Mixed Critical Architecture Requirements (MCAR)
|
|
- Robyn Holland
- 5 years ago
- Views:
Transcription
1 Superior Products Through Innovation Approved for Public Release; distribution is unlimited. (PIRA AER ) Mixed Critical Architecture Requirements (MCAR) Copyright 2009 Lockheed Martin Corporation Lockheed Martin Aeronautics
2 Mixed Critical Architecture Requirements MCAR (LM Aero Team) Technical Approach Explore the expansion of middleware to include services that are made of both safe and secure components. This new MCAM will become a modular/extendable framework for the blended/mixed environment of flight critical and mission critical systems of future UASs. Technical Challenge How to isolate/blend the safety and security middleware services? What areas need to be addressed by academia? Robust partitioning of services beyond the current time and space partitions. What innovations are needed? New methods and tools for multi-core processor to expand middleware to support these, composable certification and support for multi-levels of scheduling to support mixed critical environment. Program Information Current Status is that our team is writing the final report. MCAR requirements phase and baseline architecture is Scheduled to be completed in Summer of POCs: Craig Treece, (817) Craig.S.Treece@lmco.com Peter Stanfill, (817) Peter.O.Stanfill@lmco.com 2
3 Lockheed Martin Team 3
4 MCAR Scope 4
5 MCAR Overview 5
6 Basic Definitions Application Domain specific computer program Not infrastructure Platform Hardware/software environment for executing applications Infrastructure May itself consist of multiple programs RTOS, middleware, other Provides basic services and domain specific services Provides time, space and resource partitioning Should provide a standard API 6
7 Reference Platform Architecture App App Platform Application Programming Interface (API) Node Management Time Partition Management App Management Task Management Messaging Domain Specific Services Fault Handling/ Reporting Time Discrete I/O Legacy I/O File System 2D/3D Graphics NVM/Log Shared Memory Encryption Math Algorithms Built-in-test (BIT) 7
8 Services - General Goals Orthogonal Minimize size Avoid duplication Composable Compose low level services to implement high level services Compose across service categories Parameterized Increase reuse of software Supports composition of services Certifiable Synthesis - reuse of certified components Analysis - proof of overall correctness 8
9 Safety/Fault Tolerance - Service Categories Redundancy Management Replication (static & dynamic) Source selection Value distribution Fault Detection Presence and validity Monitoring Voting Fault Containment Fault masking Partitioning Fault Recovery Condemnation & readmission Migration Consensus Leader selection Clock synchronization Global state 9
10 Security - Service Categories Authentication Sensor inputs, command inputs, maintenance Denial of Service Key management Encryption Partitioning Multiple security levels Intrusion Detection, prevention, mitigation Anti-Tamper Loss of vehicle, maintenance 10
11 Design for Certification Technology Branches Design For Certification Developing the system architecture, development processes, and tools to minimize the cost of certification and recertification Non-Interference Abstraction Composition Automation Fault Tolerance Partitioning Standard Platform API Virtual Machine Architectural Modeling Compositional Analysis Product Families Safety Case Model Checking Compositional Verification Unified Testing & Analysis DO-178B Issues Qualified Compiler Branches are not mutually exclusive. Qualified Code Generator 11
12 Branch Definitions Non-Interference Ensuring that components cannot interfere with the behavior of other components Abstraction Enabling portability, minimizing DMS issues Composition Specifying how components can be assembled to implement a subsystem or system with known behavior Automation Developing tools and techniques that reduce the cost of verification. certification, re-certification 12
13 Fault Tolerance Technologies Non-Interference Fault Tolerance Sensor Fusion Run-Time Monitoring Pre-certified RM Platform Analytical Redundancy Qualified Signal Management Multi-thread Redundancy Cooperative Redundancy 13
