0 And Hardware SoC Coming Shortly -



║█ SynchroKnot vSoC 1.0 Base License Price Per CPU Core / Thread Per x86_64 Hardware - Euro 60 -





█║▌║▌║ Data Center & Cloud Computing Today -Vs- SynchroKnot Total Value Proposition [TVP] ║█



█║ Centralized Data Center & Cloud Computing Today

├──> Must Purchase Disparate Hardware - servers, redundant switches & routers, storage [SAN/NAS] and load balancers.
├──> Must Purchase Virtualization Software + Licenses - VMware, OpenStack, Hyper-V, RHEV, Xen, VDI etc.
├──> Must Purchase Storage Software + Licenses.
├──> Must Purchase Licenses for Switches, Routers & Load Balancers [above and beyond the hardware].
├──> Must Manage Separate Hardware & Software Through Different Management Panels, User Interfaces and APIs.
├──> Must Maintain Separate Multi-Tiered Teams and Departments To Manage Complex Operations.
└──> Must Have A Large Space To House Expensive Hardware With High-Cost Real Estate & Cooling.



█║ SynchroKnot Total Value Proposition [TVP] Advantage:

├──> SynchroKnot vSoC Software Does Everything.
├──> Decentralized Data Center and Cloud Computing @ the EDGE.
├──> No Separate Hardware Needed - Simply Install vSoC on SoC and Connect Them To Eachother.
├──> No Need To Purchase Separate Desktop & Server Virtualization Software OR Their Licenses [Eg. VMware, OpenStack, Hyper-V, RHEV, Xen, VDI etc].
├──> No Need To Purchase Physical OR Virtual Switches and Routers OR Any Of Their Licenses [Eg. Cisco, Juniper etc].
├──> No Need To Purchase SAN/NAS/Distributed Block & File Storage [Eg. Netapp, Dell, EMC, Gluster, Ceph etc].
├──> No Separate Teams And Departments Needed.
├──> Seamlessly Control & Manage All Virtual Machines & SoCs From All SoCs If Needed [ANY-to-ANY].
├──> No Large Space Needed. SynchroKnot Setup Is Very Flexible. You Can Utilize Cubicles, Offices, Apartments, Basements, Fibre Optic Hubs etc.
├──> Transparently Scale and De-Scale [locally/globally] Your SynchroKnot Infrastructure On-Demand Without Disruption/Interruption.
└──> Be Your Own Cloud Provider. Sell Full or Under-Utilized Hardware Resources With Bitcoin Internally/Externally [New Feature Coming Soon].



█║ SynchroKnot: Economic Advantages

├──> Exponential Reduction In Total Cost.
├──> Exponential Reduction In Complexity.
├──> Exponential Reduction In Manpower.
├──> Exponential Reduction In Power Consumption, Cooling Expenditure & Space/Real-Estate Requirements with Small Form-Factor, Stacked Embedded Devices [SoCs].
├──> Exponential Increase In Performance.
├──> Exponential Increase In Security.
├──> Exponential Increase In Scalability & Over-all Control & Responsiveness.
├──> Eliminate All Vendor and Multi-Vendor Lock-ins, Inter-dependencies & Traps.
├──> Comprises 10+ Year Production Seasoned Open-Source Components.
└──> Significantly Increase Your Organization's Micro and Macro Economic Dynamics and Manpower Efficiency.




█║▌║▌║ SynchroKnot vSoC Evolution: 3 Data Centers -Vs- SynchroKnot | Real-World Example Scenario ║█




3 Data Center Sites






-Vs-




20 High-Performance SoCs + vSoCs on a Standard Work Desk.









█║ Data Center & Cloud Computing Today: 3 Data Center Sites
▌ 3 Interconnected Data Center Sites – Site A, B & C [Actual Real-World Example Scenario of a Large Research Institution.]
▌ 6 Departments [Extensive, Cumbersome & Inefficient Manpower & "Meetings" Requirements]:
■ Systems Administration ■ Storage Administration ■ Network Administration / Engineering ■ Systems Engineering ■ Information Security ■ Project Management
▌ ~ 300 Virtual Machines
▌ Dependence on Multiple Vendors, Consultants and Contractors with Time-Consuming Problem/Issue Resolution

