System Aware Cyber Security. Barry Horowitz University of Virginia March 2014

Size: px
Start display at page:

Download "System Aware Cyber Security. Barry Horowitz University of Virginia March 2014"

Transcription

1 System Aware Cyber Security Barry Horowitz University of Virginia March 2014

2 Our Team SIE Faculty: Horowitz, Beling Research Scientists: Jones, Suhler, Lau CS Faculty: Skadron, Humphrey Post Doc: Li ECE Faculty: Williams Research Scientist: Elks Students 1 PhD, 5 MS, 4 Undergraduate External Partners University: GTRI (UAV integration lead) Industry: Mitre(Distributed Sim for Ops Concept Development) Leidos(Army/AF Exploitation System Support) SiCore(Secure Electronics at the Board Level)

3 System Aware Cyber Security Operates at the system application-layer, For security insideof the network and perimeter protection provided for the whole system Directly protects the most critical system functions Solutions are embedded within the protected functions Addresses supply chain and insider threats Includes physical systems as well as information systems Solution-space consists of reusable design patterns,reducing unnecessary duplications of design and evaluation efforts Design Patterns can be implemented in a super secure programmable Sentinel Specific implementation, being addressed through prototyping, involves development of a secure Sentinel for monitoring a system and taking restoration actions when appropriate. Research includes addressing critical issue of the humans in the loop and concept of operations Working with Mitre team at Creech AFB Research includes decision support tools for selection of solutions Planning for Work Shop with Naval Cyber Command in October time frame

4 Broad Objective Reversing cyber security asymmetry from favoring our adversaries (small investment in straight forward cyber exploits upsetting major system capabilities), to favoring the US (small investments for protecting the most critical system functions using System Aware cyber security solutions that require very complex and high cost exploits to defeat)

5 Broad Objective Reversing cyber security asymmetry from favoring our adversaries (small investment in straight forward cyber exploits upsetting major system capabilities), to favoring the US (small investments for protecting the most critical system functions using System Aware cyber security solutions that require very complex and high cost exploits to defeat) Focus on Defense Against Exploits that Impact System Performance (e.g., Data Corruption, Functional Degradation, System Latencies)

6 Solution Selection Blue Team Identifies and prioritizes critical system functions and risks Red Team Identifies most desirable/lowest cost attacks (cost measured in complexity, risk of discovery, dollars required, etc.) Blue Team Identifies the set of security design patterns that address results of Blue/Red team prioritization analyses Green Team Conducts cost/asymmetry analyses and selects desired solution that fits budget constraints

7 Solution Selection Blue Team Identifies and prioritizes critical system functions and risks Red Team Identifies most desirable/lowest cost attacks (cost measured in complexity, risk of discovery, dollars required, etc.) Blue Team Identifies the set of security design patterns that address results of Blue/Red team prioritization analyses Green Team Conducts cost/asymmetry analyses and selects desired solution that fits budget constraints Exploring integrated use of SysML tools and Attack Tree tools to support solution selection

8 SENTINEL ARCHITECTURE FOR MONITORING FOR CYBER ATTACKS

9 High Level Architectural Overview Internal Controls Outputs System to be Protected Internal Measurements Sentinel Providing System-Aware Security

10 High Level Architectural Overview Internal Controls Reconfiguration Controls Outputs System to be Protected + Diverse Redundancy Internal Measurements Sentinel Providing System-Aware Security Super Secure

11 High Level Architectural Overview Internal Controls Reconfiguration Controls Outputs System to be Protected + Diverse Redundancy Internal Measurements Sentinel Providing System-Aware Security Super Secure

12 System Aware Cyber Security Design Patterns Design Patterns combine design techniques from 3 communities Cyber Security Fault-Tolerant Systems Automatic Control Systems (for physical systems) The System Aware solution designers need to come from the communities related to system design and system engineering, providing a new orientation to complement the established approaches of the information assurance community

13 A Set of Techniques Utilized in System Aware Cyber Security Cyber Security * Data Provenance * Moving Target (Virtual Control for Hopping) * Forensics Fault-Tolerance * Diverse Redundancy (DoS, Automated Restoral) * Redundant Component Voting (Data Integrity, Restoral) Automatic Control * PhysicalControl for Configuration Hopping (Moving Target, Restoral) * State Estimation Techniques (Data Integrity) * System Identification (Data Integrity, Restoral)

14 Cyber Security * Data Provenance * Moving Target (Virtual Control for Hopping) * Forensics A Set of Techniques Utilized in System-Aware Security Fault-Tolerance * Diverse Redundancy (DoS, Automated Restoral) * Redundant Component Voting (Data Integrity, Restoral) Automatic Control * PhysicalControl for Configuration Hopping (Moving Target, Restoral) * State Estimation Techniques (Data Integrity) * System Identification (Data Integrity, Restoral) This combination of solutions requires adversaries to: Understand the details of how the targeted systems actually work

