Applying Assurance-Based Design to Detecting Misconfigurations of Network Recovery. SEDC 2014 (April 3-5) Joseph Kroculick Cynthia Hood
|
|
- Ezra Butler
- 5 years ago
- Views:
Transcription
1 Applying Assurance-Based Design to Detecting Misconfigurations of Network Recovery SEDC 2014 (April 3-5) Joseph Kroculick Cynthia Hood 1
2 Introduction Describe Dependability Assessment Process (DAP) Dependability, Services, Detecting Correct Configuration Apply Dependability Assessment Process to Detecting a Provisioning Error Define How Each Activity in the Dependability Assessment Process is Performed 2
3 Current Telecommunications Environment Heterogeneous Distributed Horizontal and vertical divergence of solutions Many alternatives provided to an administrator Technologies Vendors Hardware Software Manual provisioning needs to be supported at the device level Infrastructure decisions made without understanding the end-to-end view of the architecture (the system dynamics) 3
4 Network Environment Issues Potential for misconfiguration Complex system dynamics and operations Gap between service requirements and device state Fragmented device data models Service requirements are informal Telecommunications service provisioning is performed through device configuration at a command-line interface 4
5 Network Environment Issues Potential for misconfiguration Complex system dynamics and operations Gap between service requirements and device state Fragmented device data models Service requirements are informal Telecommunications service provisioning is performed through device configuration at a command-line interface 5
6 Network Environment Issues Potential for misconfiguration Complex system dynamics and operations Gap between service requirements and device state Fragmented device data models Service requirements are informal Telecommunications service provisioning is performed through device configuration at a command-line interface 6
7 Multilayer Network Infrastructure 7
8 Examples of a Configuration Conflict Protocol parameter mismatches (e.g. disagreements on directionality between routers A and B) Inconsistent escalation strategies through hold-off timers for each recovery protocol Conflict: HDA, Layer 1? HDA, Layer 0, HDB, Layer 1 = HDB, Layer 0 Example Network Misconfiguration/Conflic t 8
9 Assurance-Based Design Approach to Detecting Provisioning Conflicts Assurance-based design (ABD) Characterized by a system model accompanied by an assurance case (Hall & Rapanotti, 2008; Graydon, Knight & Strunk, 2008) An assurance case is a set of goals made about the system and arguments are provided to support the claims (Strunk, Knight, 2006) An assurance/dependability case has two parts: Step 1: Goodness properties of a system are established (Jackson, 2009) (e.g. recovery of traffic within an acceptable delay) Step 2: An argument is made that the network system satisfies these critical properties (Jackson, 2009) Apply dependability cases to assess correct configurations in IP networks (Norros, Kuusela, & Savola, 2008) 3/24/14 9
10 Assurance Case
11 Assurance Case (Goal Decomposition
12 Assurance Case Ontology 12
13 Dependability Dependability can be defined as ``the ability to deliver service that can justifiably be trusted'' Avizienis, Laprie, Randall, & Landwehr (2004) A service is ``a product that is not tangible and not storable'' (CMMI for Services, 2010) Dependability can be defined in terms of confidence or the trustworthiness that a system provides functionality consistent with a user's expectations (i.e. service requirements) 13
14 Dependability Assessment Process (DAP) Implements Dependability Case Workflow represented in Business Process Modeling Notation (BPMN) Knowledge/Informat ion Models use Activities and Ontologies 14
15 Example Network Configuration 1+1 Unidirectional Protection Generic RequestResponse Protocol between protection ports Single Shared-Link Risk Group (links w1-w2, w2w1) SRLG1 Fails Provision network components a1, w1, w2, a2, p1, and p2 to restore traffic 15
16 Define/Update Problem Context Define the Problem Context Define application requirements Define business requirements Define architectural constraints The context is the circumstances that form the setting for the problem Availability of technologies Architectural alternatives Costs of implementation Requirements of the end-user 3/24/14 # 16
17 Build Domain Model Build Network Ontology in Web Ontology Language (OWL) Domain modeler builds a logical model of network infrastructure Domain ontology represents network infrastructure viewpoint such as a topology, event operations, or network information Essential resource types and relationships between them represented as an OWL ontology Example network infrastructure terms: {layer, link, connection, link connection, network connection, termination points, ports, router labels, cross-connection} Relationship terms: {bridge (split), switch (merge)} 3/24/14 # 17
