█ Welcome to SynchroKnot and Enliven Yourselves to the Heart of some of the Most Unique Decentralized Cloud Computing & Electric Vehicle Technologies Ever Built. █

- SynchroKnot Permanent -Interplanetary- Light On & Off Road Electric Vehicles -

- Decentralized Cloud, IoT, Edge Computing & Data DeCenter In Seconds. -

█ COMPLETE ALTERNATIVE FOR: VMware, OpenStack, Hyper-V, Routers, Switches & Storage [SAN/NAS] █


SynchroKnot vSoC is NOW .F.R.E.E. .F.O.R.E.V.E.R.

[> SynchroKnot-vSoC-1.0-Binary.tgz <] [> SynchroKnot-vSoC-1.0-Binary SHA512 Checksum <]

[> SynchroKnot-LICENSES.tgz <] [> SynchroKnot-LICENSES SHA512 Checksum <]

[> satellite-tree-switch-x86_64.tar.gz <]
SHA512 Checksum after decompression:


Keep in mind that this is the merge of the latest bleeding edge code.

SynchroKnot has officially *.B.L.A.C.K.L.I.S.T.E.D.* all American, British, German and Indian governments/companies/proxies/partnerships/joint-ventures/individuals and the entire region of the United States, Britain, Germany & India from using all SynchroKnot Software, Portal, Intellectual Properties and the upcoming unique SynchroKnot Light Electric Vehicles. Strict legal action may follow as a consequence of continued illegal use of our intellectual properties. Other regions are being evaluated for the Official Blacklist.

*Please turn on your audio and view it full screen for a better experience.*

*Please turn on your audio and view it full screen for a better experience.*
- Watch this Webinar to Realize the Unmatched vSoC Total Value Proposition -

- Webinar length ~5 minutes followed by a demonstration of vSoC Stacked with Spacers and Pillars. -

Transforming Traditional Cloud, IoT And Data Center To Data Decenter @ The EDGE With ONE vSoC + SoC.

Connect Each Hardware System On Chip [SoC] DIRECTLY TO EACH-OTHER.

█║▌║▌║ Data Center, IoT & Cloud Computing Today -Vs- SynchroKnot Total Value Proposition [TVP] ║█

█║ Centralized Data Center & Cloud Computing Today

├──> Must Purchase Disparate Hardware - servers, redundant switches & routers, storage [SAN/NAS] and load balancers.
├──> Must Purchase Virtualization Software + Licenses - VMware, OpenStack, Hyper-V, RHEV, Xen, VDI etc.
├──> Must Purchase Storage Software + Licenses.
├──> Must Purchase Licenses for Switches, Routers & Load Balancers [above and beyond the hardware].
├──> Must Manage Separate Hardware & Software Through Different Management Panels, User Interfaces and APIs.
├──> Must Maintain Separate Multi-Tiered Teams and Departments To Manage Complex Operations.
└──> Must Have A Large Space To House Expensive Hardware With High-Cost Real Estate & Cooling.

█║ SynchroKnot Total Value Proposition [TVP] Advantage:

├──> SynchroKnot Virtual System on Chip [vSoC] Software Does Everything.
├──> Decentralized Cloud Computing, IoT & Data Center @ the EDGE.
├──> No Separate Hardware Needed - Simply Install vSoC on SoC and Connect Them To Eachother.
├──> No Need To Purchase Separate Desktop & Server Virtualization Software OR Their Licenses [Eg. VMware, OpenStack, Hyper-V, RHEV, Xen, VDI etc].
├──> No Need To Purchase Physical OR Virtual Switches and Routers OR Any Of Their Licenses [Eg. Cisco, Juniper etc].
├──> No Need To Purchase SAN/NAS/Distributed Block & File Storage [Eg. Netapp, Dell, EMC, Gluster, Ceph etc].
├──> No Separate Teams And Departments Needed.
├──> Seamlessly Control & Manage All Virtual Machines & SoCs From All SoCs If Needed [ANY-to-ANY].
├──> No Large Space Needed. SynchroKnot Setup Is Very Flexible. You Can Utilize Cubicles, Offices, Apartments, Basements, Fibre Optic Hubs etc.
├──> Transparently Scale and De-Scale [locally/globally] Your SynchroKnot Infrastructure On-Demand Without Disruption/Interruption.
└──> Be Your Own Cloud Provider. Sell Full or Under-Utilized Hardware Resources With Bitcoin Internally/Externally [New Feature Coming Soon].

