The document summarizes a workshop on smart grid communications held in September 2012. Key topics discussed included identifying the unknown communications requirements for smart grids, issues around network performance guarantees, and the need to break the closed loop between communications and power systems research. Participants represented different relevant expertise and discussed challenges around defining applications and use cases, technology choices, research vs industry assumptions, security, and developing a common language for the multidisciplinary community. The group agreed to further define use cases and system functions to help analyze communications requirements and develop a smart grid blueprint.
SMART GRID: MISCELLANEOUS INFORMATION TECHNOLOGIES AND THE CHALLENGES OF THEI...Jéssica Gessoli
The Smart Grid has been a great challenge of change in Brazil. For the choice of technologies to be applied it is necessary to take into account the particularities of each available technology and the power and telecommunications grids in the country.
As we compare the WiMAX to other technologies, can be added to the Smart Grid data to travel efficiently over long distances in economic terms and not suffering from the impact caused by the structural failure of the Brazilian grid.
Among the advantages mentioned by the research on WiMAX, the following stand out: the ease of communication with other public service providers, the greater robustness of its operations and technology domain, plus the ability to make electric utilities quite independently of the high costs imposed by operators. Due to all the options available, this also presents problems of its own that will be discussed throughout this article.
The results show that there is real interest in shares of energy utilities in developing WiMAX networks associated with other forms of data transmission, including PLC. Thus, the centralization of service delivery and charging can be made a reality in little time and a lot more efficiently.
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
SMART GRID: MISCELLANEOUS INFORMATION TECHNOLOGIES AND THE CHALLENGES OF THEI...Jéssica Gessoli
The Smart Grid has been a great challenge of change in Brazil. For the choice of technologies to be applied it is necessary to take into account the particularities of each available technology and the power and telecommunications grids in the country.
As we compare the WiMAX to other technologies, can be added to the Smart Grid data to travel efficiently over long distances in economic terms and not suffering from the impact caused by the structural failure of the Brazilian grid.
Among the advantages mentioned by the research on WiMAX, the following stand out: the ease of communication with other public service providers, the greater robustness of its operations and technology domain, plus the ability to make electric utilities quite independently of the high costs imposed by operators. Due to all the options available, this also presents problems of its own that will be discussed throughout this article.
The results show that there is real interest in shares of energy utilities in developing WiMAX networks associated with other forms of data transmission, including PLC. Thus, the centralization of service delivery and charging can be made a reality in little time and a lot more efficiently.
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
IMMERSIVE TECHNOLOGIES IN 5G-ENABLED APPLICATIONS: SOME TECHNICAL CHALLENGES ...ijcsit
5G next-generation networking paradigm with its envisioned capacity, coverage, and data transfer rates
provide a developmental field for novel applications scenarios. Virtual, Mixed, and Augmented Reality will
play a key role as visualization, interaction, and information delivery platforms. The recent hardware and
software developments in immersive technologies including AR, VR and MR in terms of the commercial
availability of advanced headsets equipped with XR-accelerated processing units and Software
Development Kits (SDKs) are significantly increasing the penetration of such devices for entertainment,
corporate and industrial use. This trend creates next-generation usage models which rise serious technical
challenges within all networking and software architecture levels to support the immersive digital
transformation. The focus of this paper is to detect, discuss and propose system development approaches
and architectures for successful integration of the immersive technologies in the future information and
communication concepts like Tactile Internet and Internet of Skills.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Big Data and Next Generation Network Challenges - PhdassistancePhD Assistance
Big Data is defined as data whose dynamics, such as volume, velocity, truthfulness, and diversity, are substantially expanded and impossible to be handled by typical data management systems. Modern data analytics techniques are utilised to manage such large amounts of data. With the introduction of next-generation networks, the number of wireless devices is fast expanding. According to a CISCO index released in 2014, the number of wireless devices now outnumbers the world’s population [1]. The proliferation of data generated by such a varied spectrum of linked devices is unsurprising.
