NON SENSITIVE RELEASABLE TO PUBLIC

Size: px
Start display at page:

Download "NON SENSITIVE RELEASABLE TO PUBLIC"

Transcription

1 Future for CAX Prof Dr Erdal Cayirci June 2016 v. 25 SEP 2015

2 Agenda - HLA - MSaaS - Modelling Hybrid Environments

3 LVC Purpose Live Virtual Constructive Individual, Collective, Field Exercises, Mission Rehearsal, Experiments Individual, Collective(-), CAX(-), Mission Rehearsal, Experiments Individual, Collective, CAX, Mission Rehearsal, Wargames, Experiments, Plan Analysis Real Time Real Tïme Real Time Real Time<Sim Time<Real Time Distributed Exercises Always distributed simulation distributed exercise = distributed simulation distributed exercise distributed simulation Number of Entities Hundreds Tens Highly aggregated: millions High resolution: thousands Terrain If not air, limited to tens of kilometers If not air, limited to tens of kilometers Highly aggregated: Globe High resolution: Hundreds of kilometers

4 Wargame vs CAX Focus Wargames A Game (the winning strategies/ tactics) Command Post Exercises A collective training (training the TA) Structure Players, Referees Training audience and exercise control Execution Set of Rules Set of exercise/training/experimentati on objectives Aim / Termination Nature Win the game (zero sum games, etc.) Discrete time, Realism of the results is paramount, back and forth Achieve the objectives Continuous, Realism of the environment is paramount

5 Wargame vs Analysis/Experiment Wargames Analysis Focus A Game A study, a closer examination of a course of action or a plan Structure Players, Referees Planners, Analysts Execution Set of Rules Set of objectives/intended outcomes, constraints, restrains Aim / Termination Nature Win the game Discrete, Realism is paramount, back and forth Find the feasible and better configuration to achieve the objectives. Satisfy the constraints/restrains. Understand the relations between parameters. Static, Discrete time, realism of the results is critical, confidence is to be established, highest game speed possible

6 Wargame, CAX, Analysis/Experiment Name and Size of the Audience Name and Size of the Control Length of Execution Phase Drivers Realism Wargames Players (G1-G9) Referees, <Players 5-15 days Dynamics, Rules of the game 1. Model and Data 2. Environment Command Post Exercises Complete HQ EXCON >Training Audience 5-15 days Objectives, Procedures 1. Environment 2. Model and Data Plan Analysis, Assessment, Evaluation Planners (G5) Analysts Several Months Measures, Constraints, Restrains Model and Data

7 Models iconic physical high resolution high fidelity predictive supervised deterministic Types of Models symbolic virtual low resolution low fidelity explatory unsupervised stochastic

8 Simulations discrete static non interactive real time physical deterministic centralized discrete event disconnected Types of Simulations continuous dynamic interactive adjustable simulation speed virtual stochastic distributed agent based symbiotic

9 Layered vs Monolothic OSI Application Transport Network Data Link Physical TCP/IP Protocol Suite ftp http smtp pop TCP UDP ICMP DHCP IGMP IP BOOTP ARP RARP IEEE IEEE Wireless F/O TP Coax HLA federate1 RTI federate2

10 Distributed vs Centralized Distributed Centralized Federate 2 Federate 3 federate1 Federate 1 RTI Federate 4 Federate 5 federate2

11 Other Topics - Homogeneous vs hetergenous federates (modelling approaches), is homogeneity achievable? - Attribute/entity based distribution vs service based distribution - Scalability - Achiaveable speeds - Time management - Data distribution - Federation building

12 Conclusion for next HLA - Does HLA support all kinds of models and simulations? - Does HLA support all kinds of simulation based methodologies? - Is HLA layered as architecture? - Is HLA distributed? - Is it agile enough? - Does it support the reusability of architectural components? - Is it practical and pragmatic? - Is it scalable? - Does it fit to future developments such as MSaaS?