█║ SynchroKnot: Economic Advantages

├──> Exponential Reduction In Total Cost.
├──> Exponential Reduction In Complexity.
├──> Exponential Reduction In Manpower.
├──> Exponential Reduction In Power Consumption, Cooling Expenditure & Space/Real-Estate Requirements with Small Form-Factor, Stacked Embedded Devices [SoCs].
├──> Exponential Increase In Performance.
├──> Exponential Increase In Security.
├──> Exponential Increase In Scalability, Over-all Control & Responsiveness.
├──> Eliminate All Vendor and Multi-Vendor Lock-ins, Inter-dependencies & Traps.
├──> Comprises 10+ Year Production Seasoned Open-Source Components.
└──> Significantly Increase Your Organization's Micro and Macro Economic Dynamics and Manpower Efficiency.

█║ How Can I Use Virtual System On Chip [vSoC] In My Organization?

├──> Do you run your applications or software in virtual machines?
├──> Do you use VMware, OpenStack, Hyper-V, RHEV, Xen or similar solutions?
├──> Do you run your applications or software in containers like Docker, Kubernetes, LXC and similar others?
├──> Do you run your application or software in virtual machines or containers from public cloud providers like Amazon, Google, Microsoft, IBM, Oracle and others?

If you answered "Yes" to any of the above points, then you can easily use vSoC instead.

Speak to our System Integrators and Solution Providers to learn how you can use vSoC to simplify or expand your private cloud, IoT and data center infrastructure, and also how to move away from expensive public cloud infrastructure providers.

█ SynchroKnot Certified vSoC + SoCs Stacked with Spacers and Pillars █

SynchroKnot Certified vSoC + SoCs Stacked with Spacers and Pillars

█║▌ Could It Get Any Easier? See the steps below to find out.

║█ 1] Simply install vSoC in less than 15 seconds onto a SynchroKnot-certified system on chip [SoC] and connect them to each other directly.

║█ 2] Create & Start a Spatial Cluster for a tenant in less than 3 seconds.

║█ 3] Utilize the Infrastructure Engine as a Tenant : Basic Walkthrough

█║▌║▌║ SynchroKnot vSoC Evolution: 3 Data Centers -Vs- SynchroKnot | Real-World Example Scenario ║█

3 Data Center Sites


20 High-Performance SoCs + vSoCs on a Standard Work Desk.

█║ Data Center, IoT & Cloud Computing Today: 3 Data Center Sites
▌ 3 Interconnected Data Center Sites – Site A, B & C [Actual Real-World Example Scenario of a Large Research Institution.]
▌ 6 Departments [Extensive, Cumbersome & Inefficient Manpower & "Meetings" Requirements]:
■ Systems Administration ■ Storage Administration ■ Network Administration / Engineering ■ Systems Engineering ■ Information Security ■ Project Management
▌ ~ 300 Virtual Machines
▌ Dependence on Multiple Vendors, Consultants and Contractors with Time-Consuming Problem/Issue Resolution


█║ SynchroKnot vSoC Evolution: 20 High-Performance SynchroKnot Certified SoCs + vSoCs on a Standard Work Desk.
Under Euro 35K for the Complete Software + Hardware Solution [20 SynchroKnot vSoC Base Licenses + 20 SoCs with Disk & Memory [RAM].
1 [or 2] Engineer[s].
▌ 20 SynchroKnot High-Performance Synchroknot SoCs [certified].
▌ 300 [or more] Higher-Performing Virtual Machines.
▌ Standard Work Desk for the 20 SoCs [Stacked One-on-Top-of-Another with Spacers & Pillars] and the SynchroKnot Engineer.
▌ Standard Cooling Requirement [Operating Temperature: 0 - 60 Degree Centigrade | Operating Humidity 5% - 90%].
▌ Very Small Form-Factor [4 x 4 inches].
▌ Excellent Performance: 320 Threads at 3.8 to 4.2 GHz.
▌ Low Thermal Design Power [TDP].
▌ Low-to-No Noise.
▌ Long-Term Product Availability & Support.
▌ Superior Resistance to Shock and Vibration.

