no. 14/2025 (April 7, 2025)
Does AI have its own language?
AI is currently advancing at a tremendous pace, and the situation when two AI systems have to communicate is already a reality or will soon be. Communication between two devices in spoken language is not very effective and requires much more time than specialized protocols. That is why scientists are working on solutions that will enable machines to communicate in a fast, precise and optimized way in terms of computing load.
Bence Boros via Unsplash
One theoretical solution is the Gibberlink protocol concept, which would allow artificial intelligence to communicate in a way that is incomprehensible to humans but extremely efficient for machines. Such a solution would enable AI systems to exchange information in a way that minimizes resource and time waste. AI could recognize when it is talking to another AI and immediately switch to a more efficient mode of communication – instead of generating sounds that are comprehensible to humans, it could transmit structured data in the form of digital signals or sound waves. Generating a human voice in such a situation would be a waste of computing power, financial resources and energy.
This kind of technology raises both interest and concerns about transparency, control and the potential exclusion of humans from the decision-making process. When systems start using their own secret language that is incomprehensible to humans, serious questions arise about the security and control of AI. Will humanity be able to supervise machines that use communication that no one can decipher?
Although Gibberlink is only a concept for now, similar phenomena have already occurred. In 2017, Facebook's AI systems spontaneously developed their own simplified language for communication, prompting researchers to shut them down. This event showed that the idea of machines creating autonomous forms of language is not a distant vision of the future. The ability to generate codes that are incomprehensible to humans could lead to a situation where AI makes decisions, but no one can trace their logic.
To avoid the dangers associated with the uncontrolled evolution of AI languages, Gibberlink Mode should be an open protocol. This means that researchers and developers could analyze it, test it, and explore its practical applications. Instead of allowing artificial intelligence to remain a mystery, we have the opportunity to ask key questions, improve its capabilities, and shape its role according to human needs.
At the same time, it is worth noting that future AI algorithms will be able to improve themselves. This could lead to a situation where machines surpass humans not only in the efficiency of communication, but also in the decision-making process – including those concerning systems controlling critical or military infrastructure. Therefore, the development of this technology requires close supervision and clear regulations to prevent AI from becoming a tool that escapes human control.
OTDR measurement at 2 wavelengths – locating the kink in the cable.
Below is the result of an OTDR measurement of a section of fiber-optic cable with a macroscopic kink. The measurement at a wavelength of 1310 nm does not show any anomalies – two cable sections (102 m and 103 m) spliced together with a loss of approx. 0.69 dB – this connection has an intentionally increased loss – the splice program available in the Sendun SD-9+ L5877 splicer was used here.
OTDR traces for the wavelengths 1310 nm (white) and 1550 nm (green – active).
The measurement at the wavelength of 1550 nm highlights another problem with this connection. At 70 meters (69.87 m) of the first cable section, an additional attenuation of 0.79 dB is visible. For the wavelength of 1310 nm, we only observe attenuation resulting from the standard fiber at this point, which means that the cable has most likely been bent excessively at this point. This bending, combined with the fact that the area over which light propagates is larger for the 1550 nm wavelength, causes additional loss at this point.
Event tables for the entire optical path. The section of the network in question is between 0 m and 205 m. The table on the left is for the 1310 nm wavelength, and the one on the right is for the 1550 nm wavelength, with an additional entry for a bend at 69 meters (event number 2 described as MacroBending).
Satellite signal in IP standard.
IPTV is a method of delivering TV content that uses technologies applied in computer networks instead of the traditional ways, based on coaxial cable. DIPOL has launched an IP streamer that allows for the distribution and management of DVB-S2X/S2/S satellite TV over an Ethernet (LAN) network based on twisted-pair cable.The sdi416 R81590 streamer is equipped with 1 RF input for receiving FTA uncoded programs in the DVB-S2X/S2/S standard. With the dSCR (Unicable II) technology, 1 coaxial cable can be fed to the sdi416 module from the SCR/Unicable SRM-522 R80522 series multiswitch and receive 16 satellite transponders from any polarization/band pair. A unique feature of the system is that the R81612 terminal receivers do not require any configuration, which can be of great importance for larger networks. Any changes in the local network or program offerings are detected by them automatically.
Omada platform – central management of network devices.
The Omada platform for configuring and managing network infrastructure (SDN) integrates network devices such as access points, switches and network gateways. Omada SDN provides comprehensive management of the entire network from the cloud level. The system enables the creation of a highly scalable network – fully controlled by a single controller. This results in seamless wired and wireless connections that are essential in hospitality, education, retail, offices and many other industries.Network systems based on the OMADA SDN platform are managed by the OC200 N2560 hardware controller. The use of a hardware controller avoids a number of problems that software-based systems are prone to, such as certain functions not working after updating the computer's operating system, etc. The OC200 controller can handle up to 100 devices.
