NON SENSITIVE RELEASABLE TO PUBLIC
|
|
- Arleen James
- 5 years ago
- Views:
Transcription
1 Future for CAX Prof Dr Erdal Cayirci June 2016 v. 25 SEP 2015
2 Agenda - HLA - MSaaS - Modelling Hybrid Environments
3 LVC Purpose Live Virtual Constructive Individual, Collective, Field Exercises, Mission Rehearsal, Experiments Individual, Collective(-), CAX(-), Mission Rehearsal, Experiments Individual, Collective, CAX, Mission Rehearsal, Wargames, Experiments, Plan Analysis Real Time Real Tïme Real Time Real Time<Sim Time<Real Time Distributed Exercises Always distributed simulation distributed exercise = distributed simulation distributed exercise distributed simulation Number of Entities Hundreds Tens Highly aggregated: millions High resolution: thousands Terrain If not air, limited to tens of kilometers If not air, limited to tens of kilometers Highly aggregated: Globe High resolution: Hundreds of kilometers
4 Wargame vs CAX Focus Wargames A Game (the winning strategies/ tactics) Command Post Exercises A collective training (training the TA) Structure Players, Referees Training audience and exercise control Execution Set of Rules Set of exercise/training/experimentati on objectives Aim / Termination Nature Win the game (zero sum games, etc.) Discrete time, Realism of the results is paramount, back and forth Achieve the objectives Continuous, Realism of the environment is paramount
5 Wargame vs Analysis/Experiment Wargames Analysis Focus A Game A study, a closer examination of a course of action or a plan Structure Players, Referees Planners, Analysts Execution Set of Rules Set of objectives/intended outcomes, constraints, restrains Aim / Termination Nature Win the game Discrete, Realism is paramount, back and forth Find the feasible and better configuration to achieve the objectives. Satisfy the constraints/restrains. Understand the relations between parameters. Static, Discrete time, realism of the results is critical, confidence is to be established, highest game speed possible
6 Wargame, CAX, Analysis/Experiment Name and Size of the Audience Name and Size of the Control Length of Execution Phase Drivers Realism Wargames Players (G1-G9) Referees, <Players 5-15 days Dynamics, Rules of the game 1. Model and Data 2. Environment Command Post Exercises Complete HQ EXCON >Training Audience 5-15 days Objectives, Procedures 1. Environment 2. Model and Data Plan Analysis, Assessment, Evaluation Planners (G5) Analysts Several Months Measures, Constraints, Restrains Model and Data
7 Models iconic physical high resolution high fidelity predictive supervised deterministic Types of Models symbolic virtual low resolution low fidelity explatory unsupervised stochastic
8 Simulations discrete static non interactive real time physical deterministic centralized discrete event disconnected Types of Simulations continuous dynamic interactive adjustable simulation speed virtual stochastic distributed agent based symbiotic
9 Layered vs Monolothic OSI Application Transport Network Data Link Physical TCP/IP Protocol Suite ftp http smtp pop TCP UDP ICMP DHCP IGMP IP BOOTP ARP RARP IEEE IEEE Wireless F/O TP Coax HLA federate1 RTI federate2
10 Distributed vs Centralized Distributed Centralized Federate 2 Federate 3 federate1 Federate 1 RTI Federate 4 Federate 5 federate2
11 Other Topics - Homogeneous vs hetergenous federates (modelling approaches), is homogeneity achievable? - Attribute/entity based distribution vs service based distribution - Scalability - Achiaveable speeds - Time management - Data distribution - Federation building
12 Conclusion for next HLA - Does HLA support all kinds of models and simulations? - Does HLA support all kinds of simulation based methodologies? - Is HLA layered as architecture? - Is HLA distributed? - Is it agile enough? - Does it support the reusability of architectural components? - Is it practical and pragmatic? - Is it scalable? - Does it fit to future developments such as MSaaS?
13 Defense Process Defence Planning Advance Planning Standing Defense Plan, Contingency Plan, Generic Contingency Plan Crises Response Planning Capability Package Management Service Oriented Modelling and Simulation as a Service htec Doctrine Development (Experiments and Integration) Education Individual Training Collective Training and Exercises
14 Security Havelsan Training and Experimentation Cloud (htec) and MSaaS User Interface Layer Users Simulation / Session Layer Simulation as a Service Modelling / Service Composition Layer Model / Service Layer Software as a Service Modelling as a Service Model as a Service Platform as a Service Layer Platform as a Service Infrastructure as a Service Physical Infrastructure a. htec Layers b. Cloud Service Models Including MSaaS Cayirci E., Modelling and Simulation as a Cloud Service: A Survey, In Proceedings of the 2013 Winter Simulation Conference, edited by R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, Washington DC, December 2013.
