TU Wien. From Embedded Systems to System of Systems. Outline 01/09/14. H.Kopetz September 2014

Size: px
Start display at page:

Download "TU Wien. From Embedded Systems to System of Systems. Outline 01/09/14. H.Kopetz September 2014"

Transcription

1 TU Wien From Embedded Systems to System of Systems H.Kopetz September 2014 Work supported by EU FP 7 Project AMADEOS grant agreement Outline IntroducJon CharacterisJcs of an SoS Key Issues in SoS Design The Relied upon Interface An Example from the Smart Grid Conclusion 1

2 Embedded System An embedded system consists of a physical device and an integrated computer system that controls the funcjons of the physical device acjng in the physical environment (Cyber- Physical System, CPS). Most of today s machines and appliances, e.g., automojve engines, washing machines, medical devices, mobile phones or even consumer products, such as an electric toothbrush, are controlled by an embedded computer system. Measured by the numbers, the embedded system market is by far the largest market for the computer industry. Embedded Systems: Cyber World meets Physical World C C-System RT- CommunicaJon System C(Cyber)-System Controlled by Computer Programs Execution Time P-System Event in the P System CPS: Cyber-Physical System P(Physical)-System Controlled by the Natural Laws of Physics Physical Time 2

3 Embedded System Market World-wide Revenue by Major Industry in Billion Euros Industry AutomoJve Industrial Healthcare Energy CommunicaJon Consumer Total Hardware, Software and Services, including Telecom Market. Source IDC Study: Design of Future Embedded Systems Toward Systems of Systems. May 15, 2012 ICT Developments in the next few Years (1) Hardware Technology costs are dropping further: Significant reduc9on of ultra- mass- produced hardware (FPGAs, Logic, Cloud memory, MEMS sensors and actuators) and ubiquitous low- cost communicajon (wire- less, wire- bound, Internet). (2) Breakthrough in CogniPve CompuPng: Computers will be able to sense (hear, see, smell), reason about their environment and support a higher level of funcjonality and of man- machine interacjon (speech, gesture, etc.). (3) Increasing InterconnecPon of Systems will lead to more systems- of- systems, a further increase in system complexity, already a bo`leneck in many large systems of today. (4) Security and Safety: Security and safety concerns and related technologies will play a dominant role in the further deployment of ICT systems. 3

4 Embedded Systems get Interconnected The global availability of communicajon services makes it possible to connect independently developed embedded systems to each other and to the cloud to provide new synergisjc services and more efficient economic processes. Examples: Remote Medical Systems to hospitals and doctors ProducJon systems in different companies Consumer appliances (smart home) Smart grid According to IDC, by 2020 there will be more than 30 billion intelligent devices connected in one way or another. As a consequence Systems- of- systems of enormous complexity are emerging. The Hyped Vision: The Internet of Things Consumer Cloud Computing Production Machine Internet Consumer Product Fog Computing MEMS Sensors 4

5 Fog CompuPng What is Fog CompuPng? A paradigm that extends cloud compujng to the edge of the network a computer capability close to the end user. Provides real- Jme guarantees to cyber- physical applicajons. Produces refined data from the enormous raw sensor data. Challenging requirements w.r.t reliability and maintainability. Is under the control of a single organizajon Example: A computer- system in the home that integrates all sensor informajon and provides local services, such as energy management, security management, medical monitoring, etc. System of Systems (SoS) An SoS is an integrapon of a finite number of autonomous cons=tuent systems (CS) e.g., embedded systems, which are independent and operable, and which are networked together for a period of Pme to achieve a certain higher goal (refer to Jamshidi, 2009, T- Area SoS). An autonomous consjtuent embedded system (CS) encompasses a computer system, a physical object and a human operator its behavior is non- determinis9c. 5

6 CharacterisPcs of an Embedded System vs. SoS CharacterisPc Scope of System Clock synchronizajon Structure Requirements and Spec. EvoluJon TesJng ImplementaJon Technology Faults (Physical, Design) Control Emergence System development Embedded System Fixed (known) Internal Hierarchical Fixed Version control Test phases Given and fixed ExcepJonal Central Insignificant Process model SoS Not known External (GPS) Networked Changing Uncoordinated ConJnuous Unknown Normal Autonomous Important??? Key Issues in SoS Design Global Time InformaJon RepresentaJon EvoluJon Emergent Phenomena Dependability (Security and Safety) Cogni9ve Complexity 6

7 Global Time A proper model of global (physical) 9me provides the backbone of the temporal infrastructure of an SOS. It is needed to Interpret the Jme- stamps across the diverse CSs Control the dura9ons of physical processes. Specify the temporal proper9es of interfaces Synchronize observajons Synchronize output acjons Allocate resources conflict- free (e.g, in communicajon, scheduling) Detect errors promptly Strengthen security protocols The Global Time Base must be Sparse Because of the discrete digital Jme base and the impossibility to synchronize clocks precisely the system- wide consistent temporal order of events can only be achieved if the events occur in the acjvity intervals of a sparse Jme base: Time π Δ π Δ π Events are only allowed to occur at subintervals of the timeline 7

