SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Survivable Network Systems


          Presented By,
      KARUNAKAR THAKUR



           Guided By,
        Ms. Supriya Pawar

         Date: 01/03/12
Contents

 What is ‘Survivability’?
 Domain of survivability.
 Characteristics of Survivable Systems.
 Survivability as an Integrated Engineering
  Framework
 The Current State of Practice in Survivable
  Systems.
Contents

 Expressing Survivability Requirements.
 Survivability : Design And Implementation
  Strategies.
 Case Study on Survivability in optical
  networks
 Research Directions.
 Future Scope.
 Conclusion.
What is ‘SURVIVABILITY’?

Survivability can be defined as the capability of
a system to fulfill its mission, in a timely
manner, in the presence of attacks, failures, or
accidents.

Built On : Security,Fault
Tolerance,Safety,Reliability,Reuse,Performance
,
IMPORTANCE OF
             NETWORKS
Principal enabling agents in
 business,industry,government, and defense.
Other Sectors :
 energy,transportation,telecommunication,
 manufacturing,financial services, health care
 and education.
Survivable System With 3
R's : Resist , Recognize , and
Recover




           Effected node due to attack.
DOMAIN OF SURVIVABILITY
ITS CHARACTERISTICS
Survivability as an Integrated
          Engineering Framework

 Survivability and Security
 Survivability and Fault Tolerance
 The Current State of Practice in Survivable
  Systems
Survivability Requirements
Survivability and System
     Requirements
Survivability: Design

 Survivability Analysis Is Protocol-Based Not
  Topology-Based
 Survivability Requires a Management
  Component
Strategies To Improve Network
            Survivability
Techniques to improve network survivability
can be classified into three categories:
2.Prevention
3.Network Design and capacity allocation
4.Traffic Management and Restoration
 The ideal survivability goal is to make a
network failure imperceptible to the network
users by providing service continuity .
Algorithm: For a Primal
       Approach
Case Study on Survivability in
          Optical Networks
 Survivability techniques : 2 categories –
  1. Predesigned Protection – APS and SHR’s
  2. Dynamic Restoration : Restoration Steps
Three main architectures of APS :
1. 1+1
2. 1:1
3. 1:N
APS
Case Study

There are two types of SHR’s :
1. Unidirectional SHR (USHR)
2. Bi-directional SHR (BSHR)
Restoration Steps
Survivability in WDM network
Research Directions

 Representing intruder environments through
  intruder usage models.
 Adapting and developing architectural
  description techniques to adequately describe
  large-scale distributed systems with
  survivability attribute.
Future Scope

 Unbounded Systems(e.g. Internet) will
  become free from intruders and attacks .
 Thus ,a more risk-free environment for
  online transactions and banking.
 More intelligent networks.
 Intelligent Firewalls.
Conclusion

 Thus we have seen how survivability is
  proving an emerging discipline in
  transformation of networks into an intelligent
  one that can resist,recognise,recover and
  adapt according to the attacks made.
Questions????



Have a nice day……..Thank You!!!

Weitere ähnliche Inhalte

Was ist angesagt?

Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkMphasis
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networkssangitaholkar
 
5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...
5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...
5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...Sayed Chhattan Shah
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network pptPramod Kuruvatti
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Automatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptAutomatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptJOLLUSUDARSHANREDDY
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networksŞüheda Acar
 
Multi-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), NokiaMulti-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), NokiaSmall Cell Forum
 

Was ist angesagt? (20)

Vehicular network
Vehicular networkVehicular network
Vehicular network
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
VANET
VANETVANET
VANET
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...
5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...
5G Network: Requirements, Design Principles, Architectures, and Enabling Tech...
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Presentation on CDMA
Presentation on CDMAPresentation on CDMA
Presentation on CDMA
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Cell Planning
Cell PlanningCell Planning
Cell Planning
 
Automatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos pptAutomatic chocolate vending machine using mucos rtos ppt
Automatic chocolate vending machine using mucos rtos ppt
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
ieee 802.11n
ieee 802.11nieee 802.11n
ieee 802.11n
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 
Multi-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), NokiaMulti-access Edge Computing (MEC), Nokia
Multi-access Edge Computing (MEC), Nokia
 

Andere mochten auch

Optical Network Survivability
Optical Network SurvivabilityOptical Network Survivability
Optical Network SurvivabilityBecky Jia
 
In tech demand-management_and_wireless_sensor_networks_in_the_smart_grid
In tech demand-management_and_wireless_sensor_networks_in_the_smart_gridIn tech demand-management_and_wireless_sensor_networks_in_the_smart_grid
In tech demand-management_and_wireless_sensor_networks_in_the_smart_gridAWe Shinkansen
 
Space Division Multiplexing
Space Division MultiplexingSpace Division Multiplexing
Space Division MultiplexingMahmudul Soukhin
 
Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2viniz
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technologyLikan Patra
 