14 Cooperative Redundancy Management Consider: A Flight of Interlinked Aircraft Goal: Leverage Entire Suite of System Sensors to the Benefit of Individual Aircraft Technique: Merge Onboard Data With Intra-flight Data Sources to Increase Redundancy Benefits Evolutionary Concept to Sensor Fusion Reduce Onboard Redundancy While Maintaining System Redundancy Loss of Onboard Data Causes Mission Changes, Not Loss Of Aircraft System Maturation Allows Future Reductions In Onboard Redundancy Cheaper Aircraft Allows More Flexible Mission Profiles (UAV Swarms) Disadvantages Not Extendable to all Flight Critical Parameters Requires Balancing Mission Profiling and Flight Safety Requirements 14
15 Cooperative Redundancy Management (Cont.) Cooperative RM Design Considerations Data Link Between Aircraft Determination of Data Proximity [Off-board Data Considered Valid] Determination of Data Trust [Off-board Data Considered Secure] System Logic to Control Extent of Data Fusion Impact Individual UAV Duplex Air Data Sensor Suite Single Failure: Difficult To Isolate With Divergent Sensors Dual Failure: Loss Of Aircraft Flight of Two UAVs Example Single Onboard Failure of P s (Static Pressure) Use Off-board Selected P s As Tiebreaker for Isolation Off-board Value Not Used In First Layer of Flight Criticality Dual Onboard Failure of P s Use Off-board Selected P s As Onboard Value Adopt Flight Restriction / Mission Modification To Maintain Flight Safety 15
16 Summary Next Generation Aircraft Require Mixed-Critical Architectures New Technologies Are Required to Certify Upcoming UAV Concepts Problem Growing Faster than Ability to Resolve It Increased Costs Longer Schedules Next Steps for Success Are Clear Requires Cooperation Across Disciplines, Industries, and Academia Next Generation Aircraft Will Be Developed at Reduced Cost 16
17 MCAR Questions? Chart Number 17
18
A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction
A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one
More informationWhat is Software Architecture
What is Software Architecture Is this diagram an architecture? (ATM Software) Control Card Interface Cash Dispenser Keyboard Interface What are ambiguities in the previous diagram? Nature of the elements
More informationPattern-Based Analysis of an Embedded Real-Time System Architecture
Pattern-Based Analysis of an Embedded Real-Time System Architecture Peter Feiler Software Engineering Institute phf@sei.cmu.edu 412-268-7790 Outline Introduction to SAE AADL Standard The case study Towards
More informationModel-based Architectural Verification & Validation
Model-based Architectural Verification & Validation Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Peter H Feiler Feb. 2009 2006 Carnegie Mellon University Outline Architecture-Centric
More informationDEPARTMENT OF COMPUTER SCIENCE
Department of Computer Science 1 DEPARTMENT OF COMPUTER SCIENCE Office in Computer Science Building, Room 279 (970) 491-5792 cs.colostate.edu (http://www.cs.colostate.edu) Professor L. Darrell Whitley,
More informationSAE AS5643 and IEEE1394 Deliver Flexible Deterministic Solution for Aerospace and Defense Applications
SAE AS5643 and IEEE1394 Deliver Flexible Deterministic Solution for Aerospace and Defense Applications Richard Mourn, Dap USA Inc. AS5643 coupled with IEEE-1394 Asynchronous Stream capability provides
More informationCourse Curriculum for Master Degree in Network Engineering and Security
Course Curriculum for Master Degree in Network Engineering and Security The Master Degree in Network Engineering and Security is awarded by the Faculty of Graduate Studies at Jordan University of Science
More informationData Model Considerations for Radar Systems
WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,
More informationDistributed IMA with TTEthernet
Distributed IMA with thernet ARINC 653 Integration of thernet Georg Gaderer, Product Manager Georg.Gaderer@tttech.com October 30, 2012 Copyright TTTech Computertechnik AG. All rights reserved. Introduction
More informationTest and Evaluation of Autonomous Systems in a Model Based Engineering Context
Test and Evaluation of Autonomous Systems in a Model Based Engineering Context Raytheon Michael Nolan USAF AFRL Aaron Fifarek Jonathan Hoffman 3 March 2016 Copyright 2016. Unpublished Work. Raytheon Company.