-Vs-

█║ SynchroKnot vSoC Evolution: 20 High-Performance SynchroKnot Certified SoCs + vSoCs on a Standard Work Desk.
Under Euro 35K for the Complete Software + Hardware Solution [20 SynchroKnot vSoC Base Licenses + 20 SoCs with Disk & Memory [RAM].
1 [or 2] Engineer[s].
▌ 20 SynchroKnot High-Performance Synchroknot SoCs [certified].
▌ 300 [or more] Higher-Performing Virtual Machines.
▌ Standard Work Desk for the 20 SoCs [Stacked One-on-Top-of-Another with Spacers & Pillars] and the SynchroKnot Engineer.
▌ Standard Cooling Requirement [Operating Temperature: 0 - 60 Degree Centigrade | Operating Humidity 5% - 90%].
▌ Very Small Form-Factor [4 x 4 inches].
▌ Excellent Performance: 320 Threads at 3.8 to 4.2 GHz.
▌ Low Thermal Design Power [TDP].
▌ Low-to-No Noise.
▌ Long-Term Product Availability & Support.
▌ Superior Resistance to Shock and Vibration.



█║▌║▌║ About ║█


SynchroKnot is the Originator & Leader of Converged Unification and Decentralization of the Cloud and Data Center Infrastructure and Manpower with its combined software, technology, architecture and methodology.

With the main focus on the expansive Asian Market, the SynchroKnot Technology brings about Rapid Transformation with its Multi-Dimensional Value rejuvenating the economic dynamics of your organization amidst the fast slowing global economy.

The SynchroKnot software and solution was developed and used internally & semi-commercially for over 9 years [with 15+ years of multi-faceted research]. SynchroKnot has decided to make the upcoming vSoC version 1.0 [the latest & most advanced vSoC] available for full commercial use globally.

SynchroKnot vSoC software and technology is an all-exclusive and all-inclusive product.

Donate to the SynchroKnot Beyond Light Years Initiative


SynchroKnot copyrights and intellectual property are fully and solely owned across the global jurisdiction by [> Mehul Sharma <], Owner & Creator of SynchroKnot Software, Architecture, Technology and Methodology. The physical jurisdiction[s] where SynchroKnot is located has no bindings on the intellectual properties of SynchroKnot in any manner whatsoever as it is directly owned by its creator as an individual in-person. It is illegal for any jurisdiction to make claim[s] on the ownership, authorship or proprietorship among other absurdities-of-sorts.

Read more on how to become an authorized [> SynchroKnot Integrator <]

If you would like to request time from our Integrators for a presentation, demonstration and workshop online, on site or at an event, provide us a brief idea about the type of audience [eg. percentage of C-Level executives, decision makers, technologists, developers etc] by email for further consideration.

- Live Happy With SynchroKnot -







▌█ SYNCHROKNOT POWER MODULES : Available


▌█ License


▌█ PERMANENT BLACKLIST ▌█


▌█ COST ANALYSIS: VMWARE, HYPER-V & OPENSTACK -VS- SYNCHROKNOT


▌█ SYNCHROKNOT TRAINING & CERTIFICATIONS


▌█ UNIQUE VULNERABILITIES DISCLOSURE & QUICK REMEDIATION


▌█ Generic Guide to Hardware Selection, Consulting and Pricing


▌█ Bug Fixes


▌█ Encryption - Micro How-to




█║▌║▌║ Interact ║█




█║  Interact with SynchroKnot Spatial Systems Engineering  ║█
│
│
│
│
├── █║ EMAIL /
│   │
│   └──  s y n c h r o k n o t  | a-t | synchroknot |d0t| cl0ud 




█║▌║▌║ Acquire SynchroKnot Software Licenses, Consultations and Solutions ║█



█║▌ Send us an email for details on how to acquire SynchroKnot software, licenses, consultations and solutions.

▌ To get connected with authorized SynchroKnot Integrators that serve your region, send us an email.

