Towards a Unified Architecture for Resilience, Survivability and Autonomic Fault-Management for Self-Managing Networks
|
|
- Thomas Simpson
- 5 years ago
- Views:
Transcription
1 Towards a Unified Architecture for Resilience, Survivability and Autonomic Fault-Management for Self-Managing Networks Nikolay Tcholtchev, Monika Grajzer 2, Bruno Vidalenc 3 Nikolay.Tcholtchev@fokus.fraunhofer.de, mgrajzer@telcordia.com, Bruno.Vidalenc@alcatel-lucent.com Fraunhofer FOKUS Institute for Open Communication Systems, Germany. 2 Telcordia Poland 3 Alcatel-Lucent France
2 Overview Introduction The GANA architecture for autonomic networks The architecture for Fault Management, Resilience & Survivability components The overal framework architecture an overview Summary MONA+ workshop, 24. November
3 Introduction Motivation: accommodate the plethora of existing intrinsic multi-layer resilient mechanisms Exploit relation to Autonomic Fault-Management to achieve more powerful solution address autonomic networks Improve applications and services performance by the increased robustness of the network layer Goal: propose a generic, system- and self-aware solution the unified architectural framework Examplary situation: router failure MONA+ workshop, 24. November
4 Introduction Relations between Resilience, Survivability and Fault-Management: Fault-Detection Fault-Isolation Fault-Removal is realized by (Autonomic) Fault-Management consist of Is a subset of Reactive Resilience Fault-Masking Survivability Resilience Proactive Resilience MONA+ workshop, 24. November
5 The GANA architecture - autonomicity in networking GANA Generic Autonomic Network Architecture the reference model Designed to provide autonomicity Components: Decision Element (DE), Managed Entity (ME) Concept of a control loop Hierarchical control loops structure (Protocol Level, Funcions Level, Node Level, Network Level) MONA+ workshop, 24. November
6 The architecture - requirements MONA+ workshop, 24. November
7 The architectural components Resilience & Survivability DE Functionality: Supporting generic Resilience and Survivability functions within an autonomic node Node-level DE access to all lover-level DEs and to global, node-intrinsic knowledge RS_DE acts in a fault-tolerant manner and orchestrates resilient mechanisms of the selected node entities Manages the resilient behaviour of other node entities (MEs and DEs) Interactions and interoperation with FM_DE Information required for operation: detected fault/error/failure/alarm (node intrinsic repositories) isolated faults and the Fault-Removal process (FM_DE) resilient mechanisms implemented intrinsically inside the MEs in a node (Multi-Layer Resilience Properties Repository -MLRPR) MONA+ workshop, 24. November
8 The architectural components Resilience & Survivability DE Internal components: Fault Masking Functions (FMF) block reactive resilience: Reacts to already detected incidents triggers diverse reactive faultmasking mechanisms Risk Assessment Module (RAM) proactive resilience Reacts to incidents that are likely to happen in the future tries to predict the occurrence of certain incidents in the near future and is proactively steering the node entities - the node and/or network can prepare for the upcoming problems dynamically improving the Causality Model FM_DE Repositories for faults/errors/failures/alarms RS_DE FMF Causality Model Repository (CMR) manages RAM Multi-Layer Resilience Properties Repository Lower level MEs and DEs MONA+ workshop, 24. November
9 The architectural components Fault Management DE Functionality: triggered when symptoms/anomalies indicating the presence of faults in the network are detected Fault-Isolation Fault-Removal Information required for operation: detected fault/error/failure/alarm (node intrinsic repositories) causal relationships between events in the network (Causality Model Repository -CMR) dependencies among nodes/devices, protocol modules, and services (Dependability Models Repository -DMR) MONA+ workshop, 24. November
