AMI Network-based Load Control Services Security & Protocol Considerations
|
|
- Camron Newton
- 7 years ago
- Views:
Transcription
1 February 2, 2006 AMI Network-based Load Control Services Security & Protocol Considerations 2005 OpenAMI
2 RAND Corporation s Vision of the 2004 Home Computer thank goodness for standards!!! Source: Popular Mechanics, OpenAMI Slide 2
3 AMI Network-based Load Control Services Security Considerations Trust Federation between AMI Network and Foreign Networks Mutual Authentication between AMI Network and Foreign Network Devices & Systems Common AMI Service Definitions, Authorizations and Privileges AMI Secure Service Delivery Capabilities 2005 OpenAMI Slide 3
4 NERC Security Standards CIP-002 through CIP-009 NERC Standards CIP-002 through CIP-009 provide a cyber security framework for protection of Critical Cyber Assets to ensure reliable operation of the Bulk Electric System CIP-002-1: Cyber Security Critical Cyber Assets R1. Critical Assets R Systems, equipment and facilities critical to automatic load shedding under control of a common system capable of shedding 300 MW or more CIP-005-1: Cyber Security Electronic Security standard requires the identification and protection of the Electronic Security Perimeter(s) inside which all Critical Cyber Assets reside, as well as all access points on the perimeter R1 Electronic Security Perimeter & Access Points R1.1. Access points to the Electronic Security Perimeter(s) shall include any externally connected communication end point (for example, dial-up modems) terminating at any device within the Electronic Security Perimeter(s) R2. Electronic Access Controls the Responsible Entity shall implement the organizational, technical, and procedural controls to permit or deny electronic access at all electronic access points to the Electronic Security Perimeter(s) 2005 OpenAMI Slide 4
5 AMI Network-based Load Control Services Many Protocols to Consider ANSI C x Utility Industry End Device Data Tables ANSI C12.22 Protocol Specification for Interfacing to Data Communication Networks IEC 61850, & Common Information Model (CIM) ASHRAE BACnet Data Communication Protocol for Building Automation & Control Networks ZigBee Alliance Z-Wave Alliance Broadband Wireless IEEE , & others OpenAMI Slide 5
6 ANSI C x Revision to ANSI C Specification The C x Standard provides a common data structure for use in transferring data to and from utility end devices, typically meters (electric, water & gas) The C x Data Structure is defined as sets of Tables Data Table Sets are grouped together into segments called Decades Each decade pertains to a particular feature set and data type such as Registers for Measured Values, Load Profile It is anticipated that the set of Standard Tables will grow to meet the need for common implementations of expanded functionality (C x introduces 8 new decades, and 4 new tables for existing decades) Manufacturer Tables are those data structures specified by individual end device vendors, used to allow introduction of new innovations or to provide customer requested data structures Meter Data is transferred by reading from or writing to a particular table or portion of a data table The effective transport of table structures is dependent only on the presence of basic read and write services it is left to the implementers of specific protocol stacks to select the read and write services to be included Note: Decade Numbering method modified Decade , 110 now Decade 1 10, 11, OpenAMI Slide 6
7 ANSI C x New Table Definition Language (TDL) The ANSI C12.19 Data Table Syntax or Table Definition Language (TDL) is expressed using the extended Bakus Naur Format (BNF) definitions, as described below: The syntax is a merge between the traditional Bakus Naur Format and XML simple BNF Extensible Markup Language (XML) 1.0, Second Edition There are addition extensions that facilitate the binding of production rules needed for the definition of the published pseudo PASCAL text (Section 9.0 Tables) and the machine readable XML based TDL The syntax also provides definitions for constraints on binary transmission and interpretation of types The files C1219TDL-1997.xml 1997.xml and C x.xml 200x.xml define the standard data table syntax and meta-data using XML notation These files are based directly on the extended BNF syntax described in Section 5.0 Syntax 2005 OpenAMI Slide 7
