Nreca kickoff meeting
- 3. Agenda for NRECA Agile Fractal Grid
Kickoff Meeting
8:00 Welcome by Martin Lowery; Opening by Chuck Speicher
8:15 Introductions of the Participants – John Reynolds
8:45 Achieving the Common Language through Design Patterns
9:20 The Vision of the Agile Fractal Grid – Craig Miller
9:45 Break
10:00 Discussion of the Managed Services Store and Applications
10:20 Discussion of the Distributed Systems Elements
11:45 Discussion of the Industrial Internet – Security, Resiliency, Efficiency
12:15 Lunch
1:00 Scope of the SmartAmerica Challenge vs. the Production Rollout
2:00 SEIT Process and Phase 1 Planning
2:30 Break
3:00 Phase 2 Implementation and Thread Assignments
3:30 General Discussion, Issues, Action Items, and Understandings
4:00 Wrap Up and Conclusion
- 8. It has been said that
the greatest engineering achievement of the 20th century
has been the building of the electric grid.
- The National Academy of Engineering
- 10. Department of Energy
Carol Hawk
Program Manager,
Cyber Security for Energy Delivery Systems
Ivanpah
World's largest solar plant started producing electricity today
Ivanpah was supported by $1.6 billion in investments
from the Energy Department's Loan Programs Office.
It represents the future of energy –
utility-scale renewable power generation
that uses the latest technology to harness the sun
where it is most abundant.
- 13. Department of Homeland Security
Lisa Kaiser
Sarah Mahmood
Executive Order (EO) 13636: Improving Critical Infrastructure Cybersecurity
Presidential Policy Directive (PPD)-21: Critical Infrastructure Security and Resilience,
Critical Infrastructure Cyber Community Voluntary Program
Secretary of Homeland Security
Jeh Johnson
- 15. Congress
Diane Rinaldo
Legislative Director
For Mike RogersMike Rogers
– Michigan 8th District
U.S. House of Representatives
Chairman, House Intelligence Committee
Member, Energy and Commerce Committee
United States House Energy Subcommittee on Communications and Technology
United States House Energy Subcommittee on Health
Cyberthreat Data Sharing
and Protection
- 18. We are planning to support the 940 rural co-ops in the U.S. with
hybrid cloud/device services protected by the Security Fabric.
This is also the candidate energy “testbed” for the SmartAmerica demonstration.
- 19. What NRECA has asked us to do.
1. Stand up an “app store” for both operational and analytical
applications for the cooperatives.
2. Participate in the “Substation of the Future” for the remote
equipment and subsystems.
3. Apply the Security Fabric within the emerging Industrial
Internet to protect all communications between the
elements.
- 20. Introduction to the
Security Fabric Alliance
• The Security Fabric Alliance is a working association dedicated to
practical deployment of the power grid and critical infrastructure
complex system solution in the United States:
– Utilities and telecommunications providers
– Systems integrators
– Manufacturers
– Technology partners
– National certification and interoperability entity
• The alliance is intended to give the CEO of a utility the purview of
up-to-the moment knowledge of the options available to make wise
investment decisions regarding infrastructure deployment for
optimal returns.
The variation includes the proper orientation for large, medium, and small utilities.
- 21. There are many participants at different levels
in the Security Fabric Alliance.
