Applying Assurance-Based Design to Detecting Misconfigurations of Network Recovery. SEDC 2014 (April 3-5) Joseph Kroculick Cynthia Hood

Size: px
Start display at page:

Download "Applying Assurance-Based Design to Detecting Misconfigurations of Network Recovery. SEDC 2014 (April 3-5) Joseph Kroculick Cynthia Hood"

Transcription

1 Applying Assurance-Based Design to Detecting Misconfigurations of Network Recovery SEDC 2014 (April 3-5) Joseph Kroculick Cynthia Hood 1

2 Introduction Describe Dependability Assessment Process (DAP) Dependability, Services, Detecting Correct Configuration Apply Dependability Assessment Process to Detecting a Provisioning Error Define How Each Activity in the Dependability Assessment Process is Performed 2

3 Current Telecommunications Environment Heterogeneous Distributed Horizontal and vertical divergence of solutions Many alternatives provided to an administrator Technologies Vendors Hardware Software Manual provisioning needs to be supported at the device level Infrastructure decisions made without understanding the end-to-end view of the architecture (the system dynamics) 3

4 Network Environment Issues Potential for misconfiguration Complex system dynamics and operations Gap between service requirements and device state Fragmented device data models Service requirements are informal Telecommunications service provisioning is performed through device configuration at a command-line interface 4

5 Network Environment Issues Potential for misconfiguration Complex system dynamics and operations Gap between service requirements and device state Fragmented device data models Service requirements are informal Telecommunications service provisioning is performed through device configuration at a command-line interface 5

6 Network Environment Issues Potential for misconfiguration Complex system dynamics and operations Gap between service requirements and device state Fragmented device data models Service requirements are informal Telecommunications service provisioning is performed through device configuration at a command-line interface 6

7 Multilayer Network Infrastructure 7

8 Examples of a Configuration Conflict Protocol parameter mismatches (e.g. disagreements on directionality between routers A and B) Inconsistent escalation strategies through hold-off timers for each recovery protocol Conflict: HDA, Layer 1? HDA, Layer 0, HDB, Layer 1 = HDB, Layer 0 Example Network Misconfiguration/Conflic t 8

9 Assurance-Based Design Approach to Detecting Provisioning Conflicts Assurance-based design (ABD) Characterized by a system model accompanied by an assurance case (Hall & Rapanotti, 2008; Graydon, Knight & Strunk, 2008) An assurance case is a set of goals made about the system and arguments are provided to support the claims (Strunk, Knight, 2006) An assurance/dependability case has two parts: Step 1: Goodness properties of a system are established (Jackson, 2009) (e.g. recovery of traffic within an acceptable delay) Step 2: An argument is made that the network system satisfies these critical properties (Jackson, 2009) Apply dependability cases to assess correct configurations in IP networks (Norros, Kuusela, & Savola, 2008) 3/24/14 9

10 Assurance Case

11 Assurance Case (Goal Decomposition

12 Assurance Case Ontology 12

13 Dependability Dependability can be defined as ``the ability to deliver service that can justifiably be trusted'' Avizienis, Laprie, Randall, & Landwehr (2004) A service is ``a product that is not tangible and not storable'' (CMMI for Services, 2010) Dependability can be defined in terms of confidence or the trustworthiness that a system provides functionality consistent with a user's expectations (i.e. service requirements) 13

14 Dependability Assessment Process (DAP) Implements Dependability Case Workflow represented in Business Process Modeling Notation (BPMN) Knowledge/Informat ion Models use Activities and Ontologies 14

15 Example Network Configuration 1+1 Unidirectional Protection Generic RequestResponse Protocol between protection ports Single Shared-Link Risk Group (links w1-w2, w2w1) SRLG1 Fails Provision network components a1, w1, w2, a2, p1, and p2 to restore traffic 15

16 Define/Update Problem Context Define the Problem Context Define application requirements Define business requirements Define architectural constraints The context is the circumstances that form the setting for the problem Availability of technologies Architectural alternatives Costs of implementation Requirements of the end-user 3/24/14 # 16

17 Build Domain Model Build Network Ontology in Web Ontology Language (OWL) Domain modeler builds a logical model of network infrastructure Domain ontology represents network infrastructure viewpoint such as a topology, event operations, or network information Essential resource types and relationships between them represented as an OWL ontology Example network infrastructure terms: {layer, link, connection, link connection, network connection, termination points, ports, router labels, cross-connection} Relationship terms: {bridge (split), switch (merge)} 3/24/14 # 17

18 Connectivity Represented in OWL Example Statement: urn:a1 urn:bridgedto urn:p1 3/24/14 18

19 Bridge, Switch Terms Defined Bridge action is redirecting traffic from a working transmitter to a protection transmitter Switch action is selection of traffic from a protection receiver 3/24/14 19