█║▌║▌║ SynchroKnot Permanent -Interplanetary- Light On & Off Road Electric Vehicles ║█

SynchroKnot Permanent -Interplanetary- Light On & Off Road Electric Vehicles

- Axle-Less

- Differential-Less

- Very Long Drive Time For All Your Long Space Journeys

█ Checksum of the full design of the SynchroKnot Regeneration Engine showing Mehul Sharma as the owner and creator of this inventive discovery.



█║▌║▌║ About ║█

SynchroKnot [Owned by Mehul Sharma] is the Originator & Leader of Converged Unification and Decentralization of the Cloud Computing, Edge Computing, Data Center & IoT Infrastructure and Manpower with its combined software, technology, architecture and methodology.

SynchroKnot is also the Originator & Leader of unique axle-less, differential-less Permanent Light Electric Vehicles designed for very long drive-time.

All SynchroKnot technology developed and funded by its creator Mehul Sharma is unique and unchallenged, and brings about a positive technological paradigm-shift in the world today.

The SynchroKnot decentralized vSoC Software & Technology is the world's only enterprise-grade, free, decentralized software that brings about Rapid Transformation with its Multi-Dimensional Value, rejuvenating the economic dynamics of your organization amidst the fast-slowing global economy.

SynchroKnot vSoC software and technology is an all-exclusive and all-inclusive product.

SynchroKnot vSoC completely eliminates the traps and dependence on products & solutions provided by corporates & organizations in the cloud, data center and related arenas. Understanding the SynchroKnot "Total Value Proposition" could be the vital key for gaining complete technological independence and long lasting success.

SynchroKnot copyrights and intellectual property are fully and solely owned across the global jurisdiction by [> Mehul Sharma <], Owner & Creator of the SynchroKnot Light Electric Vehicles and the vSoC Software, Architecture, Technology and Methodology. The physical jurisdiction[s] where SynchroKnot is located has no bindings on the intellectual properties of SynchroKnot in any manner whatsoever as it is directly owned by its creator as an individual in-person. It is illegal for any jurisdiction to make claim[s] on the ownership, authorship or proprietorship among other absurdities-of-sorts.
SynchroKnot vSoC License[s] are now authorized to work on all x86_64 [AMD64] Hardware, and also on SynchroKnot-Certified SoCs from SynchroKnot-Authorized Manufacturer:

ASRock Industrial Computer Corp. 7F., No.9, Ln. 79, Ligong St., Beitou Dist., Taipei City 112, Taiwan (R.O.C) +886-2-5588-2688 +886-2-2858-1369 Info_ipc@asrockind.com www.asrockind.com SynchroKnot Certified SoCs based on AMD CPUs from ASRock Industrial Computer Corp.: 4000 Series - Up To 16 Threads V2000 Series - Up To 16 Threads V1000 Series - Up To 8 Threads R1000 Series - Up To 4 Threads

- Live Happy With SynchroKnot -


▌█ License




▌█ Generic Guide to Hardware Selection, Consulting and Pricing

▌█ Bug Fixes

▌█ Encryption - Micro How-to

█║▌║▌║ Interact ║█

█║ Interact with SynchroKnot Spatial Systems Engineering ║█
│ │ ├── █║ EMAIL / │ │ │ └── s y n c h r o k n o t | a-t | synchroknot |d0t| techn0logy │ │ ├── █ Twitter: _SynchroKnot_ │ ├── █ synchroknot @ Telegram │ ├── █ synchroknot_cloud @ Telegram

█║▌║▌║ Software Product Features ║█

▌ Each feature has a type [ Type : Built-in or Type : Power Module ].

▌ Type : Built-in is included in the vSoC Base License.

▌ Type : Power Module is an additional module at an additional cost and is not included in the vSoC Base License.

█║ Spatial-Defined Infrastructure Engine - Enlivening the Heart of Enterprise 4.0/

█║ Spatial-Defined Virtualization Engine - High-Performance Desktop & Server Virtual Machines/

█║ Spatial-Defined Network Engine/

█║ Spatial-Defined Security Engine/

█║ Spatial-Defined Storage Engine/

█║▌║▌║ Demonstration and Instructional Media ║█

While the demonstration and instructional media gives a feel and insight of the flexibility and workability of different aspects of SynchroKnot, the only way to get a practical and theoretical understanding is to try and practice different case scenarios hands-on!

