Interoperability of Future Information Systems Daniel Siewiorek, Katia Sycara (PI’s) Joseph Giampapa, Ritika Sanghi, Aaron Steinfeld School of Computer.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Omniran TG 1 Cooperation for OmniRAN P802.1CF Max Riegel, NSN (Chair OmniRAN TG)
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
A Computation Management Agent for Multi-Institutional Grids
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Intelligent Software Agents Lab The Robotics Institute Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA (U.S.A.)
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Understanding Metamodels. Outline Understanding metamodels Applying reference models Fundamental metamodel for describing software components Content.
Operational Capability: We are developing and testing search munition control strategies using both a high fidelity 6-dof simulation of the LOCAAS and.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
Hands-On Microsoft Windows Server 2008
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
Chapter Intranet Agents. Chapter Background Intranet: an internal corporate network based on Internet technology. Typically, an intranet can.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Protocols and the TCP/IP Suite
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Implementing Network Access Protection
Automatic Software Testing Tool for Computer Networks ADD Presentation Dudi Patimer Adi Shachar Yaniv Cohen
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Module 7: Fundamentals of Administering Windows Server 2008.
Module 8: Configuring Network Access Protection
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Configuring Network Access Protection
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Multiagent System Katia P. Sycara 일반대학원 GE 랩 성연식.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Introduction to Active Directory
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Windows Vista Configuration MCTS : Advanced Networking.
Basharat Institute of Higher Education
Database System Concepts and Architecture
Module 10: Managing and Monitoring Network Access
SECURING NETWORK TRAFFIC WITH IPSEC
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
CHAPTER 3 Architectures for Distributed Systems
Working at a Small-to-Medium Business or ISP – Chapter 7
University of Technology
Working at a Small-to-Medium Business or ISP – Chapter 7
Unit 27: Network Operating Systems
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

Interoperability of Future Information Systems Daniel Siewiorek, Katia Sycara (PI’s) Joseph Giampapa, Ritika Sanghi, Aaron Steinfeld School of Computer Science Carnegie Mellon University ONR Grant Number: N

Outline Motivation Research Approach Taxonomy Findings Agent Development Process What’s Next

Motivation Resolving network interoperability problems is difficult and time consuming –heterogeneity, admin policies, etc Advances in network flexibility will improve underlying performance –New HCI methods and tools will be required to enhance user awareness and problem resolution

Outline Motivation Research Approach Taxonomy Findings Agent Development Process What’s Next

Research Questions How does the user diagnose and remedy network interoperability problems? What options exist given the obstacles imposed by intermediary policies?

Research Plan Generate taxonomy of remote access interoperability problems Define agent interactions with existing network tools and formulate service profiles for future tools Develop agents for the resolution of network interoperability problems

Interoperability Problem Resolution Model (IPRM)

Interoperability Problem Resolution Model - 1 ModelCurrentResearch Goals Identify the problem Recognition of a real problem rather than a temporary event Proactive monitoring and problem avoidance, periodic state maintenance, and formulation of constraining hypotheses Collect Parameters and Symptoms Manual, often requiring the user and expert to negotiate common definitions, mental models, and actions Automatic and proactive, the ability to provide an intelligently structured “parameter dump”

Interoperability Problem Resolution Model - 2 ModelCurrentResearch Goals Solve the Problem a) Human reasoning, often reduced to previously solved problem, or b) Human reasoning augmented with Case Based Reasoning tools A suite of autonomous and semi-autonomous actions: a) Agent negotiation and suggestions b) Middle agent interactions with network tools c) Agent-guided user actions LearnCheat sheets and, rarely, failure analysis Sharing of solutions between end-user and help desk agents Re-use Knowledge Knowledge base, FAQs, bug reports Dissemination, indexing of problems and solutions

Outline Motivation Research Approach Taxonomy Findings Agent Development Process What’s Next

Taxonomy Findings SCS remote access trouble ticket case data for 6/5/ /15/ Cases –Help only: 414, of these… Single configuration events (“Single”): 88 Requests for modem numbers: 137 Network (not SCS) Leaf (external user) Core (SCS)

Case Flow

Analysis Set Help cases without outliers: –Zero or null Hours to Resolve: 12 –Over 1,000 Hours to Resolve (notes): 4

