SlideShare une entreprise Scribd logo
1  sur  22
Courtesy http://asianetindia.com/wp-content/uploads/2012/07/power-shortage.jpg





Background
Architecture
Implementation
Security
Blackout
Affected
Zone

BEFORE BLACKOUT
AFTER BLACKOUT
Source: blogs.scientificamerican.com
• ELECTRICAL SIGNALS WERE OUT OF SYNC
• LACK OF WIDE AREA SITUATIONAL AWARENESS
Electrical signal from Cleveland

Resultant Signal

Electrical signal from Michigan
http://www.hindustantimes.com/Images/2012/7/becde4aa-8d33-4bec-a9fa-21ca6b31b326Wallpaper1.JPG





Background
Architecture
Implementation
Security
GRIDSTAT COMPONENTS

Publisher / PMU
Status Router
QoS Broker
Subscriber

Management Plane
Data Plane
GRIDSTAT OVER SDN
GRIDSTAT ARCHITECTURE
SDN ARCHITECTURE
Global view of the network

Publisher/PMU

Programmable switches

OpenFlow Switch
Status Router

Independent of underlying hardware

Controller
QoS Broker
Subscriber

Control PlanePlane
Management
Data Plane





Background
Architecture
Implementation
Security
PMU

SUBSCRIBER

RATE

PMU 1

SUB 1

120

PMU 2

-

-

Control Plane
Data Plane

SUB 1
PMU 1

SUB 2
PMU 2
SUB 3

LEGEND

Registration Packet
PMU

SUBSCRIBER

RATE

PMU 1

SUB 1

120

PMU 2

-

-

Control Plane
Data Plane

SUB 1
SRC IP

PORT

SRC IP

PORT

<PMU # 1> IP

PMU 1

1

<PMU # 1> IP

1

SUB 2
PMU 2

SRC IP

PORT

<PMU # 2> IP

-

SUB 3

LEGEND

Data Packet

Data Packet
PMU

SUBSCRIBER

RATE

PMU 1

SUB 1

120

PMU 2

-

-

Control Plane
Data Plane

SUB 1
SRC IP

PORT

SRC IP

PORT

<PMU # 1> IP

PMU 1

1

<PMU # 1> IP

1

SUB 2
PMU 2

SRC IP

PORT

<PMU # 2> IP

-

SUB 3

LEGEND

Data Packet

Data Packet
PMU
PMU

SUBSCRIBER
SUBSCRIBER

RATE
RATE

PMU 1
PMU 1

SUB 1
SUB 1, SUB 2

120
120, 120

PMU 2
PMU 2

SUB 3

120

Control Plane
Data Plane

SUB 1
SRC IP

PORT

SRC IP

PORT

<PMU # 1> IP

PMU 1

1

<PMU # 1> IP

1 2
1,

SUB 2
PMU 2

SRC IP

PORT

SRC IP

PORT

<PMU # 2> IP

1

<PMU # 1> IP

1

<PMU # 2> IP

2

LEGEND

Data Packet

Data Packet

Registration Packet

SUB 3
PMU

SUBSCRIBER

RATE

PMU 1

SUB 1, SUB 2

120, 120

PMU 2

SUB 3

120

Control Plane
Data Plane

SUB 1
SRC IP

PORT

SRC IP

PORT

<PMU # 1> IP

PMU 1

1

<PMU # 1> IP

1, 2

SUB 2
PMU 2

SRC IP

PORT

SRC IP

PORT

<PMU # 2> IP

1

<PMU # 1> IP

1

<PMU # 2> IP

2

LEGEND

Data Packet

Data Packet

Registration Packet

SUB 3
PMU

SUBSCRIBER

RATE

PMU 1

SUB 1, SUB 2

120, 120
60

PMU 2

SUB 3

120

Control Plane
SRC IP

PORT

SRC IP
SRC IP

PORT
PORT

<PMU # 1> IP

1

<PMU # 1> IP
<PMU # 1> IP

1, 2
1, 2

<PMU # 1> IP

Data Plane

1

SUB 1
PMU 1
SRC IP
SRC IP
<PMU # 2> IP

<PMU # 1> IP

1

1

<PMU # 2> IP

PORT

PORT

2

SUB 2
PMU 2
SUB 3

LEGEND

Data Packet

Data Packet

Registration Packet
PMU

SUBSCRIBER

RATE

PMU 1

SUB 1, SUB 2

120, 120
60

PMU 2

SUB 3

120

SRC IP

PORT

<PMU # 1> IP

1, 2

<PMU # 1> IP