18 Connectivity Represented in OWL Example Statement: urn:a1 urn:bridgedto urn:p1 3/24/14 18
19 Bridge, Switch Terms Defined Bridge action is redirecting traffic from a working transmitter to a protection transmitter Switch action is selection of traffic from a protection receiver 3/24/14 19
20 Specify Service Requirements Define the user s expectations on network services provided by the network infrastructure Applications today need to identify and formalize their service requirements Service requirements need to be matched to many fine-grained decisions made on configuration settings of network resources Service Level Specification (SLS) (e.g. expected throughput, jitter, endto-end delay, drop probability, latency, multipath bandwidth, security level) Example: Acceptable Outage Duration 10 ms for Fault Detection 50 ms for Recovery SR1: The network infrastructure shall provide a connected network after the SONET 50ms outage duration 3/24/14 20
21 Identify Dependability Property Spatial Property Strong Connectivity Temporal Property Bounded Temporal Difference 3/24/14 21
22 Specify Provisioning Provisioning Example RPC Command Sent To Router using NETCONF API Specify provisioning commands in router vendor XML data model Example: Represent Device Technology in Juniper s JUNOS XML <rpc messageid="messageid"> <edit-config> <target> <candidate/> </target> <url> ftp://kroculick:kroculickpwd@ft p.kroculick.com/% %F2var/tmp/configFile </url> </edit-config> </rpc> ]]>]]> Router data elements are enclosed in XML tags Send XML to Device Using NETCONF # 3/24/14
23 XML-Based Device Data Model XML-device specific model maps into a common domain ontology Verify that systems interoperate Errors in operation that would result from provisioning are detected XML allows syntactic checks Multivendor devices have different data models Common semantic model Behavior and structure are dependent since actions of recovery operate on a network structure 23
24 JUNOS XML 24
25 Update Domain Model Converts provisioning commands to changes to a logical model Example Change commands applied to a router data model expressed in XML can be transformed to a common OWL model serialized in RDF/XML 3/24/14 25
26 Application JUNOS XML to OWL RDF/XML Transformation Rules Transform XML device data model using XSLT script or XML parser script to an OWL RDF/XML data schema to a network ontology Example: Mapping of Port so-1/1/0, Logical Unit 0, IP Address: to a PortID 26
27 Define Conflict Statement (1) A particular situation needs to be described in terms of local decisions and properties A conflict statement connects an end-to-end dependability property to key relationships between individuals in a domain ontology Determine key relationships that must exist to enable consistency between actions of recovery bridged (a, x, y ) and switched (peer (a ), peer (x ), peer (y )) 3/24/14 # 27
28 Define Conflict Statement (2) Connect Statements Build Conflict Statement Compose axioms on local properties of routers that need to hold for the model to meet an end-to-end dependability property A conflict statement specifies key relationships between local properties within a switch 3/24/14
29 Detect Conflict Conflict Detection SPARQL Query Implemented using a SPARQL query on an inferred RDF graph Inference engine infers whether end-to-end desirable properties are true or false Example: return whether ports a1 and a2 are connected AND where they are access ports 3/24/14
30 Validate Model Allow the previous knowledge to be refined or return to the detect conflict activity Allows the system context to be updated as knowledge is discovered about the problem context Models to be refined based on updated information 3/24/14 30
31 Conclusion Dependability Assessment requires feedback/lessons learned and: Understanding of system dynamics (situations that can occur) and a suitable domain model/knowledge representation Network-level properties that have been identified in well-engineered networks Semantic interoperability between router provisioning options supports consistent behavior in implementing network infrastructure services Knowledge representation using ontologies allows network infrastructure concepts and requirement concepts to be related Inferred model can be queried to detect end-to-end conflicts31
32 References Avižienis, A., Laprie, J.-C., Randall, B., & Landwehr, C. (2004, January-March). Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing, 1(1), Cisco Systems Corporate Iconography. (n.d.). Retrieved from [Some drawings adapt and/or include Cisco corporate symbols to represent networks and devices] CMMI Product Team. (2010). CMMI for Services, Version 1.3. Report Number CMU/SEI-2010-TR-034 Graydon, P., Knight, J., & Strunk, E. (2007). Assurance-Based Development of Critical Systems. In 37th annual ieee/ifip international conference on dependable systems and networks.