Learn More:https://bit.ly/3yNpy7Y
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
Presentation of the paper by M. Söllner, C. Görg, K. Pentikousis, J. Mª Cabero Lopez, M. Ponce de Leon, P. Bertin, "Mobility Scenarios for the Future Internet: the 4WARD approach", WPMC 2008, Sept 2008
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
International Journal of Computer Science, Engineering and Information Techn...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)
will provide an excellent international forum for sharing knowledge and results in theory,
methodology and applications of Computer Science, Engineering and Information Technology.
The Journal looks for significant contributions to all major fields of the Computer Science and
Information Technology in theoretical and practical aspects. The aim of the Journal is to provide
a platform to the researchers and practitioners from both academia as well as industry to meet and
share cutting-edge development in the field.
All submissions must describe original research, not published or currently under review for another
conference or journal
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Achievements and future works of ITU-T Study Group 15 on Networks, Technologies and Infrastructures for Transport, Access and Home
Presented at WTSA-16 by Mr Stephen J. Trowbridge, Chairman of ITU-T Study Group 15
Autonomic and cognitive architectures for the Internet of Things, Claudio Sav...Universita della Calabria,
Slides related to the conference paper Autonomic and cognitive architectures for the Internet of Things, Claudio Savaglio and Giancarlo Fortino, IDCS2015. Slide author: Claudio Savaglio
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Call for Papers - 6th International Conference of Networks, Communications, W...IJNSA Journal
6th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2020) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Smart grid technology (and smart meters in particular) may raise privacy concerns. Learn what are the issues at stake, which approaches are being developed and what is coming next.
International Standards: The Challenges for an Interoperable Smart GridSchneider Electric
Building an electric energy Smart Grid involves proper interfacing between existing devices, applications and systems – all likely sourced from many different vendors. The resulting interoperability allows valuable advantages, such as the ability to use distribution system demand response (DSDR) to improve the efficiency of delivered power. Interoperability enables automated switching sequences, for system ‘self-healing’ and improved reliability, along with effective integration of distributed renewable and non-renewable resources that can enable peak shaving. Interoperability also is vital for assimilating emerging automation technologies that will enable the utility to realize these benefits in the future – and protect public and private sector technology investments.
The International Electrotechnical Commission (IEC) defines international standards, recognized globally, that characterize interoperability and security of electrical, electronic and related technologies. These standards are created to assure interoperability within all the major power system objects in an electrical utility enterprise and allow mission critical distribution functions to take advantage of real-time data in a secure manner. The IEC standards also enable reliable exchange of data among utilities and across power pools.
The U.S. National Institute of Standards and Technology (NIST) is incorporating IEC standards, and developing new or revised standards, to be applied in its development of a Smart Grid as a national energy goal. This standards framework aims to eliminate the implementation of technologies that might become obsolete prematurely or be implemented without necessary security measures – and help utilities make the infrastructure decisions that reduce cost and energy loss, improve network reliability and embrace technology innovation.
Big Data and Next Generation Network Challenges - PhdassistancePhD Assistance
Big Data is defined as data whose dynamics, such as volume, velocity, truthfulness, and diversity, are substantially expanded and impossible to be handled by typical data management systems. Modern data analytics techniques are utilised to manage such large amounts of data. With the introduction of next-generation networks, the number of wireless devices is fast expanding. According to a CISCO index released in 2014, the number of wireless devices now outnumbers the world’s population [1]. The proliferation of data generated by such a varied spectrum of linked devices is unsurprising.
Learn More:https://bit.ly/3yNpy7Y
Contact Us:
Website: https://www.phdassistance.com/
UK: +44 7537144372
India No:+91-9176966446
Email: info@phdassistance.com
Named Data Networking (NDN) is a recently designed Internet architecture that benefits data names
instead of locations and creates essential changes in the abstraction of network services from "delivering
packets to specific destinations” to "retrieving data with special names" makes. This fundamental change
creates new opportunities and intellectual challenges in all areas, especially network routing and
communication, communication security, and privacy. The focus of this dissertation is on the forwarding
aircraft feature introduced by NDN. Communication in NDN is done by exchanging interest and data
packets
Presentation of the paper by M. Söllner, C. Görg, K. Pentikousis, J. Mª Cabero Lopez, M. Ponce de Leon, P. Bertin, "Mobility Scenarios for the Future Internet: the 4WARD approach", WPMC 2008, Sept 2008
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
International Journal of Computer Science, Engineering and Information Techn...ijcseit
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)
will provide an excellent international forum for sharing knowledge and results in theory,
methodology and applications of Computer Science, Engineering and Information Technology.
