Towards a Unified Architecture for Resilience, Survivability and Autonomic Fault-Management for Self-Managing Networks

Size: px
Start display at page:

Download "Towards a Unified Architecture for Resilience, Survivability and Autonomic Fault-Management for Self-Managing Networks"

Transcription

1 Towards a Unified Architecture for Resilience, Survivability and Autonomic Fault-Management for Self-Managing Networks Nikolay Tcholtchev, Monika Grajzer 2, Bruno Vidalenc 3 Nikolay.Tcholtchev@fokus.fraunhofer.de, mgrajzer@telcordia.com, Bruno.Vidalenc@alcatel-lucent.com Fraunhofer FOKUS Institute for Open Communication Systems, Germany. 2 Telcordia Poland 3 Alcatel-Lucent France

2 Overview Introduction The GANA architecture for autonomic networks The architecture for Fault Management, Resilience & Survivability components The overal framework architecture an overview Summary MONA+ workshop, 24. November

3 Introduction Motivation: accommodate the plethora of existing intrinsic multi-layer resilient mechanisms Exploit relation to Autonomic Fault-Management to achieve more powerful solution address autonomic networks Improve applications and services performance by the increased robustness of the network layer Goal: propose a generic, system- and self-aware solution the unified architectural framework Examplary situation: router failure MONA+ workshop, 24. November

4 Introduction Relations between Resilience, Survivability and Fault-Management: Fault-Detection Fault-Isolation Fault-Removal is realized by (Autonomic) Fault-Management consist of Is a subset of Reactive Resilience Fault-Masking Survivability Resilience Proactive Resilience MONA+ workshop, 24. November

5 The GANA architecture - autonomicity in networking GANA Generic Autonomic Network Architecture the reference model Designed to provide autonomicity Components: Decision Element (DE), Managed Entity (ME) Concept of a control loop Hierarchical control loops structure (Protocol Level, Funcions Level, Node Level, Network Level) MONA+ workshop, 24. November

6 The architecture - requirements MONA+ workshop, 24. November

7 The architectural components Resilience & Survivability DE Functionality: Supporting generic Resilience and Survivability functions within an autonomic node Node-level DE access to all lover-level DEs and to global, node-intrinsic knowledge RS_DE acts in a fault-tolerant manner and orchestrates resilient mechanisms of the selected node entities Manages the resilient behaviour of other node entities (MEs and DEs) Interactions and interoperation with FM_DE Information required for operation: detected fault/error/failure/alarm (node intrinsic repositories) isolated faults and the Fault-Removal process (FM_DE) resilient mechanisms implemented intrinsically inside the MEs in a node (Multi-Layer Resilience Properties Repository -MLRPR) MONA+ workshop, 24. November

8 The architectural components Resilience & Survivability DE Internal components: Fault Masking Functions (FMF) block reactive resilience: Reacts to already detected incidents triggers diverse reactive faultmasking mechanisms Risk Assessment Module (RAM) proactive resilience Reacts to incidents that are likely to happen in the future tries to predict the occurrence of certain incidents in the near future and is proactively steering the node entities - the node and/or network can prepare for the upcoming problems dynamically improving the Causality Model FM_DE Repositories for faults/errors/failures/alarms RS_DE FMF Causality Model Repository (CMR) manages RAM Multi-Layer Resilience Properties Repository Lower level MEs and DEs MONA+ workshop, 24. November

9 The architectural components Fault Management DE Functionality: triggered when symptoms/anomalies indicating the presence of faults in the network are detected Fault-Isolation Fault-Removal Information required for operation: detected fault/error/failure/alarm (node intrinsic repositories) causal relationships between events in the network (Causality Model Repository -CMR) dependencies among nodes/devices, protocol modules, and services (Dependability Models Repository -DMR) MONA+ workshop, 24. November