1

Control Plane
Data Plane

SRC IP

PORT

<PMU # 1> IP

1

If SEQ = 1
If SEQ = 1
If SEQ = 2
If SEQ = 2

SUB 1
PMU 1

DST IP = SEQ
DST IP = SEQ
SRC IP

1

<PMU # 2> IP

1

PORT

<PMU # 1> IP

PORT

<PMU # 2> IP

SRC IP

2

SUB 2
PMU 2
SUB 3

LEGEND

Data Packet

Data Packet

Registration Packet
PMU

SUBSCRIBER

RATE

PMU 1

SUB 1, SUB 2

120, 120
60

PMU 2

SUB 3

120

Control Plane
Data Plane

SRC IP

PORT

SRC IP

PORT

<PMU # 1> IP

1, 2

<PMU # 1> IP

1

<PMU # 1> IP

1

SUB 1
PMU 1

SRC IP

PORT

SRC IP

PORT

<PMU # 1> IP

1

<PMU # 2> IP

1

<PMU # 2> IP

2

SUB 2
PMU 2
SUB 3

LEGEND

Data Packet

Data Packet

Registration Packet





Background
Architecture
Implementation
Security
 Registration/Authentication

Flooding of request packets by an adversary
Control Plane
Data Plane

LEGEND
Registration

Key

Success
Control Plane
Data Plane

SUB 1
PMU 1

SRC IP

ACTION

SUB 2

DROP

SUB 2
PMU 2

LEGEND
Registration

Stop Packet

SUB 3
Goals

Schedule

Research, Project Proposal

Week 1 ( 31 Oct - 3 Nov )

Set up Network and PMU Registration

Week 2 ( 4 Nov – 10 Nov )

Subscriber Registration and Multicast Forwarding

Week 3 ( 11 Nov – 17 Nov )

Security Features & Multi-rate Implementation

Week 4 ( 18 Nov – 24 Nov )

Security Features & Multi-rate Implementation

Week 5 ( 25 Nov - 1 Dec )

Report and Manual

Week 6 ( 2 Dec - 9 Dec )
Gridstat SDN Architecture Secures Synchrophasor Data

Contenu connexe

Tendances

Programming embedded systems ii
Programming embedded systems iiProgramming embedded systems ii
Programming embedded systems iivtsplgroup
 
Ssh config note
Ssh config noteSsh config note
Ssh config noteR.k. Thapa
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...Salem Trabelsi
 
KR2 Kyocera User Guide
KR2 Kyocera User GuideKR2 Kyocera User Guide
KR2 Kyocera User GuideAri Zoldan
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configureÄmjed Othman
 
Danger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environmentDanger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environmentMaksym Tulyuk
 

Tendances (13)

1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618) 1-300-206 (SENSS)=Firewall (642-618)
1-300-206 (SENSS)=Firewall (642-618)
 
Iuwne10 S06 L01
Iuwne10 S06 L01Iuwne10 S06 L01
Iuwne10 S06 L01
 
Cman
CmanCman
Cman
 
Programming embedded systems ii
Programming embedded systems iiProgramming embedded systems ii
Programming embedded systems ii
 
Ssh config note
Ssh config noteSsh config note
Ssh config note
 
Sc manual
Sc manualSc manual
Sc manual
 
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...2.5.1.2 packet tracer   configure cisco routers for syslog, ntp, and ssh oper...
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
 
KR2 Kyocera User Guide
KR2 Kyocera User GuideKR2 Kyocera User Guide
KR2 Kyocera User Guide
 