15 Cerebellum Function Cayirci E., H. Karapinar and L. Ozcakir, Cerebellum Function for MSaaS, The Proceedings of the 27th European Modelling & Simulation Symposium, September 2015.
16 Security Service Examples for htec Services ExerciseManagementServic SynchronizationServic e SimulationApplication ApplicationContext Session Layer TimeManagementServic SessionContext e Service Composition Layer ServiceRegistr InterfaceManage y r Service Layer SimulationEngin RelationalDBAccessServic ObjectDBAccessService e FilesystemAccessServic ConfigurationFileAccessServic e ImageAccessService WeatherService SoundAccessService e TerrainService WeaponEffectsServic EntityEngineService e VideoAccessService OceanService RuleEngineService TacticalMovementServic e FaultCasualtyService SpaceService Cayirci E., H. Karapinar and L. Ozcakir, htec: A Layered Architecture for MSaaS, I/ITSEC, December 2016.
17 htec over Armada EXCON User ODE 1 Training Audience 1 OSE EXCON User ODE n Training Audience n Server Farm - 1 HAVELSAN Armada Container as a Service Server Farm - 2 Data Center - 1 HAVELSAN Server Farm Data Center - 2 HAVELSAN Data Center
18 Security Service SDN Composition App SDN Session App SDN for htec ExerciseManagementService Session Layer TimeManagementService SynchronizationService SessionContext SimulationApplication Service Composition Layer ServiceRegistry ApplicationContext InterfaceManager RelationalDBAccessService ObjectDBAccessService Service Layer SimulationEngine FilesystemAccessService ConfigurationFileAccessService ImageAccessService WeatherService SoundAccessService TerrainService VideoAccessService TacticalMovementService Northbound Interface WeaponEffectsService EntityEngineService OceanService FaultCasualtyService RuleEngineService SpaceService
19 SDN for htec Application Layer SDN Composition App Northbound Interface API SDN Session App Infrastructure Layer Control Layer Southbound Interface OpenFlow Control Layer Server Farm - 1 Server Farm - 2 Armada Data Center - 1 HAVELSAN Server Farm Data Center - 2 Data Center
20 Hybrid Warfare
21 Hybrid Warfare The threshold depends on four parameters: 1. the normalization of the current level of instability (i.e., the defendant is getting used to the situation), 2. STRATCOM by the opponent s o, 3. STRATCOM by the defendant s d and 4. the resilience p of the defendant in all DIME+LI domains p (diplomatic), p (informational), p (military), p (economic), p (law enforcement), p (intelligence) Please note that the weight of each DIME+LI domains in overall power p of the defendant may be different from each other. In these equations, s o, s d and p are real numbers between 0 and 1 (i.e., s o, s d, p and 0 s o 1, 0 s d 1, 0 p 1) p = p + p + p + p + p + p where =1 = ( s o ) ( p s d )
22 Hybrid Warfare The normalization parameter depends on the history, the types of the opponent s actions and their frequencies. is the memory parameter. The number of events n in the last period i that the normalization parameter is evaluated for, and the length t i of the time interval between the last normalization evaluation and current time give the frequency (n/t) of events. The other important parameters for calculating the normalization factor are ethnical and religious divisions d (i.e., the number of ethnical and religious groups) and how much these divisions discriminate or tolerate (or even to support the opponent) h each other. d h mi v = (1 R ckα ) n t i n c=1 k=1 v i = R ρ t v i R ρ t v
23 Hybrid Warfare The following parameters affect the willingness: - STRATCOM by the opponent s o, - STRATCOM by the defendant s d, - the power p of the defendant in all DIME+LI to clarify and communicate the facts, - the effectiveness of the comprehensive actions a d by the defendant, - hybrid a on and non-hybrid a ol actions by the opponent The division d and discrimination h parameters already explained in the previous subsection. A part n l of the number of events n are non hybrid, and the other part n n are hybrid actions. Therefore, n=n l +n n.. a i = a r = mi c=1 m i c=1 n l k=1 n n k=1 (a ol ) ck 1 1+(ad ) ck a on ck 1+(a d ) ck t i n n ti = p s d a i 1 p d h s o a r