10 The architectural components Fault Management DE Internal components: Fault-Diagnosis/Localization/Isolation block (FDLI functions): finds the root cause for the observed symptoms based on fault propagation models represented by a Causality Model Fault-Removal Functions block (FRF) Removes the isolated fault Exemplary actions: reload a functional entity, reboot a node/device, reconfigure a functional entity (very often time consuming) Fault Removal Assessment Functions (FRAF): Gives the feedback information about the performance/result of the fault removal process Employs probing and network debugging methods or uses the risk assessment services provided by the RS_DE Action Synchronization Functions (ASF) Synchronizes the actions between FM_DE and RS_DE ensures stability MONA+ workshop, 24. November FM_DE FDLI functions Causality Model Repository (CMR) Dependability Model Repository (DMR) FRAF manages ASF FRF RS_DE Repositories for faults/errors/failures /alarms Lower level MEs and DEs

11 The overall framework architecture Autonomic Node: FM_DE Node_Main_DE ASF negotiate RS_DE supply information supply/consume FDLI functions FRAF FRF FMF RAM information Causality Model Repository (CMR) Dependability Model Repository (DMR) Multi-Layer Resilience Properties Repository manages Repositories for faults/errors/failures/alarms MEs and DEs, which appear as MEs to the Node_Main_DE manages Incident Information Dissemination Engine NETWORK MONA+ workshop, 24. November 2009

12 The overall framework architecture IDE and the network level Autonomic Node Node_Main_DE FM_DE ME (e.g. Routing DE) NetLevel RS_DE RS_DE NetLevel FM_DE Incident Information Dissemination Engine (IDE): Gives incident-related information to the other network components and services accommodates the notion of Survivability Requirements Network level RS_DE and FM_DE to address network level problems not resolvable in a distributed manner ME (e.g. OSPF) MONA+ workshop, 24. November

13 Summary Resilience, Survivability and Fault-Management are converging as Autonomic Networks are emerging Architectural Frameworks are required that define components addressing the converging aspects of the aforementioned functions address the fundamental processes of Fault-Management, i.e. Fault-Detection, Fault-Isolation, and Fault-Removal ensure the stability and effectiveness of the corresponding control loops ACHIEVE SELF-MANAGEMENT W.R.T. INCIDENTS Future steps: Implementation is ongoing FOKUS Future Internet Lab, TARC testbed Scenarios demonstration: IP black holes & duplex mismatch MONA+ workshop, 24. November

14 Thank you for your attention! Questions? MONA+ workshop, 24. November

15 There was once a young man who, in his youth, professed his desire to become a great writer. When asked to define great he said, I want to write stuff that the whole world will read, stuff that people will react to on a truly emotional level, stuff that will make them scream, cry, howl in pain and anger! He now works for a famous software producer, writing error messages MONA+ workshop, 24. November

16 Fault-Isolation Functions A is caused by B A p A, B B A error - fault E={,2,3,4,5,6,7,8} F={6,7,8} E\F={,2,3,4,5} MONA+ workshop, 24. November

17 Action Synchronization Functions NF ( t n 0 ) = wiqi ( t0 ) = w, Q( t0 ) i= The goal of the autonomic mechanisms is to optimize NF(t) throughout the operation of the network p = arg max p {0,} m n w ( q ( t + m i i 0 i = j = ) p j I ( i, j)) s.t. D m p c MONA+ workshop, 24. November

How Autonomic Fault-Management Can Address Current Challenges in Fault-Management Faced in IT and Telecommunication Networks

How Autonomic Fault-Management Can Address Current Challenges in Fault-Management Faced in IT and Telecommunication Networks How Autonomic Fault-Management Can Address Current Challenges in Fault-Management Faced in IT and Telecommunication Networks Ranganai Chaparadza 1, Nikolay Tcholtchev 1, and Vassilios Kaldanis 2 1 Fraunhofer

More information

ETSI-AFI work on SDN-oriented Enablers for Customizable Autonomic Management & Control in Evolving and Future Networks

