Generic Network Visualization: Applications for NATO IST-043/RWS-006: WG5 Luc Beaudoin Dr. Jan Bjoerke Alain Bouchard Capt Stephen Boyne Zack Jacobson.

Slides:



Advertisements
Similar presentations
1 Introducing the Specifications of the Metro Ethernet Forum.
Advertisements

Interconnection Networks: Flow Control and Microarchitecture.
Graph. -traffic modeling MAXIMUM FLOW -shortest (fastest) route SHORTEST PATH -efficient distribution, logistics, pickup/delivery HAMILTONIAN PATH/CYCLE,
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
1.1 Chapter 1 Introduction Lecture # 1 – 2 Ali Mustafa.
Risk Assessment What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling.
Wouter Pieterse 3 maart Hydrogen, paths of transitions, and geopolitics Exploring the use of coherence between institutions and geography in geopolitics.
CSI5112 Software Engineering Team: Andrei Anisenia Margi Fumtiwala.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Software Connectors. Attach adapter to A Maintain multiple versions of A or B Make B multilingual Role and Challenge of Software Connectors Change A’s.
Unified Modeling (Part I) Overview of UML & Modeling
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
CSE 222 Systems Programming Graph Theory Basics Dr. Jim Holten.
Interconnection Network Topologies
Semester 4 - Chapter 3 – WAN Design Routers within WANs are connection points of a network. Routers determine the most appropriate route or path through.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Interconnect Network Topologies
Transport support in foreign economic activity
FRE 2672 Urban Ontologies : the Towntology prototype towards case studies Chantal BERDIER (EDU), Catherine ROUSSEY (LIRIS)
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Properties of networks to be considered in their visualization Jan Terje Bjørke.
Jay Britton
1 CS 4396 Computer Networks Lab Dynamic Routing Protocols - II OSPF.
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
How to Build Network? ISAT 625 Network Problems Build highways to connect cities Build highways to connect cities Build network to connect computers.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Lecture 4 Transport Network and Flows. Mobility, Space and Place Transport is the vector by which movement and mobility is facilitated. It represents.
Systems Engineering for the Transportation Critical Infrastructure The Development of a Methodology and Mathematical Model for Assessing the Impacts of.
 Communication Tasks  Protocols  Protocol Architecture  Characteristics of a Protocol.
Campus da FEUP Rua Dr. Roberto Frias, Porto Portugal T F © 2009 Communication.
Apartado Porto Codexwww.inescporto.pt tel (351) fax (351) /April/2005 Research Activities in 4G Networks at INESC Porto.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Designing the logistics network. Facility location decisions Criteria – Demand and locations of the demand – Distribution systems (Rail, ground, air,
Network-Based Optimization Models Charles E. Noon, Ph.D. The University of Tennessee.
Highway Risk Mitigation through Systems Engineering.
RRXS Redundancy reducing XML storage in relations O. MERT ERKUŞ A. ONUR DOĞUÇ
One or More Topologies ? One or More Topologies ? A methodological reflection IRRIIS Project, WP2.1 “Topology Analysis” Rome Meeting, 6,7 April 2006 IST.
Representing Uncertainty, Unknowns and Dynamics of Social Networks NX-Workshop on Social Network Analysis and Visualization for Public Safety 18 – 19 October.
IT 606 Computer Networks (CN). 1.Evolution of Computer Networks & Application Layer. 2.Transport Layer & Network Layer. 3.Routing & Data link Layer. 4.Physical.
What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling  OCTAVE Risk/Threat.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Intelligent Traffic Environmental System (ITES-AIR)
Visualisation Reference Framework Mark Nixon, Martin Taylor, Margaret Varga, Jan Terje Bjørke and Amy Vanderbilt.
Overview of Data Communications and Networking
Highway Risk Mitigation through Systems Engineering.
1 TCOM 5143 Lecture 10 Centralized Networks: Time Delay and Cost Tradeoffs.
Graphs Definition: a graph is an abstract representation of a set of objects where some pairs of the objects are connected by links. The interconnected.
Transportation Critical Infrastructure The development of a mathematical model, using a Systems Engineering approach, for assessing the impacts disconnects.
Critical Infrastructure Protection In the Transportation Network A Mathematical Model and Methodology for Determining and Analyzing The k-Critical Links.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Designing Information Secure Networks with Graph Theory Visa Vallivaara M.Sc. Research Scientist VTT Technical Research Centre of Finland.
What is the Internet? The Internet is a computer network that interconnects millions of computing devices throughout the world.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Chapter 13 Transportation in a Supply Chain
Semester 4 - Chapter 3 – WAN Design
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
Instantiation of the Concept in GAMMA Prototypes
Network Layer Path Determination.
Transportation, Assignment and Network Models
DATA COMMUNICATION Lecture-3.
VLANs, their Characteristics, and Implementation
Presentation transcript:

Generic Network Visualization: Applications for NATO IST-043/RWS-006: WG5 Luc Beaudoin Dr. Jan Bjoerke Alain Bouchard Capt Stephen Boyne Zack Jacobson Annette Kaster Dr. Bob Truong Capt José Veríssimo

Generic Network Visualization: Applications for NATO This working group was focused at developing a taxonomy and framework of generic network properties which are required for the display on a Common Operational Picture and decision support.