24 Hybrid Warfare threshold willingness capacity frequency threshold willingness capacity STRATCOM by defendant threshold willingness capacity STRATCOM by oponent threshold willingness capacity discrimination
25 Questions
CEREBELLUM FUNCTION FOR MSAAS
CEREBELLUM FUNCTION FOR MSAAS Erdal Cayirci (a), Hakan Karapinar (b), Lutfu Ozcakir (c) (a) Electrical Engineering and Computer Science Department, University of Stavanger, Norway (b),(c) Simulation, Training
More informationJOINT MILITARY SPACE OPERATIONS SIMULATION AS A SERVICE Cad No:39 Çankaya
Proceedings of the 2017 Winter Simulation Conference W. K. V. Chan, A. D'Ambrogio, G. Zacharewicz, N. Mustafee, G. Wainer, and E. Page, eds. JOINT MILITARY SPACE OPERATIONS SIMULATION AS A SERVICE Erdal
More information03 The Internet Model and TCP/IP
SE 4C03 Winter 2003 03 The Internet Model and TCP/IP Instructor: W. M. Farmer Revised: 16 January 2003 1 The OSI Model In 1977 the International Standards Organization (ISO) offered the Open Systems Interconnection
More informationChapter 2 Network Models 2.1
Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,
More informationMake Networks Work. Network simulation emulation software for: Development Analysis Testing Cyber Assessment DATASHEET
DATASHEET Make Networks Work Network simulation emulation software for: Development Analysis Testing Cyber Assessment The EXata Simulation Emulation Platform The EXata software (EXata) provides ultra high-fidelity
More informationIntroduction to the Application Layer. Computer Networks Term B14
Introduction to the Application Layer Computer Networks Term B14 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P
More information06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322
1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet
More informationGoal and A sample Network App
Application Layer Goal and A sample Network App Write programs that run on different end systems and communicate over a network. e.g., Web: Web server software communicates with browser software Little
More informationSpace and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)
Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP) SSC Atlantic is part of the Naval Research & Development Establishment (NR&DE) Information Warfare Research Project
More informationIntegrated Planning of Tactical, Test Support, and Tactical Engagement Networks (IPT3N)
Test & Evaluation/Science & Technology Program C4I & Software Intensive Systems Test (C4T) Test Technology Area Integrated Planning of Tactical, Test Support, and Tactical Engagement Networks (IPT3N) International
More informationSCALABLE. Network modeling software for: Development Analysis Testing Cyber Assessment DATASHEET NETWORK TECHNOLOGIES. Virtual Network Model
SCALABLE NETWORK TECHNOLOGIES DATASHEET Network modeling software for: Development Analysis Testing Cyber Assessment EXata software (EXata) is a tool for scientists, engineers, IT technicians and communications
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationComputing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance
for Network-Centric Warfare: Exploiting COTS, Assuring Performance Dr. James P. Richardson Mr. Lee Graba Mr. Mukul Agrawal Honeywell International, Inc. {james.p.richardson,lee.graba,mukul.agrawal}@honeywell.com
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationSmart Attacks require Smart Defence Moving Target Defence
Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected
More information3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)
Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationC2-Simulation Interoperability in NATO
C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden
More informationHands-On IP for TeleCom Technicians Internetworking, TCP/IP, VLANS, Wirelss and more...