13 Defense Process Defence Planning Advance Planning Standing Defense Plan, Contingency Plan, Generic Contingency Plan Crises Response Planning Capability Package Management Service Oriented Modelling and Simulation as a Service htec Doctrine Development (Experiments and Integration) Education Individual Training Collective Training and Exercises

14 Security Havelsan Training and Experimentation Cloud (htec) and MSaaS User Interface Layer Users Simulation / Session Layer Simulation as a Service Modelling / Service Composition Layer Model / Service Layer Software as a Service Modelling as a Service Model as a Service Platform as a Service Layer Platform as a Service Infrastructure as a Service Physical Infrastructure a. htec Layers b. Cloud Service Models Including MSaaS Cayirci E., Modelling and Simulation as a Cloud Service: A Survey, In Proceedings of the 2013 Winter Simulation Conference, edited by R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, Washington DC, December 2013.

15 Cerebellum Function Cayirci E., H. Karapinar and L. Ozcakir, Cerebellum Function for MSaaS, The Proceedings of the 27th European Modelling & Simulation Symposium, September 2015.

16 Security Service Examples for htec Services ExerciseManagementServic SynchronizationServic e SimulationApplication ApplicationContext Session Layer TimeManagementServic SessionContext e Service Composition Layer ServiceRegistr InterfaceManage y r Service Layer SimulationEngin RelationalDBAccessServic ObjectDBAccessService e FilesystemAccessServic ConfigurationFileAccessServic e ImageAccessService WeatherService SoundAccessService e TerrainService WeaponEffectsServic EntityEngineService e VideoAccessService OceanService RuleEngineService TacticalMovementServic e FaultCasualtyService SpaceService Cayirci E., H. Karapinar and L. Ozcakir, htec: A Layered Architecture for MSaaS, I/ITSEC, December 2016.

17 htec over Armada EXCON User ODE 1 Training Audience 1 OSE EXCON User ODE n Training Audience n Server Farm - 1 HAVELSAN Armada Container as a Service Server Farm - 2 Data Center - 1 HAVELSAN Server Farm Data Center - 2 HAVELSAN Data Center

18 Security Service SDN Composition App SDN Session App SDN for htec ExerciseManagementService Session Layer TimeManagementService SynchronizationService SessionContext SimulationApplication Service Composition Layer ServiceRegistry ApplicationContext InterfaceManager RelationalDBAccessService ObjectDBAccessService Service Layer SimulationEngine FilesystemAccessService ConfigurationFileAccessService ImageAccessService WeatherService SoundAccessService TerrainService VideoAccessService TacticalMovementService Northbound Interface WeaponEffectsService EntityEngineService OceanService FaultCasualtyService RuleEngineService SpaceService

19 SDN for htec Application Layer SDN Composition App Northbound Interface API SDN Session App Infrastructure Layer Control Layer Southbound Interface OpenFlow Control Layer Server Farm - 1 Server Farm - 2 Armada Data Center - 1 HAVELSAN Server Farm Data Center - 2 Data Center

20 Hybrid Warfare

21 Hybrid Warfare The threshold depends on four parameters: 1. the normalization of the current level of instability (i.e., the defendant is getting used to the situation), 2. STRATCOM by the opponent s o, 3. STRATCOM by the defendant s d and 4. the resilience p of the defendant in all DIME+LI domains p (diplomatic), p (informational), p (military), p (economic), p (law enforcement), p (intelligence) Please note that the weight of each DIME+LI domains in overall power p of the defendant may be different from each other. In these equations, s o, s d and p are real numbers between 0 and 1 (i.e., s o, s d, p and 0 s o 1, 0 s d 1, 0 p 1) p = p + p + p + p + p + p where =1 = ( s o ) ( p s d )

22 Hybrid Warfare The normalization parameter depends on the history, the types of the opponent s actions and their frequencies. is the memory parameter. The number of events n in the last period i that the normalization parameter is evaluated for, and the length t i of the time interval between the last normalization evaluation and current time give the frequency (n/t) of events. The other important parameters for calculating the normalization factor are ethnical and religious divisions d (i.e., the number of ethnical and religious groups) and how much these divisions discriminate or tolerate (or even to support the opponent) h each other. d h mi v = (1 R ckα ) n t i n c=1 k=1 v i = R ρ t v i R ρ t v