ETSI-AFI work on SDN-oriented Enablers for Customizable Autonomic Management & Control in Evolving and Future Networks ETSI-AFI work on SDN-oriented Enablers for Customizable Autonomic Management & Control in Evolving and Future Networks ETSI 2013. All rights reserved ETSI AFI Activities & Roadmap Ranganai Chaparadza,

More information

Delivering Multimedia in Autonomic Networking Environments

Delivering Multimedia in Autonomic Networking Environments Delivering Multimedia in Autonomic Networking Environments Vassilios Kaldanis 1, Ranganai Chaparadza 2, Giannis Katsaros 1, and George Karantonis 1 1 VELTI S.A. Mobile Marketing and Advertising, 42 Kifissias

More information

Autonomic Computing. Pablo Chacin

Autonomic Computing. Pablo Chacin Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research

More information

No Industry 4.0 without Security

No Industry 4.0 without Security 24-04-2017 No Industry 4.0 without Security 24-04-2017 Introduction to Atos and Industry 4.0 Who is Atos? At a glance Revenue 2016 (M EUR) * Employees 2016 (Global) Employees 2016 (Germany) Countries 12,000

More information

Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language)

Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language) Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language) Ana Rugina, Karama Kanoun and Mohamed Kaâniche {rugina, kanoun, kaaniche}@laas.fr European Integrated Project

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Building Security Services on top of SDN

Building Security Services on top of SDN Building Security Services on top of SDN Gregory Blanc Télécom SudParis, IMT 3rd FR-JP Meeting on Cybersecurity WG7 April 25th, 2017 Keio University Mita Campus, Tokyo Table of Contents 1 SDN and NFV as

More information

AN APPROACH FOR FAULT MANAGEMENT BASED ON AUTONOMIC COMPUTING PLUS MOBILE AGENTS

AN APPROACH FOR FAULT MANAGEMENT BASED ON AUTONOMIC COMPUTING PLUS MOBILE AGENTS AN APPROACH FOR FAULT MANAGEMENT BASED ON AUTONOMIC COMPUTING PLUS MOBILE AGENTS Sergio Armando Gutiérrez, Ms.Eng 1, John Willian Branch, PhD 2 12 Facultad de Minas, Universidad Nacional de Colombia, Sede

More information

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair

More information

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks

Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline

More information

Chapter 8 Fault Tolerance

Chapter 8 Fault Tolerance DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 8 Fault Tolerance 1 Fault Tolerance Basic Concepts Being fault tolerant is strongly related to

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol

Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol Abdur Chowdhury 1,, Ophir Frieder 1, Paul Luse, Peng-Jun Wan 1 {abdur, wan, ophir}@cs.iit.edu, pluse@iitri.org

More information

ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE?

ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? Motivation, Approach, and Research Agenda Rolf Stadler and Gunnar Karlsson KTH, Royal Institute of Technology 164 40 Stockholm-Kista, Sweden {stadler,gk}@imit.kth.se

More information

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION

SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,

More information

Internet of Things 2018/2019

Internet of Things 2018/2019 Internet of Things 2018/2019 Resource Management for Dependable IoT Tanir Ozcelebi John Carpenter, 1982 1 What does resource management entail? Guiding questions What are the components of dependability?

More information

Distributed Control Systems (DCS)

Distributed Control Systems (DCS) Training Title Distributed Control Systems (DCS) Training Duration 5 days Training Venue and Dates Distributed Control Systems (DCS) 5 13-17 May $3,300 Abu Dhabi In any of the 5 star hotel. The exact venue

More information

Adaptive Failure Detection Timers for IGP Networks

Adaptive Failure Detection Timers for IGP Networks Networking 213 156972439 Adaptive Failure Detection Timers for IGP Networks Bruno Vidalenc Alcatel-Lucent Bell Labs, Nozay, France Bruno.Vidalenc@alcatel-lucent.com Samir Ghamri-Doudane Alcatel-Lucent

More information

Toward (SOS) Self-stabilizing Operating System

Toward (SOS) Self-stabilizing Operating System Toward (SOS) Self-stabilizing Operating System Shlomi Dolev and Reuven Yagel, Ben-Gurion University, Israel Sep. 1st SAACS 04 Workshop, Zaragoza Outline Motivation: current operating systems do not stabilize!

