Session B: How do we manage heterogeneous networks including those at the tactical edge? Session Facilitator: Bruce Patterson Principal Network Systems.

Slides:



Advertisements
Similar presentations
ManageEngine IT360 Product Overview
Advertisements

This document is confidential and is intended solely for the use and information of the client to whom it is addressed. SOA in a Military Environment Technical.

Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
Session D: What is the role of automation in network management? Session Facilitator: Charlie Williams III Senior Network Systems Engineer MITRE 1 1 Network.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Applying the SOA RA Utah Public Safety ESB Project Utah Department of Technology Services April 10, 2008 Prepared by Robert Woolley.
NM Interoperability Technical Exchange
ManageEngine IT360 Product Overview A Comprehensive Business Service Management Solution.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Systems Engineering in a System of Systems Context
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Chapter 19: Network Management Business Data Communications, 4e.
ICT 1 “Putting Context in Context: The Role and Design of Context Management in a Mobility and Adaptation Enabling Middleware” Marius Mikalsen Research.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Trends & Challenges Systems Supporting M-Commerce Nour El Kadri University of Ottawa.
Technical Integrity Assurance For Product Development W. Henson Graves Lockheed Martin Aeronautics Company Russ Campbell.
Chapter 8.  Network Management  Organization Management  Risk Assessment & Management  Service Management  Performance Management  Problem Management.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
Session C: What is the business value for private sector partners? Session Facilitator: Mr. Scott Winn CEO Strajillion 1 1 Network Management Interoperability.
Company Profile ► Our Expertise Here at SIEMSTECH we have a passion for designing and implementing integrated, network-centric technology solutions across.
A Combat Support Agency Defense Information Systems Agency DISN NetOps Service Assurance 2011 Customer Conference August 2011.
ITEA Easy Wireless project (EW-VTT) Milla Huusko
Roles and Responsibilities
ITIL and the Help Desk Craig Bennion University of Utah
1 Objective 2 — Facilitate a modernized and improved spectrum management system Spectrum Management Process National Forum on Public Safety Spectrum Management.
©2014 Extreme Networks, Inc. All rights reserved. Microsoft Skype for Business Integration Overview Leveraging the Power of Technology Partnerships Niels.
A Combat Support Agency Defense Information Systems Agency GIG EWSE Application and Service (EE212) 17 August 2011 Tactical Edge Service: Service Adaption.
Army Net-Centric Data Strategy Center Of Excellence (ANCDS) Army Data Harmonization and Integration Working Group (ADHIWG) Sever Ciorlian ANCDS Team Lead.
Heterogeneous network - How do mobile operators exploit different network together to enhance customer satisfaction and reduce operating cost. Yao-Yu Li,
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
TUESDAY, 4:00 – 4:20PM WEDNESDAY, 4:00 – 4:20PM Douglas Hill, NHIN Implementation Lead (Contractor), Office of the National Coordinator for Health IT Vanessa.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
DCML – The Standard that Enables ITIL Compliance.
Page 1Prepared by Sapient for MITVersion 0.1 – August – September 2004 This document represents a snapshot of an evolving set of documents. For information.
Core Enterprise Services to the Tactical Edge (CES2TE) 1 Jennifer Valentine The MITRE Corporation 13 January 2009.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
CPSC 871 John D. McGregor Module 6 Session 3 System of Systems.
Technical Exchange on Network Management Interoperability Tuesday, October 29, APL in Laurel MD NMWG September Update Session 4 - Continuous.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED UNCLASSIFIED Spectrum Access: The Tools to Connect GEMSIS 15 Aug 2011.
© 2007 The MITRE Corporation. All rights reserved Exposing Services in a Disadvantaged Environment S. Semy, M. Sabbouh, J. Higginson, F. Dandashi
FEA DRM Management Strategy Presented by : Mary McCaffery, US EPA.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Session A: How do we better adopt/define and ensure acceptance of standards and interface profiles? Session Facilitator: Dr. Mark Pullen Director GMU C4I.
A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and.
Cracow Grid Workshop ‘06 17 October 2006 Execution Management and SLA Enforcement in Akogrimo Antonios Litke Antonios Litke, Kleopatra Konstanteli, Vassiliki.
Enterprise Systems Management
Version 3.3 ITIL – IT Service Management An overview program for IT Service Management good practices.
Mariann Yeager, NHIN Policy and Governance Lead (Contractor) Office of the National Coordinator for Health IT David Riley, CONNECT Lead (Contractor) Federal.
ITIL Awareness UC JDCMG Discussion 4/26/2017.
Approved for Public Release; Distribution Unlimited. Case Number: , © 2006 The MITRE Corporation. All rights reserved Characterization Framework.
1A FAST EXCELLENCE THROUGH FACILITATION Gary Rush The FAST Process MGR Consulting
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Status & Challenges Interoperability and global integration of communication infrastructure & service platform Fixed-mobile convergence to achieve a future.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
ICS Area Managers Training 2010 ITIL V3 Overview April 1, 2010.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
1 Acquisition Automation – Challenges and Pitfalls Breakout Session # E11 Name: Jim Hargrove and Allen Edgar Date: Tuesday, July 31, 2012 Time: 2:30 pm-3:45.
Group D New Environments and Data Management System Issues.
Javier Orellana EGEE-JRA4 Coordinator CERN March 2004 EGEE is proposed as a project funded by the European Union under contract IST Network.
Serving IT up with ITIL By Thane Price. IT is the laboratory’s pit crew  Goal : Make technology transparent while accomplishing valuable internal customer.
Context-Aware Middleware for Resource Management in the Wireless Internet US Lab 신현정.
Modeling and Simulation Management Structure Breakout Session
Chapter 19: Network Management
EI Architecture Overview/Current Assessment/Technical Architecture
Mobile edge computing Report by Weiqing huang.
Service Oriented Architectures (SOA): What Users Need to Know.
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