33 References, 2 Jackson, D. (2009, April). A Direct Path to Dependable Software. Communications of the ACM, 52(4). Norros, I., Kuusela, P., & Savola, P. (2008). A Dependability Case Approach to the Assessment of IP Networks. In The second international conference on emerging security information, systems and technologies. IEEE. Strunk, E. A., & Knight, J. C. (2006b). The Essential Synthesis of Problem Frames and Assurance Cases. In Iwaapf 06. ACM.
34 Questions? Cell: (215)
NETFUSION DISCOVERY SYSTEM DESCRIPTION
NETFUSION DISCOVERY SYSTEM DESCRIPTION White Paper Contents NetFusion Discovery Overview... 3 Network Discovery... 3 Design Principles... 3 NetFusion Discovery Architecture... 4 Topology and State Changes...
More informationManaging the Emerging Semantic Risks
The New Information Security Agenda: Managing the Emerging Semantic Risks Dr Robert Garigue Vice President for information integrity and Chief Security Executive Bell Canada Page 1 Abstract Today all modern
More informationLesson 5 Web Service Interface Definition (Part II)
Lesson 5 Web Service Interface Definition (Part II) Service Oriented Architectures Security Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Controlling the style (1) The
More informationReasoning on semantically annotated processes
Chiara Di Francescomarino Chiara Ghidini Luciano Serafini Paolo Tonella FBK-irst, Trento, Italy 6th International Conference on Service Oriented Computing (ICSOC 2008) December 1-5, 2008 University of
More informationReal World Data Governance- Part 1
Real World Data Governance- Part 1 Day in the Life of a Business Steward Jesse Lambert and Jack Spivak, TopQuadrant Inc. November 30, 2017 Today s Program TopBraid EDG: A Day in the Life of a Business
More informationNETCONF Interoperability Testing
NETCONF Interoperability Testing Ha Manh Tran Iyad Tumar Jürgen Schönwälder Jacobs University Bremen July 1, 2009 Ha Manh Tran, Iyad Tumar, Jürgen Schönwälder NETCONF Interoperability Testing 1 NETCONF
More informationMULTILAYER REQUIREMENTS FOR NBI OF IP/MPLS DOMAIN CONTROLLERS
MULTILAYER REQUIREMENTS FOR NBI OF IP/MPLS DOMAIN CONTROLLERS White Paper Contents Scope... 2 NBI Requirements for IP/MPLS Domain Controller... 2 Topology and Traffic Discovery Requirements... 2 Monitoring
More informationSTS Infrastructural considerations. Christian Chiarcos
STS Infrastructural considerations Christian Chiarcos chiarcos@uni-potsdam.de Infrastructure Requirements Candidates standoff-based architecture (Stede et al. 2006, 2010) UiMA (Ferrucci and Lally 2004)
More informationBridging the Gap between Semantic Web and Networked Sensors: A Position Paper
Bridging the Gap between Semantic Web and Networked Sensors: A Position Paper Xiang Su and Jukka Riekki Intelligent Systems Group and Infotech Oulu, FIN-90014, University of Oulu, Finland {Xiang.Su,Jukka.Riekki}@ee.oulu.fi
More informationThe Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an
Solution Overview Cisco ACI and AlgoSec Solution: Enhanced Security Policy Visibility and Change, Risk, and Compliance Management With the integration of AlgoSec into the Cisco Application Centric Infrastructure
More informationCCIE SP Operations Written Exam v1.0
Cisco 350-060 CCIE SP Operations Written Exam v1.0 Version: 5.0 QUESTION NO: 1 DRAG DROP Cisco 350-060 Exam Answer: Critical Section Loss of Signal (SLOS) Critical Section Loss of Frame (SLOF) Major Alarm
More informationWhy do operators need multi-layer coordination?