15 Cyber Security * Data Provenance * Moving Target (Virtual Control for Hopping) * Forensics A Set of Techniques Utilized in System-Aware Security Fault-Tolerance * Diverse Redundancy (DoS, Automated Restoral) * Redundant Component Voting (Data Integrity, Restoral) Automatic Control * PhysicalControl for Configuration Hopping (Moving Target, Restoral) * State Estimation Techniques (Data Integrity) * System Identification (Data Integrity, Restoral) This combination of solutions requires adversaries to: Understand the details of how the targeted systems actually work Develop synchronized, distributed exploits consistent with how the attacked system actually works

16 Cyber Security * Data Provenance * Moving Target (Virtual Control for Hopping) * Forensics A Set of Techniques Utilized in System-Aware Security Fault-Tolerance * Diverse Redundancy (DoS, Automated Restoral) * Redundant Component Voting (Data Integrity, Restoral) Automatic Control * PhysicalControl for Configuration Hopping (Moving Target, Restoral) * State Estimation Techniques (Data Integrity) * System Identification (Data Integrity, Restoral) This combination of solutions requires adversaries to: Understand the details of how the targeted systems actually work Develop synchronized, distributed exploits consistent with how the attacked system actually works Corrupt multiple supply chains

17 Design Patterns Being Prototyped Diverse Redundancy for post-attack restoration Diverse Redundancy + Verifiable Votingfor trans-attack attack deflection Physical Configuration Hopping for moving target defense Virtual Configuration Hopping for moving target defense Data Consistency Checkingfor data integrity and operator display protection Parameter Assurancefor parameter controlled SW functions System Restoration using diverse redundancy

18 Parameters in Systems Parameters control how systems function for instance: Detection Thresholds For example, target detection for active sensors (Radar), Passive sensors (SIGINT), impacting missed detection/false alarm performance Modes of operation for Smart Systems that modify performance on a situational basis CFAR (Constant False Alarm Rate) in sensor systems Flight control boundary values For example, bounds on accelerations, velocity, altitude Navigation Waypoints Tracking algorithm parameters determine sensitivity and latencies for position/velocity estimates relative to timing of accelerations Communication system mode parameters, impacting QOS

19 Parameters in Systems Parameters control how systems function for instance: Detection Thresholds For example, target detection for active sensors (Radar), Passive sensors (SIGINT), impacting missed detection/false alarm performance Modes of operation for Smart Systems that modify performance on a situational basis CFAR (Constant False Alarm Rate) in sensor systems Flight control boundary values For example, bounds on accelerations, velocity, altitude Navigation Waypoints Tracking algorithm parameters determine sensitivity and latencies for position/velocity estimates relative to timing of accelerations Communication system mode parameters, impacting QOS Parameter tables provide an organized means for changing operating modes in smart, situational aware system designs and a high leverage opportunity for exploits

20 Data Consistency Checking DYNAMIC SYSTEM MODELS AND STATE ESTIMATION TECHNOLOGY FOR DATA INTEGRITY AND OPERATOR DISPLAY ATTACKS Barry M. Horowitz, Katherine Pierce, Application of Diversely Redundant Designs, Dynamic Systems Models and State Estimation Technology to the Cyber Security of Physical Systems, Systems Engineering, Volume 16, No. 3,

21 Simplified Block Diagram for Inference-Based Data Integrity Detection System System Operator ˆx 1lt Applicable Subsystems and Users Cyber Attack Alerts and Responses Protected Physical System y 1 y 2 State Estimator 1 Diversely Redundant State Estimator 2 ˆx 1lt ˆx 1mt Information Consistency Checking 21

22 Simulated System Output Based Upon a Physical Cyber Attack 22

23 23 Simulated Regulator Attack

24 To Achieve a Selected Acceptable False Alarm Rate, Estimation Difference for Alarming As a function of: # of Indirect Measurement Sensors and Sensor Accuracy 54 Tau is the minimum distance between direct and indirect estimates used to trigger an alarm with acceptable False Alarm Rate States comprising x 2 0 x b x c x d 0 x b x c 0 T T x b 0 0 T L=20 Point Detection Window 24

25 Tau is the distance between direct and indirect estimates used to trigger an alarm with acceptable False Alarm Rate States comprising x 2 0 x b x c x d 0 x b x c 0 T T x b 0 0 T L=20 Point Detection Window Using three Sensors for indirect estimation is far better than 2, but using 2 sensors is not much better than 1 Accuracy of sensors matters 25

26 CASE 2 SHIP CONTROL SYSTEM FOR PHYSICAL PLANT A System-Aware Cyber Security Method for Shipboard Control Systems Accepted for 2012 IEEE Homeland Security Conference Guy L. Babineau Northrop Grumman Naval & Marine Systems Division Rick A. Jones and Barry Horowitz University of Virginia Department of Systems and Information Engineering 26

27 27 Block Diagram Illustrating the Current System Architecture

28 Possible Cyber Threats Embedded in Redundant Ship Communications Switches Denial of Service Data Modification Show good data for what is actually out-of-spec information Show bad data for what is actually in-spec information Change operator inputs