More informationRA-GRS, 130 replication support, ZRS, 130
Index A, B Agile approach advantages, 168 continuous software delivery, 167 definition, 167 disadvantages, 169 sprints, 167 168 Amazon Web Services (AWS) failure, 88 CloudTrail Service, 21 CloudWatch Service,
More informationThe BCT Test Bus Card
The BCT-302 1553 Test Bus Card Louis Natale, Sr. Staff Engineer Lockheed Martin Aeronautics Marietta, GA USA Craig Wierzbicki, Technical Manager Embedded Software, Network Products Division Teletronics
More information69 th IFIP WG 10.4 Meeting Dependability & IoT
69 th IFIP WG 10.4 Meeting Dependability & IoT Systems of Systems (SoS) RMA&D Requirements Decomposition Aspen / Snowmass, Co Jan 11-15, 2016 John Perazza Lockheed Martin Fellow Biography John Perazza
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationData-Centric Architecture for Space Systems
Data-Centric Architecture for Space Systems 3 rd Annual Workshop on Flight Software, Nov 5, 2009 The Real-Time Middleware Experts Rajive Joshi, Ph.D. Real-Time Innovations Our goals are the same but not
More informationDual Redundant Flight Control System Design for Microminiature UAV Xiao-Lin ZHANG 1,a, Hai-Sheng Li 2,b, Dan-Dan YUAN 2,c
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) Dual Redundant Flight Control System Design for Microminiature UAV Xiao-Lin ZHANG 1,a, Hai-Sheng Li 2,b, Dan-Dan
More informationMILS Multiple Independent Levels of Security. Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho
MILS Multiple Independent Levels of Security Carol Taylor & Jim Alves-Foss University of Idaho Moscow, Idaho United states December 8, 2005 Taylor, ACSAC Presentation 2 Outline Introduction and Motivation
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationNon-uniform memory access machine or (NUMA) is a system where the memory access time to any region of memory is not the same for all processors.
CS 320 Ch. 17 Parallel Processing Multiple Processor Organization The author makes the statement: "Processors execute programs by executing machine instructions in a sequence one at a time." He also says
More informationOracle Solaris Virtualization: From DevOps to Enterprise
Oracle Solaris Virtualization: From DevOps to Enterprise Duncan Hardie Principal Product Manager Oracle Solaris 17 th November 2015 Oracle Confidential Internal/Restricted/Highly Restricted Safe Harbor
More informationDrive-by-Data & Integrated Modular Platform
Drive-by-Data & Integrated Modular Platform Gernot Hans, Bombardier Transportation Mirko Jakovljevic, TTTech Computertechnik AG CONNECTA has received funding from the European Union s Horizon 2020 research
More informationIBM Compose Managed Platform for Multiple Open Source Databases
IBM Compose Managed Platform for Multiple Source Databases Source for Source for Data Layer Blueprint with Compose Source for Comprehensive Catalogue for Simplified Scoping Scalable Platform for FutureProof
More informationA Secure Update Architecture for High Assurance Mixed-Criticality System Don Kuzhiyelil Dr. Sergey Tverdyshev SYSGO AG
A Secure Update Architecture for High Assurance Mixed-Criticality System Don Kuzhiyelil Dr. Sergey Tverdyshev SYSGO AG SYSGO AG 1 Secure Software Update Unified Diagnostic Services DiagnosticsSessionControl
More informationCisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services
Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business
More informationDesigning Fault Management in Spaceflight Architectures
Designing Fault Management in Spaceflight Architectures Chris J. Walter cwalter@wwtechnology.com (410) 418-4353 Challenges NASA architectures affected by trends in current computing architectures Network
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationBeOn Security Cybersecurity for Critical Communications Systems
WHITEPAPER BeOn Security Cybersecurity for Critical Communications Systems Peter Monnes System Design Engineer Harris Corporation harris.com #harriscorp TABLE OF CONTENTS BeOn Security... 3 Summary...