ComponentsProductsSubsystems
ResearchIntegration
Utility
Customers
• Intel – servers with Quark + TPM
• Wind River – Security Connect
• Middleware
• RTI – DDS
• GridStat
• Indra - iSpeed
• MultiSpeak
• TeamF1 – Secure Communications
• Secure Crossing – Protocol Whitelisting
• PsiNaptic – Secure Service Distribution
• SNMP Research – SNMP Agent
• Freescale – HSM w/Vybrid SoC
• Xilinx – CompactRIO SOC
• Green Hills Software - INTEGRITY
• Altera - tamper proofing
• Microsoft – Active Directory
• Red Hat – Auth Hub
• General Electric – EMS
• Alstom Grid – EMS
• Siemens – DMS
• Viridity Energy – DR + DER
+ Microgrid
• Lemko – LTE systems
• Intel Security – SIEM + GTI
• Intel – Encanto
+ silicon support
• Sypris – Supply
Chain Root of Trust
• TCIPG
• EPRI – CIM Standards
• MIT – Security &
Privacy Standards
• EPG – Phasor Data Portfolio
• GridSense– NAN & Line Sensors
• S&C IntelliTeam
• SafeNet – Secure Key Management
• Heart - Transverter
• Freescale One Box
• Cisco Cloud-in-a-Box
• Integrated Architectures – SEIT
• MACE Fusion - DoD
• Kryptos Logic – Red Team Certification
• M2M Dynamics
• Drummond Group – C&IT
• Intel Security - Distribution
...First Stage……
• ERCOT
• ONCOR
• AEP
• NRECA
• NRTC
Suppliers
• Verizon
• Level3
• AT&T
• Internet2
• BT
• ViaSat
• Hughes
• ARINC
• Stratus
• Symmetricom
…Second Stage……
• APPA
• SDG&E
• PJM
• NYISO
• Southern Company
• Duke Energy
• CAISO
• Pecan Street
• Mueller Community
• Pike Powers
• PNNL – CyberSecurity
Test Center
• Lincoln Labs
• OMG SIG
• SmartAmerica
Managed Services
• Tazca – Connect
• CSG International
• Digi International
• N-Dimension
• SETI
• Lockheed Martin
• SAIC
• Threat Connect
- 22. To establish the security of end-to-end systems using the Security Fabric elements,
you need to do all seven… not just some.
4. Audit
– Records noteworthy events for later analysis
5. Confidentiality
– Encrypts sensitive data for matters of privacy.
6. Integrity
– Ensures that messages have not been
altered.
7. Availability
– Prevents denial of service attacks
1. Identity Management
– Ensures the device identity is established
genuinely
2. Mutual Authentication
– Allows both the Device Node and the
Controller to verify the trustworthiness their
identity to each other.
3. Authorization
– Manages permission to proceed with specific
operations.
These are the seven tenets of security
as described in the NIST-IR 7628 Guidelines.
- 23. The OMG process is more about establishing markets
as opposed to just setting standards.
SFA Reference
Builds
Certification of
Conformance &
Interoperability
The OMG is planning to standardize
the Security Fabric
for all critical infrastructure.
- 25. Systems Engineering, Integration, and Test
• President – Energy One Solutions
• Secretary General – GO15
Very Large Power Grid Operators
• President and CEO
Alstom ESCA Corporation
• CTO – PJM Interconnection
• Co-founder Viridity EnergyAlain Steven
John Reynolds
Alain Steven
Rick Schaal
Mike Sisto
Jim Baller
Bob Lamont
Paul Carroll
Mike Sisto
• IBM’s Wireless Emerging Business Opportunities
• AT&T, Lucent Technologies and Hewlett-Packard
• Lemko Distributed Mobile Wireless Network solutions
Rick Schaal
• VP, Engineering – Viridity
• Executive Program Director –
Alstom ESCA
• Program Director – AREVA
• DMS Lead – Puget Sound Energy
• American Public Power Association
• Fiber to the Home Council
• Google Inc.
• National Association of Telecommunications
Officers and Advisors
• + several hundred specific broadband projects
- 27. Texas A&M University
Named second in the nation by The Wall Street Journal among all universities,
public and private, in a survey of top U.S. corporations, non-profits and government agencies,
based on graduates that recruiters prefer to hire.