8 ANSI C x New Load Control and Pricing Tables Load Control and Pricing Tables load control operation, supports up to 255 control points through one of the following methods: Direct Load Control: a command is sent directly to the end device across a communication link to modify the state of one or multiple control points Schedule: the end device is programmed to modify the state of one or multiple control points at specific dates, recurring dates, period of the week or event detection Condition: the end device is programmed to modify the state of one or multiple control points based on the magnitudes of metered quantities, price level (active tier), time of the day, period of the year or any other condition that can be construct by a Single Line Math expression Prepayment: the end device is programmed to modify the state of one or multiple control points based on a remaining credit Prepayment method of load control is used to set credit limits for pre-warning, warning and turn off directive Includes all parameters necessary to directly bill the customer, which includes taxes, daily fix charges, rate of measured quantities and this base on the current season, tier and type of quantity Procedure Initiate Table load control and prepayment procedures: DIRECT_LOAD_CONTROL procedure provides direct load control over a communication link Level (0-100), Duration (hh:mm:ss), Randomization Period (minutes) MODIFY_CREDIT procedure modifies REMAINING_CREDIT as defined in Prepayment Status 2005 OpenAMI Slide 8
9 ANSI C12.22 Draft Interfacing Data Communication Networks Specification The C12.22 Application Layer Protocol provides a minimal set of services and data structures required to support networked C12.19 end devices (meters) for purposes of: Configuration Programming Monitoring & Information Retrieval The application layer protocol is composed of the following four nested components: ANSI C12.19 End Device Table data structure Protocol Specification for Advanced Metering (PSEM) Extended Protocol Specification for Advanced Metering (EPSEM) ACSE association control as defined by IEC 8650, and represented in BNF notation The data structures transported by the C12.22 Application Protocol are defined in the C12.19TDL-1997.xml and C x.xml standard specification files Note: The ACSE Association Control component is used by the ACSE-based implementation of the ANSI C12.22 Specification 2005 OpenAMI Slide 9
10 ANSI C12.22 Application Level Protocol Protocol Specification For Electric Metering (PSEM) The draft standard modifies and extends the C12.18 specification s PSEM application services Each service description consists of a request and a response Each of these requests and responses is described C12.22 Section Note: The new ANSI C12.22 PSEM Services (**) are used by the ACSE-based implementation of the ANSI C12.22 Specification 2005 OpenAMI Slide 10
11 ANSI C12.22 Application Level Protocol Extended Protocol Specification For Electric Metering (EPSEM) The draft specification defines the new EPSEM application services structure Enables transportation of multiple requests and responses, and provides It also provides response control and C12.19 device class 2005 OpenAMI Slide 11
12 ANSI C12.22 Application Level Protocol ISO Association Control Service Element (ACSE-based) Implementations ISO ACSE is an application layer protocol to establish and release an application-association between two application entities, and to determine the application context of that association The current draft of the C12.22 Specification is based on an ACSE-model model, where the protocol relies on the application layer <acse-pdu> to convey association & security parameters: application context <application-context-element> application process titles of called and calling process <called-aptitle-element> & <calling-aptitle> authentication information <mechanism-name-element> & <authentication-value-element> The application layer <acse-pdu> is also responsible for: ACSE Packet Segmentation and Reassembly C12.22 Device Addressing ACSE Packet Processing or Forwarding (routing) Note: The encoding ACSE is based on ISO , within the C12.22 specification it is represented using a BNF notation 2005 OpenAMI Slide 12
13 ANSI C12.22 Application Level Protocol IETF Internet Protocol Networking-based Implementations Another approach would be to utilize native internet protocols and a technologies to provide required network and application layer services Using an internet protocol-based implementation of the C12.22 Specification, the application layer components would rely upon IP protocols for networking, quality of service & security: IPv6 Addressing (stateless 128-bit based addressing) Packet Integrity (i.e., source node controls maximum packet size, no fragmentation) Security (integrated IPSec) Quality of Service (priority-based routing flags) Routing (OSPF, BGP) User Datagram Protocol (UDP) for packet transmission Kerberos & PKI for identity services (authentication & authorization) Internet Key Exchange (IKE) for public & symmetric key exchange services Kerberized Internet Negotiation of Keys (KINK) for symmetric key exchange services Domain Name System (DNS) for name resolution and service advertisement services 2005 OpenAMI Slide 13
14 IEC CIM & Schema Interval-based Price Signal 2005 OpenAMI Slide 14
15 IEC CIM & Schema Power Outage 2005 OpenAMI Slide 15