10 The architectural components Fault Management DE Internal components: Fault-Diagnosis/Localization/Isolation block (FDLI functions): finds the root cause for the observed symptoms based on fault propagation models represented by a Causality Model Fault-Removal Functions block (FRF) Removes the isolated fault Exemplary actions: reload a functional entity, reboot a node/device, reconfigure a functional entity (very often time consuming) Fault Removal Assessment Functions (FRAF): Gives the feedback information about the performance/result of the fault removal process Employs probing and network debugging methods or uses the risk assessment services provided by the RS_DE Action Synchronization Functions (ASF) Synchronizes the actions between FM_DE and RS_DE ensures stability MONA+ workshop, 24. November FM_DE FDLI functions Causality Model Repository (CMR) Dependability Model Repository (DMR) FRAF manages ASF FRF RS_DE Repositories for faults/errors/failures /alarms Lower level MEs and DEs
11 The overall framework architecture Autonomic Node: FM_DE Node_Main_DE ASF negotiate RS_DE supply information supply/consume FDLI functions FRAF FRF FMF RAM information Causality Model Repository (CMR) Dependability Model Repository (DMR) Multi-Layer Resilience Properties Repository manages Repositories for faults/errors/failures/alarms MEs and DEs, which appear as MEs to the Node_Main_DE manages Incident Information Dissemination Engine NETWORK MONA+ workshop, 24. November 2009
12 The overall framework architecture IDE and the network level Autonomic Node Node_Main_DE FM_DE ME (e.g. Routing DE) NetLevel RS_DE RS_DE NetLevel FM_DE Incident Information Dissemination Engine (IDE): Gives incident-related information to the other network components and services accommodates the notion of Survivability Requirements Network level RS_DE and FM_DE to address network level problems not resolvable in a distributed manner ME (e.g. OSPF) MONA+ workshop, 24. November
13 Summary Resilience, Survivability and Fault-Management are converging as Autonomic Networks are emerging Architectural Frameworks are required that define components addressing the converging aspects of the aforementioned functions address the fundamental processes of Fault-Management, i.e. Fault-Detection, Fault-Isolation, and Fault-Removal ensure the stability and effectiveness of the corresponding control loops ACHIEVE SELF-MANAGEMENT W.R.T. INCIDENTS Future steps: Implementation is ongoing FOKUS Future Internet Lab, TARC testbed Scenarios demonstration: IP black holes & duplex mismatch MONA+ workshop, 24. November
14 Thank you for your attention! Questions? MONA+ workshop, 24. November
15 There was once a young man who, in his youth, professed his desire to become a great writer. When asked to define great he said, I want to write stuff that the whole world will read, stuff that people will react to on a truly emotional level, stuff that will make them scream, cry, howl in pain and anger! He now works for a famous software producer, writing error messages MONA+ workshop, 24. November
16 Fault-Isolation Functions A is caused by B A p A, B B A error - fault E={,2,3,4,5,6,7,8} F={6,7,8} E\F={,2,3,4,5} MONA+ workshop, 24. November
17 Action Synchronization Functions NF ( t n 0 ) = wiqi ( t0 ) = w, Q( t0 ) i= The goal of the autonomic mechanisms is to optimize NF(t) throughout the operation of the network p = arg max p {0,} m n w ( q ( t + m i i 0 i = j = ) p j I ( i, j)) s.t. D m p c MONA+ workshop, 24. November
How Autonomic Fault-Management Can Address Current Challenges in Fault-Management Faced in IT and Telecommunication Networks
How Autonomic Fault-Management Can Address Current Challenges in Fault-Management Faced in IT and Telecommunication Networks Ranganai Chaparadza 1, Nikolay Tcholtchev 1, and Vassilios Kaldanis 2 1 Fraunhofer
More informationETSI-AFI work on SDN-oriented Enablers for Customizable Autonomic Management & Control in Evolving and Future Networks
ETSI-AFI work on SDN-oriented Enablers for Customizable Autonomic Management & Control in Evolving and Future Networks ETSI 2013. All rights reserved ETSI AFI Activities & Roadmap Ranganai Chaparadza,
More informationDelivering Multimedia in Autonomic Networking Environments
Delivering Multimedia in Autonomic Networking Environments Vassilios Kaldanis 1, Ranganai Chaparadza 2, Giannis Katsaros 1, and George Karantonis 1 1 VELTI S.A. Mobile Marketing and Advertising, 42 Kifissias
More informationAutonomic Computing. Pablo Chacin
Autonomic Computing Pablo Chacin Acknowledgements Some Slides taken from Manish Parashar and Omer Rana presentations Agenda Fundamentals Definitions Objectives Alternative approaches Examples Research
More informationNo Industry 4.0 without Security
24-04-2017 No Industry 4.0 without Security 24-04-2017 Introduction to Atos and Industry 4.0 Who is Atos? At a glance Revenue 2016 (M EUR) * Employees 2016 (Global) Employees 2016 (Germany) Countries 12,000