29 29 System-Aware Security Solution

30 Experimental Configuration: Impact on Packet Losses Turbine Control: Sender Establish 16 TCP connections and 34 UDP connections with Control Station over Cisco Switch Establish 16 TCP connections and 34 UDP connections with Control Station over Dell Switch Rudder Control: Sender Establish 16 TCP connections and 34 UDP connections with Control Station over Cisco Switch Establish 16 TCP connections and 34 UDP connections with Control Station over Dell Switch Control Station Receiver In each connection, sender continuously sends packets (packet size: 1KB, speed 250Kbps) for 1 hour. 30

31 UDP and TCP Packet Losses Due to Hopping Number of Packets Lost per 10,000 Sent Number of Packets Resent per 10,000 Sent UDP Packets Lost per 10,000 Sent Hopping Rate in Seconds TCP Packet Resent per 10,000 Sent Hopping Rate in Seconds Experiment 1 Experiment 2 Experiment 3 Experiment 4 Experiment 5 Experiment 6 Experiment 7 Experiment 8 Experiment 9 Experiment 1 Experiment 2 Experiment 3 Experiment 4 Experiment 5 Experiment 6 Experiment 7 Experiment 8 Experiment 9 Experiment 10 31

32 AUTONOMOUS SURVEILLANCE SYSTEM ON BOARD A UAV

33 GAUSS GTRI AIRBORNE UNMANNED SENSOR SYSTEM FOUR SENSOR OBJECTIVE BASELINE Multi-Channel Radar (8 channels) ESA Antenna: 8 phase centers, each 4 x 4 elements X-band, 600 MHz BW (design; 1 GHz max) Arbitrary Waveform Capable (1 st design LFM) Acquisition Modes: DMTI, SAR, HRR, HRRD, CCD Multi-Channel SIGINT Near 1 and 2 GHz Bands Two orthogonal dipole pairs: TDOA geo-location Ambient Complex-Baseband Spectrum Analysis Signal Copy Selected Sub-Bands Gimbaled, Stabilized EO/IR Camera Ball High Precision GPS & INS (eventual swarm capable inter-uav coherent RF sensors) Modified Griffon Aerospace Outlaw (MQ-170) Extended Range (ER) Unmanned Aircraft System (UAS) CAPABILITIES Electronic Scanning; No Antenna Mechanical Gimbal Multi-TB On-Board Data Recording Reconfigurable for Other Sensors: LIDAR, HSI, Chem-Bio Multi-Platform Distributed Sensor Experiments (eg, MIMO) Autonomous & Collaborative Multi-Platform Control Space for Future GPU/FPGA On-Board Processing Length 9.2 ft Wingspan 16 ft GTOW ~180 lbs Payload ~35-40 lbs Ceiling 14 kft Cruise speed 70 knts Endurance 9 hrs

34 Current Project Exploits and Solutions Exploits Waypoint Manipulation from ground or onboard the aircraft Meta Data manipulation on imagery GPS embedded data manipulation Pointing control of surveillance camera Solutions Airborne and ground-based detection of attacker waypoint changes, classifying the nature of the attack, and restoration Airborne detection of meta data manipulation Airborne detection of embedded GPS attack Airborne detection of attacker control of camera pointing and correction

35 Example: Autonomous Surveillance Platform Protection

36 Characteristics of Monitoring Applications Support Highly Secure Sentinel Implementations Experience To-Date Shows: Very small monitoring apps (< 500 SLOC) No requirement for high performance or tight synchronization No complex intertwining of applications Manageable number of hardware components Diverse low cost hardware is available, supporting diverse OS s, diverse programming languages, diverse communications protocols, etc.

37 Example: Autonomous Surveillance Platform Protection Config. hopping Diverse redundancy Port Hopping Dedicated voting processing SW power utilization fingerprint SW CPU and memory usage fingerprint For Security Control Only Spread Spectrum Waveform Low Data Rate

38 Ethernet Switch Autopilot 900 MHz Com Port 1 Com Port 2 Com Port 3 Com Port 4 Com Port 5 radio TPU signal Trigger ground attack Comm no flow control Payload Stream 1 Payload Stream 2 Payload Passthrough 450 MHz Link All RS-232 Sentinel messages RS-232 RPi1 (autopilot attack) Com Port 1 Com Port 2 Snooper 1 RS GHz radio Ethernet Gimbal Communications Ethernet RS-232 Gimbal Com Port 1 Com Port 2 RPi2 (gimbal attack) From Sentinel Analog video (NTSC) RS-232 Snooper 2 VPS radio 4.4 GHz Ground Station Aircraft Operator Interface Payload Operator Interface Cyber Officer Interface Piccolo Command Center Viewpoint Cyber Station 2.4 GHz radio Sentinel RS-232 Output Two Snooper RS-232 Input 3 Rpiwith 2 Com Port / 1 Ethernet each RS-232 External GPS Com Port 1: Autopilot Communications TPU signal: Coordinate with Display Masking Attack Payload Stream 2: Sentinel Warning Messages Payload Pass-through: Gimbal data flow Com Port 2: Dedicated 450 MHz link for secondary ground station Rpi 1: Hosts waypoint attacks Rpi 2: Changes GPS information on gimbal Rpi 3,4,5: Hosts voting algorithms for Sentinel Passive Snooper To Switch 4.4 GHz radio Digital encoder