8 Models of Time in a CPS Dense Physics A B Discrete Central Computer Sparse Distributed Computer Real Time Real Time Real Time Models of Time in a CPS Dense Physics A B Discrete Central Computer Sparse Distributed Computer Real Time Real Time Precision of the Global Time Real Time 8

9 Events outside the SoC: Agreement Protocols If the occurrence of events is restricted to some acjve intervals with durajon π with an interval of silence of durajon Δ between any two acjve intervals, then we call the Jme base π/δ- sparse, or sparse for short. Non-sparse event Time π Δ π Δ π Events are only allowed to occur at subintervals of the timeline Handling of Simultaneity A Fundamental Problem In the hardware : meta-stability In operating systems: mutual exclusion In communication systems: order of messages A two-step solution: (i) Provide consistent view of simultaneity distinguish between events that are in the sphere of control (SoC) of the system and events that are outside the SoC--difficult (ii) Order simultaneous events according to some a priori established criterion--easy 9

10 InformaPon RepresentaPon An Informa=on Item (Itom) is a 9med proposi9on about some state or behavior of the world. An Itom consists of (dynamic) data and a (stajc) explana=on of the data. In cyber- space, data is represented by a bit- pahern. While the data is carried explicitly in a message, the explana9on is oken implied by context. In a large SoS the context of the sender can be different from the context of the receiver. If this is the case, then a message that carries data without an explanajon can be interpreted differently by the sender and the receiver. Example: 86 o F means the same as 30 o C Further Examples: Loss of the 125 Mio $ NASA MARS Orbiter on Sept. 23, 1999 was caused by a mismatch between English Units and Metric Units. The crash of an airplane on Jan 20, 2002 was caused the misinterpreta9on of the rate of descent into an airport - - Controlled Flight Into Terrain Accident (CFIT). 10

11 ExplanaPon of Data Human Context: The explana9on must refer to concepts that can be linked to the conceptual landscape of the intended user. Machine Context: The explana9on must specify how the data must be manipulated by a machine the explanajon is integrated in the program that processes the data and in the design of the machine. Conceptual Landscape of an Observer The totality of concepts and rela9ons among the concepts in the mind of the observer. Acquired by gene9c traits and sensory inputs over the lifejme of the observer. Can be parjjoned into two (overlapping) data bases RaJonal database: causal relajons among concepts Example: axioms and theorems IntuiJve database: associa9ve relajons among concepts Example: faces, episodes Strongly influenced by cultural environment of the observer. 11

12 ConPnuous EvoluPon There are many SoSs that are conjnuously evolving. The system boundaries are indeterminable e.g., car2car. There exists no authoritajve specificajon or final acceptance test of the system as a whole. The interfaces between the SoS and its external environment are subject to the evolujon of the external world. This evolujon is out of control of the cyber- system. Example : ATM System Client Bank ATM Owning Bank Client Bank CommunicaJon Network RUMI: Relied Upon Message Interface 12

13 Example : ATM System (2) The world- wide ATM system has evolved over the last fiky years with more than two million terminals installed changing every day. The are a number of standardized internal Relied Upon Message Interfaces (RUMI) among the CSs: ATM Card to ATM Machine Interface ATM- Machine- Client Bank Interface ATM- Machine owning Bank interface Emergent ProperPes The interacjons of the CSs of an SoS can lead to the appearance of novel properjes, called emergent proper9es at the SoS level that cannot be a`ributed to any of properjes of the CSs. Emergent properjes are irreducible, holisjc and of a new kind they disappear when the system is parjjoned into its subsystem. Emergent properjes can be unexpected or expected, they can be explained (weak emergence) or they can be unexplainable (strong emergence). Example: The appearance of deadlock in a distributed computer system. 13

14 Emergence: Interac=ons within an SoS There are three types of interacjons possible among the CSs that form an SoS InteracJons within Cyber space (CS), realized by the exchange of messages (CS- interacjons). InteracJons in the Physical Space (PhS), realized by the flow of material or energy (PhS- InteracJons). InteracJons of humans with a CSs and among humans. Any consjtuent system of an SoS has only a local view of the interacjons, seeing only the interacjons with its immediate partners. An omniscient external observer, who has a global view of all interacjons, is normally not available. ClassificaPon of Emergent Behavior 14

15 Detrimental Emergent Behavior in SoS ManifestaPon: Reduced Performance OscillaJons ErraJc Behavior InterrupJon of Service Causes: Feedback Mechanisms (Control Loops) Temporal Delays Capacity Limits Cascade Effects Feature InteracJons Strategy Conflicts Dependability: Reliability, Safety and Security Many SoSs should provide a dependable service 24hours/ day, 7days/week without any interrupjon. Examples: ATM system Electric Power Grid The global access via the Internet provides ample opportunijes for security a`acks. Since embedded systems act in the physical environment, the consequences of malicious security a`acks can be catastrophic in the physical world. Inadequate security mechanisms can be show- stoppers for the deployment for large SoSs. 15