More informationDependability Modeling Based on AADL Description (Architecture Analysis and Design Language)
Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language) Ana Rugina, Karama Kanoun and Mohamed Kaâniche {rugina, kanoun, kaaniche}@laas.fr European Integrated Project
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationBuilding Security Services on top of SDN
Building Security Services on top of SDN Gregory Blanc Télécom SudParis, IMT 3rd FR-JP Meeting on Cybersecurity WG7 April 25th, 2017 Keio University Mita Campus, Tokyo Table of Contents 1 SDN and NFV as
More informationAN APPROACH FOR FAULT MANAGEMENT BASED ON AUTONOMIC COMPUTING PLUS MOBILE AGENTS
AN APPROACH FOR FAULT MANAGEMENT BASED ON AUTONOMIC COMPUTING PLUS MOBILE AGENTS Sergio Armando Gutiérrez, Ms.Eng 1, John Willian Branch, PhD 2 12 Facultad de Minas, Universidad Nacional de Colombia, Sede
More informationCybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment
Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair
More informationSurvivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks
Survivability Architectures for Service Independent Access Points to Multiwavelength Optical Wide Area Networks Master s Thesis Defense Ananth Nagarajan EECS Department, University of Kansas 10/13/98 Outline
More informationChapter 8 Fault Tolerance
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 8 Fault Tolerance 1 Fault Tolerance Basic Concepts Being fault tolerant is strongly related to
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationNetwork Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol
Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol Abdur Chowdhury 1,, Ophir Frieder 1, Paul Luse, Peng-Jun Wan 1 {abdur, wan, ophir}@cs.iit.edu, pluse@iitri.org
More informationARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE?
ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? Motivation, Approach, and Research Agenda Rolf Stadler and Gunnar Karlsson KTH, Royal Institute of Technology 164 40 Stockholm-Kista, Sweden {stadler,gk}@imit.kth.se
More informationSOFTWARE ARCHITECTURE & DESIGN INTRODUCTION
SOFTWARE ARCHITECTURE & DESIGN INTRODUCTION http://www.tutorialspoint.com/software_architecture_design/introduction.htm Copyright tutorialspoint.com The architecture of a system describes its major components,
More informationInternet of Things 2018/2019
Internet of Things 2018/2019 Resource Management for Dependable IoT Tanir Ozcelebi John Carpenter, 1982 1 What does resource management entail? Guiding questions What are the components of dependability?
More informationDistributed Control Systems (DCS)
Training Title Distributed Control Systems (DCS) Training Duration 5 days Training Venue and Dates Distributed Control Systems (DCS) 5 13-17 May $3,300 Abu Dhabi In any of the 5 star hotel. The exact venue
More informationAdaptive Failure Detection Timers for IGP Networks
Networking 213 156972439 Adaptive Failure Detection Timers for IGP Networks Bruno Vidalenc Alcatel-Lucent Bell Labs, Nozay, France Bruno.Vidalenc@alcatel-lucent.com Samir Ghamri-Doudane Alcatel-Lucent
More informationToward (SOS) Self-stabilizing Operating System
Toward (SOS) Self-stabilizing Operating System Shlomi Dolev and Reuven Yagel, Ben-Gurion University, Israel Sep. 1st SAACS 04 Workshop, Zaragoza Outline Motivation: current operating systems do not stabilize!
More informationCprE 458/558: Real-Time Systems. Lecture 17 Fault-tolerant design techniques
: Real-Time Systems Lecture 17 Fault-tolerant design techniques Fault Tolerant Strategies Fault tolerance in computer system is achieved through redundancy in hardware, software, information, and/or computations.
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationMcGill University - Faculty of Engineering Department of Electrical and Computer Engineering
McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access
More informationProgrammableFlow White Paper. March 24, 2016 NEC Corporation
March 24, 2016 NEC Corporation Contents Preface 3 OpenFlow and ProgrammableFlow 5 Seven Functions and Techniques in ProgrammableFlow 6 Conclusion 19 2 NEC Corporation 2016 Preface SDN (Software-Defined
More informationAn object of research has changed System events System renewal Mathematical computer tools reliability dependability
Preface The conference DepCoS - RELCOMEX '06 is organized by the Institute of Computer Engineering, Control and Robotics (previously the Institute of Engineering Cybernetics), Wroclaw University of Technology.
