1 Integrity Service Excellence Complex Information Systems 19 Mar 13 Robert J. Bonneau, Ph.D. AFOSR/RTC.

Slides:



Advertisements
Similar presentations
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Advertisements

A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. A PowerPoint Presentation Package to Accompany Applied Statistics.
1. 2 Configuring the Cloud Inside and out Paul Anderson publications/mysore-2010-talk.pdf School of.
SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
1 Building scientific Virtual Research Environments in D4Science Paul Polydoras University of Athens, Greece.
Flexible Airborne Architecture
1 EL736 Communications Networks II: Design and Algorithms Class1: Introduction Yong Liu 09/05/2007.
Chapter 1: Introduction to Scaling Networks
1 Quality of Service Issues Network design and security Lecture 12.
Communications Research Centre (CRC) Defence R&D Canada – Ottawa 1 Properties of Mobile Tactical Radio Networks on VHF Bands Li Li & Phil Vigneron Communications.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
TOWARDS a UNIFIED FRAMEWORK for NONLINEAR CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer.
1 ECE 776 Project Information-theoretic Approaches for Sensor Selection and Placement in Sensor Networks for Target Localization and Tracking Renita Machado.
MMT (Multi Meshed Tree) Protocols for Cognitive Airborne Networks Nirmala Shenoy Lab for Wireless Networking and Security Rochester Institute of Technology.
Use of Kalman filters in time and frequency analysis John Davis 1st May 2011.
ECE 720T5 Fall 2012 Cyber-Physical Systems Rodolfo Pellizzoni.
Session F4G - Computing Curricula: Computer Engineering Panel: Pradip K. Srimani, Clemson University David L. Soldan, Kansas State University John Impagliazzo,
Development of Parallel Simulator for Wireless WCDMA Network Hong Zhang Communication lab of HUT.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Ch. 7. Architecture Standardization for WoT
FIN 685: Risk Management Topic 5: Simulation Larry Schrenk, Instructor.
Networks and Distributed Systems: Project Ideas
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks Maurice Chu, Horst Haussecker and Feng Zhao Xerox Palo.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
1 Reliable Adaptive Distributed Systems Armando Fox, Michael Jordan, Randy H. Katz, David Patterson, George Necula, Ion Stoica, Doug Tygar.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
1 Building National Cyberinfrastructure Alan Blatecky Office of Cyberinfrastructure EPSCoR Meeting May 21,
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Architecture-Based Runtime Software Evolution Peyman Oreizy, Nenad Medvidovic & Richard N. Taylor.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Low-Power Wireless Sensor Networks
©Ian Sommerville 2000, Mejia-Alvarez 2009 Slide 1 Software Processes l Coherent sets of activities for specifying, designing, implementing and testing.
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Wireless Networks Breakout Session Summary September 21, 2012.
A New Method For Developing IBIS-AMI Models
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
Thinking Architecturally An information theory and complex system viewpoint.
Introduction to WOLFASI: Workshop on Logical Foundations of an Adaptive Security Infrastructure Leo Marcus The Aerospace Corporation Los Angeles July 13,
CROSS-LAYER OPTIMIZATION PRESENTED BY M RAHMAN ID:
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
CORBA1 Distributed Software Systems Any software system can be physically distributed By distributed coupling we get the following:  Improved performance.
System-level power analysis and estimation September 20, 2006 Chong-Min Kyung.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Middleware for Fault Tolerant Applications Lihua Xu and Sheng Liu Jun, 05, 2003.
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Context-aware Adaptive Routing for Delay Tolerant Networking
SDN challenges Deployment challenges
Martin Casado, Nate Foster, and Arjun Guha CACM, October 2014
Introduction to Wireless Sensor Networks
Model-Driven Analysis Frameworks for Embedded Systems
Data/Analysis Challenges in the Electronic Business Environment
Data/Analysis Challenges in the Electronic Business Environment
Middleware for Fault Tolerant Applications
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