20 Specify Service Requirements Define the user s expectations on network services provided by the network infrastructure Applications today need to identify and formalize their service requirements Service requirements need to be matched to many fine-grained decisions made on configuration settings of network resources Service Level Specification (SLS) (e.g. expected throughput, jitter, endto-end delay, drop probability, latency, multipath bandwidth, security level) Example: Acceptable Outage Duration 10 ms for Fault Detection 50 ms for Recovery SR1: The network infrastructure shall provide a connected network after the SONET 50ms outage duration 3/24/14 20

21 Identify Dependability Property Spatial Property Strong Connectivity Temporal Property Bounded Temporal Difference 3/24/14 21

22 Specify Provisioning Provisioning Example RPC Command Sent To Router using NETCONF API Specify provisioning commands in router vendor XML data model Example: Represent Device Technology in Juniper s JUNOS XML <rpc messageid="messageid"> <edit-config> <target> <candidate/> </target> <url> ftp://kroculick:kroculickpwd@ft p.kroculick.com/% %F2var/tmp/configFile </url> </edit-config> </rpc> ]]>]]> Router data elements are enclosed in XML tags Send XML to Device Using NETCONF # 3/24/14

23 XML-Based Device Data Model XML-device specific model maps into a common domain ontology Verify that systems interoperate Errors in operation that would result from provisioning are detected XML allows syntactic checks Multivendor devices have different data models Common semantic model Behavior and structure are dependent since actions of recovery operate on a network structure 23

24 JUNOS XML 24

25 Update Domain Model Converts provisioning commands to changes to a logical model Example Change commands applied to a router data model expressed in XML can be transformed to a common OWL model serialized in RDF/XML 3/24/14 25

26 Application JUNOS XML to OWL RDF/XML Transformation Rules Transform XML device data model using XSLT script or XML parser script to an OWL RDF/XML data schema to a network ontology Example: Mapping of Port so-1/1/0, Logical Unit 0, IP Address: to a PortID 26

27 Define Conflict Statement (1) A particular situation needs to be described in terms of local decisions and properties A conflict statement connects an end-to-end dependability property to key relationships between individuals in a domain ontology Determine key relationships that must exist to enable consistency between actions of recovery bridged (a, x, y ) and switched (peer (a ), peer (x ), peer (y )) 3/24/14 # 27

28 Define Conflict Statement (2) Connect Statements Build Conflict Statement Compose axioms on local properties of routers that need to hold for the model to meet an end-to-end dependability property A conflict statement specifies key relationships between local properties within a switch 3/24/14

29 Detect Conflict Conflict Detection SPARQL Query Implemented using a SPARQL query on an inferred RDF graph Inference engine infers whether end-to-end desirable properties are true or false Example: return whether ports a1 and a2 are connected AND where they are access ports 3/24/14

30 Validate Model Allow the previous knowledge to be refined or return to the detect conflict activity Allows the system context to be updated as knowledge is discovered about the problem context Models to be refined based on updated information 3/24/14 30

31 Conclusion Dependability Assessment requires feedback/lessons learned and: Understanding of system dynamics (situations that can occur) and a suitable domain model/knowledge representation Network-level properties that have been identified in well-engineered networks Semantic interoperability between router provisioning options supports consistent behavior in implementing network infrastructure services Knowledge representation using ontologies allows network infrastructure concepts and requirement concepts to be related Inferred model can be queried to detect end-to-end conflicts31

32 References Avižienis, A., Laprie, J.-C., Randall, B., & Landwehr, C. (2004, January-March). Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing, 1(1), Cisco Systems Corporate Iconography. (n.d.). Retrieved from [Some drawings adapt and/or include Cisco corporate symbols to represent networks and devices] CMMI Product Team. (2010). CMMI for Services, Version 1.3. Report Number CMU/SEI-2010-TR-034 Graydon, P., Knight, J., & Strunk, E. (2007). Assurance-Based Development of Critical Systems. In 37th annual ieee/ifip international conference on dependable systems and networks.

33 References, 2 Jackson, D. (2009, April). A Direct Path to Dependable Software. Communications of the ACM, 52(4). Norros, I., Kuusela, P., & Savola, P. (2008). A Dependability Case Approach to the Assessment of IP Networks. In The second international conference on emerging security information, systems and technologies. IEEE. Strunk, E. A., & Knight, J. C. (2006b). The Essential Synthesis of Problem Frames and Assurance Cases. In Iwaapf 06. ACM.

34 Questions? Cell: (215)

NETFUSION DISCOVERY SYSTEM DESCRIPTION

NETFUSION DISCOVERY SYSTEM DESCRIPTION NETFUSION DISCOVERY SYSTEM DESCRIPTION White Paper Contents NetFusion Discovery Overview... 3 Network Discovery... 3 Design Principles... 3 NetFusion Discovery Architecture... 4 Topology and State Changes...