More informationAC2 CTC Investment Strategy. Capt Brandon Keller, AFRL/RIS Acting CTC Lead
AC2 CTC Investment Strategy Capt Brandon Keller, AFRL/RIS Acting CTC Lead Scope Covers monitor, assess, plan, and execute processes within and across air, space, cyber domains Addresses four key goals:
More informationDynamic Analytics Extended to all layers Utilizing P4
Dynamic Analytics Extended to all layers Utilizing P4 Tom Tofigh, AT&T Nic VIljoen, Netronome This Talk is about Why P4 should be extended to other layers Interoperability - Utilizing common framework
More informationALCATEL-LUCENT ENTERPRISE INTELLIGENT FABRIC TECHNOLOGY REMOVING THE LAST BARRIER FOR IT TO SUPPORT AGILE BUSINESS APPLICATION NOTE
ALCATEL-LUCENT ENTERPRISE INTELLIGENT FABRIC TECHNOLOGY REMOVING THE LAST BARRIER FOR IT TO SUPPORT AGILE BUSINESS APPLICATION NOTE INTRODUCTION This paper explains how (ifab) technology enables companies
More informationHIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM
HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM A. Valenti* I Bel ** S. Lee *EDF **EPRI E2I ConEdison France USA USA arnaud.valenti@edf.fr
More informationCisco Collaboration Optimization Services: Tune-Up for Peak Performance
Cisco Collaboration Optimization Services: Tune-Up for Peak Performance What You Will Learn More than 200,000 enterprises around the world have deployed Cisco Collaboration Solutions. If you are one of
More informationIST ATRIUM. A testbed of terabit IP routers running MPLS over DWDM. TF-NGN meeting
IST 1999-20675 ATRIUM A testbed of terabit IP routers running MPLS over DWDM TF-NGN meeting 18-06-2001 http://www.alcatel.be/atrium The objectives of the presentation Present the project : objectives partners
More informationDiagnosis in the Time-Triggered Architecture
TU Wien 1 Diagnosis in the Time-Triggered Architecture H. Kopetz June 2010 Embedded Systems 2 An Embedded System is a Cyber-Physical System (CPS) that consists of two subsystems: A physical subsystem the
More informationAmit. Amit - Active Middleware. Technology Overview. IBM Research Lab in Haifa Active Technologies October 2002
Amit Amit - Active Middleware Technology Overview IBM Research Lab in Haifa Active Technologies October 2002 OUTLINE: The Active Technologies Amit Active Middleware Technology Related Active Management
More informationDynamic Context Management and Reference Models for Dynamic Self Adaptation
Dynamic Context Management and Reference Models for Dynamic Self Adaptation Norha Villegas Icesi University (Colombia) and University of Victoria (Canada) Gabriel Tamura Icesi University (Colombia) Hausi
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationProvisioning and Operation of Virtual Networks
Provisioning and Operation of Virtual Networks KIVS 2011 Workshop on Network Virtualization Sebastian Meier sebastian.meier@ikr.uni-stuttgart.de 10.03.2011 Universität Stuttgart Institute of Communication
More informationSelf-Healing and Resilient Critical Infrastructures
Self-Healing and Resilient Critical Infrastructures Rune Gustavsson & Björn Ståhl School of Engineering Blekinge Institute of Technology (BTH) SWEDEN Gustavsson Ståhl CRITIS 2008 1 Overview Case study
More informationSmart grid control based on heterogeneous communications and adaptive layers
SmartGridComm 2014: Workshop "Managing Heterogeneous and Secure Communication Networks for Smart Grids" Smart grid control based on heterogeneous communications and adaptive layers Hans-Peter Schwefel
More informationNETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS
NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS Where are unified critical communications heading? What is the place of radio in a unified communication environment? What solutions
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationSetting the standard in class-leading aggregation and service richness An Alcatel-Lucent Bell Labs 7750 SR-a total cost of ownership modeling study