The Journal looks for significant contributions to all major fields of the Computer Science and
Information Technology in theoretical and practical aspects. The aim of the Journal is to provide
a platform to the researchers and practitioners from both academia as well as industry to meet and
share cutting-edge development in the field.
All submissions must describe original research, not published or currently under review for another
conference or journal
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Achievements and future works of ITU-T Study Group 15 on Networks, Technologies and Infrastructures for Transport, Access and Home
Presented at WTSA-16 by Mr Stephen J. Trowbridge, Chairman of ITU-T Study Group 15
Autonomic and cognitive architectures for the Internet of Things, Claudio Sav...Universita della Calabria,
Slides related to the conference paper Autonomic and cognitive architectures for the Internet of Things, Claudio Savaglio and Giancarlo Fortino, IDCS2015. Slide author: Claudio Savaglio
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
Call for Papers - 6th International Conference of Networks, Communications, W...IJNSA Journal
6th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2020) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Aspect-Oriented Programming (AOP) provides new constructs and concepts to handle secondary requirements in applications. Secondary requirements, i.e. crosscutting concerns, of the Internet of things (IoT) applications is inherited from the nature of the complexity of interactions, and implementation crosscutting concerns over core IoT architecture. Realizing the full potential of the IoT application requires a new abstraction design technique. This paper proposes an abstract class element toward a design approach to providing better means better separation of concerns. The proposed approach is accompanied by gathering relevant contextual properties pertaining to the environment of IoT interactions. A new architectural aspect-aware definition is proposed for tracking the logic of interaction characteristics on the IoT components being designed.
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
Internet of Things (IoT) has been receiving a lot of interest around the world in academia, industry and telecommunication organizations. In IoT, many constrained devices can communicate with each other which generate a huge number of transferred packets. These packets have different priorities based on the applications which are supported by IoT technology. Emergency applications such as calling an ambulance in a car accident scenario need fast and reliable packets delivery in order to receive an immediate response from a service provider. When a client sends his request with specific requirements, fast and reliable return contents (packets) should be fulfilled, otherwise, the network resources may be wasted and undesirable circumstances may be counted. Content-Centric Networking (CCN) has become a promising network paradigm that satisfies the requirements of fast packets delivery for emergency applications of IoT. In this paper, we propose fast packets delivery techniques based on CCN for IoT environment, these techniques are suitable for urgent packets in emergency applications that need fast delivery. The simulation results show how the proposed techniques can achieve high throughput, a large number of request messages, fast response time and a low number of lost packets in comparison with the normal CCN.
Smart grid technology (and smart meters in particular) may raise privacy concerns. Learn what are the issues at stake, which approaches are being developed and what is coming next.
International Standards: The Challenges for an Interoperable Smart GridSchneider Electric
Building an electric energy Smart Grid involves proper interfacing between existing devices, applications and systems – all likely sourced from many different vendors. The resulting interoperability allows valuable advantages, such as the ability to use distribution system demand response (DSDR) to improve the efficiency of delivered power. Interoperability enables automated switching sequences, for system ‘self-healing’ and improved reliability, along with effective integration of distributed renewable and non-renewable resources that can enable peak shaving. Interoperability also is vital for assimilating emerging automation technologies that will enable the utility to realize these benefits in the future – and protect public and private sector technology investments.
The International Electrotechnical Commission (IEC) defines international standards, recognized globally, that characterize interoperability and security of electrical, electronic and related technologies. These standards are created to assure interoperability within all the major power system objects in an electrical utility enterprise and allow mission critical distribution functions to take advantage of real-time data in a secure manner. The IEC standards also enable reliable exchange of data among utilities and across power pools.