More information

CprE 458/558: Real-Time Systems. Lecture 17 Fault-tolerant design techniques

CprE 458/558: Real-Time Systems. Lecture 17 Fault-tolerant design techniques : Real-Time Systems Lecture 17 Fault-tolerant design techniques Fault Tolerant Strategies Fault tolerance in computer system is achieved through redundancy in hardware, software, information, and/or computations.

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

ProgrammableFlow White Paper. March 24, 2016 NEC Corporation

ProgrammableFlow White Paper. March 24, 2016 NEC Corporation March 24, 2016 NEC Corporation Contents Preface 3 OpenFlow and ProgrammableFlow 5 Seven Functions and Techniques in ProgrammableFlow 6 Conclusion 19 2 NEC Corporation 2016 Preface SDN (Software-Defined

More information

An object of research has changed System events System renewal Mathematical computer tools reliability dependability

An object of research has changed System events System renewal Mathematical computer tools reliability dependability Preface The conference DepCoS - RELCOMEX '06 is organized by the Institute of Computer Engineering, Control and Robotics (previously the Institute of Engineering Cybernetics), Wroclaw University of Technology.

More information

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead

AC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead AC2 CTC Investment Strategy Capt Brandon Keller, AFRL/RIS Acting CTC Lead Scope Covers monitor, assess, plan, and execute processes within and across air, space, cyber domains Addresses four key goals:

More information

Dynamic Analytics Extended to all layers Utilizing P4

Dynamic Analytics Extended to all layers Utilizing P4 Dynamic Analytics Extended to all layers Utilizing P4 Tom Tofigh, AT&T Nic VIljoen, Netronome This Talk is about Why P4 should be extended to other layers Interoperability - Utilizing common framework

More information

ALCATEL-LUCENT ENTERPRISE INTELLIGENT FABRIC TECHNOLOGY REMOVING THE LAST BARRIER FOR IT TO SUPPORT AGILE BUSINESS APPLICATION NOTE

ALCATEL-LUCENT ENTERPRISE INTELLIGENT FABRIC TECHNOLOGY REMOVING THE LAST BARRIER FOR IT TO SUPPORT AGILE BUSINESS APPLICATION NOTE ALCATEL-LUCENT ENTERPRISE INTELLIGENT FABRIC TECHNOLOGY REMOVING THE LAST BARRIER FOR IT TO SUPPORT AGILE BUSINESS APPLICATION NOTE INTRODUCTION This paper explains how (ifab) technology enables companies

More information

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM A. Valenti* I Bel ** S. Lee *EDF **EPRI E2I ConEdison France USA USA arnaud.valenti@edf.fr

More information

Cisco Collaboration Optimization Services: Tune-Up for Peak Performance

Cisco Collaboration Optimization Services: Tune-Up for Peak Performance Cisco Collaboration Optimization Services: Tune-Up for Peak Performance What You Will Learn More than 200,000 enterprises around the world have deployed Cisco Collaboration Solutions. If you are one of

More information

IST ATRIUM. A testbed of terabit IP routers running MPLS over DWDM. TF-NGN meeting

IST ATRIUM. A testbed of terabit IP routers running MPLS over DWDM. TF-NGN meeting IST 1999-20675 ATRIUM A testbed of terabit IP routers running MPLS over DWDM TF-NGN meeting 18-06-2001 http://www.alcatel.be/atrium The objectives of the presentation Present the project : objectives partners