More informationDefinition of RAID Levels
RAID The basic idea of RAID (Redundant Array of Independent Disks) is to combine multiple inexpensive disk drives into an array of disk drives to obtain performance, capacity and reliability that exceeds
More informationSecurity: The Key to Affordable Unmanned Aircraft Systems
AN INTEL COMPANY Security: The Key to Affordable Unmanned Aircraft Systems By Alex Wilson, Director of Business Development, Aerospace and Defense WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY
More informationSOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE
SOFTWARE ARCHITECTURES ARCHITECTURAL STYLES SCALING UP PERFORMANCE Tomas Cerny, Software Engineering, FEE, CTU in Prague, 2014 1 ARCHITECTURES SW Architectures usually complex Often we reduce the abstraction
More informationSafety and Reliability of Software-Controlled Systems Part 14: Fault mitigation
Safety and Reliability of Software-Controlled Systems Part 14: Fault mitigation Prof. Dr.-Ing. Stefan Kowalewski Chair Informatik 11, Embedded Software Laboratory RWTH Aachen University Summer Semester
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationCprE 458/558: Real-Time Systems. Lecture 17 Fault-tolerant design techniques
: Real-Time Systems Lecture 17 Fault-tolerant design techniques Fault Tolerant Strategies Fault tolerance in computer system is achieved through redundancy in hardware, software, information, and/or computations.
More informationIoT It s All About Security
IoT It s All About Security Colin Walls colin_walls@mentor.com Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark of Linus Torvalds
More informationApplication of FPGA technology in NicSys8000N platform. Liu Zhikai Oct. 14,2015
Application of FPGA technology in NicSys8000N platform Liu Zhikai Oct. 14,2015 Presentation Overview Introduction Structure of NicSys8000N platform FPGA technology strengthen the NicSys8000N platform comprehensively
More informationComplexity-Reducing Design Patterns for Cyber-Physical Systems. DARPA META Project. AADL Standards Meeting January 2011 Steven P.
Complexity-Reducing Design Patterns for Cyber-Physical Systems DARPA META Project AADL Standards Meeting 24-27 January 2011 Steven P. Miller Delivered to the Government in Accordance with Contract FA8650-10-C-7081
More informationDeos SafeMCTM. - Flight Software Workshop - Thursday December 7 th, Safety Critical Software Solutions for Mission Critical Systems
Deos SafeMCTM Real-Time DO 178C DAL A Operating System for Safety-Critical Multicore Avionics Systems (ARINC 653 and RTEMS POSIX APIS) Presenter : Theresa Rickman Military Aerospace Accounts - Flight Software
More informationSystems Engineering and System Security Engineering Requirements Analysis and Trade-Off Roles and Responsibilities
Systems Engineering and System Security Engineering Requirements Analysis and Trade-Off Roles and Responsibilities Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering
More informationCHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating system? A collection of software modules to assist programmers in enhancing system efficiency, flexibility, and robustness An Extended Machine
More informationThe ROS 2 Vision For Advancing the Future of Robotics Development
The ROS 2 Vision For Advancing the Future of Robotics Development Sep. 21st 2017 Dirk Thomas, Mikael Arguedas ROSCon 2017, Vancouver, Canada "Unboxing" Icons made by Freepik from www.flaticon.com is licensed
More informationUsing a Hypervisor to Manage Multi-OS Systems Cory Bialowas, Product Manager
Using a Hypervisor to Manage Multi-OS Systems Cory Bialowas, Product Manager cory.bialowas@windriver.com Trends, Disruptions and Opportunity Wasn t life simple? Single-OS: SMP OS OS CPU Single Core Virtualization
More informationDATA ITEM DESCRIPTION
DATA ITEM DESCRIPTION Title: RELIABILITY AND MAINTAINABILITY (R&M) BLOCK DIAGRAMS AND MATHEMATICAL MODELS REPORT Number: DI-SESS-81496A Approval Date: 20141219 AMSC Number: 9508 Limitation: No DTIC Applicable:
More informationTwilio cloud communications SECURITY
WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and
More informationSmart Payments. Generating a seamless experience in a digital world.