The U.S. National Institute of Standards and Technology (NIST) is incorporating IEC standards, and developing new or revised standards, to be applied in its development of a Smart Grid as a national energy goal. This standards framework aims to eliminate the implementation of technologies that might become obsolete prematurely or be implemented without necessary security measures – and help utilities make the infrastructure decisions that reduce cost and energy loss, improve network reliability and embrace technology innovation.
Dynamic Semantics for the Internet of Things PayamBarnaghi
Ontology Summit 2015 : Track A Session - Ontology Integration in the Internet of Things - Thu 2015-02-05,
http://ontolog-02.cim3.net/wiki/ConferenceCall_2015_02_05
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
Connected Products for the Industrial WorldCognizant
By leveraging product-centric connected ecosystems, manufacturers can create new and more effective business models, advance operational excellence, and design and develop better products and services that align with customer needs and preferences.
Modeling and Simulation of the Communication Networks in.docxannandleola
Modeling and Simulation of the Communication
Networks in Smart grid
Yizhou Dong, Ziyuan Cai, Ming Yu, and Mischa Sturer
Dept. of Electrical & Computer Engineering
FAMU-FSU College of Engineering, FL 32310, USA.
[email protected], [email protected], [email protected], [email protected]
Abstract—A reliable and secure communication network plays
a significant role in Smart grid systems, which aims at
coordinating generation, transmission, distribution, and
consumption parts in power system. The scope of our work
ranges from utility level to end consumption level. The major
difficulties in this work can be summarized as follows: 1)
Performance requirements from the viewpoint of network have
not been clearly defined; 2) Model mapping from power system
to communication networks is not straightforward. 3) Network
performance has not been well-investigated. This paper
proposes a communication network model for a typical
program of smart gird. Moreover, application requirements,
link capacity and traffic settings have been investigated.
Simulation results validate the feasibility of this model and
provide useful network performances which can satisfy both
the non-real-time and real-time application requirements.
Keywords-Smart Grid; Communication Network; Simulation;
Performance; FREEDM; IFM
I. INTRODUCTION
Smart grid becomes to an attractive dominating topic
nowadays in both research universities and industrial
organization. The traditional power communication
infrastructure cannot meet the requirements for our future
power system which the energy will not only generated by
traditional generation facilities but also produced by
distributed facilities and new energy devices. The delivery of
both energy and information must also be end-to-end and
bidirectional. Communication network should interconnect
every device of power system from electricity generation to
end-user consumption, and even more. One view need to be
point out is that, in physical layer, geographic location for
power electricity device and communication network device
can be dissimilar.
NIST published the first definition of Smart Grid in 2009
which represent smart grid standardization in North
American. The networking parts proposed by NIST
emphasize the transformation from traditional power
communication networks to Information and Communication
Technology (ICT), which indicates that both energy and
information transmission must be bidirectional for all levels.
[1] In Europe, European Technology Platform also issued
standards to define smart grid as the target architecture which
enable all users’ connection, including generators,
transmission, and consumers. Other national organizations
and industrial companies also boost the development of
smart grid by provides the recommend standards and
proposals like The German Smart Grid Standardization
Roadmap concentrate their attentions ...
Along with the trends, 5g became a potential weapon to change the standards across all industries. Initially, mobile network communication providers are facing enormous challenges and complexities like logs of data analysis, security, mundane repetitive tasks, etc
SEMANCO Workshop: Analysing and Visualising energy related data in our buildings, towns, and cities.
http://semanco-visualization-workshop.blogspot.com.es/
La Salle Campus Barcelona, Spain, 11-12 April 2013.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Hub net symposium_smartgridcommworkshop#1_summary_note
1.
1st
SmartGrid Communications Workshop
Imperial College, London
September 2012‐01‐22
Summary Notes
1. The 1st
HubNet Smart Grid Communications scoping workshop was held on 13th
September
2011.