More information

Managing the Emerging Semantic Risks

Managing the Emerging Semantic Risks The New Information Security Agenda: Managing the Emerging Semantic Risks Dr Robert Garigue Vice President for information integrity and Chief Security Executive Bell Canada Page 1 Abstract Today all modern

More information

Lesson 5 Web Service Interface Definition (Part II)

Lesson 5 Web Service Interface Definition (Part II) Lesson 5 Web Service Interface Definition (Part II) Service Oriented Architectures Security Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Controlling the style (1) The

More information

Reasoning on semantically annotated processes

Reasoning on semantically annotated processes Chiara Di Francescomarino Chiara Ghidini Luciano Serafini Paolo Tonella FBK-irst, Trento, Italy 6th International Conference on Service Oriented Computing (ICSOC 2008) December 1-5, 2008 University of

More information

Real World Data Governance- Part 1

Real World Data Governance- Part 1 Real World Data Governance- Part 1 Day in the Life of a Business Steward Jesse Lambert and Jack Spivak, TopQuadrant Inc. November 30, 2017 Today s Program TopBraid EDG: A Day in the Life of a Business

More information

NETCONF Interoperability Testing

NETCONF Interoperability Testing NETCONF Interoperability Testing Ha Manh Tran Iyad Tumar Jürgen Schönwälder Jacobs University Bremen July 1, 2009 Ha Manh Tran, Iyad Tumar, Jürgen Schönwälder NETCONF Interoperability Testing 1 NETCONF

More information

MULTILAYER REQUIREMENTS FOR NBI OF IP/MPLS DOMAIN CONTROLLERS

MULTILAYER REQUIREMENTS FOR NBI OF IP/MPLS DOMAIN CONTROLLERS MULTILAYER REQUIREMENTS FOR NBI OF IP/MPLS DOMAIN CONTROLLERS White Paper Contents Scope... 2 NBI Requirements for IP/MPLS Domain Controller... 2 Topology and Traffic Discovery Requirements... 2 Monitoring

More information

STS Infrastructural considerations. Christian Chiarcos

STS Infrastructural considerations. Christian Chiarcos STS Infrastructural considerations Christian Chiarcos chiarcos@uni-potsdam.de Infrastructure Requirements Candidates standoff-based architecture (Stede et al. 2006, 2010) UiMA (Ferrucci and Lally 2004)

More information

Bridging the Gap between Semantic Web and Networked Sensors: A Position Paper

Bridging the Gap between Semantic Web and Networked Sensors: A Position Paper Bridging the Gap between Semantic Web and Networked Sensors: A Position Paper Xiang Su and Jukka Riekki Intelligent Systems Group and Infotech Oulu, FIN-90014, University of Oulu, Finland {Xiang.Su,Jukka.Riekki}@ee.oulu.fi

More information

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an

The Need In today s fast-paced world, the growing demand to support a variety of applications across the data center and help ensure the compliance an Solution Overview Cisco ACI and AlgoSec Solution: Enhanced Security Policy Visibility and Change, Risk, and Compliance Management With the integration of AlgoSec into the Cisco Application Centric Infrastructure

More information

CCIE SP Operations Written Exam v1.0

CCIE SP Operations Written Exam v1.0 Cisco 350-060 CCIE SP Operations Written Exam v1.0 Version: 5.0 QUESTION NO: 1 DRAG DROP Cisco 350-060 Exam Answer: Critical Section Loss of Signal (SLOS) Critical Section Loss of Frame (SLOF) Major Alarm

More information

Why do operators need multi-layer coordination?

Why do operators need multi-layer coordination? Why do operators need multi-layer coordination? Víctor López Routing Research Symposium Network Architecture Geeks (NAG) Oct. 2012 Index 01 02 03 04 05 06 Towards Cloud Ready Transport Networks Multi-layer

More information

NETCONF Design and Implementation of a Prototype

NETCONF Design and Implementation of a Prototype International University Bremen Electrical Engineering and Computer Science Faculty NETCONF Design and Implementation of a Prototype Author: Catalin Ciocov Supervisor: Jürgen Schönwälder 13 th May 2004

More information

Semantic Annotations for BPMN models: Extending SeMFIS for supporting ontology reasoning and query functionalities. Dimitraki Katerina

Semantic Annotations for BPMN models: Extending SeMFIS for supporting ontology reasoning and query functionalities. Dimitraki Katerina Semantic Annotations for BPMN models: Extending SeMFIS for supporting ontology reasoning and query functionalities Dimitraki Katerina Thesis submitted in partial fulfillment of the requirements for the

More information

Knowledge-Driven Video Information Retrieval with LOD

Knowledge-Driven Video Information Retrieval with LOD Knowledge-Driven Video Information Retrieval with LOD Leslie F. Sikos, Ph.D., Flinders University ESAIR 15, 23 October 2015 Melbourne, VIC, Australia Knowledge-Driven Video IR Outline Video Retrieval Challenges

More information

China Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom

China Unicom SDN Practice in WAN. Lv Chengjin/Ma Jichun, China Unicom China Unicom SDN Practice in WAN Lv Chengjin/Ma Jichun, China Unicom What Will Operator SDN Do? Two development directions Operator Softwaredefined networking (SDN) 1. Cloudify traditional services 2.