Setting the standard in class-leading aggregation and service richness An Alcatel-Lucent Bell Labs 775 SR-a total cost of ownership modeling study This Alcatel-Lucent Bell Labs modeling study compares
More informationOn Demand secure routing protocol resilient to Byzantine failures
On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,
More informationData Sources for Cyber Security Research
Data Sources for Cyber Security Research Melissa Turcotte mturcotte@lanl.gov Advanced Research in Cyber Systems, Los Alamos National Laboratory 14 June 2018 Background Advanced Research in Cyber Systems,
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationLefteris Mamatas University of Macedonia, Greece * joined work with Stuart Clayman and Alex Galis from UCL, UK
Lefteris Mamatas University of Macedonia, Greece emamatas@uom.gr * joined work with Stuart Clayman and Alex Galis from UCL, UK } Research challenges in information handling for SDN/NFV environments } The
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationDynamics of Hot-Potato Routing in IP Networks
Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)
More informationSACT s opening remarks at. Tide Sprint. Virginia Beach, 23 Oct 2017,
NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s opening remarks at Tide Sprint Virginia Beach, 23 Oct 2017, 0845-0900 As delivered Général d armée aérienne Denis MERCIER
More informationKey words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali
More informationFully Distributed Service Configuration Management
Fully Distributed Service Configuration Management Paul Murray, Patrick Goldsack Enterprise Systems and Software Laboratory HP Laboratories Bristol HPL-2007-84 June 28, 2007* configuration management,
More informationCisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services
Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business
More informationPREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES *
PREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES * Xiaojiang Du Mark A. Shayman Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationIQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song. HUAWEI TECHNOLOGIES Co., Ltd.
IQ for DNA Interactive Query for Dynamic Network Analytics Haoyu Song www.huawei.com Motivation Service Provider s pain point Lack of real-time and full visibility of networks, so the network monitoring
More informationInternet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014
Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track ISSN: 2070-1721 D. Frost Blue Sun S. Bryant Cisco Systems M. Bocci Alcatel-Lucent June 2014 Abstract MPLS Transport
More informationTroubleshooting Tools. Tools for Gathering Information
Internetwork Expert s CCNP Bootcamp Troubleshooting Tools http:// Tools for Gathering Information Before implementing a fix, information must be gathered about a problem to eliminate as many variables
More informationEND-TO-END RECONFIGURABILITY II: TOWARDS SEAMLESS EXPERIENCE
END-TO-END RECONFIGURABILITY II: TOWARDS SEAMLESS EXPERIENCE Didier Bourse, Karim El-Khazen, David Bateman (Motorola Labs, France) Marylin Arndt (France Telecom, France) Nancy Alonistioti (University of
More informationThe role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs
The role of ICT in managing the complex Smart Grid Infrastructure Nampuraja Enose Infosys Labs Smart Grid The Smart Grid isn t a thing, but rather a Vision for the power system of the future Its a mix
More informationMobile Wireless Sensor Network enables convergence of ubiquitous sensor services
1 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Mobile Wireless Sensor Network enables convergence of ubiquitous sensor services Dr. Jian Ma, Principal Scientist Nokia Research Center, Beijing 2 2005
More informationContext-aware Services for UMTS-Networks*
Context-aware Services for UMTS-Networks* * This project is partly financed by the government of Bavaria. Thomas Buchholz LMU München 1 Outline I. Properties of current context-aware architectures II.