Why do operators need multi-layer coordination? Víctor López Routing Research Symposium Network Architecture Geeks (NAG) Oct. 2012 Index 01 02 03 04 05 06 Towards Cloud Ready Transport Networks Multi-layer
More informationNETCONF Design and Implementation of a Prototype
International University Bremen Electrical Engineering and Computer Science Faculty NETCONF Design and Implementation of a Prototype Author: Catalin Ciocov Supervisor: Jürgen Schönwälder 13 th May 2004
More informationSemantic Annotations for BPMN models: Extending SeMFIS for supporting ontology reasoning and query functionalities. Dimitraki Katerina
Semantic Annotations for BPMN models: Extending SeMFIS for supporting ontology reasoning and query functionalities Dimitraki Katerina Thesis submitted in partial fulfillment of the requirements for the
More informationKnowledge-Driven Video Information Retrieval with LOD
Knowledge-Driven Video Information Retrieval with LOD Leslie F. Sikos, Ph.D., Flinders University ESAIR 15, 23 October 2015 Melbourne, VIC, Australia Knowledge-Driven Video IR Outline Video Retrieval Challenges
More informationChina Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom
China Unicom SDN Practice in WAN Lv Chengjin/Ma Jichun, China Unicom What Will Operator SDN Do? Two development directions Operator Softwaredefined networking (SDN) 1. Cloudify traditional services 2.
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Integrating Complex Financial Workflows in Oracle Database Xavier Lopez Seamus Hayes Oracle PolarLake, LTD 2 Copyright 2011, Oracle
More informationDeep Integration of Scripting Languages and Semantic Web Technologies
Deep Integration of Scripting Languages and Semantic Web Technologies Denny Vrandečić Institute AIFB, University of Karlsruhe, Germany denny@aifb.uni-karlsruhe.de Abstract. Python reached out to a wide
More informationSemantic Representation of Cloud Services: a Case Study for Openstack
Semantic Representation of Cloud Services: a Case Study for Openstack Beniamino Di Martino, Giuseppina Cretella, Antonio Esposito and Graziella Carta Department of Industrial and Information Engineering
More informationTagOntology. Tom Gruber Co-Founder and CTO, RealTravel tomgruber.org
TagOntology Tom Gruber Co-Founder and CTO, RealTravel tomgruber.org Let s share tags. What would we actually share? stuff that only people can read, one by one data that makes for pretty graphs and clouds
More informationCisco Implementing Cisco IP Switched Networks (SWITCH v2.0)
Cisco 300-115 Implementing Cisco IP Switched Networks (SWITCH v2.0) http://killexams.com/pass4sure/exam-detail/300-115 Question: 323 An administrator recently configured all ports for rapid transition
More informationProgress Report No. 15. Shared Segments Protection
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury
More informationProgrammableFlow White Paper. March 24, 2016 NEC Corporation
March 24, 2016 NEC Corporation Contents Preface 3 OpenFlow and ProgrammableFlow 5 Seven Functions and Techniques in ProgrammableFlow 6 Conclusion 19 2 NEC Corporation 2016 Preface SDN (Software-Defined
More informationTable of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17
Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8
More informationTaxonomy of SDN. Vara Varavithya 17 January 2018
Taxonomy of SDN Vara Varavithya 17 January 2018 Modern Data Center Environmentally protected warehouses Large number of computers for compute and storage Blades Computer- Top-of-Rack (TOR) Switches Full
More informationTowards the Semantic Desktop. Dr. Øyvind Hanssen University Library of Tromsø
Towards the Semantic Desktop Dr. Øyvind Hanssen University Library of Tromsø Agenda Background Enabling trends and technologies Desktop computing and The Semantic Web Online Social Networking and P2P Computing
More informationThe MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003
The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003 Pete Johnston UKOLN, University of Bath Bath, BA2 7AY
More informationA Python Module for NETCONF Clients
A Python Module for NETCONF Clients Shikhar Bhushan Computer Science Jacobs University Bremen Campus Ring 1 28759 Bremen Germany Type: Guided Research Proposal Date: March 8, 2009 Supervisor: Prof. J.
