Misc Project Slides 2005 - projects. PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE.

Slides:



Advertisements
Similar presentations
Mobile phone based real time solution to track completed / in progress work The programme officer initiates the work by capturing the site image, GPS.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Introduction to Wireless Sensor Networks
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
Csc333 Data communication & Networking Credit: 2.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Computers Networks and Networking The Data Communications Channel Wireless communication Microwave signal – sent from one transmitter to another Radio.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Autonomic Wireless Sensor Networks: Intelligent Ubiquitous Sensing G.M.P. O’Hare, M.J. O’Grady, A. Ruzzelli, R. Tynan Adaptive Information Cluster (AIC)
Wireless Sensor Network Security Anuj Nagar CS 590.
UNIVERSITY of CRETE Fall04 – HY436: Mobile Computing and Wireless Networks Location Sensing Overview Lecture 8 Maria Papadopouli
A Guide to major network components
APTA, Kevin Hassett, September 24, APTA Passenger Information Systems.
1 Lecture 6: Networking J. S. Chou, P.E., Ph.D. National Chung Cheng University.
Fault Tolerance in ZigBee Wireless Sensor Networks
Created by the Community for the Community Building a RFID solution in BTS 09.
Large Enterprise with Multiple Locations Source: Avaya.
513 De La Vina Street, Santa Barbara, CA ph: fax: A UNIQUE APPROACH TO SENSOR NETWORKS ®
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Basic Data Communication
Communications & Networks
6-1 Extranet Uses. 6-2 Case 2: Maryland and Colorado Serving their customers without using wires Earth Alert Emergency Management System in Maryland provides.
Your Interactive Guide to the Digital World Discovering Computers 2012.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Module Common Network Environments, Connectivity and Security Issues.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
Chapter 1 Intro to Routing & Switching.  Networks have changed how we communicate  Everyone can connect & share  How have networks changed the way…
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
1 MSCS 237 Communication issues. 2 Colouris et al. (2001): Is a system in which hardware or software components located at networked computers communicate.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Computer Networks. Data & Communication When we communicate we share information  Local Communication, if Face to Face  Remote, if through Telephone.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
NCS-2006 March 29-31, 2006 Chiang Mai, Thailand The IASTED International Conference on Networks and Communication Systems Assurance-aware Self-organization.
Ad Hoc Network.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Communications and Networks 2 Compiled by Maududie Reference: Practicum Module Application Training Institut Teknologi Bandung
Wireless Sensor Networks
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Security of the Internet of Things: perspectives and challenges
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
Future Internet: Sensor Networks Security Yongkoo Han.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Chapter 1 Characterization of Distributed Systems
Latency and Communication Challenges in Automated Manufacturing
Introduction to Wireless Sensor Networks
University of Technology
Mobile ad hoc networking: imperatives and challenges
Mobile Agents.
Denial-of-Service Jammer Detector Training Course Worldsensing
ONLINE SECURE DATA SERVICE
Presentation transcript:

Misc Project Slides projects

PLANNING, EXECUTION AND CONTROL LINKAGES IN MANUFACTURING ENTERPRISE

Common Plant Information Tool (IndustrialSQL) Plant Historian Unified Data Storage Process Control & Monitoring (InTouch) Plant-wide Manufacturing Decisions (InTrack) Engineering CAD, CAE, CAPP Parts storage And AGV control Cell control Cell control Cell control Assembly control Measuring Control Finished goods storage AGV Manufacturing Production Dispatching Schedule Execution WIP & Resource Tracking Data Collection Resource Management Quality Management Operations Sequencing Working Instructions Labor Instruction Maintenance Plant Floor System Wonderware SuiteVoyager Internet

The intelligent nodes are connected to a server where data is digitized and stored Readers Controller Card Reader Proximity Readers Biometric Gateway Fingerprint Reader Camera (Pan Tilt Zoom) Intelligent Node LAN External Monitoring Station Secure Internet Central rules-engine and data warehouse Cameras, alarms, analog devices, card readers and others are connected and controlled via distributed intelligent nodes

Self-Organizing Wireless Networks

Active, wearable RF transmitters Dedicated receiver / sensors Centralized data server Multiple client terminals Real Time Location Systems (RTLS) Receiver / Sensors Location Receiver WherePort Transmitters Wrist-Worn Asset Data Severs / Client Terminals Wireless PDA Clients Servers & Remote Clients RTLS Fills the Gap between RFID and GPS An Ideal Radio Channel for Large Sensor Networks RTLS = Active RFID + Receiver Network + Software

Application Issues around deployment Self organization – nodes must self- organize into useable network Node adaptation to other nodes’ planned/unplanned changes to operating and environmental conditions Cost and reliability of sensors Data security and integrity Systems integration

Related Research work Sokwood Rhee at Millennial Net [an MIT spin-off] Olariu, Wadaa, Wilson and Jones (NASA, Langley) of ODU MIT Auto ID laboratory RFID tag and sensor vendors

An generic sensor network [Olariu, Wadaa, Wilson – ODU] Sink End user Satellite Internet Event

Sensor networks Wireless sensor network – massive collection of tiny sensors linked by a wireless medium :Main goal: global info from local data Must integrate sensing, data fusion and low-power communication Must work unattended Amorphous  self-organized Massive fault tolerance An inherently distributed platform

Ubiquitous WSNs/ Temporary Infrastructures Agile multi-service sensor network system self-organized to serve a rescue

Sensors Each sensor packs: –micro-sensor technology –low power signal processing –low power computation –low power networking capabilities Non-renewable energy budget Anonymity: no fabrication-time identity Sleep as much as possible - conserve energy Sense and compute freely – limit communication- conserve energy

Security goals addressed  Availability: ensure the survivability of network services despite denial-of-service (DoS) attacks  Confidentiality: ensure that information is not disclosed to unauthorized entities – Integrity: guarantee that a message being transferred is not corrupted – Authentication: enable a node to ensure the identity of the peer node – Anonymity: hide the identity of sources, destinations, and routes – Tamper Proofing: Ensure that nodes cannot be physically forced to divulge secrets

NSA—Tamper proofing, authentication After deployment each sensor transmits on a specified sets of frequenciesAfter deployment each sensor transmits on a specified sets of frequencies Each sensor collects an array of signal strengths from the sensors in its localeEach sensor collects an array of signal strengths from the sensors in its locale NSA – the Neighborhood Signature ArrayNSA – the Neighborhood Signature Array Removal from deployment area  changes in the NSARemoval from deployment area  changes in the NSA

Security techniques in a nutshell  Initialize sensors with secrets and synchronize clocks  Deploy sensors over the desired area  FH communications only  NSA  Resynchronize clocks periodically  Train the sensors to provide temporary virtual infrastructure  Assign tasks to the trained network  Randomly vary sources, destinations and communication paths  Partition the network into color sets - concurrent tasking  Lightweight data encryption available

Conclusions [Olariu, et. al.] Contributions: Virtual infrastructure leveraged for security Physical level encoding via FH, very light weight and highly effective – DoS, Confidentiality, Integrity Physical level encoding via FH, very light weight and highly effective – DoS, Confidentiality, Integrity NSA – Authentication, Tamper Proofing Software NSA – Authentication, Tamper Proofing Software Random routing - Anonymity Random routing - Anonymity Current Situation:  Wireless sensor network research is still in its infancy Securing sensor networks – a subject for active research Securing sensor networks – a subject for active research