█║▌║▌║ Integrator ║█


█║▌ Apply for consideration to become a SynchroKnot Integrator and benefit in the following manner:
1] Resell and earn up to 60% margin on the Cost of the Base License and Power Modules licenses. 2] Earn up to 60% margin per SynchroKnot certification you secure. 3] Earn separately on top of that with your own consulting charges for initial consultation, design, deployment, knowledge transfer and technical support. 4] Get leads from SynchroKnot additionally and optionally above and beyond your own client base to grow your business in different regions locally and internationally. This option depends on your positive client ratings. 5] Get your engineers trained & certified at discounted prices and kept up-to-date with the latest feaures, work-arounds, business benefits and much more, so that you consistently gain market share linearly. Simple example of multiple ways to earn through SynchroKnot: Let’s say you get to enable company A with the SynchroKnot solution. You will earn through: 1] Your own consultation provided to company A with your own engineers. 2] When you recommend the number of SynchroKnot Base Licenses and Power Module Licenses, you earn up to 60% per license cost of each license company A buys. 3] You earn from the infrastructure deployment time, manpower & project management [local/remote installation, configuration and completion]. 4] Since you are certified and authorized by SynchroKnot, you earn directly from training and knowledge transfer to the engineers of company A. 5] Once you have trained the engineers of company A and they are ready to be officially certified, you will earn upto 60% on each SynchroKnot certification you secure from company A. Company A gets a complete solution whereby they also get the certifications via you. 6] Once you are done, you can earn from hourly/yearly technical support for the infrastructure that you deployed and enabled. 7] Optionally, you can choose to avail client leads or direct clients [local to your region or international] from SynchroKnot directly. Who can apply? 1] System Integrators, Web Hosting Providers, Internet Service Providers, IT Infrastructure Providers, Technology Consulting Organizations and so on in the regions where SynchroKnot software licenses can be used [refer to the license section at synchroknot.cloud]. 2] Must have a background in Linux. 3] Must have an established client base. 4] Contact: synchroknot | a t | synchroknot |d0t| cl0ud with the basic background of your organization and describe the type of market[s]/clients you serve.

█║▌║▌║ Changelog ║█


█║▌ Changelog:
2019-11-22 : VERSION : 1.0Version 1.0 : Released & Launched. │ ├─> Release Authority: Mehul Sharma @ SynchroKnot └─> It’s now your choice to be left far behind!Performance Improvements: │ ├─> 600% to 750% – Virtual Machine Information. ├─> 200% to 300% – Decentralized Parallel Search. ├─> 200% to 300% – AuthControl & BlockchainSSH. └─> 200% to 350% – Internal Checksum for all triggers. █ New Features & Enhancements: │ ├─> Excerpts Regex : powerful real-time regex matching. ├─> Excerpts Realtime Cache Regex. ├─> Multi-type full-regex OR and AND matches. ├─> Multi-type full-regex NOT with OR /AND. ├─> Auto Random + Serial AuthControl load balancing. ├─> Auto Random + Serial BlockchainSSH load balancing. ├─> Enhanced Decentralized Resource Radar. ├─> Enhanced logic for auto VM relocation & creation. ├─> Merged Blockchain SSH with AuthControl. ├─> Blockchain SSH auto fails back onto AuthControl. ├─> Reduced dependence on external libraries/tools by 98% ├─> Enhanced Satellite Tree Protocol for wireless, satellite and wired networks along with numerous other improvements. ├─> Synchrosync – now displays full replication information & progress status with an ability to stop any running replication with a click of a button. ├─> Satellite Tree Private Network – Distributed/Decentralized Multi-Fault-Tolerant, Mission Critical, Low-Overhead, Scalable Layer 2 virtual private network. ├─> Integrated Satellite Tree Private Network with Blockchain SSH and AuthControl. Now, effortlessly be a part of or grow your Satellite Tree Private Network to a large number of nodes near-instantaneously, transparently and seamlessly across wired, wireless and satellite networks across the globe. ├─> Enhanced Power Modules are now made available: FASTR, Authcontrol, Blockchain SSH, Interstellar, Arpless Interstellar, Level2 Security, Reachout, Realtime Cache & Synchrosync. ├─> Extended Nonce Fingerprint Verification [New Feature] checks & ensures that only the latest Nonce Fingerprints and their cryptographic blockchain signatures are being used to login and access the infrastructure engine.

█║▌║▌║ Software Product Features ║█


█ Works with any AMD64 [x86_64] hardware. [ARM64 (aarch64) licenses will be released in the near future.]

█ Installs on Debian 9 / 10 [kernels 4.9 | 4.19].


▌ Each feature has a type [ Type : Built-in or Type : Power Module ].

▌ Type : Built-in is included in the base license.

▌ Type : Power Module is an additional module at an additional cost and is not included in the base license.