39

40 HUMANS

41 Roles for Humans Pre-mission configuration of the Sentinel Selection of design patterns Entry of mission data Entry of Sentinel reporting requirements Adjusting attack detection criteria based upon Pre- Mission Intel Deciding on responses to detected attacks Fast post-attack forensic analysis

42 Exploring New Operational Concepts Cyber Officer Led Cyber Attack Response Team (Intel Officer, SurvOfficer, Pilot, Exploitation Officer, Commander) Varying Context surrounding Detections False Alarms Developing a Distributed Simulation/Personin-the-Loop capability to explore human factors including a Creech AF Base Mitre research team

43 Follow-on Prototype Application of System Aware Cyber Security Concept CLOUD COMPUTING

44 Cloud Computing Exploiting Cloud Agility for Securely Monitoring Systems Assuring integrity of an operational Cloud platform

45 Implementation of a Sentinel Utilizing Cloud Services Goal for project task: Investigate the use of private cloud platforms for hosting Sentinel application components and design patterns. Enable Diverse Redundancy and Configuration Hopping security design patterns by delivering Sentinel application services across a private cloud architecture utilizing: Multiple hypervisors working on different operating systems within a single private cloud infrastructure (OpenStack). Multiple cloud infrastructures (add Microsoft Hyper-V Cloud Services).

46 Cyber Security Openstack (Folsom) Private Cloud Prototyping Platform Overview OpenStack Cloud Services Sentinel Cloud Compute Node 1 Cloud Controller OpenStack Controller Provisions and manages Compute, network and storage services to private cloud environment Manages delivery of virtual environments to user community Cloud Compute Node 2 Cloud Compute Node 3... Cloud Compute Node n Compute Nodes Answers requests and allocates resources (RAM, CPUs, Storage) to establish instances of Virtual machines Supports use of multiple Hypervisors KVM, QEMU, XEN, Hyper-V Serves apps that run across multiple operating systems Sentinel Sentinel Create Cyber-Diversity through monitors running on multiple OS s (e.g. Fedora, Windows, UNIX and Ubuntu) Different Hypervisors (KVM, QEMU, XEN and Hyper-V) Cyber Hopping capabilities between virtual instances of the monitoring software/ Video Pilot hop rate ~ 10 sec

47 Security Design Patterns Across Multiple Clouds Sentinel Sentinel Sentinel Openstack Private Cloud Monitored Applications Microsoft Private Cloud Create Diversity through the monitors running on multiple OS s and multiple Hypervisors on different cloud platforms Hopping capabilities between virtual instances of the monitors on different cloud platforms

48 AIMES Application AIMES Advanced Intelligence Multimedia Exploitation Suite, a LeidosSW product (formerly SAIC) used by AF and Army Monitor with a Cloud-based Sentinel Select system functions to protect using our decision support work bench and team decision making process Provide first iteration prototype solution set this coming Fall as a companion to the UAV-based Sentinel to secure the autonomous surveillance system

49 Cloud Computing Exploiting Cloud Agility for Securely Monitoring Systems Assuring integrity of an operational Cloud platform

50 Summary We have a 4 element concept with associated research activities focused on application layer security (System Aware) Solution selection methodology and tools Security design patterns Secure Sentinel implementation Operational Procedures We are both expanding design concepts for new applications and working on gaining visibility through current prototype applications By end of Summer/early Fall we will be starting in-flight evaluations of a UAV-based autonomous surveillance system application In March we will start research on applying Cloud computing based monitoring for securing AIMES system

51 System Aware Cyber Security Publications JOURNAL ARTICLES: B.M. Horowitz and R.A. Jones, Smart security sentinels for providing point defense cyber security of critical system functions, Submitted for journal peer review R. A. Jones, B. Luckett, P. Beling, B. M. Horowitz, Architectural Scoring Framework for the Creation and Evaluation of System-Aware Cyber Security Solutions, Journal of Environmental Systems and Decisions 33, no. 3 (2013): B. M. Horowtizand K. M. Pierce, The integration ofdiverselyredundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems, Systems Engineering, Volume 16, No. 4 (2013): R. A. Jones and B. M. Horowitz, A system-aware cyber security architecture, Systems Engineering, Volume 15, No. 2 (2012), J. L. Bayukand B. M. Horowitz, An architectural systems engineering methodology for addressing cyber security, Systems Engineering Volume 14, No. 3, (2011), REFEREED CONFERENCE ARTICLES G. L. Babineau, R. A. Jones, and B. M. Horowitz, A system-aware cyber security method for shipboard control systems with a method described to evaluate cyber security solutions, 2012 IEEE International Conference on Technologies for Homeland Security (HST), R.A. Jones, T.V. Nguyen, and B.M. Horowitz, System-Aware security for nuclear power systems, 2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011, pp

System Aware Cyber Security

System Aware Cyber Security System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012