Nation Report: Brazil
Nation Report: BrazilNation Report: Brazil
Nation Report: Brazilmeggss24
 
Making a Living Project Plan
Making a Living Project PlanMaking a Living Project Plan
Making a Living Project PlanNoel Hatch
 
How the Americas Change (ass. 4)
How the Americas Change (ass. 4)How the Americas Change (ass. 4)
How the Americas Change (ass. 4)03ram
 
स्वावलंबी गाँव
स्वावलंबी गाँवस्वावलंबी गाँव
स्वावलंबी गाँवChandra Vikash
 
Day ın the Life - Militant Optimist
Day ın the Life - Militant OptimistDay ın the Life - Militant Optimist
Day ın the Life - Militant OptimistNoel Hatch
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)AltheimPrivacy
 
The fifth p, student version
The fifth p, student versionThe fifth p, student version
The fifth p, student versionRonald Voorn
 
Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
 Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
Cross Border Ediscovery vs. EU Data Protection at LegalTech West CoastAltheimPrivacy
 
Nation of America (Mexico)
Nation of America (Mexico)Nation of America (Mexico)
Nation of America (Mexico)03ram
 
Applying technology to school
Applying technology to schoolApplying technology to school
Applying technology to schoolAditi Sameer
 
Festival Techniques
Festival TechniquesFestival Techniques
Festival TechniquesNoel Hatch
 
Americas 19th Century
Americas 19th CenturyAmericas 19th Century
Americas 19th Centurymeggss24
 
Make your Future
Make your FutureMake your Future
Make your FutureNoel Hatch
 
Power is Everywhere
Power is EverywherePower is Everywhere
Power is EverywhereNoel Hatch
 

Andere mochten auch (20)

Optical Network Survivability
Optical Network SurvivabilityOptical Network Survivability
Optical Network Survivability
 
In tech demand-management_and_wireless_sensor_networks_in_the_smart_grid
In tech demand-management_and_wireless_sensor_networks_in_the_smart_gridIn tech demand-management_and_wireless_sensor_networks_in_the_smart_grid
In tech demand-management_and_wireless_sensor_networks_in_the_smart_grid
 
Space Division Multiplexing
Space Division MultiplexingSpace Division Multiplexing
Space Division Multiplexing
 
Param yuva ii
Param yuva iiParam yuva ii
Param yuva ii
 
Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2Ppt Vinisha And Giovanna Instant Messaging 2
Ppt Vinisha And Giovanna Instant Messaging 2
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technology
 
Nation Report: Brazil
Nation Report: BrazilNation Report: Brazil
Nation Report: Brazil
 
Making a Living Project Plan
Making a Living Project PlanMaking a Living Project Plan
Making a Living Project Plan
 
How the Americas Change (ass. 4)
How the Americas Change (ass. 4)How the Americas Change (ass. 4)
How the Americas Change (ass. 4)
 
स्वावलंबी गाँव
स्वावलंबी गाँवस्वावलंबी गाँव
स्वावलंबी गाँव
 
Day ın the Life - Militant Optimist
Day ın the Life - Militant OptimistDay ın the Life - Militant Optimist
Day ın the Life - Militant Optimist
 
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
Security and Privacy in Deals (altheim & mahajan)(6-3 -2015)
 
The fifth p, student version
The fifth p, student versionThe fifth p, student version
The fifth p, student version
 
Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
 Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
Cross Border Ediscovery vs. EU Data Protection at LegalTech West Coast
 
Nation of America (Mexico)
Nation of America (Mexico)Nation of America (Mexico)
Nation of America (Mexico)
 
Applying technology to school
Applying technology to schoolApplying technology to school
Applying technology to school
 
Festival Techniques
Festival TechniquesFestival Techniques
Festival Techniques
 
Americas 19th Century
Americas 19th CenturyAmericas 19th Century
Americas 19th Century
 
Make your Future
Make your FutureMake your Future
Make your Future
 
Power is Everywhere
Power is EverywherePower is Everywhere
Power is Everywhere
 

Ähnlich wie Network survivability karunakar

Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In WsnSecure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsnijcnes
 
Protection Scheme in Generation Network
Protection Scheme in Generation NetworkProtection Scheme in Generation Network
Protection Scheme in Generation NetworkIRJET Journal
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
 
concept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridconcept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridKundan Kumar
 
Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMahmoudElsisi11
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...
Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...
Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...IRJET Journal
 
Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networkseSAT Journals
 
A survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networksA survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networkseSAT Journals
 

Ähnlich wie Network survivability karunakar (20)

Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In WsnSecure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
 
Protection Scheme in Generation Network
Protection Scheme in Generation NetworkProtection Scheme in Generation Network
Protection Scheme in Generation Network
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
 
concept of resilience and self healing in smart grid
concept of resilience and self healing in smart gridconcept of resilience and self healing in smart grid
concept of resilience and self healing in smart grid
 
Thesis of SNS
Thesis of SNSThesis of SNS
Thesis of SNS
 
Mitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptxMitchell-TR12-slide.pptx
Mitchell-TR12-slide.pptx
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...
Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...
Swarm Intelligence for Network Security: A New Approach to User Behavior Anal...
 
Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networks
 
A survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networksA survey on bio inspired security in wireless sensor networks
A survey on bio inspired security in wireless sensor networks
 

Mehr von Karunakar Singh Thakur

Mehr von Karunakar Singh Thakur (13)

Rational Team Concert (RTC) installation and setup guide
Rational Team Concert (RTC) installation and setup guideRational Team Concert (RTC) installation and setup guide
Rational Team Concert (RTC) installation and setup guide
 
All About Jazz Team Server Technology
All About Jazz Team Server TechnologyAll About Jazz Team Server Technology
All About Jazz Team Server Technology
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
 
Hyper Threading technology
Hyper Threading technologyHyper Threading technology
Hyper Threading technology
 
Advanced sql injection 2
Advanced sql injection 2Advanced sql injection 2
Advanced sql injection 2
 
Advanced sql injection 1
Advanced sql injection 1Advanced sql injection 1
Advanced sql injection 1
 
Plsql programs(encrypted)
Plsql programs(encrypted)Plsql programs(encrypted)
Plsql programs(encrypted)
 
Complete placement guide(non technical)
Complete placement guide(non technical)Complete placement guide(non technical)
Complete placement guide(non technical)
 
Complete placement guide(technical)
Complete placement guide(technical)Complete placement guide(technical)
Complete placement guide(technical)
 
How to answer the 64 toughest interview questions
How to answer the 64 toughest interview questionsHow to answer the 64 toughest interview questions
How to answer the 64 toughest interview questions
 
genetic algorithms-artificial intelligence
 genetic algorithms-artificial intelligence genetic algorithms-artificial intelligence
genetic algorithms-artificial intelligence
 
Hadoop
HadoopHadoop
Hadoop
 
Prepare for aptitude test
Prepare for aptitude testPrepare for aptitude test
Prepare for aptitude test
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Network survivability karunakar

  • 1. Survivable Network Systems Presented By, KARUNAKAR THAKUR Guided By, Ms. Supriya Pawar Date: 01/03/12
  • 2. Contents  What is ‘Survivability’?  Domain of survivability.  Characteristics of Survivable Systems.  Survivability as an Integrated Engineering Framework  The Current State of Practice in Survivable Systems.
  • 3. Contents  Expressing Survivability Requirements.  Survivability : Design And Implementation Strategies.  Case Study on Survivability in optical networks  Research Directions.  Future Scope.  Conclusion.
  • 4. What is ‘SURVIVABILITY’? Survivability can be defined as the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. Built On : Security,Fault Tolerance,Safety,Reliability,Reuse,Performance ,
  • 5. IMPORTANCE OF NETWORKS Principal enabling agents in business,industry,government, and defense. Other Sectors : energy,transportation,telecommunication, manufacturing,financial services, health care and education.
  • 6. Survivable System With 3 R's : Resist , Recognize , and Recover Effected node due to attack.
  • 9. Survivability as an Integrated Engineering Framework  Survivability and Security  Survivability and Fault Tolerance  The Current State of Practice in Survivable Systems
  • 11. Survivability and System Requirements
  • 12. Survivability: Design  Survivability Analysis Is Protocol-Based Not Topology-Based  Survivability Requires a Management Component
  • 13. Strategies To Improve Network Survivability Techniques to improve network survivability can be classified into three categories: 2.Prevention 3.Network Design and capacity allocation 4.Traffic Management and Restoration The ideal survivability goal is to make a network failure imperceptible to the network users by providing service continuity .
  • 14. Algorithm: For a Primal Approach
  • 15. Case Study on Survivability in Optical Networks  Survivability techniques : 2 categories – 1. Predesigned Protection – APS and SHR’s 2. Dynamic Restoration : Restoration Steps Three main architectures of APS : 1. 1+1 2. 1:1 3. 1:N
  • 16. APS
  • 17. Case Study There are two types of SHR’s : 1. Unidirectional SHR (USHR) 2. Bi-directional SHR (BSHR)
  • 20. Research Directions  Representing intruder environments through intruder usage models.  Adapting and developing architectural description techniques to adequately describe large-scale distributed systems with survivability attribute.
  • 21. Future Scope  Unbounded Systems(e.g. Internet) will become free from intruders and attacks .  Thus ,a more risk-free environment for online transactions and banking.  More intelligent networks.  Intelligent Firewalls.
  • 22. Conclusion  Thus we have seen how survivability is proving an emerging discipline in transformation of networks into an intelligent one that can resist,recognise,recover and adapt according to the attacks made.
  • 23. Questions???? Have a nice day……..Thank You!!!