2. The workshop objectives were:
• to explore with a community of people with different relevant expertise the landscape
of Smart Grids and, specifically, their requirements on communication solutions, and
• to identify key challenges and priorities to be explored in future workshops and through
HubNet activities.
3. The workshop was attended by about 35 people, with different expertise: multi‐agent control
and multi‐agent systems, system stability analysis, integration of cloud‐computing in power
grids, algorithms for smart grid (SG) control, how to use smart metering to support SG
functionality, agent based coordination & control for ancillary systems, overload management,
(mathematics) large data set processing, testing effects of communications for smart metering,
distributed control of power systems, smart grid applications, IEC 61850 digital subsystems,
substation communication controls.
During the discussions, the following topics and areas were discussed. Key comments and the
challenges identified are noted below.
4. The following perceived issues with communications were identified:
• There is a perception that the communications requirements for smart grids are not
known/understood.
• Under assumptions of “business as usual”, the predictability of the communication
network performance (i.e. in terms of guarantee of bounds for latency and loss) is a big
issue.
• It is unclear if the Smart Grid presents special issues and challenges for communications?
If yes, in what way? Is it due to the scale, or the heterogeneity of devices, or the
relatively large scope of the first definitions of the Smart Grid?
• Is the sharing of the Smart Metering data necessary for the functioning of the Smart
Grid? If yes, what are the technological barriers to accomplish this? Is the problem only
technical or more widely data sharing in such a large system with multiple, often
competing, stakeholders?
2. • What is the role of standards in communications for the Smart Grid? There will be
different communication technologies – how can we define a path for interoperability
within a Smart Grid?
• Building security and trust support mechanisms for the Smart Grid.
• Smart Grids will be a long‐term evolving large scale system. Flexibility/autonomy should
be built into the system. There are open questions such as: how easy would it be to
introduce/attach new devices, agents, applications – how does trust/security come into
this? What is required, as a system, to allow this to happen?
5. The specification of the communications requirements within smart grid applications is difficult
because:
• communication networks can be designed once one knows the application
requirements;
• the application requirements are somewhat flexible and applications can be designed to
meet communication network constraints.
In the ensuing discussion an agreed position emerged about the need to break the closed‐loop
between communications and power systems research. The following topics were identified
during the discussions:
• Requirements and applications:
i. What requirements should come first: communications or smart grid
applications? Which part of the grid should drive, initially, the requirements?
Examples and lessons learnt can be drawn from the EPSRC AuRA‐NMS project;
other EU and UK based projects should also be consulted.
ii. There is huge variability in requirements within the Smart Grid in different areas
of it, and for different applications ‐ how to define/refine the requirements
there?
iii. What are the applications in the Smart Grid? What do we need to do in the
Smart Grid that is different from what we do today? We need to differentiate
between data‐flow and control‐flows, and analyse what exactly needs to be
communicated.
iv.
• Concrete examples of control algorithms at different scales for grid management are
necessary:
i. We need concrete examples of control algorithms and the needs of those
applications, and their requirements on the communications architecture. Are
the applications/algorithms well known? Can we be confident?
ii. What does DSM brings into the communication requirements? Does it lead to
additional challenges, due to the diversity of applications and user types? For
example, differences in supply/demand in urban vs. rural areas may
have/require different requirements/constraints.
iii.
• Technology choices and implementation strategies:
i. The communication layer is an enabler. The choice of communication
technology is driven by the data requirements, the control architecture choices,
and the information flows. It is necessary to explore any flexibility at the design
stage in deciding what information is necessary where.
ii. The choice of control architecture (centralised vs. de‐centralised) was discussed;
the emerging view was that this is not an issue, and it will be driven by whatever
is required/necessary. A better description is centralised and distributed control.
This means that the control algorithms are designed such that they can be
3. physically spread throughout the power network and still operate effectively,
The decision on where to physically place them is made on a case by case basis
depending on data access, telecommunications issues, etc. GB Smart Metering
programme rollout has produced a functional specification for the Smart Meters
‐ what would be enough to support Smart Grid applications? Is data aggregation
for Smart Metering being considered?