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Integrating Complex Financial Workflows in Oracle Database Xavier Lopez Seamus Hayes Oracle PolarLake, LTD 2 Copyright 2011, Oracle

More information

Deep Integration of Scripting Languages and Semantic Web Technologies

Deep Integration of Scripting Languages and Semantic Web Technologies Deep Integration of Scripting Languages and Semantic Web Technologies Denny Vrandečić Institute AIFB, University of Karlsruhe, Germany denny@aifb.uni-karlsruhe.de Abstract. Python reached out to a wide

More information

Semantic Representation of Cloud Services: a Case Study for Openstack

Semantic Representation of Cloud Services: a Case Study for Openstack Semantic Representation of Cloud Services: a Case Study for Openstack Beniamino Di Martino, Giuseppina Cretella, Antonio Esposito and Graziella Carta Department of Industrial and Information Engineering

More information

TagOntology. Tom Gruber Co-Founder and CTO, RealTravel tomgruber.org

TagOntology. Tom Gruber Co-Founder and CTO, RealTravel tomgruber.org TagOntology Tom Gruber Co-Founder and CTO, RealTravel tomgruber.org Let s share tags. What would we actually share? stuff that only people can read, one by one data that makes for pretty graphs and clouds

More information

Cisco Implementing Cisco IP Switched Networks (SWITCH v2.0)

Cisco Implementing Cisco IP Switched Networks (SWITCH v2.0) Cisco 300-115 Implementing Cisco IP Switched Networks (SWITCH v2.0) http://killexams.com/pass4sure/exam-detail/300-115 Question: 323 An administrator recently configured all ports for rapid transition

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

ProgrammableFlow White Paper. March 24, 2016 NEC Corporation

ProgrammableFlow White Paper. March 24, 2016 NEC Corporation March 24, 2016 NEC Corporation Contents Preface 3 OpenFlow and ProgrammableFlow 5 Seven Functions and Techniques in ProgrammableFlow 6 Conclusion 19 2 NEC Corporation 2016 Preface SDN (Software-Defined

More information

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17

Table of Contents 1 Introduction A Declarative Approach to Entity Resolution... 17 Table of Contents 1 Introduction...1 1.1 Common Problem...1 1.2 Data Integration and Data Management...3 1.2.1 Information Quality Overview...3 1.2.2 Customer Data Integration...4 1.2.3 Data Management...8

More information

Taxonomy of SDN. Vara Varavithya 17 January 2018

Taxonomy of SDN. Vara Varavithya 17 January 2018 Taxonomy of SDN Vara Varavithya 17 January 2018 Modern Data Center Environmentally protected warehouses Large number of computers for compute and storage Blades Computer- Top-of-Rack (TOR) Switches Full

More information

Towards the Semantic Desktop. Dr. Øyvind Hanssen University Library of Tromsø

Towards the Semantic Desktop. Dr. Øyvind Hanssen University Library of Tromsø Towards the Semantic Desktop Dr. Øyvind Hanssen University Library of Tromsø Agenda Background Enabling trends and technologies Desktop computing and The Semantic Web Online Social Networking and P2P Computing

More information

The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003

The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003 The MEG Metadata Schemas Registry Schemas and Ontologies: building a Semantic Infrastructure for GRIDs and digital libraries Edinburgh, 16 May 2003 Pete Johnston UKOLN, University of Bath Bath, BA2 7AY

More information

A Python Module for NETCONF Clients

A Python Module for NETCONF Clients A Python Module for NETCONF Clients Shikhar Bhushan Computer Science Jacobs University Bremen Campus Ring 1 28759 Bremen Germany Type: Guided Research Proposal Date: March 8, 2009 Supervisor: Prof. J.

More information

The challenge of reasoning for OLF s s IO G2

The challenge of reasoning for OLF s s IO G2 The challenge of reasoning for OLF s s IO G2 Arild Waaler Department of Informatics University of Oslo March 25, 2007 The challenge of reasoning for IO G2 1 OLF s vision of IO G2 Potential Integration

More information

Cisco ISR G2 Management Overview

Cisco ISR G2 Management Overview Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and

More information

Managing Your IP Telephony Environment

Managing Your IP Telephony Environment Managing Your IP Telephony Environment with HP OpenView The Growing Need to Manage IP Telephony...2 Designing an IP Telephony Solution...2 Installing and Configuring an IP Telephony Solution...4 Maintaining

More information

Deploying Voice Workloads for Skype for Business Online and Server

Deploying Voice Workloads for Skype for Business Online and Server Course Code: M40409 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Deploying Voice Workloads for Skype for Business Online and Server Overview This five-day instructor-led course teaches how to