Note that most of the media seen here pertains to the older non-commercial version of SynchroKnot.

Be sure to read through the Documentation.

█║▌║▌ Basic Demonstration of All-New vSoC

▌ [Tested on a 2 core test system - CPU max MHz: 2600 AMD - Ryzen 3 3200U - 4 GB Memory [RAM] for the purposes of recording the demonstration video]

█ Installation

█ Spatial Fabric Satellite Status

█ Spatial Cluster Create, Status and Start

█ Infrastructure Engine - Basic Walkthrough


█ █ Compare this to the complexity of how you would have to configure VMware/OpenStack/Xen/Hyper-V, and the redundant physical [and/or virtual] switches and routers and SAN/NAS/Distributed Block/File Storage. █ █

█ No VMware/OpenStack/RHEV/Xen/Hyper-V needed for server and desktop virtualization. No VMware, Red Hat, Microsoft, IBM, Citrix and other vendors.

█ No Physical or Virtual Switches/Routers Needed - No Cisco, Juniper and other vendors.

█ No Physical or Virtual SAN/NAS/Distributed Block/File Storage Needed - No NetApp, EMC and other vendors.

█ No Multi-Tiered Teams/Organizations.

█ No Expensive Licenses.

█ █ SynchroKnot vSoC Replaces All Of The Above. █ █

█║ SynchroKnot Decentralized Blockchain Identity Management

■ Demonstrates an authorized user logging into the Spatial Cluster on a Spatial Fabric Array. [This demonstration does not use level 2 security via Active Directory / LDAP].
■ The user's Blockchain Private Key is only used to sign a Spatial Nonce Fingerprint [invisible to the user] in the browser and not sent to the server.
■ On successful authentication the user is immediately taken to the SynchroKnot Infrastructure Engine.

█║ SynchroKnot Level 2 Security - Decentralized Blockchain Identity Management + Active Directory / LDAP

■ Demonstrates an authorized user logging into the Spatial Cluster on a Spatial Fabric Array with Level 2 Security enabled. The new commercial version of SynchroKnot software is depicted.
■ For the purpose of demonstration, the user first logs in without the password and is prompted to enter the password as Level 2 Security is enabled. Then the user enters a wrong password which is rejected by the designated Active Directory / LDAP server(s). On the third attempt the user succesfully logs into the SynchroKnot Infrastructure Engine.
■ In this demonstration, for the purposes of testing, the Level 2 Security Power Module tries to authenticate against the first 3 LDAP servers designated to the user and fails, and then successfully authenticates the user against the 4th LDAP server. Speed is clearly visible, in spite of multiple, complex security and cryptographic operations being performed by SynchroKnot.

█║ Decentralized Virtual Machines : Multifarious ways to Create

■ Auto Create a Virtual Machine from a Spacesuit [ template ] -- uses Decentralized Resource Radar.
■ Auto Create a Virtual Machine from a Spacesuit on a Spatial Fabric Array with high or low performance -- uses Decentralized Resource Radar.
■ Auto Create a Virtual Machine from a Spacesuit on a Spatial Fabric Array from a refined group using Microcosm / Macrocosm / Intercosm or their combination. Further automatically choose a Spatial Fabric Array with high or low performance -- uses Decentralized Resource Radar.
■ Manually Create Virtual Machine from Spacesuit on a Spatial Fabric Array.
■ Auto Create Virtual Machine from an existing Virtual Machine -- uses Decentralized Resource Radar.
■ Manually Create Virtual Machine from an existing Virtual Machine on a specific Spatial Fabric Array.
■ Auto Create a Spacesuit from an existing Virtual Machine -- uses Decentralized Resource Radar.
■ Manually Create a Spacesuit from an existing Virtual Machine on a specific Spatial Fabric Array.
■ Create from Spacesuits or Virtual Machines while they are running [ switched on ] without disruption.