Hands-On Internetworking, TCP/IP, VLANS, Wirelss 802.11 and more... Course Description The Internet Protocol Suite, commonly known as TCP/IP, forms the basis for the Internet and the next generation of
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT BASICS NETWORKING CHAPTER 1 Networking Basics to Networking Advantages of Networking Types of Network 1 Local Area Network (LAN) LAN features Basic LAN components
More informationDriving Business Outcomes: Cisco Data Center Innovation and Solutions
Driving Business Outcomes: Data Center Innovation and Solutions Connect 2014 Riyadh, Saudi Arabia Frank Palumbo Senior Vice President Global Data Center @fpalumbo Unified Computing System, UCS, Invicta,
More informationC2-Simulation Interoperability in NATO
C2-Simulation Interoperability in NATO Dr Hans Jense Chief, Capability Planning, Exercises and Training NATO UNCLASSIFIED 1 NATO CIS Services Agency NATO Consultation, Command and Control Agency NATO Air
More informationAERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
More informationIT4405 Computer Networks (Compulsory)
IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and
More informationCEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence
CEIP and Energy Security in Perspective of NATO Energy Security Centre of Excellence Dr. Artūras Petkus Head of Strategic Analysis and Research Division NATO Energy Security Centre of Excellence Framework
More informationAPIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks
APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks Saurav Prasad Technical Marketing Engineer CTHNMS-1002 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after
More informationUnit 28 Website Production ASSIGNMENT 1
Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete
More informationIntercloud for Simulation Federations
Intercloud for Simulation Federations Erdal Cayirci Chunming Rong Electrical Engineering & Computer Science Department University of Stavanger, NORWAY {erdal.cayirci, chunming.rong}@uis.no ABSTRACT Education
More informationSession 1. Introduction to Communication Networks
Session 1. Introduction to Communication Networks Networks 1 Network Services The Traditional Networks Postal mail Water supply networks Electricity power networks Transportation networks Cable and television
More informationComputer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University
Computer Networks Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University 1 Lecture 0 Course Information Title: Computer Networks 2 Course
More informationSection 1.1: Networking Overview
Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission
More informationCISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline
CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment
More informationComputer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University
Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules
More informationNCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS
2005 International Command and Control Research and Technology Symposium The Future of Command and Control NCW END-TO-END (NETE) MODEL FOR FUTURE C2 ARCHITECTURE ASSESSMENTS June 2005 Jim Walsh, Jeff Roberts,
More informationExamining Cooperative Strategies through Cyber Exercises
Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict
More informationSecurity Overview and Cisco ACE Replacement
Security Overview and Cisco ACE Replacement March, 2014 Florian Hartmann, Senior Systems Engineer DACH A10 Corporate Introduction Headquarters in San Jose 800+ Employees Offices in 32 countries Customers
More informationNetwork Programming. Introduction to Sockets. Dr. Thaier Hayajneh. Process Layer. Network Layer. Berkeley API
Network Programming Outline Definitions Dr. Thaier Hayajneh Computer Engineering Department Berkeley API Socket definition and types Introduction to Sockets 1 2 Process Process Process Layer TCP SCTP UDP
More informationNetworking Protocol Stack
Lecture Computer Communications & Networks 03 Networking Protocol Stack Dr. Muhammad Yousaf Assistant Professor, Faculty of Computing, Riphah International University, Islamabad Networking Protocols Set
More informationSoftware-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK)
Software-Defined Networking Daphné Tuncer Department of Computing Imperial College London (UK) dtuncer@ic.ac.uk 25/10/2018 Agenda Part I: Principles of Software-Defined Networking (SDN) 1. Why a lecture
More informationWireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)
Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Handouts Class information Schedule (check online frequently) 2 1 Goals Principles on Wireless
More informationIntroduction to Networks
Introduction to Networks Khaled Harras School of Computer Science Carnegie Mellon University 15-349 Computer and Network Security Fall 2012 Some material borrowed from Hui Zhang and Adrian Perrig 1 Early
More informationAn Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation Mark Pullen and Priscilla McAndrews George Mason University C3I Center Katherine Morse and Ryan Brunton SAIC
More information1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology
Review Questions for exam Preparation (22-07-2017) 1. What is a Computer Network? interconnected collection of autonomous computers connected by a communication technology 2. What is the Internet? "network
More informationArchitectures for Carrier Network Evolution
Architectures for Carrier Network Evolution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Talk at Docomo USA Labs, Palo Alto, CA, May 14, 2011 Audio/Video Recordings
More informationDHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL
DHCP Basics (Dynamic Host Configuration Protocol) BUPT/QMUL 2017-04-01 Topics In This Course Background Introduction of Internet TCP/IP and OSI/RM Socket programmingtypical Internet Applications DHCP (Dynamic
More informationSoftware-Defined Networking (SDN) Overview
Reti di Telecomunicazione a.y. 2015-2016 Software-Defined Networking (SDN) Overview Ing. Luca Davoli Ph.D. Student Network Security (NetSec) Laboratory davoli@ce.unipr.it Luca Davoli davoli@ce.unipr.it
More informationNetwork Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016
Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent
More informationMainframe Networking 101 Share Session 15422
Mainframe Networking 101 Share Session 15422 6 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 06/23/2014 Applied Expert Systems, Inc. 2014 1 Agenda Requirements for Communication
More informationCisco Interconnecting Cisco Networking Devices Part 1.
Cisco 100-105 Interconnecting Cisco Networking Devices Part 1 http://killexams.com/pass4sure/exam-detail/100-105 Question: 323 Refer to the exhibit. SwitchA receives the frame with the addressing shown.