More informationUnifying Agent and Component Concepts - Jadex Active Components
Unifying Agent and Component Concepts - Jadex Active Components Alexander Pokahr, Lars Braubach, Kai Jander Distributed Systems and Information Systems Group (VSIS) Department of Informatics, University
More informationCYSE 411/AIT 681 Secure Software Engineering. Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun
CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun Reading This lecture [McGraw]: Ch. 7-9 2 Seven Touchpoints 1. Code review 2. Architectural
More informationEnd-to-end QoS negotiation in network federations
End-to-end QoS negotiation in network federations H. Pouyllau, R. Douville Avril, 2010 Outline Motivation for Network federations The problem of end-to-end SLA composition Scenario of composition and negotiation
More informationOO Project Management
OO Project Management Twin Cities Java User s Group November 17, 1999 Mary Poppendieck Poppendieck.LLC Object Oriented Development Objects Simulate the Real World Example: Process Control On/Off Switch
More informationTHE AUTOMATED TEST FRAMEWORK
2017 THE AUTOMATED TEST FRAMEWORK Test More. Test Consistently. Test Faster. Secure Results. Delivered. xceleratesolutions.com TABLE OF CONTENTS CONCEPT...3 BENEFITS...4 TRANSFORMING FROM TRADITIONAL TO
More information4. Risk-Based Security Testing. Reading. CYSE 411/AIT 681 Secure Software Engineering. Seven Touchpoints. Application of Touchpoints
Reading This lecture [McGraw]: Ch. 7-9 CYSE 411/AIT 681 Secure Software Engineering Topic #6. Seven Software Security Touchpoints (III) Instructor: Dr. Kun Sun 2 Seven Touchpoints Application of Touchpoints
More informationEnabling Smart Energy as a Service via 5G Mobile Network advances. The Energy as a Service: when the Smart Energy uses the 5G technology
Enabling Smart Energy as a Service via 5G Mobile Network advances The Energy as a Service: when the Smart Energy uses the 5G technology Ljubljana, 5G PPP Phase 3 Stakeholders Info day October 17 2017 Fiorentino
More informationWhat is This Thing Called System Configuration?
PAUL ANDERSON dcspaul@inf.ed.ac.uk Alva Couch couch@cs.tufts.edu What is This Thing Called System Configuration? Tufts University Computer Science LISA 2004 (1) Overview Paul says: The configuration problem
More informationWhy dynamic route? (1)
Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationRedesde Computadores(RCOMP)
Redesde Computadores(RCOMP) Lecture 06 2016/2017 IPv4 routeing. Static routeing and dynamic routeing. Routeing protocols: RIP, RIPv2, EIGRP and OSPF. Autonomous systems and route redistribution Instituto
More informationLab - Configuring Multi-area OSPFv2
Topology Addressing Table Device Interface IP Address Subnet Mask Lo0 209.165.200.225 255.255.255.252 R1 R2 R3 Lo1 192.168.1.1 255.255.255.0 Lo2 192.168.2.1 255.255.255.0 S0/0/0 (DCE) 192.168.12.1 255.255.255.252
More informationPCRF. Test Methodology. Introduction. NE Testing in a Test Network
Test Methodology PCRF Introduction As the wireless industry moves toward a unified IP network that will carry both voice and data traffic, the Policy and Charging Rule Function (PCRF) will take on an increasingly
More informationPriya Narasimhan. Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA
OMG Real-Time and Distributed Object Computing Workshop, July 2002, Arlington, VA Providing Real-Time and Fault Tolerance for CORBA Applications Priya Narasimhan Assistant Professor of ECE and CS Carnegie
More informationLearning algorithms for physical systems: challenges and solutions
Learning algorithms for physical systems: challenges and solutions Ion Matei Palo Alto Research Center 2018 PARC 1 All Rights Reserved System analytics: how things are done Use of models (physics) to inform
More informationResilient Smart Grids
Resilient Smart Grids André Teixeira Kaveh Paridari, Henrik Sandberg KTH Royal Institute of Technology, Sweden SPARKS 2nd Stakeholder Workshop Cork, Ireland March 25th, 2015 Legacy Distribution Grids Main
More informationFault Tolerance. Goals: transparent: mask (i.e., completely recover from) all failures, or predictable: exhibit a well defined failure behavior
Fault Tolerance Causes of failure: process failure machine failure network failure Goals: transparent: mask (i.e., completely recover from) all failures, or predictable: exhibit a well defined failure
More informationLecture 2: Network Design and Topology. CS 598: Advanced Internetworking Matthew Caesar January 20, 2011
Lecture 2: Network Design and Topology CS 598: Advanced Internetworking Matthew Caesar January 20, 2011 1 Administrivia 2 Today s lecture: Internet topology How should I design my network s topology? What
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationClaim desired outcome