16 ASHRAE BACnet Data Communication Protocol for Building Automation & Control Networks ASHRAE Standard draft 12.X Load Control Object Type The Load Control object type defines an object whose properties represent the externally visible characteristics of a mechanism for controlling load requirements in a BACnet device a BACnet device can use a Load Control object to allow external control over the shedding of a load that it controls a BACnet client (controller) can request that the Load Control object o shed a portion of its load for a specified time by writing to the four properties: Requested_Shed_Level, Start_Time, Shed_Duration and Duty_Window Compliance with a client s load shed request may be affected by other factors, such as definition of the baseline usage, synchronization of time between the client and device containing the Load Control object, and any intrinsic device limits on shed amounts While the Load Control object is designed to allow independent operation, it is possible that there will exist within a building (or even within a device) a hierarchy of Load Control objects Where large loads are concerned, it is expected that the master Load Control object will employ sequencing to distribute the startup and shutdown of managed loads When the load control master is used in a gateway to a non-bacnet load control client, such as a utility company, the gateway shall accept and process any start randomization commands, and accordingly distribute the initiation of load control requests to its subordinate Load Control objects 2005 OpenAMI Slide 16
17 ZigBee Alliance Automation & Control Protocol for IEEE Wireless Networks ZigBee is a low-cost, low power, two-way, way, wireless communications protocol For consumer electronics, home and building automation, industrial controls, PC peripherals, medical sensor applications, toys and games The ZigBee stack architecture is made up of a set of blocks called layers Each layer performs a specific set of services for the layer above: a data entity provides a data transmission service and a management entity provides all other services Each service entity exposes an interface to the upper layer through a service access point (SAP), and each SAP supports a number of service primitives to achieve the required functionality Per website: 130+ participants 44+ companies implementing Source: ZigBee Specification, Document r00, Version OpenAMI Slide 17
18 Z-Wave Alliance Reliable Wireless Communication for Low Cost Control Networks Z-Wave is a low-cost, low power, two-way, way, wireless communications protocol The protocol consist of 4 layers MAC layer that controls the RF media Transfer Layer that controls the transmitting and receiving of frames Routing Layer that controls the routing of frames in the network Application layer controls the payload in the transmitted and received frames The Z-Wave protocol has 2 basic kinds of devices controlling devices & slave nodes Controlling devices initiate control commands and sends out the commands to other nodes Slave nodes are the nodes that reply on and execute the commands Per website: 125+ companies implementing Source: Z-Wave Protocol Overview, Document , Version OpenAMI Slide 18
19 IEEE , and Wireless Broadband Communications Standards Source: Understanding Wi-Fi and WiMAX as Metro-Access Solutions, Intel, OpenAMI Slide 19
20 Conclusions A common AMI Services Interface Definition specification is required Authenticated Connections Support for Identity & Key Management Standards certified by NIST AMI System & Device Identity Recovery after a Power Outage Authorized Access Controls & Privileges AMI Service levels & privileges defined by Utility, may be granted during authentication Common Network Naming & Addressing Needs to scale from a thousands to millions of devices, and customers Common Energy Services & Control XML Schema and Message Structures Harmonization of IEC, DNP, ANSI, BACnet, ZigBee, Z-Wave, others... AMI Network requirements should dictate AMI Services Interface Definition requirements 2005 OpenAMI Slide 20
ZigBee IP Stack Overview Don Sturek Pacific Gas and Electric (PG&E) 2009 ZigBee Alliance. All rights reserved. 1
ZigBee IP Stack Overview Don Sturek Pacific Gas and Electric (PG&E) 1 Presenter Background Pacific Gas and Electric Company Northern and Central California Gas and Electric Utility Company (including San
More informationEthernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
More informationGuide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More informationTHE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN OVERVIEW THE NEED FOR STANDARDS OSI - ORGANISATION FOR STANDARDISATION THE OSI REFERENCE MODEL A LAYERED NETWORK MODEL THE SEVEN OSI
More informationObjectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
More informationChapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.