16 Faults are Normal in an SoS Due to the autonomy of the CSs and the immense size, faults (physical, design) must be expected and tolerated. The design must mijgate the consequences of these faults and provide an acceptable service despite the occurrence of faults: The system must be parjjoned into independent fault containment units (FCU). The system must must detect the failure of an FCU reflec9ve self monitoring capabili9es. Since most faults are transient, the system must recover from transient faults within a short defined recovery Jme. The system must contain mechanisms to mijgate the consequences of permanent faults. Autonomic Fault Mi=ga=on ConsideraJons about fault containment and the control of error propaga9on have a decisive influence on the placement of the Relied Upon Message Interfaces (RUMIs): A CS should form an encapsulated fault- containment unit (FCU) Error detec9on mechanisms must be provided to detect failures of a CS within a short error detecjon latency. A CS should be capable to recover from a transient fault within a defined error recovery Jme provision of appropriate recovery points as part of the design. 16

17 Complexity Complex: Merriam Webster, 2013 hard to separate, analyze or solve; having many parts or aspects that are usually interrelated; On complexity in the Internet (a very large SoS): Complexity is the primary mechanism which impedes efficient scaling, and as a result is the primary driver of increases in both capital expenditures (CAPEX) and opera9onal expenditures (OPEX). Bush and Meyer, Some Internet Architectural Guidelines and Philosophy, RfC 3439, Dec Cogni=ve Complexity Complexity of a Scenario Complexity as a Property Complexity as a RelaJon Structural Complexity Dynamic Complexity CogniJve Complexity Socio PoliJcal Complexity Topological Components Links Algorithms Causality Temporal Feedback Computational Relation between a Scenario and a Human Observer Relation between a Scenario and Society 17

18 A Measure for the Cogni=ve Complexity What is a good measure for the cogni9ve complexity of a model? We are looking for a quanjty that measures the cognijve effort needed to understand a model of reality by a human observer. We consider the elapsed =me needed to understand a model by a given observer a reasonable measure for the cogni=ve effort and thus for the cogni=ve complexity of a model rela=ve to the observer. We assume that the given observer is representajve for the intended user group of the model. External vs. Internal Complexity External complexity is concerned with the service of a CS at a given relied upon interface. An Interface model explains the behavior at the service interface. Internal complexity is concerned with the design of the internals a CS. From the SoS point of view, a low external complexity of the RUMIs of the CSs should be strived for. In many cases, a low external complexity is achieved at the price of a high internal complexity. Example: A smart phone 18

19 SimplificaPon in Monolithic Systems There are a number principles known that simplify a design of a monolithic system [Kop11, p.45]: Principle of AbstracJon Principle SeparaJon of Concern Principle of Causality Principle of SegmentaJon Principle of Observability SimplificaPon in Systems- of- Systems (SoS) In addijon to the known principles for monolithic systems, SoS simplificajon principles focus on the design and placement of the relied- upon interfaces among the consjtuent systems: Sparse Global Time Classifica9on of Expected Changes Outside an SoS flexible, Inside an SoS stable Interfaces Internal CS Complexity vs. External Interface Complexity Autonomic Fault Mi9ga9on Isomorphic DecomposiJon 19

20 Relied Upon Interface (RUI) that connect CSs Whenever two embedded systems are connected to deliver a service from a service provider to a service requestor, a new interface must be provided at the boundary line between the two CSs. We call this new interface a Relied Upon Interface (RUI), because the provision of the services at the SoS level relies on the proper operajon of this new interface. The RUI consists of two separate interfaces, a Relied Upon Physical Interface (RUPI) that is concerned with the exchange of physical en99es across the RUI and a Relied Upon Message Interface (RUMI) that is concerned with the exchange of informa9on between the two CSs across the RUI. The Relied Upon Interface Left CS Boundary Line RUMI Right CS RUPI 20

21 The Relied Upon Physical Interface (RUPI) The Relied Upon Physical Interface (RUPI) deals with the exchange of physical en99es (material, energy) across the RUI. The transport of physical enjjes across the RUI implies also the transport of informajon we call this the intrinsic informa9on transport- - about the properjes of the physical enjjes. This intrinsic informa9on transport is linked to the presence of a physical enjty. We call the informajon about physical enjjes which is detached from the physical enjjes extrinsic informa9on. The Relied Upon Message Interface RUMI The RUMI is an SoS Internal Message interface between consjtuent systems (CS) that enables the transport of extrinsic state informa9on about the present and future state of the physical enjjes in the form of state messages without the presence of a physical enjty. With extrinsic informa9on it is possible to contemplate about and control the properjes of the physical enjjes at a future instant, without the presence of a physical enjty. Using the extrinsic informajon, we can specify the RUI service and the properjes of the RT enjjes at future points in Jme by an appropriate RUI interface model. 21

22 A RUMI should be a Stable Interface A RUMI should be a stable interface that hides the internal func9ons of a CS and the data representa9on at the interface to the environment. Changes within a CS that do not effect a RUMI are called minor changes, while those that effect the RUMI are called major changes. Since major changes can effect many CSs of an SoS, these major changes must be coordinated among all CSs of an SoS. RUMIs are owen standardized by an accepted industry consorjum or standard seqng organizajon. StandardizaJon of the Data Formats StandardizaJon of the ExplanaJon The placement and the specificapon of the RUMIs form the backbone of an SoS Architecture. Event- Triggered CommunicaPon A new message is sent, whenever a significant event occurs. Delay in the queues is unpredictable. BidirecJonal traffic needed for error detecjon. Common communicajon paradigm 22