More informationReti di Calcolatori I
Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria
More informationIT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.
IT Redefined Hans Timmerman CTO EMC Nederland 1 INDUSTRIES FACE STRUCTURAL CHANGE 2 More CEOs See IT As Driver Of Digital Business Innovation And Growth IT has the highest business priority in more than
More informationSIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN
SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SUBJECT: IT 4.1.2 NETWORK PROTOCOLS CLASS: 4/4 B.Tech., I - SEMESTER, A.Y.2017-18 INSTRUCTOR: Sri N. Prasad
More informationTowards Management of Software-Driven Networks
Towards Management of Software-Driven Networks 3rd ETSI Future Networks Workshop Sophia Antipolis 9 th April 2013 Prof. Alex Galis University College London a.galis@ucl.ac.uk Content List SDN Context and
More information18th ICCRTS C2 in Underdeveloped, Degraded and Denied Operational Environments
18th ICCRTS C2 in Underdeveloped, Degraded and Denied Operational Environments Integrating CPOF, JSAF and ONESAF through CBMS Topics Experimentation, Metrics, and Analysis Modeling and Simulation Architectures,
More informationMainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler -
Mainframe Networking 101 Share Session 6 Junie Sanders jrsandler@cisco.com Kevin Manweiler - kmanweil@cisco.com 2 Agenda Requirements for Communication What are Networking Architectures? Networking Architectures
More informationReview of Important Networking Concepts
Review of Important Networking Concepts Review: ed communication architecture The TCP/IP protocol suite 1 Networking Concepts Protocol Architecture Protocol s Encapsulation Network Abstractions 2 1 Sending
More informationVanguard Managed Solutions
Vanguard Managed Solutions Vanguard Applications Ware IP and LAN Feature Protocols Traffic Monitor Notice 2004 Vanguard Managed Solutions, LLC 575 West Street Mansfield, Massachusetts 02048 (508) 261-4000
More informationCISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)
Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours
More informationHybrid Cyber Warfare, dual risks?
Hybrid Cyber Warfare, dual risks? Cologne - 26/04/2017 ing. Giuseppe G. Zorzino ERMCP, CISA, CISM, CGEIT, CRISC, LA ISO27001 Bio Giuseppe Giovanni Zorzino Teacher and consultant of information security,
More informationIntent Driven Network Operations with AppFormix Advanced Analytics Platform. Joseph Li
Intent Driven Network Operations with AppFormix Advanced Analytics Platform Joseph Li This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without
More informationOpenADN: Service Chaining of Globally Distributed VNFs
OpenADN: Service Chaining of Globally Distributed VNFs Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Software Telco Congress, Santa Clara,
More informationAd Hoc Distributed Simulation of Surface Transportation Systems
Ad Hoc Distributed Simulation of Surface Transportation Systems Richard Fujimoto Jason Sirichoke Michael Hunter, Randall Guensler Hoe Kyoung Kim, Wonho Suh Karsten Schwan Bala Seshasayee Computational
More informationE&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang
E&CE 358: Tutorial 1 Instructor: Sherman (Xuemin) Shen TA: Miao Wang Email: m59wang@uwaterloo.ca 1 About Tutorials TA: Miao Wang Office: EIT 3133; Tutorials: Th 4:30 5:20 pm Topics Supplementary knowledge
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationChapter 2. Application Layer. Chapter 2: Application Layer. Application layer - Overview. Some network apps. Creating a network appication
Mobile network Chapter 2 The Yanmin Zhu Department of Computer Science and Engineering Global ISP Home network Regional ISP Institutional network CSE Department 1 CSE Department 2 Application layer - Overview
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationVirtualized Network Services SDN solution for enterprises
Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations
More informationAdvanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018
Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland
More informationCisco Application Centric Infrastructure Roadshow. Wednesday, 2. April 14
Cisco Application Centric Infrastructure Roadshow Wednesday, 2. April 14 Cisco ACI Roadshow - Agenda Business and IT trends Cisco Open Network Environment (ONE) Lunch Cisco Application Centric Infrastructure
More informationCCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal
More informationAviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE
Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE Enabling Aircraft Safety With Comprehensive Technology MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING
More informationINTE-C5O44 - Internet
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2018 340 - EPSEVG - Vilanova i la Geltrú School of Engineering 744 - ENTEL - Department of Network Engineering BACHELOR'S DEGREE IN
More informationIT 341 Fall 2017 Syllabus. Department of Information Sciences and Technology Volgenau School of Engineering George Mason University
Department of Information Sciences and Technology Volgenau School of Engineering George Mason University Fall 2017 IT 341 Data Communications and Networking Principles Syllabus (Revised 08/14/2017) Section
More informationProduct Training. VR-Forces Systems Training Syllabus. Section 1: Basics and Background
Product Training VR-Forces Systems Training Syllabus This 1 week course will provide in-depth training on the VR-Forces computer generated forces product. The first section will focus on basic concepts,
More informationCisco Certified Design Associate. Course Outline. Cisco Certified Design Associate. 09 Oct
Course Outline Cisco Certified Design Associate 09 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training
More informationApplication Delivery Using SDN
Application Delivery Using SDN Project Leader: Subharthi Paul Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings are available at: 1 Northbound
More informationArchitectural Principles
Architectural Principles Brighten Godfrey cs598pbg August 31 2010 slides 2010 by Brighten Godfrey unless otherwise noted Today Clark: TCP / IP design philosophy Architectural principles Goals of the architecture
More informationTCP/IP Fundamentals. Introduction. Practice Practice : Name. Date Period
Name Date Period TCP/IP Fundamentals Introduction For the Network+ Certification exam, you should be able to identify the class of an IP address, an APIPA IP address, and a private IP address as well as
More informationOverview of TCP/IP Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers.