More information

Diagnosis in the Time-Triggered Architecture

Diagnosis in the Time-Triggered Architecture TU Wien 1 Diagnosis in the Time-Triggered Architecture H. Kopetz June 2010 Embedded Systems 2 An Embedded System is a Cyber-Physical System (CPS) that consists of two subsystems: A physical subsystem the

More information

Amit. Amit - Active Middleware. Technology Overview. IBM Research Lab in Haifa Active Technologies October 2002

Amit. Amit - Active Middleware. Technology Overview. IBM Research Lab in Haifa Active Technologies October 2002 Amit Amit - Active Middleware Technology Overview IBM Research Lab in Haifa Active Technologies October 2002 OUTLINE: The Active Technologies Amit Active Middleware Technology Related Active Management

More information

Dynamic Context Management and Reference Models for Dynamic Self Adaptation

Dynamic Context Management and Reference Models for Dynamic Self Adaptation Dynamic Context Management and Reference Models for Dynamic Self Adaptation Norha Villegas Icesi University (Colombia) and University of Victoria (Canada) Gabriel Tamura Icesi University (Colombia) Hausi

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

Provisioning and Operation of Virtual Networks

Provisioning and Operation of Virtual Networks Provisioning and Operation of Virtual Networks KIVS 2011 Workshop on Network Virtualization Sebastian Meier sebastian.meier@ikr.uni-stuttgart.de 10.03.2011 Universität Stuttgart Institute of Communication

More information

Self-Healing and Resilient Critical Infrastructures

Self-Healing and Resilient Critical Infrastructures Self-Healing and Resilient Critical Infrastructures Rune Gustavsson & Björn Ståhl School of Engineering Blekinge Institute of Technology (BTH) SWEDEN Gustavsson Ståhl CRITIS 2008 1 Overview Case study

More information

Smart grid control based on heterogeneous communications and adaptive layers

Smart grid control based on heterogeneous communications and adaptive layers SmartGridComm 2014: Workshop "Managing Heterogeneous and Secure Communication Networks for Smart Grids" Smart grid control based on heterogeneous communications and adaptive layers Hans-Peter Schwefel

More information

NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS

NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS Where are unified critical communications heading? What is the place of radio in a unified communication environment? What solutions

More information

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF

More information

Setting the standard in class-leading aggregation and service richness An Alcatel-Lucent Bell Labs 7750 SR-a total cost of ownership modeling study

Setting the standard in class-leading aggregation and service richness An Alcatel-Lucent Bell Labs 7750 SR-a total cost of ownership modeling study Setting the standard in class-leading aggregation and service richness An Alcatel-Lucent Bell Labs 775 SR-a total cost of ownership modeling study This Alcatel-Lucent Bell Labs modeling study compares

More information

On Demand secure routing protocol resilient to Byzantine failures

On Demand secure routing protocol resilient to Byzantine failures On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,

More information

Data Sources for Cyber Security Research

Data Sources for Cyber Security Research Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Lefteris Mamatas University of Macedonia, Greece * joined work with Stuart Clayman and Alex Galis from UCL, UK

Lefteris Mamatas University of Macedonia, Greece * joined work with Stuart Clayman and Alex Galis from UCL, UK Lefteris Mamatas University of Macedonia, Greece emamatas@uom.gr * joined work with Stuart Clayman and Alex Galis from UCL, UK } Research challenges in information handling for SDN/NFV environments } The

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

SACT s opening remarks at. Tide Sprint. Virginia Beach, 23 Oct 2017,

SACT s opening remarks at. Tide Sprint. Virginia Beach, 23 Oct 2017, NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s opening remarks at Tide Sprint Virginia Beach, 23 Oct 2017, 0845-0900 As delivered Général d armée aérienne Denis MERCIER

More information

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

Fully Distributed Service Configuration Management

Fully Distributed Service Configuration Management Fully Distributed Service Configuration Management Paul Murray, Patrick Goldsack Enterprise Systems and Software Laboratory HP Laboratories Bristol HPL-2007-84 June 28, 2007* configuration management,

More information

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business

More information

PREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES *

PREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES * PREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES * Xiaojiang Du Mark A. Shayman Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

IQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song. HUAWEI TECHNOLOGIES Co., Ltd.

IQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song.   HUAWEI TECHNOLOGIES Co., Ltd. IQ for DNA Interactive Query for Dynamic Network Analytics Haoyu Song www.huawei.com Motivation Service Provider s pain point Lack of real-time and full visibility of networks, so the network monitoring

More information

Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014

Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014 Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track ISSN: 2070-1721 D. Frost Blue Sun S. Bryant Cisco Systems M. Bocci Alcatel-Lucent June 2014 Abstract MPLS Transport

More information

Troubleshooting Tools. Tools for Gathering Information

Troubleshooting Tools. Tools for Gathering Information Internetwork Expert s CCNP Bootcamp Troubleshooting Tools http:// Tools for Gathering Information Before implementing a fix, information must be gathered about a problem to eliminate as many variables

More information

END-TO-END RECONFIGURABILITY II: TOWARDS SEAMLESS EXPERIENCE

END-TO-END RECONFIGURABILITY II: TOWARDS SEAMLESS EXPERIENCE END-TO-END RECONFIGURABILITY II: TOWARDS SEAMLESS EXPERIENCE Didier Bourse, Karim El-Khazen, David Bateman (Motorola Labs, France) Marylin Arndt (France Telecom, France) Nancy Alonistioti (University of

More information

The role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs

The role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs The role of ICT in managing the complex Smart Grid Infrastructure Nampuraja Enose Infosys Labs Smart Grid The Smart Grid isn t a thing, but rather a Vision for the power system of the future Its a mix

More information

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services

Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services 1 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services Dr. Jian Ma, Principal Scientist Nokia Research Center, Beijing 2 2005

More information

Context-aware Services for UMTS-Networks*

Context-aware Services for UMTS-Networks* Context-aware Services for UMTS-Networks* * This project is partly financed by the government of Bavaria. Thomas Buchholz LMU München 1 Outline I. Properties of current context-aware architectures II.

More information

Unifying Agent and Component Concepts - Jadex Active Components

Unifying Agent and Component Concepts - Jadex Active Components Unifying Agent and Component Concepts - Jadex Active Components Alexander Pokahr, Lars Braubach, Kai Jander Distributed Systems and Information Systems Group (VSIS) Department of Informatics, University

More information

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun

CYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun Reading This lecture [McGraw]: Ch. 7-9 2 Seven Touchpoints 1. Code review 2. Architectural

More information

End-to-end QoS negotiation in network federations

End-to-end QoS negotiation in network federations End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation

More information

OO Project Management

OO Project Management OO Project Management Twin Cities Java User s Group November 17, 1999 Mary Poppendieck Poppendieck.LLC Object Oriented Development Objects Simulate the Real World Example: Process Control On/Off Switch

More information

THE AUTOMATED TEST FRAMEWORK

THE AUTOMATED TEST FRAMEWORK 2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO

More information

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints

4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints Reading This lecture [McGraw]: Ch. 7-9 CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun 2 Seven Touchpoints Application of Touchpoints

More information

Enabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology

Enabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology Enabling Smart Energy as a Service via 5G Mobile Network advances The Energy as a Service: when the Smart Energy uses the 5G technology Ljubljana, 5G PPP Phase 3 Stakeholders Info day October 17 2017 Fiorentino

More information

What is This Thing Called System Configuration?