23 Hybrid Warfare The following parameters affect the willingness: - STRATCOM by the opponent s o, - STRATCOM by the defendant s d, - the power p of the defendant in all DIME+LI to clarify and communicate the facts, - the effectiveness of the comprehensive actions a d by the defendant, - hybrid a on and non-hybrid a ol actions by the opponent The division d and discrimination h parameters already explained in the previous subsection. A part n l of the number of events n are non hybrid, and the other part n n are hybrid actions. Therefore, n=n l +n n.. a i = a r = mi c=1 m i c=1 n l k=1 n n k=1 (a ol ) ck 1 1+(ad ) ck a on ck 1+(a d ) ck t i n n ti = p s d a i 1 p d h s o a r

24 Hybrid Warfare threshold willingness capacity frequency threshold willingness capacity STRATCOM by defendant threshold willingness capacity STRATCOM by oponent threshold willingness capacity discrimination

25 Questions

CEREBELLUM FUNCTION FOR MSAAS

CEREBELLUM FUNCTION FOR MSAAS CEREBELLUM FUNCTION FOR MSAAS Erdal Cayirci (a), Hakan Karapinar (b), Lutfu Ozcakir (c) (a) Electrical Engineering and Computer Science Department, University of Stavanger, Norway (b),(c) Simulation, Training

More information

JOINT MILITARY SPACE OPERATIONS SIMULATION AS A SERVICE Cad No:39 Çankaya

JOINT MILITARY SPACE OPERATIONS SIMULATION AS A SERVICE Cad No:39 Çankaya Proceedings of the 2017 Winter Simulation Conference W. K. V. Chan, A. D'Ambrogio, G. Zacharewicz, N. Mustafee, G. Wainer, and E. Page, eds. JOINT MILITARY SPACE OPERATIONS SIMULATION AS A SERVICE Erdal

More information

03 The Internet Model and TCP/IP

03 The Internet Model and TCP/IP SE 4C03 Winter 2003 03 The Internet Model and TCP/IP Instructor: W. M. Farmer Revised: 16 January 2003 1 The OSI Model In 1977 the International Standards Organization (ISO) offered the Open Systems Interconnection

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

Make Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET

Make Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET DATASHEET Make Networks Work Network simulation emulation software for: Development Analysis Testing Cyber Assessment The EXata Simulation Emulation Platform The EXata software (EXata) provides ultra high-fidelity

More information

Introduction to the Application Layer. Computer Networks Term B14

Introduction to the Application Layer. Computer Networks Term B14 Introduction to the Application Layer Computer Networks Term B14 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Goal and A sample Network App

Goal and A sample Network App Application Layer Goal and A sample Network App Write programs that run on different end systems and communicate over a network. e.g., Web: Web server software communicates with browser software Little

More information

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project

More information

Integrated Planning of Tactical, Test Support, and Tactical Engagement Networks (IPT3N)

Integrated Planning of Tactical, Test Support, and Tactical Engagement Networks (IPT3N) Test & Evaluation/Science & Technology Program C4I & Software Intensive Systems Test (C4T) Test Technology Area Integrated Planning of Tactical, Test Support, and Tactical Engagement Networks (IPT3N) International

More information

SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model

SCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model SCALABLE NETWORK TECHNOLOGIES DATASHEET Network modeling software for: Development Analysis Testing Cyber Assessment EXata software (EXata) is a tool for scientists, engineers, IT technicians and communications

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance

Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance for Network-Centric Warfare: Exploiting COTS, Assuring Performance Dr. James P. Richardson Mr. Lee Graba Mr. Mukul Agrawal Honeywell International, Inc. {james.p.richardson,lee.graba,mukul.agrawal}@honeywell.com

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Smart Attacks require Smart Defence Moving Target Defence

Smart Attacks require Smart Defence Moving Target Defence Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected

More information

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4) Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

C2-Simulation Interoperability in NATO

C2-Simulation Interoperability in NATO C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden

More information

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...