Session B: How do we manage heterogeneous networks including those at the tactical edge? Session Facilitator: Bruce Patterson Principal Network Systems Engineer MITRE 1 1 Network Management Interoperability Technical Exchange

2 Breakout Session B: How do we manage heterogeneous networks including those at the tactical edge (*disadvantaged users)? What are the middleware requirements to make all of this come together? Is true multi-vendor interoperability attainable? If so to what degree? What is the impact in limited bandwidth and dynamic tactical networks? Do different rules need to apply there? Who controls and enforces service level agreements and monitors performance metrics? What are industry best practices for managing heterogeneous networks, that could also be adopted by the DoD? Network Management Interoperability Technical Exchange

3 Breakout Session B: How do we manage heterogeneous networks including those at the tactical edge (*disadvantaged users)? What are the middleware requirements to make all of this come together? Inputs: Service Management vs Element Management vs. Resource Management Standards identification – SOA? QOS Management Profile – may be different on different networks Identification of critical/relevant info to the right end point based on available network capacity and type of user/type of equipment available (DIL User) Manager of manager vs. manger of elements – what does the NMS need to be? Common situational awareness capability incorporating a tactical and enterprise cross-domain solution Network Management Interoperability Technical Exchange

4 Breakout Session B: How do we manage heterogeneous networks including those at the tactical edge (*disadvantaged users)? Is true multi-vendor interoperability attainable? If so to what degree? Inputs: Central authority guiding common standards and context in which those standards are intended to be used Ontology as the context Enforcement? Acquisition community involvement Tools come and go, so some level of multi-vendor interoperability will be necessary – already happing on some levels Provisioning and activation more difficult than gathering information How to include processes that will never be automated? Financial incentive to DoD specific application development? Network Management Interoperability Technical Exchange

5 Breakout Session B: How do we manage heterogeneous networks including those at the tactical edge (*disadvantaged users)? What is the impact in limited bandwidth and dynamic tactical networks? Do different rules need to apply there? Inputs: Complete information on network is not always available Bandwidth Latency Intermittent connectivity Minimize the amount of information required to traverse the network depending on availability, bandwidth, etc. Self-healing capabilities How do you know the configuration when rejoining after being disconnected? How to tailor the views depending on the echelon/user requirements Network nodes are mobile Event based reconfiguration End-to-end visibility of assets Network Management Interoperability Technical Exchange

6 Breakout Session B: How do we manage heterogeneous networks including those at the tactical edge (*disadvantaged users)? Who controls and enforces service level agreements and monitors performance metrics? Inputs: SLA contractual obligations don’t apply to military model in the same way – or at all SLAs will be different as network capabilities vary Is a military “SLA” really an expectation of service to meet mission requirements? End-to-end SLA may be different from a single service/interim service provider – coordination required at different levels to provision, operate and deactivate, ensure spectrum available Using performance metrics to monitor SLAs Can they be enforced in the DoD tactical environment? Network Management Interoperability Technical Exchange

7 Breakout Session B: How do we manage heterogeneous networks including those at the tactical edge (*disadvantaged users)? What are industry best practices for managing heterogeneous networks, that could also be adopted by the DoD? Inputs: TM Forum ITIL OPNET type simulations SNMP, WMI, NetFlow, etc. Better configuration control Some companies merge, but maintain autonomy in NM operation. Different DoD entities may have valid reasons as well in separate, but interoperable systems Ontology development Participation in standards bodies Security standards Network Management Interoperability Technical Exchange