Paket 1 UJIKOM TKJ 2015
Paket 1 UJIKOM TKJ 2015Paket 1 UJIKOM TKJ 2015
Paket 1 UJIKOM TKJ 2015
 
Um basic config_l2p_rel71_en
Um basic config_l2p_rel71_enUm basic config_l2p_rel71_en
Um basic config_l2p_rel71_en
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
TCU upgrade and configure
TCU  upgrade and configureTCU  upgrade and configure
TCU upgrade and configure
 
Danger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environmentDanger of Proxy ARP in IX environment
Danger of Proxy ARP in IX environment
 

En vedette (13)

Vitaminer
VitaminerVitaminer
Vitaminer
 
2nd unit test x class p
2nd unit test        x class         p2nd unit test        x class         p
2nd unit test x class p
 
Vitamin
VitaminVitamin
Vitamin
 
Nervous system PowerPoint SSA+S
Nervous system PowerPoint SSA+SNervous system PowerPoint SSA+S
Nervous system PowerPoint SSA+S
 
Presentación1
Presentación1Presentación1
Presentación1
 
Nervous system SSAS
Nervous system SSASNervous system SSAS
Nervous system SSAS
 
M&ms (2)
M&ms (2)M&ms (2)
M&ms (2)
 
Msr science fairs
Msr science fairsMsr science fairs
Msr science fairs
 
The circulatory system SSA+S
The circulatory system SSA+SThe circulatory system SSA+S
The circulatory system SSA+S
 
The excretory system SSA+S
The excretory system SSA+SThe excretory system SSA+S
The excretory system SSA+S
 
Sand stone 1
Sand stone 1Sand stone 1
Sand stone 1
 
Stephen casey resume (main)
Stephen casey   resume (main)Stephen casey   resume (main)
Stephen casey resume (main)
 
Исламски споменици
Исламски споменициИсламски споменици
Исламски споменици
 

Similaire à Gridstat SDN Architecture Secures Synchrophasor Data

VYATTAによるマルチパスVPN接続手法
VYATTAによるマルチパスVPN接続手法VYATTAによるマルチパスVPN接続手法
VYATTAによるマルチパスVPN接続手法Naoto MATSUMOTO
 
GGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeGGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeMustafa Golam
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdfssusercbaa33
 
Dpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCPDpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCPHemant Agrawal
 
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networksPLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networksPROIDEA
 
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfBRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfaaajjj4
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNADawood Aqlan
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switchingparthasn83
 
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesEnabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesTal Lavian Ph.D.
 
Krzysztof Mazepa - IOS XR - IP Fast Convergence
Krzysztof Mazepa - IOS XR - IP Fast ConvergenceKrzysztof Mazepa - IOS XR - IP Fast Convergence
Krzysztof Mazepa - IOS XR - IP Fast ConvergencePROIDEA
 
D-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringD-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringStefano Salsano
 
Project #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docxProject #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docxstilliegeorgiana
 
Building scalable web socket backend
Building scalable web socket backendBuilding scalable web socket backend
Building scalable web socket backendConstantine Slisenka
 
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]qqlan
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяEkaterina Melnik
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NamePositive Hack Days
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginEC-Council
 
Oracle Basics and Architecture
Oracle Basics and ArchitectureOracle Basics and Architecture
Oracle Basics and ArchitectureSidney Chen
 
Steen_Dissertation_March5
Steen_Dissertation_March5Steen_Dissertation_March5
Steen_Dissertation_March5Steen Larsen
 
IBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEIBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEsandipg123
 

Similaire à Gridstat SDN Architecture Secures Synchrophasor Data (20)

VYATTAによるマルチパスVPN接続手法
VYATTAによるマルチパスVPN接続手法VYATTAによるマルチパスVPN接続手法
VYATTAによるマルチパスVPN接続手法
 
GGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support NodeGGSN-Gateway GPRS Support Node
GGSN-Gateway GPRS Support Node
 