23 Time- Triggered CommunicaPon In a Jme- triggered communicajon system, the sender and receiver(s) agree a priori on a cyclic Jme- controlled conflict- free communicajon schedule for the sending of Jme- triggered messages. In every period, a message is sent at exactly the same phase. The control and data flow is unidirecjonal. Error detecjon is in the sphere of control of the receiver, based on his a priori knowledge of the arrival instants of messages. A Jme- triggered interface is temporal firewall that eliminates control errors. Comparison: Event Message vs. State Message Event Message Event InformaJon Queues ConsumpJon on Read No Real- Time Guarantees Explicit Flow Control BidirecJonal Error DetecJon at Sender Long Error DetecJon Latency For non- real =me data State Message State InformaJon Update In Place No ConsumpJon on Read Real- Time Guarantees Implicit Flow Control UnidirecJonal (MulJcast) Error DetecJon at Receiver Short Error DetecJon Latency For real =me data 23

24 The RUMI should be based on State Messages Real- Jme state informajon that is exchanged across a RUMI should be encoded in periodic state messages. State messages report about the present or future state of a RT enjty, are self- contained and easy to understand, since they require no context. State messages are idempotent duplica9on of a state message has no effect and a lost state message is autonomously mijgated in the next cycle. State messages erect a temporal firewall and are an ideal base for the implementajon of fault tolerance. The Relied Upon Interface Left CS Boundary Line RUMI Right CS RUPI 24

25 The Two RUMI Interface Models The LeW- CS Interface model describes the services of the Lek CS that are provided to the Right CS. The Right- CS Interface model describes the services of the Right CS that are provided to the Lek CS. The two interface models must be based on an agreed ontology explaining the meaning of the interface variables exchanged across the RUMI and must be compajble with each other. Since the service at future points in 9me is explicated, a global Jme of proper precision among the CS is required. Service Level Agreement (SLA) Before a service can be provided at a RUMI, a Service Level Agreement between the service requester and the service provider must be established. The service level agreement contains: The descripjon of the stajc properjes of the service The specificajon of the domains of the variables that are contained in a service request. The quality of the provided service. The cost of the service. PenalJes that will apply, if a commihed service is not provided. 25

26 Request Reply Model of the RUMI We disjnguish between the request instant t r and the delivery instant t d of a service request. At t r (which must be before t d ) a service request message containing the descripjon of the requested service at t d is sent to the service provider by the service requestor. The service provider responds with a service response message, hopefully indicajng its commitment to provide the service at t d. The internal variables and algorithms used by the service provider to arrive the service response are not visible at the RUMI. At t d the service provider controls its P- system such that the requested service is delivered. An Example from the Smart Grid To further explain the concepts introduced so far, we provide an example of a RUI specificajon between a micro- grid and a ujlity: Left CS Right CS Micro- grid Controller RUMI UJlity Controller CONSUMER PRODUCER STORAGE Micro-grid Power Line RUPI Utility 26

27 The Problem: Circular Dependencies The micro- grid can be a consumer or producer of power. The Jme- dependent price of power is determined by the ujlity. The decision whether the micro- grid consumes power from the ujlity or delivers power to the ujlity during a given interval depends, among other variables, on the price paid by the ujlity. The price offered by the ujlity during a given interval depends, among other variables, on the amount of power consumed or produced by the plurality of micro- grids. This circularity is resolved by a sequenjal iterajon, where the rate of change of one iterajon to the next is limited. Flow Interface vs. Discrete Event Interface The RUPI between the smart grid and the ujlity is a flow interface, where the integral of the power flow over a 9me interval gives the energy flow in this interval. We parjjon the Jme- line in 15 minute intervals and assume that the power flow and the price over an interval is constant. The start of each 15 minute interval is the delivery instant t d. The planning horizon for the power flow is 24 hours, i.e., 96 fikeen minute intervals. The iterajon consists of state messages that are exchanged every 15 minutes. The state message from the ujlity contains the anjcipated price and the state message from the micro- grid contains the amount of power consumed/produced in each one of the 15 minute interval. 27

28 SLA between the UPlity and the Smart Grid The SLA specifies a price band for the electric energy provided or accepted by the ujlity and boundaries for the electric power consumed or produced by a micro- grid. One hour before the delivery instant t d the ujlity must commit the price for the interval that starts at t d. 45 minutes before delivery instant t d the micro- grid must commit the amount of energy consumed or produced in the interval that starts at t d for the commi`ed price. The rates of change of the energy prices and the amount of energy consumed/produced are limited. If a CS does not honor its commihed values, a penalty applies. Service DescripPon of the RUI Every 15 minutes the ujlity will send a price vector with 96 fields (the next 24 hour period) containing the prices for consumed/produced energy. Based on the ujlity prices, the micro- grid will send a consumpjon/producjon vector with 96 fields (the next 24 hour period) every 15 minutes to the ujlity containing the planned amount of energy consumed/produced. One hour before the delivery instant t d the ujlity will commit to the price and 45 minutes before the delivery instant t d the micro grid will commit to the amount of energy. StarJng at t d the micro- grid will consume/produce the commi`ed energy at the commi`ed price. 28