1 Integrity Service Excellence Complex Information Systems 19 Mar 13 Robert J. Bonneau, Ph.D. AFOSR/RTC

2 Goals: Preserve critical information structure and minimize latency over a heterogeneous distributed network and system Ensure network and system robustness and stability under a diverse set of resource constraints and manage not assuming static models Find invariant properties for a given network and system from a distributed set of observations and predict network behavior Develop unifying mathematical approach to discovering fundamental principles of networks and system and use them in network and system design Payoffs: Preserve information structures in a network rather than just delivering packets or bits Quantify likelihood of a given network management policy to support critical mission functions Predict and manage network and system failure comprehensively Complex Networks and Systems

3 Foundations of Information Systems - Model heterogeneous distributed systems using unified mathematical framework through previous measurement and validate - Verify the properties of a given system application through measurement of a limited set of system parameters and assess mission risk - Define general architectural principles of design through unified assessment of system operating properties - Generalize design properties to universal system architectural principles Program Objectives Payoff - Assess and verify properties of a distributed heterogeneous system where there is limited access to its elements - Assess dynamic Air Force system mission performance and assess risk of failure

4 System Properties Information Systems Research Measure System Information & Verify Properties Diverse Types of Systems Complex networks and systems uses measured information to assure, manage, predict, and design distributed networks, systems, and architectures Complex Networks and Information Systems Roadmap Dynamic, Heterogeneous, Air Force Systems Critical Information System Measurement Local Network/Systems Research Assure Critical Information Delivery Network/Systems Management Research Manage Information Flow Global Network/Systems Research Predict Network Performance

5 Local Network/System Research: Preserving Information Content Statistical geometric coding structures are used to transport diverse sets of information in a network and system and preserve its critical structure Information Timescale t Content Information Distribution Content Information Loss With Interference Content Information Recovery Less: Latency/Computation/ Storage More: Information Loss With Interference Less: Information Loss With Interference More: Latency/Computation/ Storage Recovered Information Loss Distributed Information Loss Measurable Information Loss Significant Information Source Deterministic/Minimal Coding (ex: Trellis Code) Hybrid Code (ex: Network Code) Random Code (ex: Rateless Code) t packets, variables, registers, Recover Using Coding Recover With Code and Retransmit Recover With Retransmission

6 Less: Information Loss With Disruption More: Latency, Difficult to Control Less: Latency More: Information Loss With Disruption, Controllable Information Sources Information Timescale t Protocol/Policy Information Distribution Protocol/Policy Information Loss With Interference Protocol/Policy Information Recovery Source 1 Source 2 Source 3 t groups of packets, subroutine, virtual mem. The state of information transfer on a network changes with network and system management policy and protocol – Particularly important to the Air Force given its unique heterogeneous mobile infrastructure Network/System Management Research: Guaranteeing Information Transfer Recovered Information Message 1 Message 2 Message 3 Deterministic Routing (ex: OSPF) Hybrid Routing (ex: OLSR) Random Protocol (ex: Flooding) Recover With Redundancy and Retransmit Recover With Redundancy Recover With Retransmission Information Loss Distributed Information Loss Measurable Information Loss Significant

7 Less: Latency/Disruption Tolerant More: Controllable Less: Information Loss Under Disruption More: Latency, Resource Intensive Information Sources Information Timescale t Architecture Information Distribution Architecture Information Loss With Interference Architecture Information Recovery Source 1 Source 2 Source 3 Recovered Information Message 1 Message 2 Message 3 t blocks of information, program, virtual memory We wish to develop information invariants that can be used to assess network/ system performance Global Network/System Research: Architecture Performance Invariants and Prediction Deterministic Routing (ex: Core/Backbone) Hybrid Network (Mesh) Random Network (ex: Mobile Ad Hoc) Reroute Information Reroute and Change Distribution Change Information Distribution Information Loss Distributed Information Loss Measurable Information Loss Significant

8 Example: Unified Mission Assured Architecture Current networks are managed with multiple protocols depending on their taxonomy Air Force networks, particularly Airborne Networks are heterogeneous A unified network approach should adapt to the conditions and provide design principles Less: Disruption Tolerant, Latency More: Information Loss Under Interference, Observable/Controllable Less: Information Loss Under Interference, Observable/Controllable More : Disruption Tolerant, Latency Design Principles According To Constraints Adapt According To Measurements