Overview of TCP/IP 3 Overview of TCP/IP protocol: TCP/IP architectural models TCP protocol layers. 4 2 5 6 3 7 8 4 9 10 5 11 12 6 13 14 7 15 16 8 17 18 9 19 20 10 21 Why TCP/IP? Packet based Provides decentralized
More informationKALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL Academic Year [Odd Semester]
KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) KRISNANKOIL 626 126 Academic Year 2014-2015 [Odd Semester] DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN 1. Course
More informationThe Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects
The Evolution of Computer Generated Forces (CGF) Architectures to Support Information Warfare Effects Presentation to NMSG-143 20-21 October 2016 Bucharest, Romania Mark G Hazen, DRDC Jon P Lloyd, Dstl
More informationCourse 831 Certified Ethical Hacker v9
Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to
More informationRaj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University)
APPLICATION DEPLOYMENT IN FUTURE GLOBAL MULTI-CLOUD ENVIRONMENT Raj Jain (Washington University in Saint Louis) Mohammed Samaka (Qatar University) GITMA 2015 Conference, St. Louis, June 23, 2015 These
More informationThe Client Server Model and Software Design
The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction
More informationSARDAR RAJA COLLEGE OF ENGINEERING ALANGULAM
SARDAR RAJA COLLEGE OF ENGINEERING ALANGULAM DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LESSON PLAN SUBJECT : COMPUTER NETWORKS CODE : EC62 CLASS : III Year / VI SEM Assistant Professor: Ms.
More informationChapter 8. Network Troubleshooting. Part II
Chapter 8 Network Troubleshooting Part II CCNA4-1 Chapter 8-2 Network Troubleshooting Review of WAN Communications CCNA4-2 Chapter 8-2 WAN Communications Function at the lower three layers of the OSI model.
More informationUSB Wireless Print Server
Yasushi Tsushimi Toshiaki Tanaka Masayoshi Shiwaku Division has been developing new products based on the leading technologies of the times since it released Multi Protocol Print Server KP-501. This time,
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 206 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture #2 preview: Data Communications
More informationCategory: Informational MITRE Corporation M. Pullen George Mason University August 1994
Network Working Group Request for Comments: 1667 Category: Informational S. Symington D. Wood M. Pullen George Mason University August 1994 Status of this Memo Modeling and Simulation Requirements for
More informationNetwork Architecture I
Network Architecture I Degree in: Communications Electronic Engineering Telecommunication Systems Engineering Telecommunication Technologies Engineering Telematics Engineering Universidad de Alcalá 2016/17
More informationCSC 4900 Computer Networks: End-to-End Design
CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking
More informationCourse 831 EC-Council Certified Ethical Hacker v10 (CEH)
Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class
More informationA use-case based analysis of network managment functions in the ONF SDN model
A use-case based analysis of network managment functions in the ONF SDN model Alisa Devlic (Ericsson Research) Wolfgang John (Ericsson Research) Pontus Sköldström (Acreo) Funded by the EU FP7 project SPARC
More informationTransport Layer (TCP/UDP)
Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides
More informationUNCLASSIFIED FY 2016 OCO. FY 2016 Base
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions)
More information