29 The Interface Models Le_ CS (Micro- grid): Based on the energy prices received from the ujlity, the energy needed within the micro- grid and the storage state of the ba`ery, the micro- grid will determine if the energy from the Photo- Voltaic Cells should be delivered to the ujlity or stored in the ba`eries. Right CS (UPlity): Based on the amount of energy consumed/produced by the plurality of micro- grids and the given energy prices on the spot market, the UJlity will determine the energy prices for the next 24 hour period. These procedures will be repeated iterajvely unjl one hour before the delivery interval. Conclusions Systems of systems are substanjally different from monolithic embedded systems many of the established design methods need to be revisited. The substanjal cogni9ve effort required to understand a system- of- system from the different perspecjves is the main cause for the massive engineering effort in design and operajon. It is a worthwhile goal to structure a System of System such that the cogni9ve complexity for understanding the designed arjfact is reduced. 29

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

The Temporal Firewall--A Standardized Interface in the Time-Triggered Architecture

The Temporal Firewall--A Standardized Interface in the Time-Triggered Architecture 1 The Temporal Firewall--A Standardized Interface in the Time-Triggered Architecture H. Kopetz TU Vienna, Austria July 2000 Outline 2 Introduction Temporal Accuracy of RT Information The Time-Triggered

More information

Mixed-Criticality: Integration of Different Models of Computation. University of Siegen, Roman Obermaisser

Mixed-Criticality: Integration of Different Models of Computation. University of Siegen, Roman Obermaisser Workshop on "Challenges in Mixed Criticality, Real-time, and Reliability in Networked Complex Embedded Systems" Mixed-Criticality: Integration of Different Models of Computation University of Siegen, Roman

More information

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,

More information

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Applica3on So5ware

More information

Splunk Enterprise in the Cloud Vision and Roadmap

Splunk Enterprise in the Cloud Vision and Roadmap Copyright 2013 Splunk Inc. Splunk Enterprise in the Cloud Vision and Roadmap Alex Munk PM Cloud #splunkconf Ledio Ago Director of Engineering Cloud Legal NoJces During the course of this presentajon, we

More information

The ISP Column A monthly column on all things Internet

The ISP Column A monthly column on all things Internet The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Software AG Fast Big Data Solutions. Come la gestione realtime dei dati abilita nuovi scenari di business per le Banche

Software AG Fast Big Data Solutions. Come la gestione realtime dei dati abilita nuovi scenari di business per le Banche Software AG Fast Big Data Solutions Come la gestione realtime dei dati abilita nuovi scenari di business per le Banche Software AG Fast Big Data Solutions Get there faster Vittorio Carosone Regional Sales

More information

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Based on Time- Triggered Ethernet with Multiple Ring Topologies University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Need for mixed-criticality systems due to

More information

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11 Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.

More information

Principles and characteristics of distributed systems and environments

Principles and characteristics of distributed systems and environments Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single

More information

How To Understand The Concept Of A Distributed System

How To Understand The Concept Of A Distributed System Distributed Operating Systems Introduction Ewa Niewiadomska-Szynkiewicz and Adam Kozakiewicz ens@ia.pw.edu.pl, akozakie@ia.pw.edu.pl Institute of Control and Computation Engineering Warsaw University of

More information

Milestone Edge Storage with flexible retrieval

Milestone Edge Storage with flexible retrieval White paper Milestone Edge Storage with flexible retrieval Prepared by: John Rasmussen, Senior Technical Product Manager, Milestone XProtect Corporate Business Unit Milestone Systems Date: July 8, 2015

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

How Network Operators Do Prepare for the Rise of the Machines

How Network Operators Do Prepare for the Rise of the Machines Internet of Things and the Impact on Transport Networks How Network Operators Do Prepare for the Rise of the Machines Telecommunication networks today were never designed having Inter of Things use cases

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things M A R K E T S P O T L I G H T T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things May 2015 Adapted from Perspective: The Internet of Things Gains Momentum in Manufacturing in 2015,

More information

cloud SOA www.cloud4soa.eu Research Guide

cloud SOA www.cloud4soa.eu Research Guide cloud SOA A Cloud interoperability framework and platform for user-centric, semantically-enhanced, service-oriented application design, deployment and distributed execution Research Guide www.cloud4soa.eu

More information

How To Improve The Performance Of Anatm

How To Improve The Performance Of Anatm EXPLORATORY RESEARCH IN ATM David Bowen Chief ATM 4 th May 2015 1 ATM Research in Europe HORIZON Transport Challenges smart, green and integrated transport FlightPath 2050 five challenges to aviation beyond

More information

Supercomputing applied to Parallel Network Simulation

Supercomputing applied to Parallel Network Simulation Supercomputing applied to Parallel Network Simulation David Cortés-Polo Research, Technological Innovation and Supercomputing Centre of Extremadura, CenitS. Trujillo, Spain david.cortes@cenits.es Summary