█║ Spatial-Defined Infrastructure Engine - Enlivening the Heart of Enterprise 4.0/


█║ Spatial-Defined Virtualization Engine - High-Performance Desktop & Server Virtual Machines/


█║ Spatial-Defined Network Engine/


█║ Spatial-Defined Security Engine/


█║ Spatial-Defined Storage Engine/







█║▌║▌║ Demonstration and Instructional Media ║█

While the demonstration and instructional media gives a feel and insight of the flexibility and workability of different aspects of SynchroKnot, the only way to get a practical and theoretical understanding is to try and practice different case scenarios hands-on!

Note that most of the media seen here pertains to the older non-commercial version of SynchroKnot. We have received exhilarating and positive feedback about the ambiance and workability of the new SynchroKnot software [currently undepicted in the demonstration videos].

Be sure to read through the Documentation.




█║ SynchroKnot Decentralized Blockchain Identity Management

■ Demonstrates an authorized user logging into the Spatial Cluster on a Spatial Fabric Array. [This demonstration does not use level 2 security via Active Directory / LDAP].
■ The user's Blockchain Private Key is only used to sign a Spatial Nonce Fingerprint [invisible to the user] in the browser and not sent to the server.
■ On successful authentication the user is immediately taken to the SynchroKnot Infrastructure Engine.









█║ SynchroKnot Level 2 Security - Decentralized Blockchain Identity Management + Active Directory / LDAP

■ Demonstrates an authorized user logging into the Spatial Cluster on a Spatial Fabric Array with Level 2 Security enabled. The new commercial version of SynchroKnot software is depicted.
■ For the purpose of demonstration, the user first logs in without the password and is prompted to enter the password as Level 2 Security is enabled. Then the user enters a wrong password which is rejected by the designated Active Directory / LDAP server(s). On the third attempt the user succesfully logs into the SynchroKnot Infrastructure Engine.
■ In this demonstration, for the purposes of testing, the Level 2 Security Power Module tries to authenticate against the first 3 LDAP servers designated to the user and fails, and then successfully authenticates the user against the 4th LDAP server. Speed is clearly visible, in spite of multiple, complex security and cryptographic operations being performed by SynchroKnot.






█║ Decentralized Virtual Machines : Multifarious ways to Create

■ Auto Create a Virtual Machine from a Spacesuit [ template ] -- uses Decentralized Resource Radar.
■ Auto Create a Virtual Machine from a Spacesuit on a Spatial Fabric Array with high or low performance -- uses Decentralized Resource Radar.
■ Auto Create a Virtual Machine from a Spacesuit on a Spatial Fabric Array from a refined group using Microcosm / Macrocosm / Intercosm or their combination. Further automatically choose a Spatial Fabric Array with high or low performance -- uses Decentralized Resource Radar.
■ Manually Create Virtual Machine from Spacesuit on a Spatial Fabric Array.
■ Auto Create Virtual Machine from an existing Virtual Machine -- uses Decentralized Resource Radar.
■ Manually Create Virtual Machine from an existing Virtual Machine on a specific Spatial Fabric Array.
■ Auto Create a Spacesuit from an existing Virtual Machine -- uses Decentralized Resource Radar.
■ Manually Create a Spacesuit from an existing Virtual Machine on a specific Spatial Fabric Array.
■ Create from Spacesuits or Virtual Machines while they are running [ switched on ] without disruption.






█║ Virtual Machine : Real-time Information, Monitoring & Statistics and Web Console






█║ Decentralized Automatic and Manual Virtual Machine Relocation

■ Auto Relocate virtual machines with their storage without knowing where the virtual machine you intend to relocate resides on the Spatial Cluster and without knowing who the receiver will be. Further, the receiver does not know who the sender will be. Just the name with the relocate command or click of the Auto Relocate button. Everything is auto ascertained and executed by the decentralized resource radar, without reading a central or distributed database or resource.
■ Manually relocate to a specific Spatial Fabric Array by simply giving its IP address.
■ Auto relocate also possible [ not shown in the video ] to a refined group of Spatial Fabric Arrays with the help of Microcosm, Macrocosm and Intercosm [ individually or their combination ].
■ Auto relocate also possible [ not shown in the video ] to high or low performance Spatial Fabric Arrays by simply adding performance:[high / low]. Further, use it with Microcosm, Macrocosm and Intercosm [ individually or their combination ].






█║ Decentralized Virtual Machine Operations - Start, Stop, Unplug, Pause, Unpause, Delete .....