• Research vs. Industry:
i. There is a concern that there is a disparity in assumptions between the research
community and what is actually happening in industry – this needs to be
resolved.
• Interdependency, reliance, redundancy:
i. The Smart Grid will result in an increased reliance on communications –
therefore the reliability of communications becomes a key issue (collapse of
network/system). How does the recovery process happen? What is the impact
of depending on communications during power system transients and
faults?What is the required communications network restoration time? What is
the impact of the interdependency between the communications and power
systems layer? How will we manage the transition path between what is a
largely deterministically‐behaving system today into one that will depend
strongly on systems with statistically‐governed behaviour, such as
communication systems? One example given was that the recovery of the power
network in case of significant nature disruptive event impact in Scotland was 4
months.
• Cost‐benefit analysis for Smart Grid developments:
i. Are the necessary functions/requirements too expensive to achieve?
ii. For a system that will evolve over time, and which may break current working
practices, one way to design will be to, initially, ignore the cost. What is possible
if we ignore the cost, and is ignoring the cost practicable?
• Security ‐ this was indicated as a key issue:
i. Should be included from the start, because it is a system issue.
ii. Should be given top priority, since it will likely determine/constrain strategies for
data aggregation, processing, communications, etc.
• The architecture of the Smart Grid actually reflects both technical considerations and
the regulatory and market framework (UK and EU). The Smart Grid until now is seen as a
complete, end‐to‐end, system architecture design. In practice constraints will apply
(technical and regulatory). To address this any architecture proposals for the SG should
consider breaking down what the areas of control/functions (Smart Grid) are likely to
be, and start establishing/considering realistic performance requirements for these
areas so that there is some belief that the system will function end‐to‐end..
Requirements should be derived from realistic use cases/examples (e.g. from
DECC/Ofgem work on SG). Design flexibility at this early stage of the specification of
Smart Grid architecture is absolutely necessary.
• The Smart Grid community needs a common language/terminology/understanding:
i. Difference between data and information; interpretation required, data
analytics and management, etc.
4. ii. Multidisciplinary discussions are a start, but we need to establish
mechanisms,methods and processes to get to a common terminology and
definition of problems at some scale.
iii. There is a dichotomy in understanding of the performance requirements
towards communication link vs. communication networks. End‐to‐end
communication service is provided by the communication network, and it is
this that will largely affect the end‐to‐end behaviour of the system.
iv.
• The power networks and existing market structure itself has implications for the way
data is collected, processed, communicated, stored, etc.
i. Data and information sharing ‐ who does it, how do you share the data?
ii. Communications is not necessarily direct; data can take different paths through
different stakeholder networks and systems.
iii. There is a broken value chain.
• Other communities (e.g. Internet of Things) are looking at similar issues/having the
same discussions: how do we bring the two communities together?
As a result of the wide ranging technical discussion, and the challenges identified, the following
activities were identified as the way forward.
6. The way forward
• Define, if necessary, and catalogue use cases and system functions. These can be used
as drivers for communications requirements analysis. Building and analysing use cases
and functions will lead to the identification of communications requirements.
• State‐of‐the‐art and literature review. What resources are available? (e.g., IEEE Smart
Grid register, LCNF projects, etc.) How can these resources be brought together/bridged
for the benefit of the SG community?
• Multi‐disciplinary teams to focus on and analyse use cases, from the following list, to
determine what are the new challenges:
i. Future scenarios ‐ what needs to be done, e.g., ENA
ii. Projects in progress.
iii. Transferable technologies, standards and research that can be re‐used.
iv. Current scenarios are simple; consider more complex scenarios (e.g., involving
coordination functions). Look from simple to more future‐related use cases
(mixed level of functions/simplicity).
v. Build some strawman use cases together, work on them and present them in the
next workshop.
• Smart Grid Blueprint: As a community we should work towards detailed requirements
specifications and functional specifications. These documents will become the blueprint
for the smart grid. They should consider together the following interactions: Physical
communications Networking system and data flows Information flows Control.
Dr Dritan Kaleshi
Prof Stephen McArthur
Dr Terence Song
Prof Joe McGeehan