Hands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more... Hands-On Internetworking, TCP/IP, VLANS, Wirelss 802.11 and more... Course Description The Internet Protocol Suite, commonly known as TCP/IP, forms the basis for the Internet and the next generation of

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components

More information

Driving Business Outcomes: Cisco Data Center Innovation and Solutions

Driving Business Outcomes: Cisco Data Center Innovation and Solutions Driving Business Outcomes: Data Center Innovation and Solutions Connect 2014 Riyadh, Saudi Arabia Frank Palumbo Senior Vice President Global Data Center @fpalumbo Unified Computing System, UCS, Invicta,

More information

C2-Simulation Interoperability in NATO

C2-Simulation Interoperability in NATO C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 NATO CIS Services Agency NATO Consultation, Command and Control Agency NATO Air

More information

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence

CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence Dr. Artūras Petkus Head of Strategic Analysis and Research Division NATO Energy Security Centre of Excellence Framework

More information

APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks

APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks Saurav Prasad Technical Marketing Engineer CTHNMS-1002 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after

More information

Unit 28 Website Production ASSIGNMENT 1

Unit 28 Website Production ASSIGNMENT 1 Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Intercloud for Simulation Federations

Intercloud for Simulation Federations Intercloud for Simulation Federations Erdal Cayirci Chunming Rong Electrical Engineering & Computer Science Department University of Stavanger, NORWAY {erdal.cayirci, chunming.rong}@uis.no ABSTRACT Education

More information

Session 1. Introduction to Communication Networks

Session 1. Introduction to Communication Networks Session 1. Introduction to Communication Networks Networks 1 Network Services The Traditional Networks Postal mail Water supply networks Electricity power networks Transportation networks Cable and television

More information

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University Computer Networks Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University 1 Lecture 0 Course Information Title: Computer Networks 2 Course

More information

Section 1.1: Networking Overview

Section 1.1: Networking Overview Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

NCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS

NCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS 2005 International Command and Control Research and Technology Symposium The Future of Command and Control NCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS June 2005 Jim Walsh, Jeff Roberts,

More information

Examining Cooperative Strategies through Cyber Exercises

Examining Cooperative Strategies through Cyber Exercises Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict

More information

Security Overview and Cisco ACE Replacement

Security Overview and Cisco ACE Replacement Security Overview and Cisco ACE Replacement March, 2014 Florian Hartmann, Senior Systems Engineer DACH A10 Corporate Introduction Headquarters in San Jose 800+ Employees Offices in 32 countries Customers

More information

Network Programming. Introduction to Sockets. Dr. Thaier Hayajneh. Process Layer. Network Layer. Berkeley API

Network Programming. Introduction to Sockets. Dr. Thaier Hayajneh. Process Layer. Network Layer. Berkeley API Network Programming Outline Definitions Dr. Thaier Hayajneh Computer Engineering Department Berkeley API Socket definition and types Introduction to Sockets 1 2 Process Process Process Layer TCP SCTP UDP

More information

Networking Protocol Stack

Networking Protocol Stack Lecture Computer Communications & Networks 03 Networking Protocol Stack Dr. Muhammad Yousaf Assistant Professor, Faculty of Computing, Riphah International University, Islamabad Networking Protocols Set

More information

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK)

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK) Software-Defined Networking Daphné Tuncer Department of Computing Imperial College London (UK) dtuncer@ic.ac.uk 25/10/2018 Agenda Part I: Principles of Software-Defined Networking (SDN) 1. Why a lecture

More information

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007) Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Handouts Class information Schedule (check online frequently) 2 1 Goals Principles on Wireless

More information

Introduction to Networks

Introduction to Networks Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early

More information

An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation

An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation Mark Pullen and Priscilla McAndrews George Mason University C3I Center Katherine Morse and Ryan Brunton SAIC

More information

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology

1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network

More information

Architectures for Carrier Network Evolution

Architectures for Carrier Network Evolution Architectures for Carrier Network Evolution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Talk at Docomo USA Labs, Palo Alto, CA, May 14, 2011 Audio/Video Recordings

More information

DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL

DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL 2017-04-01 Topics In This Course Background Introduction of Internet TCP/IP and OSI/RM Socket programmingtypical Internet Applications DHCP (Dynamic

More information

Software-Defined Networking (SDN) Overview

Software-Defined Networking (SDN) Overview Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it

More information

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016 Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent

More information

Mainframe Networking 101 Share Session 15422

Mainframe Networking 101 Share Session 15422 Mainframe Networking 101 Share Session 15422 6 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 06/23/2014 Applied Expert Systems, Inc. 2014 1 Agenda Requirements for Communication

More information

Cisco Interconnecting Cisco Networking Devices Part 1.