Chapter 3: Review of Important Networking Concepts Magda El Zarki Dept. of CS UC Irvine elzarki@uci.edu http://www.ics.uci.edu/~magda 1 Networking Concepts Protocol Architecture Protocol Layers Encapsulation
More informationNetworking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
More informationVisio Enabled Solution: One-Click Switched Network Vision
Visio Enabled Solution: One-Click Switched Network Vision Tim Wittwer, Senior Software Engineer Alan Delwiche, Senior Software Engineer March 2001 Applies to: All Microsoft Visio 2002 Editions All Microsoft
More informationIP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
More informationThe OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationOSI Seven Layers Model Explained with Examples
OSI Layer Model describes how information is transmitted between networking devices. In this tutorial I will provide a brief introduction of OSI Layer model including its advantage and services. OSI model
More informationSLIP and PPP. Gursharan Singh Tatla. mailme@gursharansingh.in www.eazynotes.com. 1 www.eazynotes.com
SLIP and PPP Gursharan Singh Tatla mailme@gursharansingh.in 1 Data Link Layer in Internet We know that Internet consists of individual systems that are connected to each other. Basically, it is wide are
More informationZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile
Document Part Number 53-301017 Rev 0.1 April 2013 ii Exegin Technologies Limited Printed in Canada The information in this document is subject to change without notice. No part of this document may be
More informationEITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst
EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for
More informationPerformance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
More informationProtocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
More informationTCP/IP and the Internet
TCP/IP and the Internet Computer networking today is becoming more and more entwined with the internet. By far the most popular protocol set in use is TCP/IP (Transmission Control Protocol/Internet Protocol).
More informationThe OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
More informationMobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
More informationEmbedded Web Services: Making Sense out of Diverse Sensors
Embedded Web Services: Making Sense out of Diverse Sensors Introduction David E. Culler Gilman Tolle Arch Rock Corporation How many times have you heard, I just want to connect a collection of different
More informationNIST Coordination and Acceleration of Smart Grid Standards. Tom Nelson National Institute of Standards and Technology 8 December, 2010
NIST Coordination and Acceleration of Smart Grid Standards Tom Nelson National Institute of Standards and Technology 8 December, 2010 The Electric Grid One of the largest, most complex infrastructures
More information21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationGuide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
More informationCOMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
More informationITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
More informationOverview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
More informationIT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationSecurity in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering
Security in Smart Grid / IoT Nenad Andrejević Comtrade Solutions Engineering Introduction Why is security important With so much of our lives connected to the Internet from our critical infrastructure
More informationMobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationSecuring Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
More informationIndustrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationRedesigning automation network security
White Paper WP152006EN Redesigning automation network security Presented at Power and Energy Automation Conference (PEAC), Spokane, WA, March 2014 Jacques Benoit Eaton s Cooper Power Systems Abstract The
More informationSecure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea sntdvl@yahoo.com, taihoonn@paran.com Abstract: The overall
More informationZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
More informationData Communication and Computer Network
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
More informationAERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
More informationProtocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods
The Internet and its Protocols Protocol Specification & Design Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre/ Friday: 13:30-15:00 (Rm: 101)???: xx:x0-xx:x0 (Rm:???)