More informationThe challenge of reasoning for OLF s s IO G2
The challenge of reasoning for OLF s s IO G2 Arild Waaler Department of Informatics University of Oslo March 25, 2007 The challenge of reasoning for IO G2 1 OLF s vision of IO G2 Potential Integration
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationManaging Your IP Telephony Environment
Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining
More informationDeploying Voice Workloads for Skype for Business Online and Server
Course Code: M40409 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Deploying Voice Workloads for Skype for Business Online and Server Overview This five-day instructor-led course teaches how to
More informationInternet Engineering Task Force (IETF) Orange R. Shakir Google March 2018
Internet Engineering Task Force (IETF) Request for Comments: 8355 Category: Informational ISSN: 2070-1721 C. Filsfils, Ed. S. Previdi, Ed. Cisco Systems, Inc. B. Decraene Orange R. Shakir Google March
More informationThe Role of Networking in a Virtualized World Sponsor Technology Roadmap. Kevin Ryan Director Data Center Solutions
The Role of Networking in a Virtualized World Sponsor Technology Roadmap Kevin Ryan Director Data Center Solutions www.extremenetworks.com Data Center Trends The New Computer Data center capacity, not
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Most of today s Web content is intended for the use of humans rather than machines. While searching documents on the Web using computers, human interpretation is required before
More informationService Oriented Architecture
Service Oriented Architecture Web Services Security and Management Web Services for non-traditional Types of Data What are Web Services? Applications that accept XML-formatted requests from other systems
More informationTechnologies for the future of Network Insight and Automation
Technologies for the future of Network Insight and Automation Richard Wade (ricwade@cisco.com) Technical Leader, Asia-Pacific Infrastructure Programmability This Session s Context Service Creation Service
More informationChapter 3 Research Method
Chapter 3 Research Method 3.1 A Ontology-Based Method As we mention in section 2.3.6, we need a common approach to build up our ontologies for different B2B standards. In this chapter, we present a ontology-based
More informationSolution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and
Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and Compliance Management Through the integration of AlgoSec
More informationWhat you have learned so far. Interoperability. Ontology heterogeneity. Being serious about the semantic web
What you have learned so far Interoperability Introduction to the Semantic Web Tutorial at ISWC 2010 Jérôme Euzenat Data can be expressed in RDF Linked through URIs Modelled with OWL ontologies & Retrieved
More informationCategory: Standards Track December 2006
Network Working Group R. Enns, Ed. Request for Comments: 4741 Juniper Networks Category: Standards Track December 2006 Status of This Memo NETCONF Configuration Protocol This document specifies an Internet
More informationOverview of lectures today and Wednesday
Model-driven development (MDA), Software Oriented Architecture (SOA) and semantic web (exemplified by WSMO) Draft of presentation John Krogstie Professor, IDI, NTNU Senior Researcher, SINTEF ICT 1 Overview
More informationSemantic Web Fundamentals
Semantic Web Fundamentals Web Technologies (706.704) 3SSt VU WS 2018/19 with acknowledgements to P. Höfler, V. Pammer, W. Kienreich ISDS, TU Graz January 7 th 2019 Overview What is Semantic Web? Technology
More informationArmy Data Services Layer (ADSL) Data Mediation Providing Data Interoperability and Understanding in a
Army Data Services Layer (ADSL) Data Mediation Providing Data Interoperability and Understanding in a SOA Environment Michelle Dirner Army Net-Centric t Data Strategy t (ANCDS) Center of Excellence (CoE)