Cisco Interconnecting Cisco Networking Devices Part 1. Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.

More information

Reti di Calcolatori I

Reti di Calcolatori I Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria

More information

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved. IT Redefined Hans Timmerman CTO EMC Nederland 1 INDUSTRIES FACE STRUCTURAL CHANGE 2 More CEOs See IT As Driver Of Digital Business Innovation And Growth IT has the highest business priority in more than

More information

SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN

SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SUBJECT: IT 4.1.2 NETWORK PROTOCOLS CLASS: 4/4 B.Tech., I - SEMESTER, A.Y.2017-18 INSTRUCTOR: Sri N. Prasad

More information

Towards Management of Software-Driven Networks

Towards Management of Software-Driven Networks Towards Management of Software-Driven Networks 3rd ETSI Future Networks Workshop Sophia Antipolis 9 th April 2013 Prof. Alex Galis University College London a.galis@ucl.ac.uk Content List SDN Context and

More information

18th ICCRTS C2 in Underdeveloped, Degraded and Denied Operational Environments

18th ICCRTS C2 in Underdeveloped, Degraded and Denied Operational Environments 18th ICCRTS C2 in Underdeveloped, Degraded and Denied Operational Environments Integrating CPOF, JSAF and ONESAF through CBMS Topics Experimentation, Metrics, and Analysis Modeling and Simulation Architectures,

More information

Mainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler -

Mainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler - Mainframe Networking 101 Share Session 6 Junie Sanders jrsandler@cisco.com Kevin Manweiler - kmanweil@cisco.com 2 Agenda Requirements for Communication What are Networking Architectures? Networking Architectures

More information

Review of Important Networking Concepts

Review of Important Networking Concepts Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending

More information

Vanguard Managed Solutions

Vanguard Managed Solutions Vanguard Managed Solutions Vanguard Applications Ware IP and LAN Feature Protocols Traffic Monitor Notice 2004 Vanguard Managed Solutions, LLC 575 West Street Mansfield, Massachusetts 02048 (508) 261-4000

More information

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD) Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours

More information

Hybrid Cyber Warfare, dual risks?

Hybrid Cyber Warfare, dual risks? Hybrid Cyber Warfare, dual risks? Cologne - 26/04/2017 ing. Giuseppe G. Zorzino ERMCP, CISA, CISM, CGEIT, CRISC, LA ISO27001 Bio Giuseppe Giovanni Zorzino Teacher and consultant of information security,

More information

Intent Driven Network Operations with AppFormix Advanced Analytics Platform. Joseph Li

Intent Driven Network Operations with AppFormix Advanced Analytics Platform. Joseph Li Intent Driven Network Operations with AppFormix Advanced Analytics Platform Joseph Li This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without

More information

OpenADN: Service Chaining of Globally Distributed VNFs

OpenADN: Service Chaining of Globally Distributed VNFs OpenADN: Service Chaining of Globally Distributed VNFs Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Software Telco Congress, Santa Clara,

More information

Ad Hoc Distributed Simulation of Surface Transportation Systems

Ad Hoc Distributed Simulation of Surface Transportation Systems Ad Hoc Distributed Simulation of Surface Transportation Systems Richard Fujimoto Jason Sirichoke Michael Hunter, Randall Guensler Hoe Kyoung Kim, Wonho Suh Karsten Schwan Bala Seshasayee Computational

More information

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication

Chapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication Mobile network Chapter 2 The Yanmin Zhu Department of Computer Science and Engineering Global ISP Home network Regional ISP Institutional network CSE Department 1 CSE Department 2 Application layer - Overview

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Virtualized Network Services SDN solution for enterprises

