Naman shah Harshil shah Priyank BambhrOLIA

Slides:



Advertisements
Similar presentations
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Interference.
Advertisements

CHARACTERIZATION OF DISTRIBUTED SYSTEMS
Overview of Digital Stenography
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
A brief overview about Distributed Systems Group A4 Chris Sun Bryan Maden Min Fang.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Convergecast with MIMO Luoyi Fu, Yi Qin, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Xue Liu Department of Computer.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Bio-Networking: Biology Inspired Approach for Development of Adaptive Network Applications 21 May 2005Ognen Paunovski Bio-Networking: Biology Inspired.
Distributed Systems: Principles and Paradigms By Andrew S. Tanenbaum and Maarten van Steen.
Group # 14 Dhairya Gala Priyank Shah. Introduction to Grid Appliance The Grid appliance is a plug-and-play virtual machine appliance intended for Grid.
Co-PIs: Dr. I-En Liao, CSE Department, National Chung Hsing University Dr. Gwoboa Horng, CSE Department, National Chung Hsing University Dr. Chung-Ming.
1 Distributed Systems Architectures Distributed object architectures Reference: ©Ian Sommerville 2000 Software Engineering, 6th edition.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
Introduction to Steganography
Data Management on Opportunistic Grids
Golden Linear Group Key Agreement Protocol
Computer Science Courses
CprE 458/558: Real-Time Systems
CSC 480 Software Engineering
LECTURE 34: WEB PROGRAMMING FOR SCALE
Failure recovery and Checkpointing in Distributed Systems
Information Security at Florida State University
Information Security at Florida State University
Consistency in Distributed Systems
CS & CS Capstone Project & Software Development Project
Storage Systems for Managing Voluminous Data
Distributed Shared Memory
Content Dissemination Systems Including Streaming Systems
Ch. 11 – Cipher Techniques Dr. Wayne Summers
LECTURE 32: WEB PROGRAMMING FOR SCALE
Visit for more Learning Resources
On the Power of Hybrid Networks in Multi-Party Computation
Towards Next Generation Panel at SAINT 2002
9.2 SECURE CHANNELS Medisetty Swathy.
MobEyes: Smart Mobs for Urban Monitoring in Vehicular Sensor Networks
Mobile Agents.
Information Security at Florida State University
Security in Network Communications
Optimizing MapReduce for GPUs with Effective Shared Memory Usage
Information Security at Florida State University
Distributed Ledger Technology (DLT) and Blockchain
Architectures of distributed systems Fundamental Models
Cryptography and Network Security
Process Migration Troy Cogburn and Gilbert Podell-Blume
Architectures of distributed systems Fundamental Models
SCTP-based Middleware for MPI
Cyber Physical Systems
Replication and Availability in Distributed Systems
CONSISTENCY IN DISTRIBUTED SYSTEMS
Install AD Certificate Services
CPSC 531: System Modeling and Simulation
Architectures of distributed systems
Introduction To Distributed Systems
Architectures of distributed systems Fundamental Models
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
USN Introduction Computer Engineering Sejin Oh.
Distributed Graph Algorithms
Design.
World-Leading Research with Real-World Impact!
Substation Automation IT Needs
Image Based Steganography Using LSB Insertion Technique
Distributed Systems Architectures
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Distributed systems A collection of autonomous computers linked by a network, with software designed to produce an integrated computing facility A well.
Presentation transcript:

Naman shah Harshil shah Priyank BambhrOLIA Cyber Physical Systems CS455: Introduction to Distributed Systems Computer Science Department Colorado State University Naman shah Harshil shah Priyank BambhrOLIA

Importance of Cyber Physical Systems Bridge between Cyber and Physical world Applications Automotive Healthcare Future Uses Autonomous urban driving Brain signals to control physical objects New Emerging Mobile CPS http://www.comm.utoronto.ca/~dkundur/research/cyber-physical-systems/ Saturday, January 12, 2019 Cyber Physical Systems

Problem Characterization Space and Time Middleware for Cyber Physical Systems Fault-Tolerance Concurrency Security Saturday, January 12, 2019 Cyber Physical Systems

Trade-off Space for Solutions Use of Guava Concurrency Actor-Oriented Approach Inherency and Hierarchy Precision Timed Machines Approach Known Programing Paradigms Use of Deterministic Models Throughput Saturday, January 12, 2019 Cyber Physical Systems

Dominant Approach for Concurrency Use of Model Driven Development Actor-Oriented Design Actors – concurrent components Communication using ports Channels to transfer data between ports Object-Oriented Design Vs Actor-Oriented Design Saturday, January 12, 2019 Cyber Physical Systems

Cyber Physical Systems Dominant Approach for Security Use of Cryptographic and Steganographic Techniques Cryptography ElGamal Encryption Divided Private Key Steganography Technical Steganography Least Significant Bit (LSB) Method Linguistic Steganography Cover Text Saturday, January 12, 2019 Cyber Physical Systems

Cyber Physical Systems Insights Gleaned Model Driven Development Follows the notion of Actors Outstanding and Emerging Concept Cryptographic and Steganographic Techniques Combination achieves Greater Security Hierarchical Structure of Agents Distributed Private Key in Cryptography Saturday, January 12, 2019 Cyber Physical Systems

Cyber Physical Systems Future Problem Space Next Human Being Smart HealthCare System Scalability Security Smart Vehicular Network System Time Synchronization Saturday, January 12, 2019 Cyber Physical Systems

Future Trade-off Space and Solutions Scalable CPS Diminish Network Communication Delay New Protocol Communication Time Independent from Number of Nodes In the End, It’s really a Small World! Saturday, January 12, 2019 Cyber Physical Systems

Thank you! Questions?