150 likes | 312 Views
Some Remarks Karl F. Rauscher Chair, IEEE CQR Advisory Board Bell Labs Fellow Executive Director, Bell Labs Network Reliability & Security Office, Alcatel-Lucent. C Q R. Ft. Myers, Florida, USA 16 May 2007. Questions you may be asking. What is the IEEE CQR? What is the purpose of CQR?
E N D
Some Remarks Karl F. Rauscher Chair, IEEE CQR Advisory Board Bell Labs Fellow Executive Director, Bell Labs Network Reliability & Security Office, Alcatel-Lucent C Q R Ft. Myers, Florida, USA 16 May 2007
Questions you may be asking . . . What is the IEEE CQR? What is the purpose of CQR? How do I become a member of CQR? How do I get more involved in CQR? What is the value of CQR?
Questions you may be asking . . . What is the IEEE CQR? - a professional society What is the purpose of CQR? - to build YOU up How do I become a member of CQR? - you already are How do I get more involved in CQR? - ICC, GLOBECOM, workshops, journals, something new . . . What is the value of CQR? - networking, peer review, special workshops, coaching
Step back in time to the 2001 CQR International Workshop Issue discussed in a facilitated discussion: What is the complete list of things that can cause outages in emerging data networks? Background: took a while to learn circuit switched business . . . would be nice to have a faster learning curve.
A Running Jump onto a New S-Curve Reliability Packet-Switched Circuit-Switched Cost
A Running Jump onto a New S-Curve Historic Insights Non-Historic Insights + Reliability Packet-Switched Circuit-Switched Cost
Proceedings from the 2001 CQR International Workshop IEEE CQR Outline of Packet Switched Network Vulnerabilities • Hardware, Firmware • Software • Protocols • Interoperability • Human Performance and Procedures • Physical Environment • Network Design and Planning • Network Congestion / Traffic Engineering • Power • Rapid Pace of Growth, Change, Complexity • Malicious Attacks, Security • Disasters
Different sides of an equation Threat Anything with the potential to damage or compromise the communications infrastructure or some portion of it Vulnerability A characteristic of any aspect of the communications infrastructure that renders it, or some portion of it, susceptible to damage or compromise
Some Characteristics of Ts and Vs Threats • ~ infinite in number • knowledge value is fleeting • each has permutations Vulnerabilities (intrinsic) • finite • fixed and well known • only way threats can impact
“Terrorism depends on surprise.” “Failure ofimagination.” Do you want to be responsible for this?
The Forces + + + The need. The knowledge. The physics. The expecation.
8-Ingredient Framework . . .
Intrinsic Vulnerabilities Packet-Switched
‘Take Aways’ stay engaged - contribute (ICC, Globecom, International workshops, special workshops, journals, your own idea, …)- step up to more responsibilities