█║ Virtual Machine : Real-time Information, Monitoring & Statistics and Web Console

█║ Decentralized Automatic and Manual Virtual Machine Relocation

■ Auto Relocate virtual machines with their storage without knowing where the virtual machine you intend to relocate resides on the Spatial Cluster and without knowing who the receiver will be. Further, the receiver does not know who the sender will be. Just the name with the relocate command or click of the Auto Relocate button. Everything is auto ascertained and executed by the decentralized resource radar, without reading a central or distributed database or resource.
■ Manually relocate to a specific Spatial Fabric Array by simply giving its IP address.
■ Auto relocate also possible [ not shown in the video ] to a refined group of Spatial Fabric Arrays with the help of Microcosm, Macrocosm and Intercosm [ individually or their combination ].
■ Auto relocate also possible [ not shown in the video ] to high or low performance Spatial Fabric Arrays by simply adding performance:[high / low]. Further, use it with Microcosm, Macrocosm and Intercosm [ individually or their combination ].

█║ Decentralized Virtual Machine Operations - Start, Stop, Unplug, Pause, Unpause, Delete .....

■ All virtual machine operations can be performed with a click of a button or with the use of intelligent auto-fill triggers.

■ When using the intelligent auto-fill triggers there is no need to give the lastname [ ie Blockchain ID ] of the virtual machine. Only in certain cases the lastname is required due to the decentralized nature of the technology, and in most of those cases there are mechanisms in the infrastructure engine where one can append the virtual machine lastname to different keys with just a click of a button, resulting in operational ease and speed!

█║ Virtual Machine Replica - Writable Snapshots that don't relocate with the virtual machines, reducing the burden of tugging along snapshots, yet still available to be reverted to the original or created into new virtual machines.

█║ Spatial Satellite Tree Protocol - One of the many SynchroKnot components enabling an industry-wide global paradigm shift.

Part 1 : Shows a total of 24 nodes in one large loop [ Ring Topology ] with Spatial Satellite Tree Protocol enabled and multiple switches being brought down and up every 10 seconds. Mininet is used for this demonstration. One can observe the results of the pings etc.

In actual use case scenarios, with our unique cabling technique in a 5 X 5 2-D Torus topology, one may generally not have more than one hop! 24 nodes are used for purposes of extreme testing in difficult case scenarios [ sometimes not siding with the logical mind ].

■ In the video, an older script [ring-topologyx16-test] was used to bring switches down and up, but while recording this demo the number of total nodes were increased to 24 impromptu for fun to increase the level of difficulty. In this demo, the root bridge is auto selected and is not s16. In the next demo we will manually make s16 the root bridge and fail it.

■ Simple machine with 2 cores [4 threads] Intel Core i7-6500U Processor with 8 GB RAM. Alongside, a few running virtual machines not a part of this demo were used in the background to consume CPU and memory resources, leaving fewer CPU cycles and memory for Satellite Tree Protocol and the 24 nodes with Mininet. [This demonstration video was also recorded on the same machine and thus used additional CPU cycles and memory.]

■ Side Note : Spanning Tree Protocol and Rapid Spanning Tree Protocol generally respond to failures by recovering in about 40 to 300 seconds or more depending upon the timers and topology [ RSTP may recover faster by just a few seconds ]. This is with the regular vendor / standards suggested timers found in most switches in standard setups today. One can increase the network diameter [ i.e number of switches between two endpoints ] to a maximum of about 18. This however will substantially increase the recovery time, alongside most likely put the timers of switches out of sync. Your mileage may vary. Do your own research.

Caution : If you try a similar setup with standard physical Ethernet switches [Cisco, Juniper etc] then you are solely responsible if you brick your appliance(es).

█║ Spatial Satellite Tree Protocol - Root Bridge Failure, Failover and Failback.

■ Part 2 : Continuation of Part 1. Shows Satellite Tree Protocol - Root Bridge Failure, Failover and Failback and multiple switches being brought down and up every 10 seconds.
■ In this demo, the root bridge is manually set to s16 and then brought down first! More details in the video.

█║ Spatial Satellite Tree Protocol - Root Bridge Failure, Failover and Failback with FLOOD PING!

■ Part 3 : Continuation of Part 2. Shows Satellite Tree Protocol - Root Bridge Failure, Failover and Failback and multiple switches being brought down and up every 10 seconds with FLOOD PING instead of ping. Same set up as above with a total of 24 nodes in one large loop [ Ring Topology ] and simple hardware with 2 cores - 4 threads Intel Core i7-6500U Processor with 8 GB RAM.

Note: You may also notice results of prior flood ping tests before the current one gets underway. We would like to assume that 0% packet loss with 24 switches is a bit much for our logical mind to digest and would love to blame the ping utility with a faulty flood ping option :) ..... of course with double/triple/quadruple shots of your favorite beverage [Eg. coffee, lemonade etc] you may develop an insight that differs.