More informationEnergyAxis System: Security for the Smart Grid
Security for the Smart Grid 2010 by Elster All rights reserved. No part of this document may be reproduced, transmitted, processed or recorded by any means or form, electronic, mechanical, photographic
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationMobile IP and Wireless Application Protocol
Mobile IP and Wireless Application Protocol Mobile IP Uses Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile user's point of attachment
More informationInternet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
More informationChapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
More informationSimple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
More informationOSI Reference Model: An Overview
OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department
More informationCONTROL MICROSYSTEMS DNP3. User and Reference Manual
DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationTransport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
More informationData Communication Networks Introduction
Data Communication Networks Introduction M. R. Pakravan Department of Electrical Engineering Sharif University of Technology Data Networks 1 Introduction The course introduces the underlying concepts and
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationOverview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
More informationRedefining MDM for a Smart Grid Enabled
Redefining MDM for a Smart Grid Enabled Enterprise Florida Power and Light Radha Swaminathan Director, AMI Information Technology, MDM and its future in a smart grid enabled enterprise A key component
More informationHow To Understand The Internet Of S (Netware)
Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationElectronic Service Agent TM. Network and Transmission Security And Information Privacy
Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationThreats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security
Threats and Security Analysis for Enhanced Secure Neighbor Discovery Protocol (SEND) of IPv6 NDP Security Yvette E. Gelogo 1, Ronnie D. Caytiles 1 and Byungjoo Park 1 * 1Multimedia Engineering Department,
More informationInternet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
More informationIP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
More informationIPv6 Challenges for Embedded Systems István Gyürki 30.08.2011
IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011 AGENDA Introduction IPv6 why do we need it? Selecting the right TCP/IP stack Case study Conclusions Page 2 Company Profile Wireless Products
More informationNetwork Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationNetwork Models and Protocols
669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationBluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
More informationCSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
More information(Refer Slide Time: 01:38 01:37)
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More information6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt stefan@osg.samsung.com 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available
More informationFirst Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
More informationJuniper Networks Certified Internet Associate (JNCIA-Junos) Exam. http://www.examskey.com/jn0-101.html
Juniper JN0-101 Juniper Networks Certified Internet Associate (JNCIA-Junos) Exam TYPE: DEMO http://www.examskey.com/jn0-101.html Examskey Juniper JN0-101 exam demo product is here for you to test the quality
More informationSecurity (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
More informationPART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationIP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
More informationRIG Acceptance Test (RAT) Procedures
RIG Acceptance Test (RAT) Procedures RIG Acceptance Test (RAT) Procedure 0 Print Date 2 /20/2007 REVISION HISTORY REVISON NO. DATE DESCRIPTION 1.0 Initial Release 0 Update Logo and Links i RIG Acceptance
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationThe Latest Development of Smart Grid Standards and Pilot Projects
Cambridge, Massachusetts The Latest Development of Smart Grid Standards and Pilot Projects Dr. Jinyun Zhang IEEE Fellow & MERL Fellow Manager, Digital Communication November 2, 2010 For SmartGrids China2010
More information1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
More informationAlberta Reliability Standard Cyber Security Security Management Controls CIP-003-AB-5
A. Introduction 1. Title: 2. Number: 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and accountability to protect BES cyber systems against
More information920MHz Band Multi-hop Wireless Network System
920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart
More informationCourse 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile
Course 6292A: Installing and Configuring Windows 7 Client Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows 7 Type: Course Delivery Method: Instructor-led
More informationUsing the AnyBus -X Gateway to Communicate between a DVT camera and a Profibus Master
Using the AnyBus -X Gateway to Communicate between a DVT camera and a Profibus Master Page 1 of 13 Table of Contents 1 OVERVIEW... 3 2 INSTALLING AND CONFIGURING THE ANYBUS -X GENERIC GATEWAY AND ETHERNET
More informationIntroduction to IPv6 and Benefits of IPv6
Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet
More informationHow To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
More informationIPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationTYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
More informationCOMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.
COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall
More information