What is This Thing Called System Configuration? PAUL ANDERSON dcspaul@inf.ed.ac.uk Alva Couch couch@cs.tufts.edu What is This Thing Called System Configuration? Tufts University Computer Science LISA 2004 (1) Overview Paul says: The configuration problem

More information

Why dynamic route? (1)

Why dynamic route? (1) Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Redesde Computadores(RCOMP)

Redesde Computadores(RCOMP) Redesde Computadores(RCOMP) Lecture 06 2016/2017 IPv4 routeing. Static routeing and dynamic routeing. Routeing protocols: RIP, RIPv2, EIGRP and OSPF. Autonomous systems and route redistribution Instituto

More information

Lab - Configuring Multi-area OSPFv2

Lab - Configuring Multi-area OSPFv2 Topology Addressing Table Device Interface IP Address Subnet Mask Lo0 209.165.200.225 255.255.255.252 R1 R2 R3 Lo1 192.168.1.1 255.255.255.0 Lo2 192.168.2.1 255.255.255.0 S0/0/0 (DCE) 192.168.12.1 255.255.255.252

More information

PCRF. Test Methodology. Introduction. NE Testing in a Test Network

PCRF. Test Methodology. Introduction. NE Testing in a Test Network Test Methodology PCRF Introduction As the wireless industry moves toward a unified IP network that will carry both voice and data traffic, the Policy and Charging Rule Function (PCRF) will take on an increasingly

More information

Priya Narasimhan. Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA

Priya Narasimhan. Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA OMG Real-Time and Distributed Object Computing Workshop, July 2002, Arlington, VA Providing Real-Time and Fault Tolerance for CORBA Applications Priya Narasimhan Assistant Professor of ECE and CS Carnegie

More information

Learning algorithms for physical systems: challenges and solutions

Learning algorithms for physical systems: challenges and solutions Learning algorithms for physical systems: challenges and solutions Ion Matei Palo Alto Research Center 2018 PARC 1 All Rights Reserved System analytics: how things are done Use of models (physics) to inform

More information

Resilient Smart Grids

Resilient Smart Grids Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main

More information

Fault Tolerance. Goals: transparent: mask (i.e., completely recover from) all failures, or predictable: exhibit a well defined failure behavior

Fault Tolerance. Goals: transparent: mask (i.e., completely recover from) all failures, or predictable: exhibit a well defined failure behavior Fault Tolerance Causes of failure: process failure machine failure network failure Goals: transparent: mask (i.e., completely recover from) all failures, or predictable: exhibit a well defined failure

More information

Lecture 2: Network Design and Topology. CS 598: Advanced Internetworking Matthew Caesar January 20, 2011

Lecture 2: Network Design and Topology. CS 598: Advanced Internetworking Matthew Caesar January 20, 2011 Lecture 2: Network Design and Topology CS 598: Advanced Internetworking Matthew Caesar January 20, 2011 1 Administrivia 2 Today s lecture: Internet topology How should I design my network s topology? What

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Claim desired outcome

Claim desired outcome Assessment Authoring - Table of Specification (TOS) The Table of Specification (TOS) is a high-level design template for a given assessment. It identifies the claims, components skills, targeted number

More information

Analysis and Design with the Universal Design Pattern

Analysis and Design with the Universal Design Pattern Analysis and Design with the Universal Design Pattern by Koni Buhrer Software Engineering Specialist Rational Software Developing large software systems is notoriously difficult and unpredictable. Software

More information

Defining Computer Security Incident Response Teams

Defining Computer Security Incident Response Teams Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that

More information

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based

More information

How to set up, Configure and Manage VCS Virtual Business Services across a Multi-tier Application environment

How to set up, Configure and Manage VCS Virtual Business Services across a Multi-tier Application environment SM L09 How to Set up, Configure and Manage VERITAS Cluster Server Virtual Business Services across a Multi-Tier Application environment How to set up, Configure and Manage VCS Virtual Business Services

More information

Chapter 39: Concepts of Time-Triggered Communication. Wenbo Qiao

Chapter 39: Concepts of Time-Triggered Communication. Wenbo Qiao Chapter 39: Concepts of Time-Triggered Communication Wenbo Qiao Outline Time and Event Triggered Communication Fundamental Services of a Time-Triggered Communication Protocol Clock Synchronization Periodic

