A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and.

Slides:



Advertisements
Similar presentations
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
Advertisements

All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Distributed Data Processing
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Cloud Computing to Satisfy Peak Capacity Needs Case Study.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Dynamic Routing Scalable Infrastructure Workshop, AfNOG2008.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Rev A8/8/021 ABC Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Ch.6 - Switches CCNA 3 version 3.0.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
A Guide to major network components
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
IPv6 and IPv4 Coexistence Wednesday, October 07, 2015 IPv6 and IPv4 Coexistence Motorola’s Views for Migration and Co-existence of 3GPP2 Networks to Support.
A Combat Support Agency Defense Information Systems Agency GIG EWSE Application and Service (EE212) 17 August 2011 Tactical Edge Service: Service Adaption.
10/8/2015CST Computer Networks1 IP Routing CST 415.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Apartado Porto Codexwww.inescporto.pt tel (351) fax (351) /April/2005 Research Activities in 4G Networks at INESC Porto.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
UNIT 5 SEMINAR Unit 5 Chapter 6, plus Lab 10 for next week Course Name – IT482 Network Design Instructor – David Roberts Contact Information:
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
© 2007 The MITRE Corporation. All rights reserved Exposing Services in a Disadvantaged Environment S. Semy, M. Sabbouh, J. Higginson, F. Dandashi
Chapter 8: Internet Operation. Network Classes Class A: Few networks, each with many hosts All addresses begin with binary 0 Class B: Medium networks,
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
1 CCSDS Security Working Group Spring Meeting Colorado Springs Security Architecture January 19 th 2007.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Internet Protocol Storage Area Networks (IP SAN)
Status & Challenges Interoperability and global integration of communication infrastructure & service platform Fixed-mobile convergence to achieve a future.
7/11/0666th IETF1 QoS Enhancements to BGP in Support of Multiple Classes of Service Andreas Terzis Computer Science Department Johns Hopkins University.
Characteristics of Scaleable Internetworks
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Working at a Small-to-Medium Business or ISP – Chapter 6
SECURING NETWORK TRAFFIC WITH IPSEC
Federated IdM Across Heterogeneous Clouding Environment
Module 5 - Switches CCNA 3 version 3.0.
Goals Introduce the Windows Server 2003 family of operating systems
Working at a Small-to-Medium Business or ISP – Chapter 6
Presentation transcript:

A Combat Support Agency Defense Information Systems Agency GIG EWSE IA and NetOps (EE213) 17 August 2011 UNCLASSIFIED Tactical Edge Service: NetOps and IA Considerations NetOps and IA Considerations

A Combat Support AgencyAgenda Additional Tactical NetOps Challenges NetOps/IA Implications of Proposed Communications and Service Delivery Solutions NetOps/IA Research Areas Summary 2

A Combat Support Agency An EWSE Approach to the Tactical Edge Service Problem Technical Approach Framework 3 Tactical Services Tactical Networks Tactical Edge Environment Enterprise Services Core Networks Fixed Environment Network & Service Mgmt Identify management capabilities required to support the developed strategies Techniques and design patterns to adapt to the constrained tactical env. Techniques to improve network performance to meet the service layer requirements Service Adaption techniques to improve quality and reliability of tactical edge services Strategy #1 Strategy #2 Strategy #3 Strategy #4 Focus of this briefing

A Combat Support Agency NetOps in the fixed and tactical environments involves the same three general areas –monitoring, managing & controlling availability, allocation & performance (GEM) –protecting & defending to assure capabilities (GNA) –managing the visibility & accessibility of information (GCM) The tactical environment is made more difficult by –Operating Environment Much more dynamic network topology User and resource node mobility Limited capacity, intermittent communication channels Greater likelihood of deliberate action by adversary to disrupt/deny RF channels –Resource Limitations Availability of trained NetOps personnel Space, weight, and power constraints on processing, transmission & storage resources for NetOps Availability of RF spectrum and device capabilities Technical and procedural barriers to “resource pooling” –Organizational Structures Need to communicate “forward”, “upward” and “laterally” among heterogeneous mix of organizational elements and systems Complexity of operational control and reporting chains Why is Tactical NetOps more difficult?