More information

Security Engineering Project

Security Engineering Project Security Engineering Project Part 1a System Aware Cyber Security for an Autonomous Surveillance System On Board an Unmanned Arial Vehicle Part 1b System Aware Cyber-Security Application to Unmanned Aircraft

More information

How to Safely Flight Test a UAV Subject to Cyber-Attacks

How to Safely Flight Test a UAV Subject to Cyber-Attacks Mike Heiges Rob Bever Kyle Carnahan Georgia Tech Research Institute Georgia Tech Research Institute Georgia Tech Research Institute 7220 Richardson Rd 7220 Richardson Rd 7220 Richardson Rd Smyrna, GA Smyrna,

More information

System Aware Cyber Security Architecture

System Aware Cyber Security Architecture System Aware Cyber Security Architecture Rick A. Jones October, 2011 Research Topic DescripAon System Aware Cyber Security Architecture Addresses supply chain and insider threats Embedded into the system

More information

Cooperative UAVs for Remote Data Collection and Relay

Cooperative UAVs for Remote Data Collection and Relay Cooperative UAVs for Remote Data Collection and Relay Kevin L. Moore Michael J. White, Robert J. Bamberger, and David P. Watson Systems and Information Science Group Research and Technology Development

More information

Matthew O. Anderson Scott G. Bauer James R. Hanneman. October 2005 INL/EXT-05-00883

Matthew O. Anderson Scott G. Bauer James R. Hanneman. October 2005 INL/EXT-05-00883 INL/EXT-05-00883 Unmanned Aerial Vehicle (UAV) Dynamic-Tracking Directional Wireless Antennas for Low Powered Applications That Require Reliable Extended Range Operations in Time Critical Scenarios Matthew

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Network performance in virtual infrastructures

Network performance in virtual infrastructures Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso

More information

Post-Access Cyber Defense

Post-Access Cyber Defense Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Background of the Research Agile and precise maneuverability of helicopters makes them useful for many critical tasks ranging from rescue and law enforcement task to inspection

More information

UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern

UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern UAVNet: Prototype of a Highly Adaptive and Mobile Wireless Mesh Network using Unmanned Aerial Vehicles (UAVs) Simon Morgenthaler University of Bern Dez 19, 2011 Outline Introduction Related Work Mikrokopter

More information

NXP Basestation Site Scanning proposal with AISG modems

NXP Basestation Site Scanning proposal with AISG modems NXP Basestation Site Scanning proposal with modems Advanced Systems White Paper by Jaijith Radhakrishnan There are a number of connectivity issues associated with cellular base stations that can increase

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

How To Control Gimbal

How To Control Gimbal Tarot 2-Axis Brushless Gimbal for Gopro User Manual V1.0 1. Introduction Tarot T-2D gimbal is designed for the Gopro Hero3, which is widely used in film, television productions, advertising aerial photography,

More information

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing www.anite.com Propsim enabled Aerospace, Satellite and Airborne Radio System Testing Anite is now part of Keysight Technologies Realistic and repeatable real-time radio channel emulation solutions for

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

Restorable Logical Topology using Cross-Layer Optimization

Restorable Logical Topology using Cross-Layer Optimization פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology

More information

UAV Data Links Present and Future. Broadband Satellite Terminal (BST)

UAV Data Links Present and Future. Broadband Satellite Terminal (BST) UAV Data Links Present and Future Broadband Satellite Terminal (BST) Outline of the presentation Speaker: Barry RP Jackson COO Cahon Systems Inc. Outline: First Where we are today. Second Where are we

More information

The NASA Global Differential GPS System (GDGPS) and The TDRSS Augmentation Service for Satellites (TASS)

The NASA Global Differential GPS System (GDGPS) and The TDRSS Augmentation Service for Satellites (TASS) The Global Differential GPS System (GDGPS) and The TDRSS Augmentation Service for Satellites (TASS) Yoaz Bar-Sever, Larry Young, Frank Stocklin, Paul Heffernan and John Rush s Global Differential GPS System

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

A highly integrated UAV avionics system 8 Fourth Street PO Box 1500 Hood River, OR 97031 (541) 387-2120 phone (541) 387-2030 fax CCT@gorge.

A highly integrated UAV avionics system 8 Fourth Street PO Box 1500 Hood River, OR 97031 (541) 387-2120 phone (541) 387-2030 fax CCT@gorge. A highly integrated UAV avionics system 8 Fourth Street PO Box 1500 Hood River, OR 97031 (541) 387-2120 phone (541) 387-2030 fax CCT@gorge.net Bill Vaglienti Ross Hoag April 10, 2003 Table of contents

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

MP2128 3X MicroPilot's. Triple Redundant UAV Autopilot

MP2128 3X MicroPilot's. Triple Redundant UAV Autopilot MP2128 3X MicroPilot's Triple Redundant UAV Autopilot Triple redundancy (3X) gives autopilot technology the reliability necessary to safely carry out sensitive flight missions and transport valuable payloads.

