ANSALDO: BACKGROUND experience in dependable Signalling Automation Systems experience in dependable Management Automation Systems experience in installation,

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Distributed Data Processing
Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Ethernet as a field-network Renaud Barillère - CERN IT-CO.
2003 Indigo Technology, Inc. All Rights Reserved Alliance Portfolio Computing Infrastructure Services Customer Relationship Management Engineering Services.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
CS599 Software Engineering for Embedded Systems1 Software Engineering for Real-Time: A Roadmap Presentation by: Mandar Samant Raghbir Singh Banwait.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Company Profile.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
A Guide to major network components
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Data Center Infrastructure
ARRC Collision Avoidance System
© Siemens AG, CT SE 1, Dr. A. Ulrich C O R P O R A T E T E C H N O L O G Y Research at Siemens CT SE Software & Engineering Development Techniques.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Research and Projects Name: Aloysius. A. EDOH Name: Alo Address: Ext 3344.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
18 September Licensing for Next Generation Signalling Buddhadev Dutta Chowdhury 27 th April 2012.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Brussels, 1 June 2005 WP Strategic Objective Embedded Systems Tom Bo Clausen.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Initiatives for FP6 A few thoughts on IP-level research: Dependability-related Research the University of Lisboa Paulo E. Veríssimo
Intro to Network Design
Networks Of Mobile Arbitrary Devices (NOMADs) Miroslaw Malek Humboldt-University Berlin, Germany
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
1 / Name / Date IDA Interface for Distributed Automation The journey toward Distributed Intelligence.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
ECOGEM Cooperative Advanced Driver Assistance System for Green Cars Burak ONUR Project Coordinator R&D Support Executive
May 2004NTUA1 National Technical University of Athens EGEE Project 3 rd Parties Kick off Meeting, Athens, May 27-28, 2004 Dr. Costis Christogiannis Telecommunications.
Over View of CENELC Standards for Signalling Applications
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
B. RAMMAMURTHY Connected Vehicle Technology 6/6/2014 cse651 1.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
ANASOFT VIATUS. Challenges Supply chain optimization is necessary for achieving competitive price of final products Synchronization and utilization of.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Fall ‘99 Simulation Interoperability Workshop RTI Interoperability Study Group Final Report Michael D. Myjak, Chair.
Page 1 NeSSI II - A Platform for Micro-Analytical Devices Sensor Actuator Manager (SAM) Controller Considerations And Specification Identification CPAC.
Session 1: Technology Development August 15 NSF Workshop.
Decisive Themes, July, JL-1 ARTEMIS Decisive Theme for Integrasys Pedro A. Ruiz Integrasys July, 2011.
How to Influence ERTMS. The Organisations Involved EC UNIFE CER EIM UIC Infrastructure Forum GSMR Users Group (ERIG) Corridor Steering Group ERTMS Users.
Network Concepts.
Chapter 6: Securing the Cloud
KNOWLEDGE MANAGEMENT (KM) Session # 32
Design Decisions / Lessons Learned
Connected Vehicle Technology
An Overview of the ITTC Networking & Distributed Systems Laboratory
Overview of System Engineering
Technical University of Cluj-Napoca
Regulatory Oversight of HOF in Finland
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Online Learning.
Internet Engineering Course
Central Topic: EMBEDDED SYSTEM
STATEL an easy way to transfer data
Chapter 2: Building a System
Building a “System” Moving from writing a program to building a system. What’s the difference?! Complexity, size, complexity, size complexity Breadth.
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

ANSALDO: BACKGROUND experience in dependable Signalling Automation Systems experience in dependable Management Automation Systems experience in installation, commissioning, Validation Diagnostic and Maintenance of large automation systems for rail

ANSALDO: ARCHITECTURES FOR DEPENDABLE INFRASTRUCTURES

Ansaldo: Architectures for dependable infrastructures Architecture FEASIBILITY STUDIES use of COTS DEVELOPMENT OF THE INFRASTRUCTURE (HW+SW) Development of typical APPLICATION with application SWs belonging to systems of different integrity level VALIDATION

Ansaldo: Architectures for dependable infrastructures SEVERE SAFETY REQUIREMENTS (reference to CENELEC SIL 4 for RAIL) SEVERE AVAILABILITY REQUIREMENTS HIGH FAULT TOLERANT PERFORMANCE GRACEFULL DEGRADATION