“Home of the 12th Man”
Walt Magnussen
- 30. GridSense
Transformer IQ
Line IQ
Inspection
Brett Sargent • System Capacity
• Phase Imbalance
• Metering / Theft
• Conservation Voltage
Reduction
• Four Quadrant True
Power Factor
• Line Fault Directionality
• PQ – voltage sags/swells,
interruptions, surges,
unbalance
• Transformer Asset
Management
- 31. Lemko
LTE over Satellite
Cellular on Wheels
Utility Industry
WiMax Replacement
Security Industry
Transportation Industry
Mike Sisto
Public Safety
Healthcare industry
- 42. Green Hills Software
Smart Farming
Smart Medical Systems
GE Aircraft Engines
EMC High End Storage Systems
Transportation Systems
Phase Array Radar Systems
Weapons Control Systems
Guidance Systems
Game Systems
Automotive Systems
John Warther
John Killam
Brad Jackson
Brian Riley
- 43. LocalGrid Technologies
Power Quality Analyzer
Microgrid controls:
• Microgrid and Generation Control
• Generation and Asset Monitoring
• Storage Integration
Device EnvironmentController Environment
Hypervisor
Application
Management
Agent
Hypervisor
Application
Management
Agent
David Berg
- 51. Utilities Telecommunications Council
Eric Wagner
Brett Kilbourne
• Advocacy and Training
• License Sentry
• Frequency Coordination
• Microwave Coordination
• PLC Database
• RF Safety and Training
• Regulatory Filing and Tracking
- 54. National Rural Electrical Cooperative
Association
Martin Lowery
Robbin Christianson
David Pinney
Maurice Martin
Barry Lawson
Bridgette Bourge
Bob Lamouth
Doug Lambert
Paul Carrol
Craig Miller
- 55. Building a Common Language
Everyone shapes his or her view of the world
through framing, and people with different
backgrounds are likely to see their
surroundings through vastly different frames.
By themselves, frames are not inherently good
or bad…
they just are.
- 56. The quality that all of us seek in life
that has no name
includes
Simplicity.
- 57. The Laws of Simplicity are very important
in complex environments.
1. Reduce
The simplest way to achieve
simplicity is through thoughtful
reduction.
2. Organize
Organization makes a system of
many appear fewer.
3. Time
Savings in time feels like simplicity.
4. Learn
Knowledge makes everything
simpler.
5. Differences
Simplicity and complexity need each
other.
6. Context
What lies in the periphery of
simplicity is definitely not peripheral.
7. Emotion
More emotions are better than less.
8. Trust
In simplicity we trust.
9. Failure
Some things can never be made
simple.
10. The One
Simplicity is about subtracting the
obvious, and adding the meaningful.
John Maeda leads RISD:
the #1 school of design in the country.
- 58. Never design a thing without first understanding the
next larger context into which it must fit.
• A chair within a room,
• a room within a house,
• a house within a neighborhood,
• a neighborhood within a city.
- Eero Saarinen
There are two more guiding principles in all contemporary architecture.
Cranbrook Academy is the
#2 school of design in the country.
- 59. Use a system of design patterns to
allow local teams to design their own systems
out of interchangeable parts such that
integration is assured from the outset…
but such that no two local systems ever look exactly the same.
- Christopher Alexander
“The Timeless Way of Building”
Design patterns allow for organic growth.
This treatise on design patterns is now he basis of
most object-oriented systems in the world today.
- 60. Our assignment here is to build
a forest of oak trees.
First start with a vision of the end goal...
… then work backwards in time to determine the first step.
- 61. Those who are not students of history …
…are doomed to repeat it.
We always seem to build things four times,
and in a certain order.
– Make it work
– Make it fast
– Make it small
– Make it pretty
- Jim Ladd
- 63. This iconic building remained the tallest building in the world for over 40 years…
… and yet took only one year to construct…
In their first meeting with the client,
Lamb asked Raskob about his vision
for the building.
Raskob stood a pencil on end and said,
"How high can you make it
so that it won't fall down?“
The initial plans were
ready in two weeks.
John Jakob Raskob
Chief Financial Officer
of both
Dupont and General Motors
- 64. The building of the Boeing 777
drew from the lessons learned.
• The design phase for Boeing's new twinjet was different from the
company's previous commercial jetliners. For the first time, eight major
airlines had a role in the development of the airliner. This was a
departure from industry practice, where manufacturers typically designed
aircraft with minimal customer input.
• The 777 was the first commercial aircraft designed entirely on computer.
Each design drawing was created on a three-dimensional CAD software
system. This let engineers assemble a virtual aircraft, in simulation, to
check for interference and verify that the thousands of parts fit properly—
thus reducing costly rework.