More information

Product Overview. Steve Erickson

Product Overview. Steve Erickson Product Overview Steve Erickson Memorylink products GPS-100C Flanger About Flanger TDM over IP, wired or wireless applications Wireless T1/E1 using Ethernet radios 1-4 T1 s or E1 s per unit Additional

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

COMBATSS-21 Scalable combat management system for the world s navies

COMBATSS-21 Scalable combat management system for the world s navies COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,

More information

How To Design A Cyber Security Architecture

How To Design A Cyber Security Architecture A System-Aware Cyber Security Architecture Rick A. Jones and Barry Horowitz* Regular Paper Systems and Information Engineering, University of Virginia, Charlottesville, VA 22904 A SYSTEM-AWARE CYBER SECURITY

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

SIX DEGREE-OF-FREEDOM MODELING OF AN UNINHABITED AERIAL VEHICLE. A thesis presented to. the faculty of

SIX DEGREE-OF-FREEDOM MODELING OF AN UNINHABITED AERIAL VEHICLE. A thesis presented to. the faculty of SIX DEGREE-OF-FREEDOM MODELING OF AN UNINHABITED AERIAL VEHICLE A thesis presented to the faculty of the Russ College of Engineering and Technology of Ohio University In partial fulfillment of the requirement

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Control Tower for Virtualized Data Center Network

Control Tower for Virtualized Data Center Network Control Tower for Virtualized Data Center Network Contents 1 Virtual Machine Network Environment Analysis...3 2 "Control Tower" Must Have an Overall Picture of the Network...4 3 Virtual Machine Migration

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

Configuring PROFINET

Configuring PROFINET CHAPTER 9 This chapter describes how to configure the PROFINET feature on the Cisco IE 3000 switch. Understanding PROFINET, page 9-1, page 9-4 Displaying the PROFINET Configuration, page 9-5 Troubleshooting

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Basler. Line Scan Cameras

Basler. Line Scan Cameras Basler Line Scan Cameras High-quality line scan technology meets a cost-effective GigE interface Real color support in a compact housing size Shading correction compensates for difficult lighting conditions

More information

ASNE Intelligent Ships Symposium X. Navy Research @Villanova. Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering

ASNE Intelligent Ships Symposium X. Navy Research @Villanova. Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering ASNE Intelligent Ships Symposium X Navy Research @Villanova Dr. Gary A. Gabriele Drosdick Endowed Dean of Engineering Some numbers and highlights 930 Undergraduate Students 400 Graduate Students 61 Tenured

More information

AP Series Autopilot System. AP-202 Data Sheet. March,2015. Chengdu Jouav Automation Tech Co.,L.t.d

AP Series Autopilot System. AP-202 Data Sheet. March,2015. Chengdu Jouav Automation Tech Co.,L.t.d AP Series Autopilot System AP-202 Data Sheet March,2015 Chengdu Jouav Automation Tech Co.,L.t.d AP-202 autopilot,from Chengdu Jouav Automation Tech Co., Ltd, provides complete professional-level flight

More information

Nighthawk IV UAS. Versatility. User Friendly Design. Capability. Aerial Surveillance Simplified. forcepro@ara.com 800.639.6315 www.ara.

Nighthawk IV UAS. Versatility. User Friendly Design. Capability. Aerial Surveillance Simplified. forcepro@ara.com 800.639.6315 www.ara. Aerial Surveillance Simplified The Nighthawk IV small unmanned aerial vehicle brings military hardened technology to civil agencies and commercial user groups. Supremely easy to operate and recently certified

More information

Annual review FLORENCE 2013. WP4 Network: prototypes

Annual review FLORENCE 2013. WP4 Network: prototypes Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Northrop Grumman Corporation Trusted, Innovative, World-Class Supply Chain INTERVIEWS Kevin Engfer Director, Supplier Mission Assurance, Northrop Grumman

More information

2-Megapixel Sony Progressive CMOS Sensor with Super Wide Dynamic Range and High Frame Rate

2-Megapixel Sony Progressive CMOS Sensor with Super Wide Dynamic Range and High Frame Rate SD-2020 2-Megapixel 20X Optical Zoom Speed Dome IP Camera 1/2.8" Sony Progressive CMOS Sensor Full HD 1080p + D1 Real-Time at Dual Streaming Up to 20x Optical Zoom Up to 30 fps @ 1080p Full HD Weather-Proof

More information

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches

More information

What s New in 2013. Mike Bailey LabVIEW Technical Evangelist. uk.ni.com

What s New in 2013. Mike Bailey LabVIEW Technical Evangelist. uk.ni.com What s New in 2013 Mike Bailey LabVIEW Technical Evangelist Building High-Performance Test, Measurement and Control Systems Using PXImc Jeremy Twaits Regional Marketing Engineer Automated Test & RF National

More information

Sensor Integration in the Security Domain

Sensor Integration in the Security Domain Sensor Integration in the Security Domain Bastian Köhler, Felix Opitz, Kaeye Dästner, Guy Kouemou Defence & Communications Systems Defence Electronics Integrated Systems / Air Dominance & Sensor Data Fusion

More information

2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION 2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological

More information

Technicolor ATSC-8. User s Guide. 2012 Technicolor. All Rights reserved

Technicolor ATSC-8. User s Guide. 2012 Technicolor. All Rights reserved Technicolor ATSC-8 User s Guide 2012 Technicolor. All Rights reserved Introduction This document describes the process and procedures for integrating the ATSC-8 product with the COM1000 digital head-end

More information

Welcome. People Power Partnership. 2015-10-27 PROFIdag 2013 Peter Van Passen Sales & Business Development Manager HARTING Electric 1/44

Welcome. People Power Partnership. 2015-10-27 PROFIdag 2013 Peter Van Passen Sales & Business Development Manager HARTING Electric 1/44 Welcome 2015-10-27 PROFIdag 2013 Peter Van Passen Sales & Business Development Manager HARTING Electric 1/44 Performant, Deterministic & Time Accurate Networking with FTS & PTP 2015-10-27 PROFIdag 2013

More information

Fail-Safe IPS Integration with Bypass Technology

Fail-Safe IPS Integration with Bypass Technology Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive

More information

Surveillance System Using Wireless Sensor Networks

Surveillance System Using Wireless Sensor Networks Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA dantnguyen84@gmail.com chihshun@gmail.com Abstract The

More information

Honeywell Video Analytics

Honeywell Video Analytics INTELLIGENT VIDEO ANALYTICS Honeywell s suite of video analytics products enables enhanced security and surveillance solutions by automatically monitoring video for specific people, vehicles, objects and

More information

Aircraft Hacking Practical Aero Series

Aircraft Hacking Practical Aero Series Aircraft Hacking Practical Aero Series IT Security Commercial Pilot Hugo Teso (@hteso) (@48bits) www.48bits.com One and a half architecture Aero Series www.commandercat.com Agenda Part 1: The $PATH to

More information

Current Challenges in UAS Research Intelligent Navigation and Sense & Avoid

Current Challenges in UAS Research Intelligent Navigation and Sense & Avoid Current Challenges in UAS Research Intelligent Navigation and Sense & Avoid Joerg Dittrich Institute of Flight Systems Department of Unmanned Aircraft UAS Research at the German Aerospace Center, Braunschweig

More information

SDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing

SDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing SDR Architecture Contributed by Lee Pucker, Spectrum Signal Processing Introduction Software defined radio (SDR) is an enabling technology, applicable across a wide range of areas within the wireless industry,

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Normen & Standards Industrie 4.0 IEEE Standards

Normen & Standards Industrie 4.0 IEEE Standards Normen & Standards Industrie 4.0 IEEE Standards Stand: Oktober 2015 IEEE 1872 * IEEE 2015 IEEE Standard Ontologies for Robotics and Automation 1872-2015 IEEE 1232.3 * IEEE 1232.3- IEEE Guide for the Use

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

Two Novel Technologies Enabling IoT: Mobile Clouds and Visible Light Communications. Centre for Wireless Communications University of Oulu, Finland

Two Novel Technologies Enabling IoT: Mobile Clouds and Visible Light Communications. Centre for Wireless Communications University of Oulu, Finland Two Novel Technologies Enabling IoT: Mobile Clouds and Visible Light Communications Marcos Katz Centre for Wireless Communications University of Oulu, Finland Introduction: Internet of Things (IoT) What

More information

presentation Our customers & Partners AE40 www.ae40.com +972-9-743-8410

presentation Our customers & Partners AE40 www.ae40.com +972-9-743-8410 AE40 presentation AE40 Our customers & Partners AE40 profile AE40 founded at 2002 Privately held company VoIP and Video over IP based communication solutions(radio, intercom, public announcements, telephony,

More information

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

can you effectively plan for the migration and management of systems and applications on Vblock Platforms? SOLUTION BRIEF CA Capacity Management and Reporting Suite for Vblock Platforms can you effectively plan for the migration and management of systems and applications on Vblock Platforms? agility made possible

More information

Real- Time Wireless Sensor- Actuator Networks

Real- Time Wireless Sensor- Actuator Networks Real- Time Wireless Sensor- Actuator Networks Abusayeed Saifullah Department of Computer Science Roadmap Ø Real- time transmission scheduling theory for WSAN Dynamic priority Fixed priority - - End- to-

More information

TAMU-CC UAS Program 1

TAMU-CC UAS Program 1 TAMU-CC UAS Program 1 TAMU-CC Major Research Initiatives Coastal & Marine Economic & environmental sustainability Ecosystem evaluation Shoreline mapping Water supply studies Policy Engineering Science

More information

SDN CENTRALIZED NETWORK COMMAND AND CONTROL

SDN CENTRALIZED NETWORK COMMAND AND CONTROL SDN CENTRALIZED NETWORK COMMAND AND CONTROL Software Defined Networking (SDN) is a hot topic in the data center and cloud community. The geniuses over at IDC predict a $2 billion market by 2016

More information

Design Specifications of an UAV for Environmental Monitoring, Safety, Video Surveillance, and Urban Security