■ Exercise the same caution as mentioned above.

█║ Disperser - Load Balancer - Create, Enable, Disable and Remove.

■ Basic operations with private IP addresses depicted [ add a public IP address if needed ].

■ Demo showing TCP and UDP auto load balancing with no separate configuration for TCP or UDP ports. Sending traffic to the front-end Disperser IP address load balances to its respective port on the back-end.

█║ Virtual Machine Modification - Multiple Multi-Order Edits to Multiple Components and Services Seamlessly All in a Single Line.

■ This demo shows a simple form of multiple edits [ which can be in any order ] all on one line being performed by the Intelligent Modification Logic & Engine in the background to the virtual machine's Spacesuit. The configuration and sub-configurations of components and services are handled transparently. This video shows an example where the SpaceBuoy configuration and service is automatically modified and brought up along with the other modifications after checking against conflicts, among other things.

■ The second video shows using the web console of the virtual machine [ Linux - Openwrt ] and restarting the network to see if the IP address and the default Gateway IP address that was just invoked via the SpaceBuoy is assigned correctly.

█║ Excerpts - Decentralized Realtime Precision Parallel Search with the Parallel Regex Engine

■ This simple demo shows a precision parallel search for virtual machines individually and in combination with Microcosm, Macrocosm and Intercosm for geographical location specificity. Extreme fine-grained searches are possible in real-time. Decentralized responses are not generated by reading in-memory databases or caching, but rather computed when requested!!!

[ This section will be updated with more videos demonstrating advanced fine-grained searches emulated across globally dispersed Spatial Fabric Arrays. ]

Below are the triggers used with Excerpts in the demo video:

trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:*
trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:apache
trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:nginx
trigger:excerpts intercosm: macrocosm: microcosm: spatial-fabric-array: synchroknot:apache,nginx
trigger:excerpts intercosm: macrocosm:boston microcosm:row10,rack1 spatial-fabric-array: synchroknot:apache,nginx
trigger:excerpts intercosm:washington-dc macrocosm:ashburn microcosm:rack9 spatial-fabric-array: synchroknot:apache,nginx

█║ Realtime Logs with Log Panorama and Spatial Fabric Array Information

■ List of Spatial Fabric Arrays and their concise information.

■ Logs of different operations performed by users in realtime

■ Searching of keywords in the received logs.

█║ SpaceBuoy - Decentralized DHCP : Secure Dynamic Static IP, Netmask, Broadcast, Gateway, DNS, MTU and much more.

This demo shows the SpaceBuoy in action which comes with the new commercial version of SynchroKnot. Without touching the virtual machine one can assign ANY Name, IP Address [Public/Private IPv4 IP Address], Netmask, Broadcast, Default Gateway, MTU [Maximum Transfer Unit], NTP, DNS, Domain Name, Domain Search, Log Server, NETBIOS [Name Servers, Datagram Distribution and Node-Type], SMTP server, POP3 server, plus also, Enable IP Forwarding, Set TCP Keepalive, Set Multiple Classless Static Routes and more.

█║ SpaceBuoy - Decentralized DHCP : Setting Private and Public Dynamic Static IPs with different Netmask, Broadcast and Gateway.

This demo shows the SpaceBuoy being used on a Spatial Fabric Satellite with fairly low resources [cpu and memory] with the object being to see how the DHCP client inside the virtual machine with 512M of memory is able to succesfully sustain the changes to different public and private IP addresses with varying netmasks and broadcasts. [The private & public IP addresses shown in the video are randomly selected for testing.]

Note : Those familiar with the DHCP server and client functionality might have noticed that no specific private or public IP address is assigned to the DHCP server in the demo! [nor has it been assigned previously]. This feature saves IP addresses and configuration & maintenance hassles.

█║ SpaceBuoy and DHCPCAST : Secure Dynamic Static IP with Decentralized DHCP and IP address from specific DHCP Server

This demo shows the following:

■ setting of a dynamic static IP address and default gateway IP address via the SpaceBuoy, and then checking and confirming it using the virtual machine's web console.

■ pointing the virtual machine's network interface to a specific DHCP server by its MAC address, and then checking and confirming via the web console if the virtual machine received its IP address and default gateway IP address from that DHCP server.