Smart Payments Generating a seamless experience in a digital world www.infineon.com/payment Trends Rising need for security The trends highlighted opposite are heightening the need for security and performance,
More informationAutomation systems. Scalable performance for every requirement
Scalable performance for every requirement Designs of the SIMATIC PCS 7 automation systems: S7-400 system (left), modular embedded system (center), and Microbox system (right) in the three designs shown
More informationREALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware
REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market
More informationDEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING UNIT-1
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester Section Subject Code Subject Name Degree & Branch : I & II : M.E : CP7204 : Advanced Operating Systems : M.E C.S.E. 1. Define Process? UNIT-1
More informationExperion LX Purpose-built DCS. Honeywell Proprietary
Experion LX Purpose-built DCS Honeywell s New DCS Experion LX Purpose- Built On Honeywell s Reliable DCS Platform Delivered Through Authorized Partners Experion LX: Proven Technology Purpose Built DCS
More informationReaching for the sky with certified and safe solutions for the aerospace market
www.tttech.com/aerospace Reaching for the sky with certified and safe solutions for the aerospace market More about our certified and safe products inside Advancing safe technologies, improving human lives
More informationOpenFog Reference Architecture. Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member
OpenFog Reference Architecture Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member My background Associate Research Scholar at Princeton
More informationARM TrustZone for ARMv8-M for software engineers
ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline
More informationSensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016
Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused
More informationIPMA State of Washington. Disaster Recovery in. State and Local. Governments
IPMA State of Washington Disaster Recovery in State and Local Governments Disaster by the Numbers Over 70% of agencies had some sort of data loss incident in 2012 Under 5% report that they were able to
More informationQualitative Evaluation of Fault Hypotheses with Non- Intrusive Fault Injection
Qualitative Evaluation of Fault Hypotheses with Non- Intrusive Fault Injection Jelena Frtunikj, Joachim Fröhlich, Tim Rohlfs, Alois Knoll fortiss GmbH An-Institut Technische Universität München Goal: Tests
More informationChapter 39: Concepts of Time-Triggered Communication. Wenbo Qiao
Chapter 39: Concepts of Time-Triggered Communication Wenbo Qiao Outline Time and Event Triggered Communication Fundamental Services of a Time-Triggered Communication Protocol Clock Synchronization Periodic
More informationMigration. 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1
22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/
More informationDependability. IC Life Cycle
Dependability Alberto Bosio, Associate Professor UM Microelectronic Departement bosio@lirmm.fr IC Life Cycle User s Requirements Design Re-Cycling In-field Operation Production 2 1 IC Life Cycle User s
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies.
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline
More informationApplying Plantwide Industrial Wireless Communications for Cost Savings. Copyright 2012 Rockwell Automation, Inc. All rights reserved.
Applying Plantwide Industrial Wireless Communications for Cost Savings Rev 5058-CO900C Abstract New cost savings across multiple industries are now possible by leveraging recent developments in both Integrated
More informationMILS Middleware: High Assurance Security for Real-time, Distributed Systems
2001 Objective Interface Systems, Inc. MILS Middleware: High Assurance Security for Real-time, Distributed Systems Bill Beckwith bill.beckwith@ois.com Objective Interface Systems, Inc. 13873 Park Center
More informationMulti-Band (Ku, C, Wideband - Satcom, Narrowband Satcom) Telemetry Test System for UAV Application
Multi-Band (Ku, C, Wideband - Satcom, Narrowband Satcom) Telemetry Test System for UAV Application Murat IMAY Turkish Aerospace Ind, Inc. Ankara, Turkey mimay@tai.com.tr, muratimay@gmail.com ABSTRACT "This
More informationProcessor Affinity or Bound Multiprocessing? Easing the Migration to Embedded Multicore Processing
Easing the Migration to Embedded Multicore Processing Shiv Nagarajan, Ph.D. Nicola Vulpe, Ph.D. shiv@qnx.com, nvulpe@qnx.com Abstract Thanks to higher computing power and system density at lower clock
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationDistributed Systems Question Bank UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems?