More information

Internet Engineering Task Force (IETF) Orange R. Shakir Google March 2018

Internet Engineering Task Force (IETF) Orange R. Shakir Google March 2018 Internet Engineering Task Force (IETF) Request for Comments: 8355 Category: Informational ISSN: 2070-1721 C. Filsfils, Ed. S. Previdi, Ed. Cisco Systems, Inc. B. Decraene Orange R. Shakir Google March

More information

The Role of Networking in a Virtualized World Sponsor Technology Roadmap. Kevin Ryan Director Data Center Solutions

The Role of Networking in a Virtualized World Sponsor Technology Roadmap. Kevin Ryan Director Data Center Solutions The Role of Networking in a Virtualized World Sponsor Technology Roadmap Kevin Ryan Director Data Center Solutions www.extremenetworks.com Data Center Trends The New Computer Data center capacity, not

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Most of today s Web content is intended for the use of humans rather than machines. While searching documents on the Web using computers, human interpretation is required before

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Web Services Security and Management Web Services for non-traditional Types of Data What are Web Services? Applications that accept XML-formatted requests from other systems

More information

Technologies for the future of Network Insight and Automation

Technologies for the future of Network Insight and Automation Technologies for the future of Network Insight and Automation Richard Wade (ricwade@cisco.com) Technical Leader, Asia-Pacific Infrastructure Programmability This Session s Context Service Creation Service

More information

Chapter 3 Research Method

Chapter 3 Research Method Chapter 3 Research Method 3.1 A Ontology-Based Method As we mention in section 2.3.6, we need a common approach to build up our ontologies for different B2B standards. In this chapter, we present a ontology-based

More information

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and Compliance Management Through the integration of AlgoSec

More information

What you have learned so far. Interoperability. Ontology heterogeneity. Being serious about the semantic web

What you have learned so far. Interoperability. Ontology heterogeneity. Being serious about the semantic web What you have learned so far Interoperability Introduction to the Semantic Web Tutorial at ISWC 2010 Jérôme Euzenat Data can be expressed in RDF Linked through URIs Modelled with OWL ontologies & Retrieved

More information

Category: Standards Track December 2006

Category: Standards Track December 2006 Network Working Group R. Enns, Ed. Request for Comments: 4741 Juniper Networks Category: Standards Track December 2006 Status of This Memo NETCONF Configuration Protocol This document specifies an Internet

More information

Overview of lectures today and Wednesday

Overview of lectures today and Wednesday Model-driven development (MDA), Software Oriented Architecture (SOA) and semantic web (exemplified by WSMO) Draft of presentation John Krogstie Professor, IDI, NTNU Senior Researcher, SINTEF ICT 1 Overview

More information

Semantic Web Fundamentals

Semantic Web Fundamentals Semantic Web Fundamentals Web Technologies (706.704) 3SSt VU WS 2018/19 with acknowledgements to P. Höfler, V. Pammer, W. Kienreich ISDS, TU Graz January 7 th 2019 Overview What is Semantic Web? Technology

More information

Army Data Services Layer (ADSL) Data Mediation Providing Data Interoperability and Understanding in a

Army Data Services Layer (ADSL) Data Mediation Providing Data Interoperability and Understanding in a Army Data Services Layer (ADSL) Data Mediation Providing Data Interoperability and Understanding in a SOA Environment Michelle Dirner Army Net-Centric t Data Strategy t (ANCDS) Center of Excellence (CoE)

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

An Architecture for Semantic Enterprise Application Integration Standards

An Architecture for Semantic Enterprise Application Integration Standards An Architecture for Semantic Enterprise Application Integration Standards Nenad Anicic 1, 2, Nenad Ivezic 1, Albert Jones 1 1 National Institute of Standards and Technology, 100 Bureau Drive Gaithersburg,

More information

SEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES

SEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES SEMANTIC SOLUTIONS FOR OIL & GAS: ROLES AND RESPONSIBILITIES Jeremy Carroll, Ralph Hodgson, {jeremy,ralph}@topquadrant.com This paper is submitted to The W3C Workshop on Semantic Web in Energy Industries

More information

Appropriate Layer-2 Interconnection Between IXPs

Appropriate Layer-2 Interconnection Between IXPs Appropriate Layer-2 Interconnection Between IXPs Keith Mitchell NANOG31, San Francisco 24/25 th May 2004 Layer-2 Interconnect Typical scenarios faced by IXP operators today: ISPs conserving router ports

More information

BPMN Working Draft. 1. Introduction

BPMN Working Draft. 1. Introduction 1. Introduction The Business Process Management Initiative (BPMI) has developed a standard Business Process Modeling Notation (BPMN). The primary goal of BPMN is to provide a notation that is readily understandable

More information

Carrier SDN for Multilayer Control

Carrier SDN for Multilayer Control Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration

More information

Why SD-WAN Alone is Not Enough

Why SD-WAN Alone is Not Enough W H I T E PA P E R Why SD-WAN Alone is Not Enough In order to recognize the full potential of SD-WAN, businesses need a solution that fundamentally understands application performance. CLOUDGENIX WHITEPAPER