■ All virtual machine operations can be performed with a click of a button or with the use of intelligent auto-fill triggers.

■ When using the intelligent auto-fill triggers there is no need to give the lastname [ ie Blockchain ID ] of the virtual machine. Only in certain cases the lastname is required due to the decentralized nature of the technology, and in most of those cases there are mechanisms in the infrastructure engine where one can append the virtual machine lastname to different keys with just a click of a button, resulting in operational ease and speed!






█║ Virtual Machine Replica - Writable Snapshots that don't relocate with the virtual machines, reducing the burden of tugging along snapshots, yet still available to be reverted to the original or created into new virtual machines.






█║ Spatial Satellite Tree Protocol - One of the many SynchroKnot components enabling an industry-wide global paradigm shift.

Part 1 : Shows a total of 24 nodes in one large loop [ Ring Topology ] with Spatial Satellite Tree Protocol enabled and multiple switches being brought down and up every 10 seconds. Mininet is used for this demonstration. One can observe the results of the pings etc.

In actual use case scenarios, with our unique cabling technique in a 5 X 5 2-D Torus topology, one may generally not have more than one hop! 24 nodes are used for purposes of extreme testing in difficult case scenarios [ sometimes not siding with the logical mind ].

■ In the video, an older script [ring-topologyx16-test] was used to bring switches down and up, but while recording this demo the number of total nodes were increased to 24 impromptu for fun to increase the level of difficulty. In this demo, the root bridge is auto selected and is not s16. In the next demo we will manually make s16 the root bridge and fail it.

■ Simple machine with 2 cores [4 threads] Intel Core i7-6500U Processor with 8 GB RAM. Alongside, a few running virtual machines not a part of this demo were used in the background to consume CPU and memory resources, leaving fewer CPU cycles and memory for Satellite Tree Protocol and the 24 nodes with Mininet. [This demonstration video was also recorded on the same machine and thus used additional CPU cycles and memory.]

■ Side Note : Spanning Tree Protocol and Rapid Spanning Tree Protocol generally respond to failures by recovering in about 40 to 300 seconds or more depending upon the timers and topology [ RSTP may recover faster by just a few seconds ]. This is with the regular vendor / standards suggested timers found in most switches in standard setups today. One can increase the network diameter [ i.e number of switches between two endpoints ] to a maximum of about 18. This however will substantially increase the recovery time, alongside most likely put the timers of switches out of sync. Your mileage may vary. Do your own research.

Caution : If you try a similar setup with standard physical Ethernet switches [Cisco, Juniper etc] then you are solely responsible if you brick your appliance(es).









█║ Spatial Satellite Tree Protocol - Root Bridge Failure, Failover and Failback.

■ Part 2 : Continuation of Part 1. Shows Satellite Tree Protocol - Root Bridge Failure, Failover and Failback and multiple switches being brought down and up every 10 seconds.
■ In this demo, the root bridge is manually set to s16 and then brought down first! More details in the video.









█║ Spatial Satellite Tree Protocol - Root Bridge Failure, Failover and Failback with FLOOD PING!

■ Part 3 : Continuation of Part 2. Shows Satellite Tree Protocol - Root Bridge Failure, Failover and Failback and multiple switches being brought down and up every 10 seconds with FLOOD PING instead of ping. Same set up as above with a total of 24 nodes in one large loop [ Ring Topology ] and simple hardware with 2 cores - 4 threads Intel Core i7-6500U Processor with 8 GB RAM.

Note: You may also notice results of prior flood ping tests before the current one gets underway. We would like to assume that 0% packet loss with 24 switches is a bit much for our logical mind to digest and would love to blame the ping utility with a faulty flood ping option :) ..... of course with double/triple/quadruple shots of your favorite beverage [Eg. coffee, lemonade etc] you may develop an insight that differs.

■ Exercise the same caution as mentioned above.









█║ Disperser - Load Balancer - Create, Enable, Disable and Remove.

■ Basic operations with private IP addresses depicted [ add a public IP address if needed ].










■ Demo showing TCP and UDP auto load balancing with no separate configuration for TCP or UDP ports. Sending traffic to the front-end Disperser IP address load balances to its respective port on the back-end.









█║ Virtual Machine Modification - Multiple Multi-Order Edits to Multiple Components and Services Seamlessly All in a Single Line.