By Type Phone number queries (significant) Network problems consume time fast

By Operating System Macs: quicker & less variable Mixed OS & Unknown (significant)

Duration, by Operating System Hours to resolve Percent Unresolved Mac Mixed Li/unix (no Mac) Unknown Win

Analysis Set Help cases without outliers or phone number requests: –Zero or null Hours to Resolve: 12 –Over 1,000 Hours to Resolve: 4 –Requests for modem numbers: 132

Duration, by Type Percent Unresolved Hours to resolve Core Leaf NetworkSingle

Modes: DSL, Modem, Wireless Combined are usually requests for same IP # in both modes No significant effects

Security Policies: VPN, Realm 41% cases & 47% time involved either VPN or other security, authentication, or registration issues VPN and VPN*Realm (significant)

Very Little Knowledge Re-use Root Cause or Solution either –Not found –Not documented No significant effects

Taxonomy Findings Summary 22% from configuration changes 49 hrs/case for all help related –60 hrs/case for subset not including phone number requests Security policy issues are frequent Very little knowledge sharing/re-use –Extracted by hand, rarely in existing database fields

Outline Motivation Research Approach Taxonomy Findings Agent Development Process What’s Next

Agent Development Process Model the Problem Domain Map Agents and Service Descriptions to: –Interoperability Problem Resolution Model, and –Problem Domain Implement, Deploy, Test, Evaluate Automatic Process Refinement

The Problem Domain Model Multiple Views and Options Intersect –Connectivity Model –Connectivity Security Model –Security Programs and Features VPN, SSH, SCP, Kerberos Typical Motivating Applications –Interact with the above 3 models –Multiple ways to achieve application goals –Users get lost in the intersections

Typical Motivating Applications –Send and receive –From: on- or off- campus Intranet Quality of Service (QoS) –Institute-wide access Printing, e-service subscriptions Software licenses, downloads and updates –Bandwidth/speed File Transfer & File System Access

Generic Connectivity Model End Leaf Node MODEM LAN / Ethernet Wireless (802.11) Other MODEMS (DSL, cable, broadband, etc.) ISP Entity ISP Authentication Internet Public CMU Security ProgramsPrivate CMU SCS Realm

Mappings Each Connection between nodes: –Indicates a possibly new authentication step –Puts the user in a new application and access rights context –Potentially grants the user new privileges –Can be modeled as a service description Each Node: –Has (potentially) verifiable configuration parameters –Can be modeled as an agent A User’s Connectivity Problem –Possibly parameterized by goals of using certain applications –Resolved automatically by agent / service description matching

System Architecture Agents will have models of application, connectivity, and security tasks Agents will shadow local and remote applications Agents will also interact with SysAd agents for updates and policy changes

Service Descriptions Service profile: represents what a service does Service model: describes how a service works Service grounding: specifies service access information

Functional Architecture

Four parallel threads : Communicator for conversing with other agents Planner matches “sensory” input and “beliefs” to possible plan actions Scheduler schedules “enabled” plans for execution Execution Monitor executes scheduled plan swaps-out plans for those with higher priorities Agent Architecture

MAS Interoperation Translation Services Interoperator Services Capability to Agent Mapping Middle Agents Name to Location Mapping Agent Name Service Security Certificate Authority Cryptographic Service Performance Services MAS Monitoring Reputation Services Multi-Agent Management Services Logging Activity Visualization Launching ACL Infrastructure Public Ontology Protocol Servers Communications Infrastructure Discovery Message Transfer MAS Infrastructure Interoperation Interoperation Modules Capability to Agent Mapping Middle Agent Components Name to Location Mapping ANS Component Security Security Module Private/Public Keys Performance Services Performance Service Modules Management Services Logging and Visualization Components ACL Infrastructure Parser, Private Ontology, Protocol Engine Communication Modules Discovery Message Transfer Modules Individual Agent Infrastructure Operating Environment Machines, OS, Network, Multicast Transport Layer, TCP/IP, Wireless, Infrared, SSL MAS Infrastructure

Outline Motivation Research Approach Taxonomy Findings Agent Development Process What’s Next

Implement proof of concepts Monitoring agent that collects parameter settings during problem solving and stores them in a centralized location Implement resolution models Quantitative analysis of resolution agent use