More information

EMS / DMS. DISTRIBUTION MANAGEMENT SYSTEM- Functional Description

EMS / DMS. DISTRIBUTION MANAGEMENT SYSTEM- Functional Description EMS / DMS DISTRIBUTION MANAGEMENT SYSTEM- Content 1. INTRODUCTION... 4 2. MODES OF INTERACTION WITH THE SCADA SYSTEM... 5 2.1 Simulation Mode... 5 2.2 State Estimation Mode (See functional description

More information

PRIMEQUEST 400 Series & SQL Server 2005 Technical Whitepaper (November, 2005)

PRIMEQUEST 400 Series & SQL Server 2005 Technical Whitepaper (November, 2005) PRIMEQUEST 400 Series & SQL Server 2005 Technical Whitepaper (November, 2005) Fujitsu Limited PRIMEQUEST 400 Series & SQL Server 2005 Technical White Paper PRIMEQUEST 400 Series Server & SQL Server 2005

More information

Safety-critical embedded systems, fault-tolerant control systems, fault detection, fault localization and isolation

Safety-critical embedded systems, fault-tolerant control systems, fault detection, fault localization and isolation Fault detection in safety-critical embedded systems nomen VERBER i, MA TJAl COLNARIC i, AND WOLFGANG A. HALANG 2 JUniversity of Maribor, Faculty of Electrical Engineering and Computer Science, 2000 Maribor,

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Federal Information Security Management Act (FISMA) Operational Controls and Their Relationship to Process Maturity

Federal Information Security Management Act (FISMA) Operational Controls and Their Relationship to Process Maturity Federal Information Security Management Act (FISMA) Operational Controls and Their Relationship to Process Maturity Ronda Henning rhenning@harris.com The Basic Premise of This Presentation Proper preparation

More information

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Application Software

More information

Reliable Robotics Diagnostics++ Dominik Kirchner, Daniel Saur (Distributed System Group, University of Kassel)

Reliable Robotics Diagnostics++ Dominik Kirchner, Daniel Saur (Distributed System Group, University of Kassel) Reliable Robotics Diagnostics++ Dominik Kirchner, Daniel Saur (Distributed System Group, University of Kassel) Story board Motivation Introduction to ROS diagnostics ROS diagnostics extensions Takeaways

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information

Integrating Autonomic Slice Networking in NFV

Integrating Autonomic Slice Networking in NFV Integrating Autonomic Slice Networking in NFV draft-galis-anima-autonomic-slice-networking-01 V2.0 12 th November 2016 Prof. Alex Galis a.gais@ucl.ac.uk; http://www.ee.ucl.ac.uk/~agalis/ University College

More information

Network Working Group. Category: Informational Cisco Systems A. Shaikh AT&T Labs (Research) April 2005

Network Working Group. Category: Informational Cisco Systems A. Shaikh AT&T Labs (Research) April 2005 Network Working Group Request for Comments: 4061 Category: Informational V. Manral SiNett Corp. R. White Cisco Systems A. Shaikh AT&T Labs (Research) April 2005 Benchmarking Basic OSPF Single Router Control

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Cyber Perspectives. Science and Technology Roadmap

Cyber Perspectives. Science and Technology Roadmap Cyber Perspectives Science and Technology Roadmap NDIA S&T Conference 14 April 2010 Pat Sullivan SSC Pacific Cyber Warfare Capabilities, Opportunities and Challenges Capabilities: Global, 24x7 Network

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

Overview of the Cybersecurity Framework

Overview of the Cybersecurity Framework Overview of the Cybersecurity Framework Implementation of Executive Order 13636 Matt Barrett Program Manager matthew.barrett@nist.gov cyberframework@nist.gov 15 January 2015 Executive Order: Improving

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE

IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE Application Note Abstract Alcatel-Lucent has established a partnership with NetworkMining

More information