■ This demo shows a simple form of multiple edits [ which can be in any order ] all on one line being performed by the Intelligent Modification Logic & Engine in the background to the virtual machine's Spacesuit. The configuration and sub-configurations of components and services are handled transparently. This video shows an example where the SpaceBuoy configuration and service is automatically modified and brought up along with the other modifications after checking against conflicts, among other things.

■ The second video shows using the web console of the virtual machine [ Linux - Openwrt ] and restarting the network to see if the IP address and the default Gateway IP address that was just invoked via the SpaceBuoy is assigned correctly.












█║ Excerpts - Decentralized Realtime Precision Parallel Search with the Parallel Regex Engine

■ This simple demo shows a precision parallel search for virtual machines individually and in combination with Microcosm, Macrocosm and Intercosm for geographical location specificity. Extreme fine-grained searches are possible in real-time. Decentralized responses are not generated by reading in-memory databases or caching, but rather computed when requested!!!

[ This section will be updated with more videos demonstrating advanced fine-grained searches emulated across globally dispersed Spatial Fabric Arrays. ]


Below are the triggers used with Excerpts in the demo video:

trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:*
trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:apache
trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:nginx
trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:apache,nginx
trigger:excerpts intercosm: macrocosm:boston microcosm:row10,rack1 spatial-fabric-array: synchroknot:apache,nginx
trigger:excerpts intercosm:washington-dc macrocosm:ashburn microcosm:rack9 spatial-fabric-array: synchroknot:apache,nginx









█║ Realtime Logs with Log Panorama and Spatial Fabric Array Information

■ List of Spatial Fabric Arrays and their concise information.

■ Logs of different operations performed by users in realtime

■ Searching of keywords in the received logs.









█║ SpaceBuoy - Decentralized DHCP : Secure Dynamic Static IP, Netmask, Broadcast, Gateway, DNS, MTU and much more.

This demo shows the SpaceBuoy in action which comes with the new commercial version of SynchroKnot. Without touching the virtual machine one can assign ANY Name, IP Address [Public/Private IPv4 IP Address], Netmask, Broadcast, Default Gateway, MTU [Maximum Transfer Unit], NTP, DNS, Domain Name, Domain Search, Log Server, NETBIOS [Name Servers, Datagram Distribution and Node-Type], SMTP server, POP3 server, plus also, Enable IP Forwarding, Set TCP Keepalive, Set Multiple Classless Static Routes and more.









█║ SpaceBuoy - Decentralized DHCP : Setting Private and Public Dynamic Static IPs with different Netmask, Broadcast and Gateway.

This demo shows the SpaceBuoy being used on a Spatial Fabric Satellite with fairly low resources [cpu and memory] with the object being to see how the DHCP client inside the virtual machine with 512M of memory is able to succesfully sustain the changes to different public and private IP addresses with varying netmasks and broadcasts. [The private & public IP addresses shown in the video are randomly selected for testing.]

Note : Those familiar with the DHCP server and client functionality might have noticed that no specific private or public IP address is assigned to the DHCP server in the demo! [nor has it been assigned previously]. This feature saves IP addresses and configuration & maintenance hassles.









█║ SpaceBuoy and DHCPCAST : Secure Dynamic Static IP with Decentralized DHCP and IP address from specific DHCP Server

This demo shows the following:

■ setting of a dynamic static IP address and default gateway IP address via the SpaceBuoy, and then checking and confirming it using the virtual machine's web console.

■ pointing the virtual machine's network interface to a specific DHCP server by its MAC address, and then checking and confirming via the web console if the virtual machine received its IP address and default gateway IP address from that DHCP server.









█║ FASTR : Intelligent Fast Asynchronous Triggered Replication of Virtual Machines

This demo shows how simple it is to setup FASTR, and how fast it actually is. Especially considering that it even detects and triggers intelligently on just a few bytes being written to the filesystem inside the virtual machine!!!!

The video shows the following:

■ Enabling and starting FASTR for a virtual machine called app-containers [ running different containers like LXC, Docker, Kubernetes etc ]. app-containers resides on Spatial Fabric Array 28.9.0.1 and is replicating to app-containers-fastr on Spatial Fabric Array 28.9.0.2 on another machine connected via Gigabit Ethernet on VLAN 9.

■ Logging into app-containers via the web console and writing to the filesystem by echoing simple text to a file and doing a sync.