UNIT 1 Chapter 1 1. Define distributed systems. What are the significant issues of the distributed systems? 2. What are different application domains of distributed systems? Explain. 3. Discuss the different
More informationBedrock OSA Features and Benefits
Bedrock OSA Features and Benefits Bedrock OSA Features and Benefits - 0217 Page 1 of 9 1. Backplane Module Interconnect, (BMI) Bedrock OSA BMI Features Sealed all-metal construction. Electronically passive,
More informationApplied Architectures, Part 2
Applied Architectures, Part 2 Lecture 18 Copyright Richard N. Taylor, Nenad Medvidovic, and Eric M. Dashofy. All rights reserved. Decentralized Architectures Networked applications where there are multiple
More informationITU activities on secure vehicle software updates
Submitted by the expert form ITU Document No. ITS/AD-08-08 (8 th ITS/AD, 9 March 2016, agenda item 4) ITU activities on secure vehicle software updates 8 th meeting of IWG ITS/AD 9 March 2016 T.Russell
More informationSoftware Architecture. Definition of Software Architecture. The importance of software architecture. Contents of a good architectural model
Software Architecture Definition of Software Architecture Software architecture is process of designing g the global organization of a software system, including: Dividing software into subsystems. Deciding
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationWHAT IS SOFTWARE ARCHITECTURE?
WHAT IS SOFTWARE ARCHITECTURE? Chapter Outline What Software Architecture Is and What It Isn t Architectural Structures and Views Architectural Patterns What Makes a Good Architecture? Summary 1 What is
More informationMark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services
Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience
More informationSecurity
Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from
More informationAccelerating Data Center Virtualization with Cisco Services. Mark Milinkovich Director, WWTP Advanced Services, Data Center
Accelerating Data Center Virtualization with Cisco Services Mark Milinkovich Director, WWTP Advanced Services, Data Center 1 Data Center Services Capabilities Architecture Application Operations & Management
More informationEnd-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration
End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration Dr. Andreas Hauser Director Digital Service, TÜV SÜD Tokyo, 21 February 2017 Corporate Profile Slide 2 Our heritage: 150
More informationMULTIFUNCTION AIRCRAFT FLIGHT SURFACE BETTER AVIONICS VERIFICATION TOOL ELECTRONIC CONTROL UNIT TEST SYSTEM: A. Project Goals
MULTIFUNCTION AIRCRAFT FLIGHT SURFACE ELECTRONIC CONTROL UNIT TEST SYSTEM: A BETTER AVIONICS VERIFICATION TOOL Modern avionics exemplify safety and mission-critical, dependable systems. These systems continue
More informationDesign Specification
MethodA Version: 10 Design Specification < S y s t e m N a m e > This document defines the that is proposed to serve the for the purpose(s) of < >. Implementation
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationHPE Nimble Storage HF20 Adaptive Dual Controller 10GBASE-T 2-port Configure-to-order Base Array (Q8H72A)
Digital data sheet HPE Nimble Storage HF20 Adaptive Dual Controller 10GBASE-T 2-port Configure-to-order Base Array (Q8H72A) Disk Storage Systems What's new Inline variable block deduplication and compression
More informationData Acquisition, Processing, Analytics, and Display
Data Acquisition, Processing, Analytics, and Display Ground support software and equipment for complex aerospace platforms The Power of insight Monitor Control Test Satellites, launch vehicles, aircraft,
More informationExam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.
Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer
More informationDistributed Meta-data Servers: Architecture and Design. Sarah Sharafkandi David H.C. Du DISC
Distributed Meta-data Servers: Architecture and Design Sarah Sharafkandi David H.C. Du DISC 5/22/07 1 Outline Meta-Data Server (MDS) functions Why a distributed and global Architecture? Problem description
More informationABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data
RnD Consulting LLC 957 Route 33 PMB 143 Hamilton Square, NJ 08690 Tel. (800) 949-8215 Fax. (609) 586-1712 mike@rndconsultingnj.com josh@rndconsultingnj.com ABOUT US A Legacy of Providing Solutions With
More informationClient Server & Distributed System. A Basic Introduction
Client Server & Distributed System A Basic Introduction 1 Client Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Source: http://webopedia.lycos.com
More informationEliminating Single Points of Failure in Software Based Redundancy
Eliminating Single Points of Failure in Software Based Redundancy Peter Ulbrich, Martin Hoffmann, Rüdiger Kapitza, Daniel Lohmann, Reiner Schmid and Wolfgang Schröder-Preikschat EDCC May 9, 2012 SYSTEM
More informationMulti-Board Systems Design
Multi-Board Systems Design D A T A S H E E T MAJOR BENEFITS: Xpedition optimizes multi-board system design from logical system definition through manufacturing. Overview Electronic multi-board systems
More informationSimplifying Downtime Prevention for Industrial Plants. A Guide to the Five Most Common Deployment Approaches
Simplifying Downtime Prevention for Industrial Plants A Guide to the Five Most Common Deployment Approaches Simplifying Downtime Prevention for Industrial Plants: A Guide to the Five Most Common Deployment
More informationIPCOM EX Series for Realizing Network Stability and Safety
IPCOM EX Series for Realizing Stability and Safety V Shoji Temma (Manuscript received June 8, 2007) Stability and safety are essential requirements in today s enterprise IT systems. This paper discusses
More informationMicroNet TMR Control System
Product Specification 03363 (Rev. C) MicroNet TMR Control System Applications The MicroNet TMR (triple modular redundant) controller is a state-of-the-art digital control platform designed to reliably
More informationExam C Foundations of IBM Cloud Reference Architecture V5
Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles
More informationThe MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems
The MILS Partitioning Communication System + RT CORBA = Secure Communications for SBC Systems Kevin Buesing Objective Interface Systems Field Applications Engineer kevin.buesing@ois.com Jeff Chilton Objective
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationThe Business Value of Virtualizing Oracle ebusiness Suite. Haroon Qureshi QSolve, Inc.
The Business Value of Virtualizing Oracle ebusiness Suite Haroon Qureshi QSolve, Inc. hqureshi@qsolveinc.com http://www.qsolveinc.com Agenda Introductions Introduction to Virtualization Challenges with
More informationDeclarative Self-Expand Service Access Framework for NASA Mission Users
Declarative Self-Expand Service Access Framework for NASA Mission Users Rose Pajerski, Jinghong J. Chen, David Warren, Keiji Tasaki, Senior Scientist, Fraunhofer Center for Experimental Software Engineering,
More informationThe vsphere 6.0 Advantages Over Hyper- V
The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted
More informationCreate the ideal conditions for your network to grow.
Create the ideal conditions for your network to grow. Create the ideal conditions for your network to grow. SBC PremierSERV SM Network Integration and Managed Services. Flexible, end-to-end solutions
More informationMetadata Architectures
Metadata Architectures Evaluating Metadata Architectures Introduction The IT world has practiced metadata management in one form or another for more than twenty years. IT has developed three models for
More informationTU Wien. Shortened by Hermann Härtig The Rationale for Time-Triggered (TT) Ethernet. H Kopetz TU Wien December H. Kopetz 12.
TU Wien 1 Shortened by Hermann Härtig The Rationale for Time-Triggered (TT) Ethernet H Kopetz TU Wien December 2008 Properties of a Successful Protocol 2 A successful real-time protocol must have the following
More informationThird annual ITU IMT-2020/5G Workshop and Demo Day 2018
All Sessions Outcome Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 Geneva, Switzerland, 18 July 2018 Session 1: IMT-2020/5G standardization (part 1): activities and future plan in ITU-T SGs 1.
More information