Generic Network Visualization: Applications for NATO

Objectives Development of a network visualisation framework to be used by NATO Development of a common language to describe networks and to enable interoperability

Definition A Network is an array of nodes and links that exchange stuff on carriers under a certain protocol and following a determined path generating a certain amount of traffic.

NATO Needs on Network Analysis/Visualization Counterterrorism Knowledge Management Information Assurance Logistic Support Management Disease Management Infrastructure Security Correlation of interconnected networks etc.

Links between nodes of same networks Within a network, links between the nodes have a crucial role to play in the network characteristics. Changes, such as a new link between two nodes, can have drastic impact on the network.

Links between nodes of different networks Connecting two networks together can largely influence the capacity of each network. As an example, a link between two different networks related to terrorists and their activities can drastically improve the ability of the authorities to forecast/understand threats... The potential is dependant on traffic characteristics and network information semantic structure.

Visualisation Issues Human Factors Colors Temporal information AutomationClutteringSymbologyetc.

What do we need to see from the networks ? Generic network properties Variables of networks Intersection of disparate networks etc.

Variables of networks Constraints Rules RulesNodes Location Location Node type Node type Symbology Symbology Open/Closed Open/Closed Node ID Node ID Input/output property Input/output propertyLinks Capacity Capacity Weight Weight Strength Strength Direction Direction Availability Availability Type of traffic Type of traffic Location Location Route Route Identification (Unique) Identification (Unique) The medium The medium Thresholds and changes Traffic Flow Path RoutingTopology Symmetric/asymmetric Boundaries Layout Hierarchical Tree Topology evolution in time and spaceLogical/physicalRedundancy Partially connected graph Protocols Networks interconnections LocationOpen/ClosedLayersHierarchy

Important variables in: Counterterrorism Constraints Rules RulesNodes Location Location Node type Node type Symbology Symbology Open/Closed Open/Closed Node ID Node ID Input/output property Input/output property Number/Type of Links Number/Type of LinksLinks Capacity Capacity Weight Weight Strength Strength Direction Direction Availability Availability Type of traffic Type of traffic Location Location Route Route Identification (Unique) Identification (Unique) The medium The medium Thresholds and changes Traffic Flow Path RoutingTopology Symmetric/asymmetric Boundaries Layout Hierarchical Tree Topology evolution in time and spaceLogical/physicalRedundancy Partially connected graph Protocols Networks interconnections LocationOpen/ClosedLayersHierarchy

Important variables in: Information Assurance Constraints Rules RulesNodes Location Location Node type Node type Symbology Symbology Open/Closed Open/Closed Node ID Node ID Input/output property Input/output property Number/Type of Links Number/Type of LinksLinks Capacity Capacity Weight Weight Strength Strength Direction Direction Availability Availability Type of traffic Type of traffic Location Location Route Route Identification (Unique) Identification (Unique) The medium The medium Thresholds and changes Traffic Flow Path RoutingTopology Symmetric/asymmetric Boundaries Layout Hierarchical Tree Topology evolution in time and spaceLogical/physicalRedundancy Partially connected graph Protocols Networks interconnections LocationOpen/ClosedLayersHierarchy

Important variables in: Logistic Support Management Constraints Rules RulesNodes Location Location Node type Node type Symbology Symbology Open/Closed Open/Closed Node ID Node ID Input/output property Input/output property Number/Type of Links Number/Type of LinksLinks Capacity Capacity Weight Weight Strength Strength Direction Direction Availability Availability Type of traffic Type of traffic Location Location Route Route Identification (Unique) Identification (Unique) The medium The medium Thresholds and changes Traffic Flow Path RoutingTopology Symmetric/asymmetric Boundaries Layout Hierarchical Tree Topology evolution in time and spaceLogical/physicalRedundancy Partially connected graph Protocols Networks interconnections LocationOpen/ClosedLayersHierarchy

How do create a network? Example: Transportation network for deploying a NATO force What are the important properties to be visualised? Gradual decomposition of the network!

What do we have to know about … … the nodes? Is there a transfer point (Can you load/unload cargo? Is there a transfer point (Can you load/unload cargo? Can you change directions? Can you change directions? What is the dwell time? What is the dwell time? … the links? What is the capacity? (What and how much can you carry?) What is the capacity? (What and how much can you carry?) Is it going two/one way? Is it going two/one way? How long is the link (in terms of time and distance)? How long is the link (in terms of time and distance)? What kind of traffic can it take? What kind of traffic can it take? Is it available? Is it available? … the carriers? What is the capacity? What is the capacity? Is it available? Is it available?

Example: Transportation network for deploying a NATO force Start: Then gradually decompose by asking the aforementioned questions? Toronto Sarajevo Nodes: Cities, harbours, airports, … Links: Roads, Sea, Air, … Carriers: Trucks, ships, planes, …

Conclusions Network analysis/visualization is task oriented The same generic framework can be used for most types of networks The most critical issue is to set the correct thresholds Network Analysis can be focused on nodes, links, etc.