■ Running the fastr-checksum script immediately after doing a filesystem sync inside the virtual machine. The fastr-checksum script does an shasum on app-containers virtual disk locally, and pulls the shasum of the virtual disk of app-containers-fastr from 28.9.0.2

■ Observing if the checksums match. This proves that the changes are being replicated correctly onto the remote side, and everything is perfectly in sync.









█║ Spatial Fabric Satellite Setup and Invoke

This demonstration shows how to set up and invoke the Spatial Fabric Satellite on any commodity x86_64 hardware with Debian 9.









█║ Create Spatial Cluster for Tenants with Multiple Stacked Vlans

Demonstrating creation of a Spatial Cluster for tenants on a Spatial Fabric Satellite with Multiple Stacked Vlans [Single Vlan 1000, Double Stacked Vlan 1000.1000 and Triple Stacked Vlan 1000.1000.1000]. Additional information not a part of the video : The tenants are identified with their Blockchain ID [and confirmed with their signature] for global decentralized multi-service provider deployment, access, connectivity and VPN, among a whole lot of other aspects.









█║ Start Spatial Cluster

Start the previously created Spatial Cluster.









█║ Set up Spatial Fabric Satellite - Create and Start Spatial Cluster - Unabridged

Unabridged. All in one flow for fun.

Setting up a Spatial Fabric Satellite and creating a Spatial Cluster is a one time task. Spatial Cluster is started once after the operating system boots.









█║ Android Desktop as Virtual Desktop Infrastructure [VDI]

Fun with Android Desktop acting as VDI. Good performance with no special adjustments to the web console! [leaving enough room for the performance to be further improved]. Both touch screen and mouse from the track pad were used [though one can't tell the difference in the video]. Reduce your VDI costs [as it is free]. Benefit from the built-in terminal, VPN and numerous apps. This is just a basic demo to get one started. [Keep in mind that this video was recorded with average frame rate quality].









█║ Automatic Distance Vectoring with Spatial Fabric Arrays + SynchroKnot User Information Display

The new version of SynchroKnot comes with built-in automatic distance vectoring for auto adjustment of local and global latencies experienced when the Spatial Fabric Arrays communicate over variable distances. These latencies are mainly caused by long distance links and the load [available CPU cycles] on the destination Spatial Fabric Satellite(s).

This demonstration shows the speed-up achieved on the SynchroKnot Infrastructure Engine Web Interface by reducing the internal distance vector time of the Spatial Fabric Array by the tenant. Every tenant of every Spatial Fabric Satellite can adjust their distance vector semantics. It is recommended not to adjust this value unless you know exactly what you are doing. Also featured is a peek into the SynchroKnot [user] information, which may not have been shown in other videos.













█║ ARPLESS INTERSTELLAR

This impromptu Arpless Interstellar power module demonstration shows 2 virtual machines named webserver [w] and deb [d] in interstellar dac0001 enabled with Arpless 192.168.1.111-dac00011eeee. This means, in addition to being protected by Arpless, they are already protected by Interstellar at two separate levels of security enabled at layer 2, namely mac address spoofing protection and communication protection, only allowing interaction between virtual machines with their matching interstellar id(s), interstellar resonance id(s) and interstellar oui(s).

In this demo, traffic from W is specifically heading to 192.168.1.111 with mac address da:c0:00:11:ee:ee. D is compromised and is used to divert traffic that is heading to 192.168.1.111 with mac address da:c0:00:11:ee:ee on to itself using various methods. In real world scenarios, 192.168.1.111 could be anything like a gateway, router, load balancer, webserver, database, ldap/active directory, network/distributed filesystem server, email server, voip server etc.

The result is that all the attempts are unsuccessful. Neither does W's ARP cache change nor does its traffic get diverted to D.

Further, as a last resort, the user gets into W and succesfully poisons the arp cache of W to point to D. The result is that traffic diversion is unsuccessful. Also, the ability to reach D directly from within W is unsuccessful!!!!

Keep in mind, this demonstration assumes one has basic to advanced hands-on knowledge of network and operating system security and packet wrangling. The point of this demonstration is to show one the most vulnerable actual use case scenarios, and not pseudo arp cache poisoning like shown in the following next demo where all machines within a network that can communicate with eachother without Arpless Interstellar, and poisoning the arp cache, simply diverts the traffic from one to the other. The next demo also confirms that there is no bug in the operating system that prevents the traffic from being diverted when its arp cache is poisoned [tested on debian 9 - stretch]. This means that the traffic would have been easily diverted without Arpless Interstellar.

