NM Interoperability Technical Exchange

Slides:



Advertisements
Similar presentations
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Advertisements

Building an Operational Enterprise Architecture and Service Oriented Architecture Best Practices Presented by: Ajay Budhraja Copyright 2006 Ajay Budhraja,
©2014 Extreme Networks, Inc. All rights reserved. Extreme Networks Optimized Networks Kevin Kuenker, Solutions Architect – Central Region.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
7-1 INTRODUCTION: SoA Introduced SoA in Chapter 6 Service-oriented architecture (SoA) - perspective that focuses on the development, use, and reuse of.
1 An Overview of Computer Security computer security.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
Test Environments Arun Murugan – u Rohan Ahluwalia – u Shuchi Gauri – u
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
Private Cloud: Application Transformation Business Priorities Presentation.
The big Data security Analytics Era Is Here Reporter : Ximeng Liu Supervisor: Rongxing Lu School of EEE, NTU
Effective Methods for Software and Systems Integration
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
VARONIS OVERVIEW DATA GOVERNANCE & SECURE FILE SHARING JUNE 5, 2013 Presented By: Dietrich Benjes VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
DPI in an SDN world Charles Glass.
Devices change the picture billion.
Session C: What is the business value for private sector partners? Session Facilitator: Mr. Scott Winn CEO Strajillion 1 1 Network Management Interoperability.
Integrating Digital and Mobile Health: From Next Generation Sensors to Cloud Analytics Speakers: Yohan Lee, PhD; Ernest Sohn DISCLAIMER: The views and.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
KMS Products By Justin Saunders. Overview This presentation will discuss the following: –A list of KMS products selected for review –The typical components.
Technical Exchange on Network Management Interoperability Tuesday, October 29, APL in Laurel MD NMWG September Update Session 4 - Continuous.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Management for IP-based Applications Mike Fisher BTexaCT Research
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Software Architectural Styles Andrew Midwinter, Mark Mullen, Kevin Wong, Matt Jones 1.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
NetQoPE: A Middleware-based Netowork QoS Provisioning Engine for Distributed Real-time and Embedded Systems Jaiganesh Balasubramanian
Evolution of Technical Insider Threat at the FBI and Lessons Learned
TACTIC | Workflow: Project Management OSS on Microsoft Azure Helps Enterprises to Create Streamline, Manage, and Track Digital Content MICROSOFT AZURE.
SOFTWARE DEFINED NETWORKING/OPENFLOW: A PATH TO PROGRAMMABLE NETWORKS April 23, 2012 © Brocade Communications Systems, Inc.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
The Management Challenge of Transnational Management.
SAM for SQL Workloads Presenter Name.
Software Engineering Introduction.
Chapter 9 The People in Information Systems. Learning Objectives Upon successful completion of this chapter, you will be able to: Describe each of the.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
8a Certified. About Us  Headquarters in Vienna, VA  Service Disabled Veteran-owned Small Business  SBA 8(a) program participant  Small Disadvantaged.
Introduction to Avaya’s SDN Architecture February 2015.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
1 EIT 4.1 Thinking Different: Data Centers and IoT Chris Crosby, CEO, Compass Datacenters.
Basic Concepts of Software Architecture. What is Software Architecture? Definition: – A software system’s architecture is the set of principal design.
Realize the Power of Information IJIS Institute Briefing June 24, 2014.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
8a Certified. About Us  Headquarters in Vienna, VA  Service Disabled Veteran-owned Small Business  SBA 8(a) program participant  Small Disadvantaged.
- Company Confidential - Corporate Overview March 2015.
Panel: "QoS Provisioning at the Network Edge" John Vicente Intel Corporation / Columbia University USENIX Special Workshop on Intelligence at the Network.
Enabling Secure Multi-Organization Collaboration Andrew Porter IT Director, Enterprise Architecture Merck & Co., Inc.
University of Maryland College Park
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Selling Advanced Security for Account Managers v4.0 Smart Services for AM/SE Exam Code: practice-questions.html.
Managing Information Technology
5G Security Training
Azure Allays Data Security and Privacy Concerns for Solution Provider’s Cloud-Wary Customers “With Microsoft Azure, Jedox can deliver advanced enterprise.
CS 31006: Computer Networks – The Routers
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Automating Security in the Cloud
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
​​​​​​​​Brooklyn, New York, United States, 2 October 2018
JPL Perspective on Software Defined Everything
Enterprise Architecture at Penn State
Utilizing the Network Edge
Customer 360.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

NM Interoperability Technical Exchange Session 3: Emerging Technologies Dr. Stephen Bush, GE Research Mr. Morris Hornik, DoD CIO

Topics of Interest SDN and applications Security Emerging Technologies Cloud Networks Tactical/waveforms Security Emerging Technologies

Supply-Chain counter-fitting – HW and SW lineage Architectures need to account for emerging technologies, and should be the baseline for how things are engineered, deployed, maintained and managed. SDN Architectures Supply-Chain counter-fitting – HW and SW lineage Commercial vs DoD Financial industry has tighter security relationships/architectures to protect financial networks

SDN can establish coalition networks Better provisioning DRS built software routers, used in Blue-Force tracking network SDN in tactical Benefits – dumb, small devices: size, weight and power Disadvantages – vulnerability, management complexity Challenges – do we know if the network is doing what it is supposed to be doing? Diversity and redundancy – how critical is it in the tactical – increases footprint, power, vulnerability (space shuttle example of 5 identical processors) Opinion – SDN is premature Recommend early investigation, testing to understand how SDN is applied, verified and secured

Good about SDN Understanding Risk Defining Cost Evolution on how networking and NM is done Retooling of staff Size, weight and power May need new tools/languages to enable humans effectively manage Understanding Risk Defining Cost

Standards and enforcement of standards Trusted Platform Spec Cognitive Radios Is SDN an enabler of cognitive networking? Evolved Packet Core Standards and enforcement of standards Trusted Platform Spec Reference Implementation Helps with interpretations of specifications Need to make specs

How many times has a packet been access/encrypted How many times has a packet been access/encrypted? A ‘smart’ packet with code running may capture access/modification info. SDN and MANET Content-Aware routing MPLS and SDN? SDN is not able to control network interface? SDN may not scale? Networked Soldier Avoid information overload Automated decision making for data flow Attractive target ‘big data’ problem QOS and QOE are important

Company called Embrane Policy based management How smart should the network be to keep things simple for the networked soldier Company called Embrane Evolution of SDN, new capabilities Policy based management SDN and other IT Drivers Analytics and Business Intelligence Big Data Driven by need to rationalize IT costs, handling massive data volumes, mobile operations

Volumes of data /Cloud/Data Processing & Filtering/ Data Shaping are now needed for DoD – 100G transport Patterns (data that is compressible also lends to better analysis) Agile, localized standards (vice enterprise-wide standards) may be more effective and timely Is this risky? Customers willing to give data? Interactions/interfaces can evolve (instead of designing/specifying it completely upfront) Smarts centralized initially, but pushed out (decentralized) over time Instead of grand network solution that does everything, let the components do what they need to do, their way; but a centralized solution that pulls it all together to work with independent components

Decentralized mgmt pitfalls Too many data interfaces/relationships to manage Trouble-shooting is not trivial Knowing your network and knowing what ‘normal’ is Deception Techniques that will make our networks safer What can we do to make enemies see our network differently than what it is+ What is the value of doing this? CS and Neuroscience – biological system is compromised – risk management is more crucial