• The initial 777-200 model was launched with propulsion options from
three manufacturers, General Electric, Pratt and Whitney, and Rolls-Royce,
giving the airlines their choice of engines from competing firms.
- 65. The advice from some of the team is memorable
relevant to creating complex systems.
Chapter 3 on Reliable Delivery
recounts some of the inspiration
from the building of the
Empire State Building in 1930.
In the beginning it is
always good to come up
with at least two or
three options for how a
capability might be
implemented…
… and then defer
making a final decision
until after they are
better understood
relative to what the
overall system must do.
- 66. But how should we start?
• We should first go talk to the least capable of our customers
and walk a mile in his moccasins to see what takes place
there:
– for that feel of what events go on there
– for what their definition of happiness is all about
– for that essence of what life itself is all about
– for “the quality that has no name”… (more on this later…)
Let’s use a compelling user story to make it easy for all to see the intent.
- 67. The Vision
“The Agile Fractal Grid”
Achieving
Grid Security, Reliability, and Resiliency
through Advanced Analytics and Control
- 69. On a nice day, the
utility is running smoothly.
Everything is “Hot”
- 71. A bad storm comes through
and some areas lose power
- 77. This may allow some
power to be restored in
additional areas as the
utility works to bring dark
areas on line
- 83. Collect Data
Transform and Organize Data
Perform Analysis
Derive Decision
Implement Action
Collect Data
Transform and Organize Data
Perform Analysis
Derive Decision
Implement Action
All grid applications have the same basic structure.
- 84. Collect Data
Transform and Organize
Data
Perform Analysis
Derive Decision
Implement Action
Data level
integration
Abstraction of the data layers opens the grid to
better, lower cost development
- 86. Layer Innovations Needed
Action Layer Advanced technology:
• Smart feeder switching
• CVR
• Advanced sectionalization
• Direct load control
• Storage
• Phasor measurement units
• Solid state VAR control
…
High bandwidth, high-reliability communications
Software defined networks
Decision Layer Static and dynamic power flow modeling
Event tree generation
Taxonomic system for failure classification
Analysis Layer Predictive modeling
Static and dynamic power flow modeling
AI based anomaly detection
Information layer High performance database
Distributed information stores
Cloud based computing
Data Layer High performance sensor networks
Improved interoperability standards
Passive and active capture technology
Innovations are needed at all layers.
- 89. At NRECA the private cloud-based support
needs to provide applications options for
all the participating utilities.
The Security Fabric must support all the interfaces.
- 90. Candidate Applications
• Business Functions External
to Distribution
Management
– Customer Relationship
Management (CRM) (includes
CIS)
– Meter Data Management
(MDM)
– Customer Billing (CB)
– Payment Processing (PP)
– Prepaid Metering (PPM)
– End Device Testing and
Receiving (EDTR)
– Finance and Accounting (FA)
• Distribution Engineering,
Planning, Construction, and
GIS
– Asset Management (AM)
– Project Manager -
Configuration Management
– Engineering Analysis (EA)
– Field Design (Staking)
– Geographic Information
Systems (GIS)
– GIS Viewer (GV)
– Inspection (INSP)
- 91. Candidate Applications
• Distribution Operations
– Integration Server
– Call Handling (CH)
– Distribution Automation (DA)
– FAST voltage regulation,
active power control and load
flow control in meshed power
systems.
– Interactive Voice Response
(IVR),
– Outage Detection (OD)
– Outage Management (OA)
– Supervisory Control and Data
Acquisition (SCADA)
– Substation Automation
– Switching Orders (SWO)
– Vehicle Location (AVL)
– Volt/Var Control
– Demand Response (DR)
– Load Management (LM)
– Demand Optimization
Systems (DOS)
– DRAS Server
- 92. Candidate Applications
• Distribution System
Monitoring
– Connect/Disconnect (CD)
– Load Profile (LP)
– Meter Reading (MR) (AMI)
• Work Management
– Work Task Generator (WTG)
– Work Task Originator (WTO)
– Work Task Performer (WTP)
– Work Task Scheduler (WTS)
– Work Task Viewer (WTV)
• System Providers /
Aggregators
– DRAS Home/Building
Manager
– DRAS Client Aggregator
• Customer Premises
– HAN Communications
– Energy Services Interface
– Meter
- 93. Candidate Applications
• G&T Ops
– G&T EMS
– Demand Management
– Load Forecast (Load profiles?)