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationAn Architecture for Semantic Enterprise Application Integration Standards
An Architecture for Semantic Enterprise Application Integration Standards Nenad Anicic 1, 2, Nenad Ivezic 1, Albert Jones 1 1 National Institute of Standards and Technology, 100 Bureau Drive Gaithersburg,
More informationSEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES
SEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES Jeremy Carroll, Ralph Hodgson, {jeremy,ralph}@topquadrant.com This paper is submitted to The W3C Workshop on Semantic Web in Energy Industries
More informationAppropriate Layer-2 Interconnection Between IXPs
Appropriate Layer-2 Interconnection Between IXPs Keith Mitchell NANOG31, San Francisco 24/25 th May 2004 Layer-2 Interconnect Typical scenarios faced by IXP operators today: ISPs conserving router ports
More informationBPMN Working Draft. 1. Introduction
1. Introduction The Business Process Management Initiative (BPMI) has developed a standard Business Process Modeling Notation (BPMN). The primary goal of BPMN is to provide a notation that is readily understandable
More informationCarrier SDN for Multilayer Control
Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration
More informationWhy SD-WAN Alone is Not Enough
W H I T E PA P E R Why SD-WAN Alone is Not Enough In order to recognize the full potential of SD-WAN, businesses need a solution that fundamentally understands application performance. CLOUDGENIX WHITEPAPER
More informationSemantic Interoperability. Being serious about the Semantic Web
Semantic Interoperability Jérôme Euzenat INRIA & LIG France Natasha Noy Stanford University USA 1 Being serious about the Semantic Web It is not one person s ontology It is not several people s common
More informationICSOC 2005: Extending OWL for QoS-based Web Service Description and Discovery
ICSOC 2005: Extending OWL for QoS-based Web Service Description and Discovery PhD Candidate kritikos@csd.uoc.gr Computer Science Department, University of Crete Heraklion, Crete, Greece 1 Overview Problem
More informationActiveVOS Technologies
ActiveVOS Technologies ActiveVOS Technologies ActiveVOS provides a revolutionary way to build, run, manage, and maintain your business applications ActiveVOS is a modern SOA stack designed from the top
More informationSwapMe. Semantic Web Application Platform for the Mobile Ecosystem
SwapMe Semantic Web Application Platform for the Mobile Ecosystem Ora Lassila (Nokia) Tim Berners-Lee, Daniel Jackson, David Karger, Daniel Weitzner (MIT) January 2006 1 NOKIA & MIT SwapMe kickoff / 2006-01-31
More informationSemantic Web Update W3C RDF, OWL Standards, Development and Applications. Dave Beckett
Semantic Web Update W3C RDF, OWL Standards, Development and Applications Dave Beckett Introduction Semantic Web Activity RDF - RDF Core OWL - WebOnt Interest Group Query, Calendaring SWAD and Applications
More information> Semantic Web Use Cases and Case Studies
> Semantic Web Use Cases and Case Studies Case Study: Improving Web Search using Metadata Peter Mika, Yahoo! Research, Spain November 2008 Presenting compelling search results depends critically on understanding
More informationOWL-DBC The Arrival of Scalable and Tractable OWL Reasoning for Enterprise Knowledge Bases
OWL-DBC The Arrival of Scalable and Tractable OWL Reasoning for Enterprise Knowledge Bases URL: [http://trowl.eu/owl- dbc/] Copyright @2013 the University of Aberdeen. All Rights Reserved This document
More informationPedigree Management and Assessment Framework (PMAF) Demonstration
Pedigree Management and Assessment Framework (PMAF) Demonstration Kenneth A. McVearry ATC-NY, Cornell Business & Technology Park, 33 Thornwood Drive, Suite 500, Ithaca, NY 14850 kmcvearry@atcorp.com Abstract.
More informationTaxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company
Taxonomy Tools: Collaboration, Creation & Integration Dave Clarke Global Taxonomy Director dave.clarke@dowjones.com Dow Jones & Company Introduction Software Tools for Taxonomy 1. Collaboration 2. Creation
More informationDatacenter replication solution with quasardb
Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION
More informationSemantics-Based Integration of Embedded Systems Models
Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current
More informationConfiguring Virtual Port Channels
This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page
More informationJENA: A Java API for Ontology Management
JENA: A Java API for Ontology Management Hari Rajagopal IBM Corporation Page Agenda Background Intro to JENA Case study Tools and methods Questions Page The State of the Web Today The web is more Syntactic
More informationReducing Network Tiers Flattening the Network. Kevin Ryan Director Data Center Solutions
Reducing Tiers Flattening the Kevin Ryan Director Data Center Solutions www.extremenetworks.com Data Center Trends The New Computer Data center capacity, not server capacity, is the new metric Consolidation
More informationInternet Engineering Task Force (IETF) Juniper Networks K. Watsen Watsen Networks R. Wilton Cisco Systems March 2019
Internet Engineering Task Force (IETF) Request for Comments: 8526 Updates: 6241, 7950 Category: Standards Track ISSN: 2070-1721 M. Bjorklund Tail-f Systems J. Schoenwaelder Jacobs University P. Shafer
More informationExtracting Ontologies from Standards: Experiences and Issues
Extracting Ontologies from Standards: Experiences and Issues Ken Baclawski, Yuwang Yin, Sumit Purohit College of Computer and Information Science Northeastern University Eric S. Chan Oracle Abstract We
More informationMir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada
Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mohamed Bakillah and Steve H.L. Liang Department of Geomatics Engineering University of Calgary, Alberta, Canada
More informationLinked Data and RDF. COMP60421 Sean Bechhofer
Linked Data and RDF COMP60421 Sean Bechhofer sean.bechhofer@manchester.ac.uk Building a Semantic Web Annotation Associating metadata with resources Integration Integrating information sources Inference
More informationCOMP9321 Web Application Engineering
COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 12 (Wrap-up) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411
More informationSONET Topologies and Upgrades
CHAPTER 9 Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring
More informationCategory: Standards Track. Cisco N. Sprecher. Nokia Siemens Networks. A. Fulignoli, Ed. Ericsson October 2011
Internet Engineering Task Force (IETF) Request for Comments: 6378 Category: Standards Track ISSN: 2070-1721 Y. Weingarten, Ed. Nokia Siemens Networks S. Bryant E. Osborne Cisco N. Sprecher Nokia Siemens
More informationDependability Analysis of Web Service-based Business Processes by Model Transformations
Dependability Analysis of Web Service-based Business Processes by Model Transformations László Gönczy 1 1 DMIS, Budapest University of Technology and Economics Magyar Tudósok krt. 2. H-1117, Budapest,
More information"Charting the Course... MOC A Deploying Voice Workloads for Skype for Business Online and Server Course Summary
Description Course Summary This five-day instructor-led course teaches how to design, plan, and deploy the various voice solutions available with Skype for Business Online and Skype for Business Server
More informationBGP Configuration Automation on Edge Routers
BGP Configuration Automation on Edge Routers System and Network Engineering Msc. Research Project Stella Vouteva & Tarcan Turgut Supervisor: Stavros Konstantaras, NLNetLabs Introduction Big Internet Depletion
More informationCOMP9321 Web Application Engineering
COMP9321 Web Application Engineering Semester 1, 2017 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 12 (Wrap-up) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2457
More informationPractical Semantic Applications Master Title for Oil and Gas Asset Reporting. Information Integration David Price, TopQuadrant
Practical Semantic Applications Master Title for Oil and Gas Asset Reporting Life Click Cycle to Data edit Master Management subtitle and style Information Integration David Price, TopQuadrant Key Presentation
More informationChapter 4 Research Prototype
Chapter 4 Research Prototype According to the research method described in Chapter 3, a schema and ontology-assisted heterogeneous information integration prototype system is implemented. This system shows
More informationContext-aware Semantic Middleware Solutions for Pervasive Applications
Solutions for Pervasive Applications Alessandra Toninelli alessandra.toninelli@unibo.it Università degli Studi di Bologna Department of Electronics, Information and Systems PhD Course Infrastructure and