More information

Semantic Interoperability. Being serious about the Semantic Web

Semantic Interoperability. Being serious about the Semantic Web Semantic Interoperability Jérôme Euzenat INRIA & LIG France Natasha Noy Stanford University USA 1 Being serious about the Semantic Web It is not one person s ontology It is not several people s common

More information

ICSOC 2005: Extending OWL for QoS-based Web Service Description and Discovery

ICSOC 2005: Extending OWL for QoS-based Web Service Description and Discovery ICSOC 2005: Extending OWL for QoS-based Web Service Description and Discovery PhD Candidate kritikos@csd.uoc.gr Computer Science Department, University of Crete Heraklion, Crete, Greece 1 Overview Problem

More information

ActiveVOS Technologies

ActiveVOS Technologies ActiveVOS Technologies ActiveVOS Technologies ActiveVOS provides a revolutionary way to build, run, manage, and maintain your business applications ActiveVOS is a modern SOA stack designed from the top

More information

SwapMe. Semantic Web Application Platform for the Mobile Ecosystem

SwapMe. Semantic Web Application Platform for the Mobile Ecosystem SwapMe Semantic Web Application Platform for the Mobile Ecosystem Ora Lassila (Nokia) Tim Berners-Lee, Daniel Jackson, David Karger, Daniel Weitzner (MIT) January 2006 1 NOKIA & MIT SwapMe kickoff / 2006-01-31

More information

Semantic Web Update W3C RDF, OWL Standards, Development and Applications. Dave Beckett

Semantic Web Update W3C RDF, OWL Standards, Development and Applications. Dave Beckett Semantic Web Update W3C RDF, OWL Standards, Development and Applications Dave Beckett Introduction Semantic Web Activity RDF - RDF Core OWL - WebOnt Interest Group Query, Calendaring SWAD and Applications

More information

> Semantic Web Use Cases and Case Studies

> Semantic Web Use Cases and Case Studies > Semantic Web Use Cases and Case Studies Case Study: Improving Web Search using Metadata Peter Mika, Yahoo! Research, Spain November 2008 Presenting compelling search results depends critically on understanding

More information

OWL-DBC The Arrival of Scalable and Tractable OWL Reasoning for Enterprise Knowledge Bases

OWL-DBC The Arrival of Scalable and Tractable OWL Reasoning for Enterprise Knowledge Bases OWL-DBC The Arrival of Scalable and Tractable OWL Reasoning for Enterprise Knowledge Bases URL: [http://trowl.eu/owl- dbc/] Copyright @2013 the University of Aberdeen. All Rights Reserved This document

More information

Pedigree Management and Assessment Framework (PMAF) Demonstration

Pedigree Management and Assessment Framework (PMAF) Demonstration Pedigree Management and Assessment Framework (PMAF) Demonstration Kenneth A. McVearry ATC-NY, Cornell Business & Technology Park, 33 Thornwood Drive, Suite 500, Ithaca, NY 14850 kmcvearry@atcorp.com Abstract.

More information

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company

Taxonomy Tools: Collaboration, Creation & Integration. Dow Jones & Company Taxonomy Tools: Collaboration, Creation & Integration Dave Clarke Global Taxonomy Director dave.clarke@dowjones.com Dow Jones & Company Introduction Software Tools for Taxonomy 1. Collaboration 2. Creation

More information

Datacenter replication solution with quasardb

Datacenter replication solution with quasardb Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION

More information

Semantics-Based Integration of Embedded Systems Models

Semantics-Based Integration of Embedded Systems Models Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page

More information

JENA: A Java API for Ontology Management

JENA: A Java API for Ontology Management JENA: A Java API for Ontology Management Hari Rajagopal IBM Corporation Page Agenda Background Intro to JENA Case study Tools and methods Questions Page The State of the Web Today The web is more Syntactic

More information

Reducing Network Tiers Flattening the Network. Kevin Ryan Director Data Center Solutions

Reducing Network Tiers Flattening the Network. Kevin Ryan Director Data Center Solutions Reducing Tiers Flattening the Kevin Ryan Director Data Center Solutions www.extremenetworks.com Data Center Trends The New Computer Data center capacity, not server capacity, is the new metric Consolidation

More information

Internet Engineering Task Force (IETF) Juniper Networks K. Watsen Watsen Networks R. Wilton Cisco Systems March 2019

Internet Engineering Task Force (IETF) Juniper Networks K. Watsen Watsen Networks R. Wilton Cisco Systems March 2019 Internet Engineering Task Force (IETF) Request for Comments: 8526 Updates: 6241, 7950 Category: Standards Track ISSN: 2070-1721 M. Bjorklund Tail-f Systems J. Schoenwaelder Jacobs University P. Shafer