– Distributed Storage EMS
– Distributed Generation EMS
– Market Services
• (External Market
Functions)
– Energy Management
Clearinghouse
– ISO EMS
- 94. To be relevant as a digital services provider,
you must develop new repeatable capabilities
to do the following:
• Bundle service provider services
• Define new services as products
• Automate, monetize, and allocate revenue of the
contracted relationships
This is not simply just a walled garden…
Plus, it is not just simply an Amazon product shopping cart.
- 95. Candidate Functional Architecture
Industry Specific
Tenant / Resellers # 1-n
Service Providers
e.g. industry specific
service providers
Offerings on
Service Provider terms
Ecosystem Enablement Platform
Aggregator & ICT Service Broker
Service Providers
e.g. SaaS, IaaS, PaaS
providers
Service Providers
e.g. Telco, Mobile
Cloud providers
Offerings on
Reseller terms
Offerings on
ICTSB Operator terms
Generalist
Tenant / Resellers # 1-n
Offerings on
Reseller terms
R6 VSO R6 VSO
R6 VSP
“Amazon type” Digital Services Enablement
Infrastructure
Layer
Enabling &
Partnering
Layer
Digital Services
Provider
Products, Content, Applications, Services
- 97. The repeatable capabilities need to enable
entity to entity partnering and C2C white labeling:
SYSTEM
Ecosystem &
Partnering Enabler /
Cloud Service Broker
on-board Service
Provider
on-board Reseller
Define SLA
resolve Incident
publish Retail Offering
on-board
End Customer
publish Wholesale
Offering
pay Invoice
report Incident
issue Invoice
Monitor SLA
Handle SLA Violation
on-board Service
Service Providers
/ Suppliers
retrieve Catalog
Information
retrieve Quote
place Order
get Order Status
Digital Service Providers
/ Resellers
End Customers
B2B2x Entity Interaction Diagram
- 100. Electric power distribution and broadband communications
are like Siamese twins!
(They can’t go anywhere without each other.)
Digital control is needed
at each junction point.
Like electricity,
broadband can be used
for multiple things.
The Circulatory System The Nervous System
NRECA
NRTC
- 101. We will use a typical distribution path to demonstrate
the intelligent combination of power controls and broadband.
Central
Control
Local Area
Relay
Neighborhood
Relay
Substation
Relay
Management
Servers
Substation
Server/Router
NAN
Gateway
HAN
Gateway
Communications /
Firewall
FTL (E&LM)
SIEM
E&LM
Communications Communications /
Firewall
E&LM
Sensor Mgt
Communications /
Firewall
E&LM
Meter App
HomeApp
TE App
SA SA SA
SA
SA
SA
Cell Manager
Master
Agent
Posture Validation
Remediation Server
Jini SP
MA
SA
“Cell Management”
“Local Management”
There are multiple locations in the conceptual network.
Management
Signaling Server
- 102. Our communications has redundancy
built into the control protocols.
LTE
Macrocell
and
Distribution
Fiber
NAN
LTE
Picocell
Mobile
HAN
LTE
Home
Gateway
This is the only capability available
that allows handoff between terrestrial
LTE services and satellite services.
This system can simultaneously support
the public safety 700 MHz frequencies
as well as commercial usage.
Symmetric 2Mbps
10Mbps downloading and
786Kbps when uploading.
100 MHz LTE Services!
National
Interconnect
- 103. The telemetry systems occur in front of the analytic
applications and feed data to the Big Data stores.
Utility
Operations
Broadband
Operations
Service
Providers
The Fractal Pattern!