A Combat Support Agency NetOps/IA Considerations for Service Adaptation Solutions Tiered Service Model –“Tier” of service should be chosen based on functional requirements and network path; “best available bandwidth” rather than shortest path algorithm for service delivery point selection may be more appropriate –Need to provide mechanism for characterization of network path between end device and service delivery point Service Proxy Gateway –Asynchronous operation (e.g. store & forward) implies use of transferable user identity token/credentials or authentication of users at proxy device –Compression, data/protocol translation imply intermediate decryption/re- encryption –Cross domain invocation of services requires agreement on user identity, attributes, and authentication mechanisms –Need to consider confidentiality and integrity of stored/cached data –Intelligent content filtering requires either external tagging or visibility into payload data Service Broker –Greatest utility is when broker can access service delivery points in multiple organizations Requires supporting policy and interoperable user identity, attributes, and authentication mechanisms Need to monitor and manage cross-domain resource utilization –Need to verify identity of both service delivery points and users –If combined with aggregation, the issue of transferable user identity token/credentials applies

A Combat Support Agency NetOps/IA Considerations for Service Design Pattern Solutions Adaptive Content Delivery –Needs same type of network path characterization mechanism as tiered service Distributed Architecture/Runtime Binding –Need to verify identity of distributed platforms –Need to monitor which distributed platform is being used by which user –May need mechanism to control distribution of load Forward Caching/Store and Forward –Implies use of transferable user identity token/credentials –Confidentiality and integrity of stored/cached data Offline Mode –May need to rate-limit traffic when device reconnects

A Combat Support Agency NetOps/IA Considerations for Enhance Transport Solutions Use of more sophisticated or adaptive modulation/ transmit power techniques and increased antenna gain makes RF spectrum management more complex Need agreement on QoS approach and implementation across domains; mission criticality versus transmission requirements of supported service (e.g. jitter, max latency) in packet queuing priority an open question Performance Enhancing Proxies imply intermediate decryption/re-encryption Application level gateways and security devices doing deep packet inspection need to account for payload compression

A Combat Support Agency Summary of NetOps/IA Considerations Supporting dynamic, secure relationships between users and resources requires bi-directional endpoint authentication Sharing of resources across organizational boundaries requires both operational agreement and NetOps function to monitor and control such use Rewriting packets and/or storing information at intermediate locations requires adjustments to end to end security and key distribution model Autonomous adaptive use of physical channel resources (bandwidth/spectrum) by end devices needs to be accounted for as part of overall NetOps resource management

A Combat Support Agency NetOps/IA Research Areas Network Path Characterization Method –potential for leveraging information exchanged as part of routing protocols –ongoing work in feeding link performance information into routing process Interoperability of Identity and Access Control across organizational boundaries –common identity solution for both users and service delivery points –assignment of capabilities to unanticipated users Extending Service Monitoring –how to identify who is utilizing a particular service –monitoring and controlling cross boundary service utilization Spectrum Allocation and Management for Self-adaptive RF Devices

A Combat Support Agency Example – Use DHCP to map end devices to servers and track use 10 1) End device does normal DHCP discovery/request 2) Response from DHCP server includes IP addresses for end device and Service Delivery Point 3) Assignment of end device and Service Delivery Point reported to/collected by NetOps center 4) Service Delivery Point logs requesting IP addresses

A Combat Support Agency Issues are both technical and operational –Need agreement on sharing and management of resources on across organizations for greatest efficiency –Method for assured user identity and access control across organizational boundaries a key capability Some possible technical improvements involve straightforward extensions of existing technology –Example #1 Both Tiered Service and Adaptive Content Delivery need a network path characterization mechanism Route computation often uses path characteristics but essentially discards this information and determines a single best route Expand available set of route choices and associated metrics by using Neighbor Specific BGP –Example #2 DHCP in wide use to distribute client IP address, subnet mask, DNS server and gateway IP information RFC 2132 includes option for providing multiple server addresses as part of DHCP response Use DHCP to distribute clients among alternative servers or to service broker 11Summary

A Combat Support Agency 12 UNCLASSIFIED