More information

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

White Paper: Pervasive Power: Integrated Energy Storage for POL Delivery

White Paper: Pervasive Power: Integrated Energy Storage for POL Delivery Pervasive Power: Integrated Energy Storage for POL Delivery Pervasive Power Overview This paper introduces several new concepts for micro-power electronic system design. These concepts are based on the

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

Distribution transparency. Degree of transparency. Openness of distributed systems

Distribution transparency. Degree of transparency. Openness of distributed systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed

More information

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom. M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com

Industrial Roadmap for Connected Machines. Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Roadmap for Connected Machines Sal Spada Research Director ARC Advisory Group sspada@arcweb.com Industrial Internet of Things (IoT) Based upon enhanced connectivity of this stuff Connecting

More information

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview. Title Series Managing IP Centrex & Hosted PBX Services Date July 2004 VoIP Performance Management Contents Introduction... 1 Quality Management & IP Centrex Service... 2 The New VoIP Performance Management

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture

Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Architecture 1 B. Kamala 2 B. Priya 3 J. M. Nandhini 1 2 3 ABSTRACT The global economic recession and the shrinking budget

More information

Virtualized WAN Optimization

Virtualized WAN Optimization Virtualized WAN Optimization The Road to Cloud Computing Written by: Michael Keen, DABCC.com October, 2009 1 DABCC Opinion Strong market potential and growth in the application delivery and WAN optimization

More information

The emerging cross-industry ICTization changes competition within the wholesale business 2032

The emerging cross-industry ICTization changes competition within the wholesale business 2032 Strategy Christof Gerlach, Dr Werner Knoben, Tim Schellschmidt Everything Flows The emerging cross-industry ICTization changes competition within the wholesale business 2032 The need for cross-industry

More information

Collided Vehicle Position Detection using GPS & Reporting System through GSM

Collided Vehicle Position Detection using GPS & Reporting System through GSM Collided Vehicle Position Detection using GPS & Reporting System through GSM M.M.Raghaveendra 1, N.Sahitya 2, N.Nikhila 3, S.Sravani 4 1 Asst.Professor ECE Department, 2 Student, 3 Student, 4 Student,

More information

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology

More information

Autonomic IoT Systems Realizing Self-* Properties in IoT Systems

Autonomic IoT Systems Realizing Self-* Properties in IoT Systems Autonomic IoT Systems Realizing Self-* Properties in IoT Systems Noor Bajunaid nbajunai@masonlive.gmu.edu CS 788 Fall 2015 1 IoT and CPS The internet of things is known as giving any object the ability

More information

Introduction CHAPTER 1

Introduction CHAPTER 1 CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by

More information

Opportunities to Overcome Key Challenges

Opportunities to Overcome Key Challenges The Electricity Transmission System Opportunities to Overcome Key Challenges Summary Results of Breakout Group Discussions Electricity Transmission Workshop Double Tree Crystal City, Arlington, Virginia

More information

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet. KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

Virtual PC-Type Thin Client System

Virtual PC-Type Thin Client System Thin Client Virtual PC-Type Thin Client System KAWASHIMA Hiroyuki, KOSHIBA Kunihiro, TUCHIMOCHI Kazuki, FUTAMURA Kazuhiro, ENOMOTO Masahiko, WATANABE Masahiro Abstract NEC has developed VirtualPCCenter,

More information

Delivering Managed Services Using Next Generation Branch Architectures

Delivering Managed Services Using Next Generation Branch Architectures Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN

More information

Transforming industries: energy and utilities. How the Internet of Things will transform the utilities industry

Transforming industries: energy and utilities. How the Internet of Things will transform the utilities industry Transforming industries: energy and utilities How the Internet of Things will transform the utilities industry GETTING TO KNOW UTILITIES Utility companies are responsible for managing the infrastructure

More information

EE552. Advanced Logic Design and Switching Theory. Metastability. Ashirwad Bahukhandi. (Ashirwad Bahukhandi) bahukhan@usc.edu

EE552. Advanced Logic Design and Switching Theory. Metastability. Ashirwad Bahukhandi. (Ashirwad Bahukhandi) bahukhan@usc.edu EE552 Advanced Logic Design and Switching Theory Metastability by Ashirwad Bahukhandi (Ashirwad Bahukhandi) bahukhan@usc.edu This is an overview of what metastability is, ways of interpreting it, the issues

More information

Mobile Technologies Index

Mobile Technologies Index www.pwc.com/technology Technology Institute Mobile Technologies Index Mobile operating system: Smartphones will just get smarter By Raman Chitkara, Global Technology Industry Leader The smartphone seems

More information

VoIP Timing and Synchronization Best Practices

VoIP Timing and Synchronization Best Practices Best Practices A Brilliant Telecommunications White Paper December 2006 Introduction The explosive adoption of packet based networks from circuit switched (i.e. PSTN) continues to change the networking

More information

The Importance of Software License Server Monitoring

The Importance of Software License Server Monitoring The Importance of Software License Server Monitoring NetworkComputer How Shorter Running Jobs Can Help In Optimizing Your Resource Utilization White Paper Introduction Semiconductor companies typically

More information

Networking Technologies for 5G

Networking Technologies for 5G The Fifth Generation Mobile Communications Promotion Forum (5GMF) Networking Technologies for 5G Network Architecture Committee 5GMF AWG-18 Kyoto, Japan 9 Mar. 2015 1/32 Contents 1. Mission of the network

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Software Engineering for Real- Time Systems.