Virtualized Network Services SDN solution for enterprises Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations

More information

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland

More information

Cisco Application Centric Infrastructure Roadshow. Wednesday, 2. April 14

Cisco Application Centric Infrastructure Roadshow. Wednesday, 2. April 14 Cisco Application Centric Infrastructure Roadshow Wednesday, 2. April 14 Cisco ACI Roadshow - Agenda Business and IT trends Cisco Open Network Environment (ONE) Lunch Cisco Application Centric Infrastructure

More information

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal

More information

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Enabling Aircraft Safety With Comprehensive Technology MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING

More information

INTE-C5O44 - Internet

INTE-C5O44 - Internet Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2018 340 - EPSEVG - Vilanova i la Geltrú School of Engineering 744 - ENTEL - Department of Network Engineering BACHELOR'S DEGREE IN

More information

IT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University

IT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 341 Data Communications and Networking Principles Syllabus (Revised 08/14/2017) Section

More information

Product Training. VR-Forces Systems Training Syllabus. Section 1: Basics and Background

Product Training. VR-Forces Systems Training Syllabus. Section 1: Basics and Background Product Training VR-Forces Systems Training Syllabus This 1 week course will provide in-depth training on the VR-Forces computer generated forces product. The first section will focus on basic concepts,

More information

Cisco Certified Design Associate. Course Outline. Cisco Certified Design Associate. 09 Oct

Cisco Certified Design Associate. Course Outline. Cisco Certified Design Associate. 09 Oct Course Outline Cisco Certified Design Associate 09 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Application Delivery Using SDN

Application Delivery Using SDN Application Delivery Using SDN Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings are available at: 1 Northbound

More information

Architectural Principles

Architectural Principles Architectural Principles Brighten Godfrey cs598pbg August 31 2010 slides 2010 by Brighten Godfrey unless otherwise noted Today Clark: TCP / IP design philosophy Architectural principles Goals of the architecture

More information

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period

TCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as

More information

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.

Overview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized

More information

KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL Academic Year [Odd Semester]

KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL Academic Year [Odd Semester] KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL 626 126 Academic Year 2014-2015 [Odd Semester] DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN 1. Course

More information

The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects

The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects Presentation to NMSG-143 20-21 October 2016 Bucharest, Romania Mark G Hazen, DRDC Jon P Lloyd, Dstl

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)

Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

SARDAR RAJA COLLEGE OF ENGINEERING ALANGULAM

SARDAR RAJA COLLEGE OF ENGINEERING ALANGULAM SARDAR RAJA COLLEGE OF ENGINEERING ALANGULAM DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LESSON PLAN SUBJECT : COMPUTER NETWORKS CODE : EC62 CLASS : III Year / VI SEM Assistant Professor: Ms.

More information

Chapter 8. Network Troubleshooting. Part II

Chapter 8. Network Troubleshooting. Part II Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.

More information

USB Wireless Print Server

USB Wireless Print Server Yasushi Tsushimi Toshiaki Tanaka Masayoshi Shiwaku Division has been developing new products based on the leading technologies of the times since it released Multi Protocol Print Server KP-501. This time,

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 206 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #2 preview: Data Communications

More information

Category: Informational MITRE Corporation M. Pullen George Mason University August 1994

Category: Informational MITRE Corporation M. Pullen George Mason University August 1994 Network Working Group Request for Comments: 1667 Category: Informational S. Symington D. Wood M. Pullen George Mason University August 1994 Status of this Memo Modeling and Simulation Requirements for

More information

Network Architecture I

Network Architecture I Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17

More information

CSC 4900 Computer Networks: End-to-End Design

CSC 4900 Computer Networks: End-to-End Design CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

A use-case based analysis of network managment functions in the ONF SDN model

A use-case based analysis of network managment functions in the ONF SDN model A use-case based analysis of network managment functions in the ONF SDN model Alisa Devlic (Ericsson Research) Wolfgang John (Ericsson Research) Pontus Sköldström (Acreo) Funded by the EU FP7 project SPARC

More information

Transport Layer (TCP/UDP)

Transport Layer (TCP/UDP) Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information