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdfBRKRST-3068  Troubleshooting Catalyst 2K and 3K.pdf
BRKRST-3068 Troubleshooting Catalyst 2K and 3K.pdf
 
Dpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCPDpdk: rte_security: An update and introducing PDCP
Dpdk: rte_security: An update and introducing PDCP
 
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networksPLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
PLNOG 13: Piotr Głaska: Quality of service monitoring in IP networks
 
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdfBRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
BRKRST-3066 - Troubleshooting Nexus 7000 (2013 Melbourne) - 2 Hours.pdf
 
شرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNAشرح مبسط جدا لمنهج سيسكو CCNA
شرح مبسط جدا لمنهج سيسكو CCNA
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding EnginesEnabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
Enabling Active Flow Manipulation In Silicon-based Network Forwarding Engines
 
Krzysztof Mazepa - IOS XR - IP Fast Convergence
Krzysztof Mazepa - IOS XR - IP Fast ConvergenceKrzysztof Mazepa - IOS XR - IP Fast Convergence
Krzysztof Mazepa - IOS XR - IP Fast Convergence
 
D-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoringD-STREAMON - NFV-capable distributed framework for network monitoring
D-STREAMON - NFV-capable distributed framework for network monitoring
 
Project #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docxProject #3 IT Security Controls Baseline for Red Clay Renovations.docx
Project #3 IT Security Controls Baseline for Red Clay Renovations.docx
 
Building scalable web socket backend
Building scalable web socket backendBuilding scalable web socket backend
Building scalable web socket backend
 
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
 
SCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имяSCADA Strangelove: взлом во имя
SCADA Strangelove: взлом во имя
 
SCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the NameSCADA Strangelove: Hacking in the Name
SCADA Strangelove: Hacking in the Name
 
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul CogginTakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
 
Oracle Basics and Architecture
Oracle Basics and ArchitectureOracle Basics and Architecture
Oracle Basics and Architecture
 
Steen_Dissertation_March5
Steen_Dissertation_March5Steen_Dissertation_March5
Steen_Dissertation_March5
 
IBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEIBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWE
 

Dernier

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Dernier (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Gridstat SDN Architecture Secures Synchrophasor Data

Notes de l'éditeur

  1. ABOUT : KURUSH FLAWS : VARUN SDN: VARUN GRIDSTAT SDN ARCHI / ANIMATION: MONIL SEC : SAGAR AMAN
  2. Without time-aligned phase information, the power grid has been controlled through an iterative state estimation process. Supervisory control and data acquisition (SCADA) information including voltage, current, and power measurements at various points in the system is combined to estimate the state. ----- Lack of communication between peering entities Electrical signals were out of sync
  3. ABOUT : KURUSH FLAWS : VARUN SDN: VARUN GRIDSTAT SDN ARCHI / ANIMATION: MONIL SEC : SAGAR AMAN
  4. Directly programmable Control Plane Agile network and flow configuration Centrally managed Open standards-based and vendor-neutral
  5. Directly programmable Control Plane Agile network and flow configuration Centrally managed Open standards-based and vendor-neutral
  6. ABOUT : KURUSH FLAWS : VARUN SDN: VARUN GRIDSTAT SDN ARCHI / ANIMATION: MONIL SEC : SAGAR AMAN
  7. ABOUT : KURUSH FLAWS : VARUN SDN: VARUN GRIDSTAT SDN ARCHI / ANIMATION: MONIL SEC : SAGAR AMAN
  8. Network Resource Management low-latency reliable delivery QoS-managed multicast (Focus only on main job i.e. Providing data for analysis) A publisher simply announces the availability of its data stream(s) to the management plane. Subscribers then request that the middleware set up delivery paths (with QoS, including rate, latency, and redundancy) to accomplish the delivery.
  9. Network Resource Management low-latency reliable delivery QoS-managed multicast (Focus only on main job i.e. Providing data for analysis) A publisher simply announces the availability of its data stream(s) to the management plane. Subscribers then request that the middleware set up delivery paths (with QoS, including rate, latency, and redundancy) to accomplish the delivery.