Software Engineering for Real- Time Systems. Software Engineering for Real- Time Systems. Presented by Andrew Dyer-Smith and Jamie McClelland Overview What are Real-Time Systems. Requirements of Real-Time Systems Current Technology Construction 1

More information

Solving big data problems in real-time with CEP and Dashboards - patterns and tips

Solving big data problems in real-time with CEP and Dashboards - patterns and tips September 10-13, 2012 Orlando, Florida Solving big data problems in real-time with CEP and Dashboards - patterns and tips Kevin Wilson Karl Kwong Learning Points Big data is a reality and organizations

More information

Teaching Embedded So0ware Concepts Using Android

Teaching Embedded So0ware Concepts Using Android Teaching Embedded So0ware Concepts Using Android Jogesh K. Muppala Dept. of Computer Science and Engineering The Hong Kong University of Science and Technology Clearwater Bay, Kowloon, Hong Kong muppala@cse.ust.hk

More information

Big Data Driven Knowledge Discovery for Autonomic Future Internet

Big Data Driven Knowledge Discovery for Autonomic Future Internet Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

IERC IoT Research and Innovation. 29-30 September 2014, Brussels, Belgium

IERC IoT Research and Innovation. 29-30 September 2014, Brussels, Belgium www.internet-of-things-research.eu IERC IERC IoT Research and Innovation Stakeholders Consultation Workshop Network Technologies Work Programme 2016-2017 29-30 September 2014, Brussels, Belgium Dr. Ovidiu

More information

Data Management in Sensor Networks

Data Management in Sensor Networks Data Management in Sensor Networks Ellen Munthe-Kaas Jarle Søberg Hans Vatne Hansen INF5100 Autumn 2011 1 Outline Sensor networks Characteristics TinyOS TinyDB Motes Application domains Data management

More information

Virtual Machine in Data Center Switches Huawei Virtual System

Virtual Machine in Data Center Switches Huawei Virtual System Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From

More information

Exploring Cyber-Physical Systems

Exploring Cyber-Physical Systems Fakultät für Informatik Institut für Software- und Multimediatechnik Resubic Lab Dresden Exploring Cyber-Physical Systems http://www.resubic.org O, quae mutatio rerum. Prof. Dr. Uwe Aßmann Version 04.04.11

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

Microsoft s Open CloudServer

Microsoft s Open CloudServer Microsoft s Open CloudServer Page 1 Microsoft s Open CloudServer How is our cloud infrastructure server design different from traditional IT servers? It begins with scale. From the number of customers

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

Monitoring within an Autonomic Network: A. Framework

Monitoring within an Autonomic Network: A. Framework Monitoring within an Autonomic Network: A GANA based Network Monitoring i Framework Anastasios Zafeiropoulos, Athanassios Liakopoulos, Alan Davy, Ranganai Chaparadza tzafeir@grnet.gr Greek Research and

More information

Real Time Programming: Concepts

Real Time Programming: Concepts Real Time Programming: Concepts Radek Pelánek Plan at first we will study basic concepts related to real time programming then we will have a look at specific programming languages and study how they realize

More information

Synchronization Essentials of VoIP WHITE PAPER

Synchronization Essentials of VoIP WHITE PAPER Synchronization Essentials of VoIP WHITE PAPER Synchronization Essentials of VoIP Introduction As we accelerate into the New World of VoIP we assume we can leave some of the trappings of wireline telecom

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

Research at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014

Research at the Department of Computer Science and Software Engineering. Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research at the Department of Computer Science and Software Engineering Professor Yong Yue BEng, PhD, CEng, FIET, FIMechE 17 October 2014 Research Areas Ar%ficial intelligence Robo%cs Data mining Image

More information

IntroducJon to Splunk Cloud & Case Study: MindTouch. Praveen Rangnath Splunk César López- Natarén MindTouch Aaron Fulkerson MindTouch

IntroducJon to Splunk Cloud & Case Study: MindTouch. Praveen Rangnath Splunk César López- Natarén MindTouch Aaron Fulkerson MindTouch Copyright 2014 plunk Inc. Copyright @ 2 014 CSomcast IntroducJon to Splunk Cloud & Case Study: MindTouch Praveen Rangnath Splunk César López- Natarén MindTouch Aaron Fulkerson MindTouch Disclaimer During

More information

Virtual Full Replication for Scalable. Distributed Real-Time Databases

Virtual Full Replication for Scalable. Distributed Real-Time Databases Virtual Full Replication for Scalable Distributed Real-Time Databases Thesis Proposal Technical Report HS-IKI-TR-06-006 Gunnar Mathiason gunnar.mathiason@his.se University of Skövde June, 2006 1 Abstract