█║ FASTR : Intelligent Fast Asynchronous Triggered Replication of Virtual Machines

This demo shows how simple it is to setup FASTR, and how fast it actually is. Especially considering that it even detects and triggers intelligently on just a few bytes being written to the filesystem inside the virtual machine!!!!

The video shows the following:

■ Enabling and starting FASTR for a virtual machine called app-containers [ running different containers like LXC, Docker, Kubernetes etc ]. app-containers resides on Spatial Fabric Array and is replicating to app-containers-fastr on Spatial Fabric Array on another machine connected via Gigabit Ethernet on VLAN 9.

■ Logging into app-containers via the web console and writing to the filesystem by echoing simple text to a file and doing a sync.

■ Running the fastr-checksum script immediately after doing a filesystem sync inside the virtual machine. The fastr-checksum script does an shasum on app-containers virtual disk locally, and pulls the shasum of the virtual disk of app-containers-fastr from

■ Observing if the checksums match. This proves that the changes are being replicated correctly onto the remote side, and everything is perfectly in sync.

█║ Spatial Fabric Satellite Setup and Invoke

This demonstration shows how to set up and invoke the Spatial Fabric Satellite on any commodity x86_64 hardware with Debian 9.

█║ Create Spatial Cluster for Tenants with Multiple Stacked Vlans

Demonstrating creation of a Spatial Cluster for tenants on a Spatial Fabric Satellite with Multiple Stacked Vlans [Single Vlan 1000, Double Stacked Vlan 1000.1000 and Triple Stacked Vlan 1000.1000.1000]. Additional information not a part of the video : The tenants are identified with their Blockchain ID [and confirmed with their signature] for global decentralized multi-service provider deployment, access, connectivity and VPN, among a whole lot of other aspects.

█║ Start Spatial Cluster

Start the previously created Spatial Cluster.

█║ Set up Spatial Fabric Satellite - Create and Start Spatial Cluster - Unabridged

Unabridged. All in one flow for fun.

Setting up a Spatial Fabric Satellite and creating a Spatial Cluster is a one time task. Spatial Cluster is started once after the operating system boots.

█║ Automatic Distance Vectoring with Spatial Fabric Arrays + SynchroKnot User Information Display

The new version of SynchroKnot comes with built-in automatic distance vectoring for auto adjustment of local and global latencies experienced when the Spatial Fabric Arrays communicate over variable distances. These latencies are mainly caused by long distance links and the load [available CPU cycles] on the destination Spatial Fabric Satellite(s).

This demonstration shows the speed-up achieved on the SynchroKnot Infrastructure Engine Web Interface by reducing the internal distance vector time of the Spatial Fabric Array by the tenant. Every tenant of every Spatial Fabric Satellite can adjust their distance vector semantics. It is recommended not to adjust this value unless you know exactly what you are doing. Also featured is a peek into the SynchroKnot [user] information, which may not have been shown in other videos.


This impromptu Arpless Interstellar power module demonstration shows 2 virtual machines named webserver [w] and deb [d] in interstellar dac0001 enabled with Arpless This means, in addition to being protected by Arpless, they are already protected by Interstellar at two separate levels of security enabled at layer 2, namely mac address spoofing protection and communication protection, only allowing interaction between virtual machines with their matching interstellar id(s), interstellar resonance id(s) and interstellar oui(s).

In this demo, traffic from W is specifically heading to with mac address da:c0:00:11:ee:ee. D is compromised and is used to divert traffic that is heading to with mac address da:c0:00:11:ee:ee on to itself using various methods. In real world scenarios, could be anything like a gateway, router, load balancer, webserver, database, ldap/active directory, network/distributed filesystem server, email server, voip server etc.

The result is that all the attempts are unsuccessful. Neither does W's ARP cache change nor does its traffic get diverted to D.

Further, as a last resort, the user gets into W and succesfully poisons the arp cache of W to point to D. The result is that traffic diversion is unsuccessful. Also, the ability to reach D directly from within W is unsuccessful!!!!