Ansaldo: Architectures for dependable infrastructures PROTECTED COMMUNICATION BETWEEN SYSTEMS THROUGH CLOSED AND OPEN NETWORKS COMMUNICATION BETWEEN SIGNALLING EMBEDDED SYSTEMS COMMUNICATION BETWEEN SIGNALLING AND MANAGEMENT EMBEDDED SYSTEMS

Ansaldo: Architectures for dependable infrastructures THIS LEADS TO APPLICATION OF DIFFERENT INTEGRITY LEVEL IN THE SAME PLATFORMS, SPATIAL AND TEMPORAL FIREWALLS TO PROTECT THE HIGHER INTEGRITY LEVEL APPLICATIONS

Ansaldo: VITAL SW development and VALIDATION... UML METHODS FAULT TREE ANALISYS FOR TOP DOWN VALIDATION REAL TIME UML AUTOMATIC CODING Sw TEST cases, derived automatically by the selected methods and tools SYSTEM SIMULATION AND MODELLING

Ansaldo: SW VALIDATION: EVENT TREE ANALYSIS EXTENDED TO SW VALIDATION SW TEST CASES, DERIVED AUTOMATICALLY BY THE SELECTED METHODS AND TOOLS: the ANSALDO interest is in using the methods and tools in the validation of a SW application

WE ARE DEALING WITH LARGE EMBEDDED SYSTEM CONCERNING : SAFE SIGNALLING route control, train protection SUPERVISION AND MANAGEMENT OF RAIL & TRAFFIC PLANT SURVEILLANCE TRANSPORT BUSENESS

A possible example of APPLICATIONs of different Integrity level in the same VITAL COMPUTER : SIGNALLING APPLICATION (e.g. : Central Interlocking functions and Radio Block Center functions in ERTMS level 3) DIAGNOSTICS & SUPPORT to MAINTENANCE

ANSALDO DIAGNOSTICS & MAINTENANCE

INTELLIGENT SUPPORT TO…. DIAGNOSTICS ALSO FOR : PREDICTIVE MAINTENANCE

INTELLIGENT SUPPORT ALSO TO…. design (based on RAMS data from field) data preparation for configuration of systems data bases of data collected from field methods to derive RAMS parameters from field data configuration of systems in factory or in field commissioning of Large Automation Plants validation

INTELLIGENT SUPPORT... suitable data bases (information is large, and differentiated for different users belonging to suppliers and clients )

INTELLIGENT SUPPORT….. focal topics : open infrastructures wireless communication proactive computing embedded systems critical infrastructures interdependencies

INTELLIGENT SUPPORT... dependability: fault forecasting for System evaluation security requirement are essential (e.g. access to reserved information must be forbidden to non authorised personnel, connection with subsystem of different integrity level is necessary, intrusion of hackers must be avoided, etc…)

INTELLIGENT SUPPORT… ansaldo would like... Participate to the NoE De-fine Participate to the IP De-sire for design & development and testing of suitable methods

Sw Architecture for INTELLIGENT SUPPORT…:

INTELLIGENT SUPPORT…: low integrity Sw Requirement low cost validation for NON VITAL APPLICATION, even when implemented in vital computers

INTELLIGENT SUPPORT…: Additional lower integrity Sw Requirements INCREMENTALITY: able to allow in future new application services even not initially defined by the specification

INTELLIGENT SUPPORT…: Sw Architecture Requirements PERVASIVITY: able to be used also by other clients with no or minor constraints on their platforms and SW architectures

INTELLIGENT SUPPORT…: Sw Architecture Requirements DECENTRALISATION able to avoid a unique center and a unique network center to manage the exchange of data between the users

INTELLIGENT SUPPORT…: Sw Architecture Requirements EXTENSIBILITY able to deliver application services both on old formats or protocols and on new ones (generally correspondent to new services)

INTELLIGENT SUPPORT…: Sw Architecture Requirements INTEROPERABILITY open to all potential new users and services suppliers

INTELLIGENT SUPPORT…: Sw Architecture Requirements OPEN TO EXTERNAL able to provide its services and information through the network, accessible through Internet (Buseness to buseness Portal)

INTELLIGENT SUPPORT…: Sw Architecture Requirements SECURITY to protect the exchange of information with external to protect the internal information not authorised for external delivery to protect the internal information from intruders