More information

Optimization Problems in Infrastructure Security

Optimization Problems in Infrastructure Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,

More information

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers Modern IT Operations Management Why a New Approach is Required, and How Boundary Delivers TABLE OF CONTENTS EXECUTIVE SUMMARY 3 INTRODUCTION: CHANGING NATURE OF IT 3 WHY TRADITIONAL APPROACHES ARE FAILING

More information

QoS for (Web) Applications Velocity EU 2011

QoS for (Web) Applications Velocity EU 2011 QoS for (Web) Applications Velocity EU 2011 Intelligent Activity Metering Self Regulated Software Signals & Control william.louth@jinspired.com Self Adaptive Software Self Adaptive Software evaluates its

More information

Some Software Technologies for Resilient Computing

Some Software Technologies for Resilient Computing Some Software Technologies for Resilient Computing Jean-Charles FABRE OSD Conference, Tokyo, Japan, March 7, 2012 Resilient computing Resilience is defined as the persistence of dependability when facing

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant International Journal of Computational Engineering Research Vol, 03 Issue, 4 Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant 1, Mr.S.Vimalraj, 2, Gausalya.R.B, 3, Samyuktha.V,

More information

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by

More information

IoT Prospects of Worldwide Development and Current Global Circumstances

IoT Prospects of Worldwide Development and Current Global Circumstances IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in

More information

Designing Real-Time and Embedded Systems with the COMET/UML method

Designing Real-Time and Embedded Systems with the COMET/UML method By Hassan Gomaa, Department of Information and Software Engineering, George Mason University. Designing Real-Time and Embedded Systems with the COMET/UML method Most object-oriented analysis and design

More information

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer

More information

ITU-T Future Networks and Its Framework of Virtualization

ITU-T Future Networks and Its Framework of Virtualization ITU-T Future Networks and Its Framework of Virtualization Ziaul Ain Usmani 1, Dr. Gulabchand K. Gupta 2 1 Research Scholar, JJT University, Jhunjhunu, Rajasthan, India 2 Western College of Commerce and

More information

IoT Analytics Today and in 2020

IoT Analytics Today and in 2020 Competitive Edge from Edge Intelligence IoT Analytics Today and in 2020 Aapo Markkanen: Principal Analyst Competitive Edge from Edge Intelligence IoT Analytics Today and in 2020 INTRODUCTION Across the

More information

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS

More information

A Novel Approach to QoS Monitoring in the Cloud

A Novel Approach to QoS Monitoring in the Cloud A Novel Approach to QoS Monitoring in the Cloud 2nd Training on Software Services- Cloud computing - November 11-14 Luigi Sgaglione EPSILON srl luigi.sgaglione@epsilonline.com RoadMap Rationale and Approach

More information

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

Chapter 11 I/O Management and Disk Scheduling

Chapter 11 I/O Management and Disk Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

MES and Industrial Internet

MES and Industrial Internet October 7, 2014 MES and Industrial Internet Jan Snoeij Board Member, MESA International Principal Consultant, CGI Do you know MESA? Agenda Introduction Internet of Things Big Data Smart Factory or Smart

More information

Integrated System Modeling for Handling Big Data in Electric Utility Systems

Integrated System Modeling for Handling Big Data in Electric Utility Systems Integrated System Modeling for Handling Big Data in Electric Utility Systems Stephanie Hamilton Brookhaven National Laboratory Robert Broadwater EDD dew@edd-us.com 1 Finding Good Solutions for the Hard

More information

The Internet of Things

The Internet of Things The Internet of Things The Power of Actionable Insight An introduction to the Internet of Things Chris Vetor Business Unit Executive, WW Programs cvetor@us.ibm.com More and more of the world s activity

More information

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing

NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science

More information

Revitalising your Data Centre by Injecting Cloud Computing Attributes. Ricardo Lamas, Cloud Computing Consulting Architect IBM Australia

Revitalising your Data Centre by Injecting Cloud Computing Attributes. Ricardo Lamas, Cloud Computing Consulting Architect IBM Australia Revitalising your Data Centre by Injecting Attributes Ricardo Lamas, Consulting Architect IBM Australia Today s datacenters face enormous challenges: I need to consolidate to reduce sprawl and OPEX. I

More information

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications

More information

Network Infrastructure Considerations for Smart Grid Strategies By Jim Krachenfels, Marketing Manager, GarrettCom, Inc.

Network Infrastructure Considerations for Smart Grid Strategies By Jim Krachenfels, Marketing Manager, GarrettCom, Inc. Network Infrastructure Considerations for Smart Grid Strategies By Jim Krachenfels, Marketing Manager, GarrettCom, Inc. The Smart Grid is having a decided impact on network infrastructure design and the

More information

Key Challenges in Cloud Computing to Enable Future Internet of Things

Key Challenges in Cloud Computing to Enable Future Internet of Things The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet

More information

Integrated management information in utilities

Integrated management information in utilities Integrated management information in utilities Information from Cigré The objective of this article is to assist utilities define, specify and evaluate the high level management systems that form the information

More information