Keep in mind, this demonstration assumes one has basic to advanced hands-on knowledge of network and operating system security and packet wrangling. The point of this demonstration is to show one the most vulnerable actual use case scenarios, and not pseudo arp cache poisoning like shown in the following next demo where all machines within a network that can communicate with eachother without Arpless Interstellar, and poisoning the arp cache, simply diverts the traffic from one to the other. The next demo also confirms that there is no bug in the operating system that prevents the traffic from being diverted when its arp cache is poisoned [tested on debian 9 - stretch]. This means that the traffic would have been easily diverted without Arpless Interstellar.

Breakdown of the highlights of the demonstration video:

1) In W check for arp entries, and then ping which is turned off. Arpless responds with the mac address. Arpless would have also replied even if was turned on. For the purposes of the demo it is easier and clearer to show the Arpless functionality.

2) ping W to D and D to W to check the connectivity and arp cache.

3) Check if mac address spoofing is working. Ping from D to W. Change the mac address on W and then ping D and see if the pings are still working. Change back to the original mac address of W and check ping. This shows the mac address spoofing protection via the interstellar is enabled on both W and D [though we did not repeat the same steps for D in this demo].

4) On D, change IP address to while keeping its original mac address. Ping from both sides and check their arp caches. Notice in the demo, that there was no arp entry for which was likely flushed, due to the back and forth changing of mac addresses, but when W pings it only hears back da:c0:00:11:ee:ee and not the mac address of D.

5) Since the previous step did not work on D, change the mac address of eth0 to da:c0:00:11:ee:ee, so D now has the IP and mac address of the original destination. [Wonder what would happen in an actual case scenario without Arpless Interstellar? .....don't know..... :)]

6) As the previous step was also unsuccessful, as a last resort, get into W and poison the ARP cache to point to D. On D, keep the IP and change the mac address to its original so that mac address spoofing protection done by interstellar does not block us. This should be it. So far this seems like a no-brainer, and can't wait for that ping to get through finally!!!

7) See what happens.

█║ Blockchain SSH Public Key Infrastructure Management

This quick demo shows fast passwordless SSH login and SCP with SynchroKnot Blockchain SSH Power Module. [Notice that tab completion works with SCP.]

To get it working [not shown in the video], in the target virtual machine simply modify the sshd_config and run the setup script [one time operation], and then map the Linux [or other operating system] username [ID] to the Blockchain ID of the SynchroKnot. That's it.

The video shows the username debian [on the vm deb] is interlock-mapped to the Blockchain ID 1PeDaGo6Uj9HWdVQs8zJAYeQ1478xrpwLE and Spacesuit of 1PeDaGo6Uj9HWdVQs8zJAYeQ1478xrpwLE shows the key sdac-pki-id with the value debian. This is essential for successful login access to the virtual machine. Only the SynchroKnot root user can perform the interlock-mapping of the user's identity.

Users manage their own public key(s) [ Base64 encoded & up to 10 keys ] in their Spacesuit on upto 5 different Spatial Fabric Arrays [geographically dispersed to protect against network and infrastructure failures].

Only the authorized SynchroKnot [user] can add or remove his/her public key(s). Even the SynchroKnot root user cannot perform this operation. This feature prevents anyone else from mistakenly/illegitimately denying access.

Note: In this demo the SynchroKnot user [not the linux user] happens to be a SynchroKnot root user. One can create users that are plain SynchroKnot users without SynchroKnot-root capabilities.

█║ AuthControl : Distributed Fault-Tolerant Authentication Management & Identification Control System

This is a very basic impromptu demonstration of AuthControl. Here both of the virtual machines are enabled with AuthControl and show the following:

■ Login via Graphical Interface

■ Login via Non-Graphical Interface

■ Run a command with SU as another user

■ Run a command with SUDO as another user

■ Login to a remote system via SSH

■ Mount a remote filesystem via SSHFS

■ Use File Manager to create a Network Place using SFTP

All these different types of logins use AuthControl with standard Linux users and password + 5 digit pin. Here the password used for all logins is hello12345 and the basic HTTPS traffic is captured on the Spatial Fabric Satellite using TCPDUMP to show realtime interaction with the SynchroKnot AuthControl Power Module when the password is entered in the virtual machines for the purposes of authentication.

Note: This demo was recorded on a severely resource-constrained system. It is up to you to determine the performance :)

Creative Commons License
SynchroKnot [ website - content ] by SynchroKnot is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Based on a work by its creator Mehul Sharma at SynchroKnot : synchroknot.[technology|cloud|com|org|ie|systems|ru].