More information

Extracting Ontologies from Standards: Experiences and Issues

Extracting Ontologies from Standards: Experiences and Issues Extracting Ontologies from Standards: Experiences and Issues Ken Baclawski, Yuwang Yin, Sumit Purohit College of Computer and Information Science Northeastern University Eric S. Chan Oracle Abstract We

More information

Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada

Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mir Abolfazl Mostafavi Centre for research in geomatics, Laval University Québec, Canada Mohamed Bakillah and Steve H.L. Liang Department of Geomatics Engineering University of Calgary, Alberta, Canada

More information

Linked Data and RDF. COMP60421 Sean Bechhofer

Linked Data and RDF. COMP60421 Sean Bechhofer Linked Data and RDF COMP60421 Sean Bechhofer sean.bechhofer@manchester.ac.uk Building a Semantic Web Annotation Associating metadata with resources Integration Integrating information sources Inference

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 2, 2015 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 12 (Wrap-up) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2411

More information

SONET Topologies and Upgrades

SONET Topologies and Upgrades CHAPTER 9 Note The terms "Unidirectional Path Switched Ring" and "UPSR" may appear in Cisco literature. These terms do not refer to using Cisco ONS 15xxx products in a unidirectional path switched ring

More information

Category: Standards Track. Cisco N. Sprecher. Nokia Siemens Networks. A. Fulignoli, Ed. Ericsson October 2011

Category: Standards Track. Cisco N. Sprecher. Nokia Siemens Networks. A. Fulignoli, Ed. Ericsson October 2011 Internet Engineering Task Force (IETF) Request for Comments: 6378 Category: Standards Track ISSN: 2070-1721 Y. Weingarten, Ed. Nokia Siemens Networks S. Bryant E. Osborne Cisco N. Sprecher Nokia Siemens

More information

Dependability Analysis of Web Service-based Business Processes by Model Transformations

Dependability Analysis of Web Service-based Business Processes by Model Transformations Dependability Analysis of Web Service-based Business Processes by Model Transformations László Gönczy 1 1 DMIS, Budapest University of Technology and Economics Magyar Tudósok krt. 2. H-1117, Budapest,

More information

"Charting the Course... MOC A Deploying Voice Workloads for Skype for Business Online and Server Course Summary

Charting the Course... MOC A Deploying Voice Workloads for Skype for Business Online and Server Course Summary Description Course Summary This five-day instructor-led course teaches how to design, plan, and deploy the various voice solutions available with Skype for Business Online and Skype for Business Server

More information

BGP Configuration Automation on Edge Routers

BGP Configuration Automation on Edge Routers BGP Configuration Automation on Edge Routers System and Network Engineering Msc. Research Project Stella Vouteva & Tarcan Turgut Supervisor: Stavros Konstantaras, NLNetLabs Introduction Big Internet Depletion

More information

COMP9321 Web Application Engineering

COMP9321 Web Application Engineering COMP9321 Web Application Engineering Semester 1, 2017 Dr. Amin Beheshti Service Oriented Computing Group, CSE, UNSW Australia Week 12 (Wrap-up) http://webapps.cse.unsw.edu.au/webcms2/course/index.php?cid=2457

More information

Practical Semantic Applications Master Title for Oil and Gas Asset Reporting. Information Integration David Price, TopQuadrant

Practical Semantic Applications Master Title for Oil and Gas Asset Reporting. Information Integration David Price, TopQuadrant Practical Semantic Applications Master Title for Oil and Gas Asset Reporting Life Click Cycle to Data edit Master Management subtitle and style Information Integration David Price, TopQuadrant Key Presentation

More information

Chapter 4 Research Prototype

Chapter 4 Research Prototype Chapter 4 Research Prototype According to the research method described in Chapter 3, a schema and ontology-assisted heterogeneous information integration prototype system is implemented. This system shows

More information

Context-aware Semantic Middleware Solutions for Pervasive Applications

Context-aware Semantic Middleware Solutions for Pervasive Applications Solutions for Pervasive Applications Alessandra Toninelli alessandra.toninelli@unibo.it Università degli Studi di Bologna Department of Electronics, Information and Systems PhD Course Infrastructure and

More information

Using Link Layer Discovery Protocol in Multivendor Networks

Using Link Layer Discovery Protocol in Multivendor Networks Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates

More information

Semantic Web and Natural Language Processing

Semantic Web and Natural Language Processing Semantic Web and Natural Language Processing Wiltrud Kessler Institut für Maschinelle Sprachverarbeitung Universität Stuttgart Semantic Web Winter 2014/2015 This work is licensed under a Creative Commons

More information

Using Link Layer Discovery Protocol in Multivendor Networks

Using Link Layer Discovery Protocol in Multivendor Networks Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates

More information

Ontology mutation testing

Ontology mutation testing Ontology mutation testing February 3, 2016 Cesare Bartolini Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg Outline 1 Mutation testing 2 Mutant generation 3

More information

Semantic Technologies and CDISC Standards. Frederik Malfait, Information Architect, IMOS Consulting Scott Bahlavooni, Independent