Breakdown of the highlights of the demonstration video:

1) In W check for arp entries, and then ping 192.168.1.111 which is turned off. Arpless responds with the mac address. Arpless would have also replied even if 192.168.1.111 was turned on. For the purposes of the demo it is easier and clearer to show the Arpless functionality.

2) ping W to D and D to W to check the connectivity and arp cache.

3) Check if mac address spoofing is working. Ping from D to W. Change the mac address on W and then ping D and see if the pings are still working. Change back to the original mac address of W and check ping. This shows the mac address spoofing protection via the interstellar is enabled on both W and D [though we did not repeat the same steps for D in this demo].

4) On D, change IP address to 192.168.1.111 while keeping its original mac address. Ping from both sides and check their arp caches. Notice in the demo, that there was no arp entry for 192.168.1.111 which was likely flushed, due to the back and forth changing of mac addresses, but when W pings 192.168.1.111 it only hears back da:c0:00:11:ee:ee and not the mac address of D.

5) Since the previous step did not work on D, change the mac address of eth0 to da:c0:00:11:ee:ee, so D now has the IP and mac address of the original destination. [Wonder what would happen in an actual case scenario without Arpless Interstellar? .....don't know..... :)]

6) As the previous step was also unsuccessful, as a last resort, get into W and poison the ARP cache to point to D. On D, keep the IP 192.168.1.111 and change the mac address to its original so that mac address spoofing protection done by interstellar does not block us. This should be it. So far this seems like a no-brainer, and can't wait for that ping to get through finally!!!

7) See what happens.













█║ Blockchain SSH Public Key Infrastructure Management

This quick demo shows fast passwordless SSH login and SCP with SynchroKnot Blockchain SSH Power Module. [Notice that tab completion works with SCP.]

To get it working [not shown in the video], in the target virtual machine simply modify the sshd_config and run the setup script [one time operation], and then map the Linux [or other operating system] username [ID] to the Blockchain ID of the SynchroKnot. That's it.

The video shows the username debian [on the vm deb] is interlock-mapped to the Blockchain ID 1PeDaGo6Uj9HWdVQs8zJAYeQ1478xrpwLE and Spacesuit of 1PeDaGo6Uj9HWdVQs8zJAYeQ1478xrpwLE shows the key sdac-pki-id with the value debian. This is essential for successful login access to the virtual machine. Only the SynchroKnot root user can perform the interlock-mapping of the user's identity.

Users manage their own public key(s) [ Base64 encoded & up to 10 keys ] in their Spacesuit on upto 5 different Spatial Fabric Arrays [geographically dispersed to protect against network and infrastructure failures].

Only the authorized SynchroKnot [user] can add or remove his/her public key(s). Even the SynchroKnot root user cannot perform this operation. This feature prevents anyone else from mistakenly/illegitimately denying access.

Note: In this demo the SynchroKnot user [not the linux user] happens to be a SynchroKnot root user. One can create users that are plain SynchroKnot users without SynchroKnot-root capabilities.









█║ AuthControl : Distributed Fault-Tolerant Authentication Management & Identification Control System

This is a very basic impromptu demonstration of AuthControl. Here both of the virtual machines are enabled with AuthControl and show the following:

■ Login via Graphical Interface

■ Login via Non-Graphical Interface

■ Run a command with SU as another user

■ Run a command with SUDO as another user

■ Login to a remote system via SSH

■ Mount a remote filesystem via SSHFS

■ Use File Manager to create a Network Place using SFTP

All these different types of logins use AuthControl with standard Linux users and password + 5 digit pin. Here the password used for all logins is hello12345 and the basic HTTPS traffic is captured on the Spatial Fabric Satellite using TCPDUMP to show realtime interaction with the SynchroKnot AuthControl Power Module when the password is entered in the virtual machines for the purposes of authentication.

Note: This demo was recorded on a severely resource-constrained system. It is up to you to determine the performance :)














Creative Commons License
SynchroKnot [ website - content - technology - architecture - methodology ] by SynchroKnot is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Based on a work by its creator Mehul Sharma at SynchroKnot : synchroknot.[cloud|systems|world|com|org|de|ch|tokyo|in|ru].