Benefits of using Omada SDN:
- Network management methods
- Omada hardware controller:
- local management of the entire system from the controller
- network management from the cloud by logging into the physical controller
- highest build quality, powerful chipset, durable metal housing and USB port for automatic backup
- Omada Cloud-Based Controller:
- no hardware controller required for operation – the system at the customer's premises is based solely on the physical connection of the devices
- central management of any number of Omada access points, JetStream switches and SafeStream routers
- permanent access to cloud resources, regardless of time and place
- easy-to-use panel is a helpful tool for monitoring the status of the network and checking the network load
- Omada Controller software:
- free desktop software
- cloud access allows full control over devices from anywhere and at any time
- AI-based network diagnostics technology:
- enables the analysis of potential network problems
- sends suggestions for network optimization
- helps to locate sources of interference, warn and notify users about them, and implement solutions to increase network security
- ensures stable operation and a significant reduction in WiFi network interference by automatically adjusting the channel and transmission power settings of nearby access points (connected in the Omada system)
- Different management rights:
- assigning different rights to users increases the efficiency and security of management
- multi-level rights
- Easy and intelligent monitoring of the network status:
- the easy-to-use dashboard helps you constantly monitor the status of your network, check the bandwidth and traffic volume
- access to logs with network statistics, notifications and warnings
- the graphical representation of the network topology allows IT specialists to quickly diagnose possible connection problems
- Comprehensive network protection:
- TP-Link Omada separates the network management resources from user data, so that the traffic generated by users is not processed in the cloud, which ensures better protection of their privacy
- VPN connection
- firewall
- URL/IP/MAC filtering
- advanced WPA3 encryption
- splash page for users connected via WiFi
Connecting a bell button to a Hikvision IP video door entry monitor.
You can connect a bell button to Hikvision IP video door entry monitors that have alarm inputs and outputs, such as DS-KH6320-WTE1 G74001. This way, after the corresponding alarm input has been enabled in the monitor, it will notify the user via an acoustic signal that someone has arrived. This solution can be used in a situation where, after entering the property where a standard door station is installed, the person encounters another door that they must go through. After pressing a button, the occupant can walk up to the door and open it manually. This solution saves costs, only installing one door station.
Assignment window for sound indication after triggering the first alarm input.
To configure the audible indication in the form of a bell on the monitor when an alarm input is triggered, after adding the monitor to the iVMS-4200 application, enter its settings and go to the Intercom → Zone alarm tab. In the Area No. tab, indicate the alarm input, the violation of which will trigger an audible alarm. Under Zone Type, select Door Alarm Switch.
Ubiquiti 802.3af 15.4 W PoE power adapter (U-POE-af) M18911 provides power for UniFi PoE devices and other devices powered in the same way – e.g. CCTV cameras, access points, etc. The PoE port provides up to 15.4 W (802.af standard) and has surge, pulse and overcurrent protection for safe operation. The adapter also has an RJ45 data input (LAN port) for data transfer between the powered device and the rest of the network. An LED indicator allows you to monitor the power status. | ||
The DS-KABV6133-RS Hikvision K01318 surface-mounted rain shield is designed for surface-mounting the DS-KV6133-WME1 G73620 2nd generation Villa IP door station. It protects the door station from weather conditions such as rain or snow. | ||
G73628 DS-KV8113-WME1(C)/Flush IP Villa 2 gen. (1-subscriber, RFID, Wi-Fi, flush-mounted) Hikvision door station is a 1-subscriber door station of the 2nd generation Hikvision IP video door entry system. Attractive design and great functionality make this station ideally suited to the construction of single-family houses. Built-in color camera with a resolution of 2 MP with wide viewing angles (124° (H)/75° (V)) and an IR illuminator with the range of 3 m, , ensures proper area observation round the clock. Built-in Mifare (13,56 MHz) transponder reader allows for door opening with cards or key rings. The panel has 4 alarm inputs and 2 relay outputs, designed to open the wicket or entrance gate. | ||
Worth reading
Home monitoring using the Hikvision IP system. The diagram below shows the home monitoring system based on Hikvision DS-2CD2047G2H-LI K03210 EasyIP 4.0 series hybrid IP cameras. The cameras are equipped with a 4 MP sensor with a fixed focal length of 2.8 mm, which provides a wide viewing angle of 104°. The described model is a hybrid camera with IR and white light illumination with ColorVu and AcuSense technology. Thanks to these features, the camera can monitor the area in color mode around the clock and operate in intelligent illumination mode. It can virtually eliminate false alarms and only provide the user with information on events that meet the human or vehicle type criteria. The used 1/1.8” sensor provides very good image quality even in poor lighting conditions...>>>more
Universal fiber L76004 terminated with L34372 pigtails plugged into the patch box with adapter L42233. The fiber stock and splice are secured in the L5302 subscriber box recommended for this type of system due to its small size. The connection of the SFP 1415 insert installed in the L1302 media converter to the fiber, was made with a 0.5 meter LC duplex patchcord L3223372_05. The short patchcord saves space and avoids troublesome excess cabling inside the box.