Semantic Technologies and CDISC Standards. Frederik Malfait, Information Architect, IMOS Consulting Scott Bahlavooni, Independent Semantic Technologies and CDISC Standards Frederik Malfait, Information Architect, IMOS Consulting Scott Bahlavooni, Independent Part I Introduction to Semantic Technology Resource Description Framework

More information

Service Level Agreement

Service Level Agreement General This document is a (SLA) setting out the indicative levels of services to be provided to you by Luminet. This document must be read in conjunction with our standard Terms and Conditions of Service

More information

Agent Framework For Intelligent Data Processing

Agent Framework For Intelligent Data Processing Agent Framework For Intelligent Data Processing Rahul Ramachandran, Sara Graves, Sunil Movva and Xiang Li Information Technology and Systems Center University of Alabama in Huntsville rramachandran@itsc.uah.edu

More information

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul

More information

An ontology for the Business Process Modelling Notation

An ontology for the Business Process Modelling Notation An ontology for the Business Process Modelling Notation Marco Rospocher Fondazione Bruno Kessler, Data and Knowledge Management Unit Trento, Italy rospocher@fbk.eu :: http://dkm.fbk.eu/rospocher joint

More information

SAWSDL Status and relation to WSMO

SAWSDL Status and relation to WSMO Leopold Franzens Universität Innsbruck SAWSDL Status and relation to WSMO Jacek Kopecký DERI Innsbruck University of Innsbruck Copyright 2007 DERI Innsbruck www.deri.at Overview Semantic Annotations for

More information

Semantic agents for location-aware service provisioning in mobile networks

Semantic agents for location-aware service provisioning in mobile networks Semantic agents for location-aware service provisioning in mobile networks Alisa Devlić University of Zagreb visiting doctoral student at Wireless@KTH September 9 th 2005. 1 Agenda Research motivation

More information

ISO Geometry Templates using OWL

ISO Geometry Templates using OWL ISO 15926 Geometry Templates using OWL Manoj Dharwadkar, Ph.D. Director, Data Interoperability Bentley Systems Inc. (Chair: PCA Geometry SIG) June 2nd, Semantic Days 2010 Content ISO 15926 and Reference

More information

Presented By Aditya R Joshi Neha Purohit

Presented By Aditya R Joshi Neha Purohit Presented By Aditya R Joshi Neha Purohit Pellet What is Pellet? Pellet is an OWL- DL reasoner Supports nearly all of OWL 1 and OWL 2 Sound and complete reasoner Written in Java and available from http://

More information

Configuring IP Multicast Routing

Configuring IP Multicast Routing 34 CHAPTER This chapter describes how to configure IP multicast routing on the Cisco ME 3400 Ethernet Access switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive

More information

Joining the BRICKS Network - A Piece of Cake

Joining the BRICKS Network - A Piece of Cake Joining the BRICKS Network - A Piece of Cake Robert Hecht and Bernhard Haslhofer 1 ARC Seibersdorf research - Research Studios Studio Digital Memory Engineering Thurngasse 8, A-1090 Wien, Austria {robert.hecht

More information

CONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION

CONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION CONTENT MODEL FOR MOBILE ADAPTATION OF MULTIMEDIA INFORMATION Maija Metso, Antti Koivisto and Jaakko Sauvola MediaTeam, MVMP Unit Infotech Oulu, University of Oulu e-mail: {maija.metso, antti.koivisto,

More information

802.1Qcc findings. Astrit Ademaj. Sept 2018

802.1Qcc findings. Astrit Ademaj. Sept 2018 802.1Qcc findings Astrit Ademaj astrit.ademaj@tttech.com Sept 2018 Background Present Qcc findings - mainly related to but not limited to centralized configuration model Information sharing, with the WG

More information

Next generation branch with SD-WAN and NFV

Next generation branch with SD-WAN and NFV Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark

More information

Chapter 5: Inter-VLAN Routing. Routing & Switching

Chapter 5: Inter-VLAN Routing. Routing & Switching Chapter 5: Inter-VLAN Routing Routing & Switching What is Inter-VLAN routing? Layer 2 switches cannot forward traffic between VLANs without the assistance of a router. Inter-VLAN routing is a process for

More information

The Semantic Web Revisited. Nigel Shadbolt Tim Berners-Lee Wendy Hall

The Semantic Web Revisited. Nigel Shadbolt Tim Berners-Lee Wendy Hall The Semantic Web Revisited Nigel Shadbolt Tim Berners-Lee Wendy Hall Today sweb It is designed for human consumption Information retrieval is mainly supported by keyword-based search engines Some problems

More information

Explain how cloud technologies are changing the design, deployment, and management of voice architectures.

Explain how cloud technologies are changing the design, deployment, and management of voice architectures. Course Outline Module 1: Introduction to Voice Workloads Designing a Skype for Business voice solution requires the understanding of many technologies. With Microsoft s latest cloud based voice services,

More information