9 Foundations of Information Systems Hybrid Architecture Hybrid Protocol Hybrid Content Random Architecture Random Protocol Random Content Deterministic Architecture Deterministic Protocol Deterministic Content Measured Performance Regions Heterogeneous Information Network States (packets, packet blocks, packet groups) Software States (variable, subroutine, program) Hardware States (register, ram, virt. mem) System Measurements Less: Information Loss Under Disruption/Live More: Latency, Resource Intensive/Safe Less: Latency/Disruption Tolerant/Safe More: Controllable/Live Best Integrated Performance Region (timescale/level of abstraction ) Global Properties Statistical Properti es Stable/Resourced Secure Unstable/Un-resourced Insecure Measure and verify information system properties among various system constraints

10 Measuring Information Systems Fundamental Properties Units of information translate across heterogeneous domains and can be used to measure and quantify system performance - Taking this approach can lead to a unified systems and security strategy Deterministic Protocol Distribution Time Evolution (Global Properties) Deterministic Heterogeneous Random Content (local) System Policy/ Protocol (management) System Structure (global) Deterministic Content Heterogeneous System Heterogeneous Protocol Deterministic System (1/information timescale) Frequency Data Network Packet Groups Packet Blocks Wireless Network Modulation Unit Waveform Signal Array Hardware/ Software Register/ Variable Ram/ Subroutine Virtual Mem./ Program Social Words Phrases News Reports/ Blogs Biological DNA Protein Synth. Cell Function Basic Information Unit Scales Digital Systems General Systems Random Protocol Random Content Heterogeneous Content Random System Measured System Properties Not Resourced, Not Stable, Not Secure Design Excluded Properties Resourced, Stable, Secure, (Safe) Design Included Properties

11 Algorithms for Information Networks If we would like to estimate, detect, control, or predict networks, there are many algorithms that have been adapted to the relevant network conditions We would like new classes of integrated algorithms that can adapt across many dynamic network conditions Dynamic/ Non-stationary Static/ Stationary Random Deterministic Time Frequency/ Scale Stationary Markov Dec. Process Min-max Estimation Wiener Filter Adaptive Matched Filters Kalman Filter Bootstrap Methods Extended Kalman Filter Sequential Probability Ratio Tests Particle Filtering Architecture Hybrid Statistics Protocol/ Policy Content More: Robust to Change/Computationally Intensive Less: Robust to Change/Computationally Intensive Critical Space of Network Performance Necessary Algorithm Properties

12 Comprehensive Systems Modeling - Model heterogeneous distributed systems using unified, modular, composable and scalable mathematical framework from previous measurement and system specification - Use new statistical, algebraic, and geometric representations and theory for modularized representations and composable into a modeling framework Unified Representation Modular, Composable, Scalable Model of Unified System Resource Policy Security Framework Database Arch. Operating System Prog. Languages Design Tools Mission Applications Physical Environ. Resource Const. Processing Hardware Network System of Interest Mathematical Models Statistical, Algebraic, Geometric, …

13 Measurement-Based System Verification - Verify the properties of a given unified system through measurement of a limited set of parameters and calculate system risk of not meeting mission requirements - Assess risk by distance between properties of desired representation (model) and measured properties - Incorporate risk of sparse measurement Desirable Properties: (Example) Robustness to Disruption Undesirable Properties: (Examples) Latency, Interference, Computational Overhead Measurement Mission Requirements Performance Verification Low Mission Risk Medium Mission Risk High Mission Risk Risk Assessment Measured Properties Desired Properties

14 Measurement Validation Trade-space - Define general application architectural and policy validation principles through unified assessment of system operating risk - Apply to existing architectures through policy implementation Architecturally Validated Modalities (low mission risk) Architecturally Excluded Modalities (high mission risk) System Operating Trade-space

15 Mission Performance Guarantees Cloud Component Space Airborne Terrestrial Introduce Advanced Mathematical and Modeling Techniques Into System Components Advanced Mathematical Algorithm Current & Future System Component System Components Complex Information Systems Current & Future Architectures Introduce measurement algorithms and components into existing systems architectures Use measurement based verification strategies to assure mission performance Statistical invariants for modeling based on measured data to validate models Incorporate algorithms into new generations of semiconductors for distributed online system assessment Systems Components in Architecture + Future Mathematical Systems Analysis