Assessment Authoring - Table of Specification (TOS) The Table of Specification (TOS) is a high-level design template for a given assessment. It identifies the claims, components skills, targeted number
More informationAnalysis and Design with the Universal Design Pattern
Analysis and Design with the Universal Design Pattern by Koni Buhrer Software Engineering Specialist Rational Software Developing large software systems is notoriously difficult and unpredictable. Software
More informationDefining Computer Security Incident Response Teams
Defining Computer Security Incident Response Teams Robin Ruefle January 2007 ABSTRACT: A computer security incident response team (CSIRT) is a concrete organizational entity (i.e., one or more staff) that
More informationThe Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne
The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based
More informationHow to set up, Configure and Manage VCS Virtual Business Services across a Multi-tier Application environment
SM L09 How to Set up, Configure and Manage VERITAS Cluster Server Virtual Business Services across a Multi-Tier Application environment How to set up, Configure and Manage VCS Virtual Business Services
More informationChapter 39: Concepts of Time-Triggered Communication. Wenbo Qiao
Chapter 39: Concepts of Time-Triggered Communication Wenbo Qiao Outline Time and Event Triggered Communication Fundamental Services of a Time-Triggered Communication Protocol Clock Synchronization Periodic
More informationEMS / DMS. DISTRIBUTION MANAGEMENT SYSTEM- Functional Description
EMS / DMS DISTRIBUTION MANAGEMENT SYSTEM- Content 1. INTRODUCTION... 4 2. MODES OF INTERACTION WITH THE SCADA SYSTEM... 5 2.1 Simulation Mode... 5 2.2 State Estimation Mode (See functional description
More informationPRIMEQUEST 400 Series & SQL Server 2005 Technical Whitepaper (November, 2005)
PRIMEQUEST 400 Series & SQL Server 2005 Technical Whitepaper (November, 2005) Fujitsu Limited PRIMEQUEST 400 Series & SQL Server 2005 Technical White Paper PRIMEQUEST 400 Series Server & SQL Server 2005
More informationSafety-critical embedded systems, fault-tolerant control systems, fault detection, fault localization and isolation
Fault detection in safety-critical embedded systems nomen VERBER i, MA TJAl COLNARIC i, AND WOLFGANG A. HALANG 2 JUniversity of Maribor, Faculty of Electrical Engineering and Computer Science, 2000 Maribor,
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationFederal Information Security Management Act (FISMA) Operational Controls and Their Relationship to Process Maturity
Federal Information Security Management Act (FISMA) Operational Controls and Their Relationship to Process Maturity Ronda Henning rhenning@harris.com The Basic Premise of This Presentation Proper preparation
More informationReal-Time Component Software. slide credits: H. Kopetz, P. Puschner
Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Application Software
More informationReliable Robotics Diagnostics++ Dominik Kirchner, Daniel Saur (Distributed System Group, University of Kassel)
Reliable Robotics Diagnostics++ Dominik Kirchner, Daniel Saur (Distributed System Group, University of Kassel) Story board Motivation Introduction to ROS diagnostics ROS diagnostics extensions Takeaways
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationIntegrating Autonomic Slice Networking in NFV
Integrating Autonomic Slice Networking in NFV draft-galis-anima-autonomic-slice-networking-01 V2.0 12 th November 2016 Prof. Alex Galis a.gais@ucl.ac.uk; http://www.ee.ucl.ac.uk/~agalis/ University College
More informationNetwork Working Group. Category: Informational Cisco Systems A. Shaikh AT&T Labs (Research) April 2005
Network Working Group Request for Comments: 4061 Category: Informational V. Manral SiNett Corp. R. White Cisco Systems A. Shaikh AT&T Labs (Research) April 2005 Benchmarking Basic OSPF Single Router Control
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationCyber Perspectives. Science and Technology Roadmap
Cyber Perspectives Science and Technology Roadmap NDIA S&T Conference 14 April 2010 Pat Sullivan SSC Pacific Cyber Warfare Capabilities, Opportunities and Challenges Capabilities: Global, 24x7 Network
More informationPlanning for Information Network
Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including
More informationOverview of the Cybersecurity Framework
Overview of the Cybersecurity Framework Implementation of Executive Order 13636 Matt Barrett Program Manager matthew.barrett@nist.gov cyberframework@nist.gov 15 January 2015 Executive Order: Improving
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationIMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE
IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE Application Note Abstract Alcatel-Lucent has established a partnership with NetworkMining
More information