More informationUsing Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
More informationSemantic Web and Natural Language Processing
Semantic Web and Natural Language Processing Wiltrud Kessler Institut für Maschinelle Sprachverarbeitung Universität Stuttgart Semantic Web Winter 2014/2015 This work is licensed under a Creative Commons
More informationUsing Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
More informationOntology mutation testing
Ontology mutation testing February 3, 2016 Cesare Bartolini Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg Outline 1 Mutation testing 2 Mutant generation 3
More informationSemantic Technologies and CDISC Standards. Frederik Malfait, Information Architect, IMOS Consulting Scott Bahlavooni, Independent
Semantic Technologies and CDISC Standards Frederik Malfait, Information Architect, IMOS Consulting Scott Bahlavooni, Independent Part I Introduction to Semantic Technology Resource Description Framework
More informationService Level Agreement
General This document is a (SLA) setting out the indicative levels of services to be provided to you by Luminet. This document must be read in conjunction with our standard Terms and Conditions of Service
More informationAgent Framework For Intelligent Data Processing
Agent Framework For Intelligent Data Processing Rahul Ramachandran, Sara Graves, Sunil Movva and Xiang Li Information Technology and Systems Center University of Alabama in Huntsville rramachandran@itsc.uah.edu
More informationUnicast Routing. Information About Layer 3 Unicast Routing CHAPTER
CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul
More informationAn ontology for the Business Process Modelling Notation
An ontology for the Business Process Modelling Notation Marco Rospocher Fondazione Bruno Kessler, Data and Knowledge Management Unit Trento, Italy rospocher@fbk.eu :: http://dkm.fbk.eu/rospocher joint
More informationSAWSDL Status and relation to WSMO
Leopold Franzens Universität Innsbruck SAWSDL Status and relation to WSMO Jacek Kopecký DERI Innsbruck University of Innsbruck Copyright 2007 DERI Innsbruck www.deri.at Overview Semantic Annotations for
More informationSemantic agents for location-aware service provisioning in mobile networks
Semantic agents for location-aware service provisioning in mobile networks Alisa Devlić University of Zagreb visiting doctoral student at Wireless@KTH September 9 th 2005. 1 Agenda Research motivation
More informationISO Geometry Templates using OWL
ISO 15926 Geometry Templates using OWL Manoj Dharwadkar, Ph.D. Director, Data Interoperability Bentley Systems Inc. (Chair: PCA Geometry SIG) June 2nd, Semantic Days 2010 Content ISO 15926 and Reference
More informationPresented By Aditya R Joshi Neha Purohit
Presented By Aditya R Joshi Neha Purohit Pellet What is Pellet? Pellet is an OWL- DL reasoner Supports nearly all of OWL 1 and OWL 2 Sound and complete reasoner Written in Java and available from http://
More informationConfiguring IP Multicast Routing
34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationJoining the BRICKS Network - A Piece of Cake
Joining the BRICKS Network - A Piece of Cake Robert Hecht and Bernhard Haslhofer 1 ARC Seibersdorf research - Research Studios Studio Digital Memory Engineering Thurngasse 8, A-1090 Wien, Austria {robert.hecht
More informationCONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION
CONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION Maija Metso, Antti Koivisto and Jaakko Sauvola MediaTeam, MVMP Unit Infotech Oulu, University of Oulu e-mail: {maija.metso, antti.koivisto,
More information802.1Qcc findings. Astrit Ademaj. Sept 2018
802.1Qcc findings Astrit Ademaj astrit.ademaj@tttech.com Sept 2018 Background Present Qcc findings - mainly related to but not limited to centralized configuration model Information sharing, with the WG
More informationNext generation branch with SD-WAN and NFV
Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark
More informationChapter 5: Inter-VLAN Routing. Routing & Switching
Chapter 5: Inter-VLAN Routing Routing & Switching What is Inter-VLAN routing? Layer 2 switches cannot forward traffic between VLANs without the assistance of a router. Inter-VLAN routing is a process for
More informationThe Semantic Web Revisited. Nigel Shadbolt Tim Berners-Lee Wendy Hall
The Semantic Web Revisited Nigel Shadbolt Tim Berners-Lee Wendy Hall Today sweb It is designed for human consumption Information retrieval is mainly supported by keyword-based search engines Some problems
More informationExplain how cloud technologies are changing the design, deployment, and management of voice architectures.
Course Outline Module 1: Introduction to Voice Workloads Designing a Skype for Business voice solution requires the understanding of many technologies. With Microsoft s latest cloud based voice services,
More information