Design Specifications of an UAV for Environmental Monitoring, Safety, Video Surveillance, and Urban Security Design Specifications of an UAV for Environmental Monitoring, Safety, Video Surveillance, and Urban Security A. Alessandri, P. Bagnerini, M. Gaggero, M. Ghio, R. Martinelli University of Genoa - Faculty

More information

Wireless Video Best Practices Guide

Wireless Video Best Practices Guide Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager

More information

On-Premises DDoS Mitigation for the Enterprise

On-Premises DDoS Mitigation for the Enterprise On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has

More information

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN

High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION

More information

Distributed Network Monitoring. netbeez.net Booth #2344

Distributed Network Monitoring. netbeez.net Booth #2344 Distributed Network Monitoring Booth #2344 Network Blindness Do users have network connectivity? Is the network degrading application performance? The network monitoring stack Active end- to- end tests

More information

Control Design of Unmanned Aerial Vehicles (UAVs)

Control Design of Unmanned Aerial Vehicles (UAVs) Control Design of Unmanned Aerial Vehicles (UAVs) Roberto Tempo CNR-IEIIT Consiglio Nazionale delle Ricerche Politecnico di Torino tempo@polito.it Control of UAVs UAVs: Unmanned aerial vehicles of different

More information

Monitoring high-speed networks using ntop. Luca Deri <deri@ntop.org>

Monitoring high-speed networks using ntop. Luca Deri <deri@ntop.org> Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:

More information

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It

More information

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network

More information

Open Source in Network Administration: the ntop Project

Open Source in Network Administration: the ntop Project Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:

More information

Opening the Airspace for UAS

Opening the Airspace for UAS Opening the Airspace for UAS Lambert Dopping- Hepenstal, FREng ASTRAEA Programme Director RAeS UAS Operations Conference September 2012 Contents What are the aims of ASTRAEA? Why is it important? What

More information

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a

Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

AeroVironment, Inc. Unmanned Aircraft Systems Overview Background

AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft

More information

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group

The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links. Filippo Costa on behalf of the ALICE DAQ group The new frontier of the DATA acquisition using 1 and 10 Gb/s Ethernet links Filippo Costa on behalf of the ALICE DAQ group DATE software 2 DATE (ALICE Data Acquisition and Test Environment) ALICE is a

More information

Development of the Fabry-Perot Spectrometer Application. Kathryn Browne Code 587

Development of the Fabry-Perot Spectrometer Application. Kathryn Browne Code 587 Development of the Fabry-Perot Spectrometer Application Kathryn Browne Code 587 1 Overview Fabry-Perot Spectrometer (FPS) Conclusion 2 Overview Fabry-Perot Spectrometer (FPS) Conclusion 3 SpaceCube Radiation

More information

Software defined networking. Your path to an agile hybrid cloud network

Software defined networking. Your path to an agile hybrid cloud network Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

ZigBee Technology Overview

ZigBee Technology Overview ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003 Internal Information Services Outline Background Northrop Grumman Service Business Models Service as primary

More information

SNC-VL10P Video Network Camera

SNC-VL10P Video Network Camera SNC-VL10P Video Network Camera CHANGING THE WAY BUSINESS 2AM. WATCHING HIS NEW PRODUCTION LINE. 10,000 MILES AWAY. COMMUNICATES www.sonybiz.net/netstation CORPORATE COMMUNICATIONS SURVEILLANCE VIDEOCONFERENCING

More information

Jive Core: Platform, Infrastructure, and Installation

Jive Core: Platform, Infrastructure, and Installation Jive Core: Platform, Infrastructure, and Installation Jive Communications, Inc. 888-850-3009 www.getjive.com 1 Overview Jive hosted services are run on Jive Core, a proprietary, cloud-based platform. Jive

More information

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at

More information

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms? CA Capacity Management and Reporting Suite for Vblock Platforms

More information

VNF & Performance: A practical approach

VNF & Performance: A practical approach VNF & Performance: A practical approach Luc Provoost Engineering Manager, Network Product Group Intel Corporation SDN and NFV are Forces of Change One Application Per System Many Applications Per Virtual

More information

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Proceedings of the APAN Network Research Workshop 2013 The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Ming-Chang Liang 1, *, Meng-Jang Lin 2, Li-Chi Ku 3, Tsung-Han Lu 4,

More information

Hardware In The Loop Simulator in UAV Rapid Development Life Cycle

Hardware In The Loop Simulator in UAV Rapid Development Life Cycle Hardware In The Loop Simulator in UAV Rapid Development Life Cycle Widyawardana Adiprawita*, Adang Suwandi Ahmad = and Jaka Semibiring + *School of Electric Engineering and Informatics Institut Teknologi

More information

Precision Time Protocol on Linux ~ Introduction to linuxptp

Precision Time Protocol on Linux ~ Introduction to linuxptp Precision Time Protocol on Linux ~ Introduction to linuxptp Ken ICHIKAWA FUJITSU LIMITED. LinuxCon Japan 2014 Copyright 2014 FUJITSU LIMITED Agenda Background Overview of Precision Time Protocol (PTP)

More information