- 105. Obtain image of
network traffic
Structure data
Interpret events
using policies
Compare
current state to
baseline
Analyze options
Model
power flows
(if necessary)
Layer 1:
Data
Layer 2:
Information
Layer 3:
Understanding
Layer 4:
Decision
Layer 5:
Action
Transmit to
collector
Validate
Extract layer
3,4,7 data
1st level
anomaly
detection
Replicate
Notify
anomaly
Update baseline
model
Recommend
remediation
Notify
compromise
Monitor changes
in network
performance
Implement
network
changes
Confirm
implementation
Analyze
anomalies
Resolve
discrepancies
Human review,
adjustment, and
approval
(if necessary)
Activate
workflow
Compensate for
exceptions
Finalize actions
Options: PNNL + Secure Crossing
Investigate options: Carnegie Mellon + InterSystem?
Options: Cigital + CRB
Options: BaseN
Options: Complex
Request Broker
Activation system + configuration synchronizer
- 106. Understanding
Information
Decision
Data in – Action out
But sometimes semi-autonomic policy decisions
are made and executed in the field.
(at the small, the medium, and the large)
The policy logic is actually spread to each major active element.
MultiSpeak
Initiative
- 107. This effort has been launched with
a current research project already underway.
But the ultimate goal is to find COTS products
that are fully supported that perform these functions.
“Always find two or three candidates
and explore them fully before
making a final selection.”
- 109. Power Grid Distributed Node
Architecture
Legacy
Apps
Simulation
Libs
RT-DB
IEC
Agents
IEC
Drivers
OSGi Container
RT Linux or RTOS
DDS
JVM-RT
DDS API NIO API
ESP/CEP Engine
RDF-DB
Distributed
Cache
Reasoner
OWL-DL SWRL
API
OWL-DL
Rule Engine
SWRL/RuleML
JADE (Bundle)
Publishing Server (HTTP)
- 120. The embedded systems include:
Our strategy is to provide certified interoperability
to the key devices controlling the grid.
Our solution would be embedded
at each critical point in the energy infrastructure.
All points must connect to each other
in an end-to-end system.
Management Agents
- 121. The Security Fabric follows the guidelines required by the
NIST 7628 for the Department of Energy.
xSystem &
Network
Management
Controller
Device
Device The
Security
Fabric
The Security Fabric is an implementation of the
Tailored Trustworthy Space.
- 123. Separation of Protection and Security
• The major hardware approach for security or protection is the
use of hierarchical protection domains. Prominent example
of this approach is a ring architecture with "supervisor mode"
and "user mode“ [Intel].
• This approach adopts
capabilities provided
by a lower level:
(hardware/firmware/kernel).
The Multics Style of Ring Structure
- 124. The Security Connected components need to handle
the various management agent functions.
The approach also provides for secure persistent storage.
Policy logic goes here.DDS goes here.Industrial Protocol
Whitelisting
The security
inner sanctum ring
- 128. We use an industrial protocol whitelisting technique to
avoid false positives in mission critical operations.
ContentAwareFirewall
ProtocolWhitelistingLayers
4-6
IPCommunicationsStack–Layers2-3
IPsecVPN
UDPv6
UDPv4
Connections
• Kerberos Get Credentials + Tickets
• Get Extended Credentials
• Kerberos Mutual Authentication
• Get Precision Time
• Register for Management +
Configuration Synchronization
• Service Locator
• Service Provider
• Multicast Alert
• Unicast Command
• Event Notification
• SNMP Get/Set
• Application Event: Send and Receive:
• High Priority
• Medium Priority
• Low Priority
Sessions
InterfaceA
InterfaceB
- 130. The next greater context includes collaboration:
Cyberthreat collaboration & emergency notification
Sensing Analyze Decision Action
Picocell
Utility
SIEM
Utility
TOP
SFA Boundary
Control
Situational
Awareness
Incident
Management
Alert/
Notification
Threat Connect
SMS
Email
Phone
Sirens
Social
Media
Radio
• DHS
• NSA
• DOE
• DOD
• State&Local
• Commercial
CAP
CAP
• Culpepper
• Dallas
• Chicago
• San Joe
DHS
FEMA
IPAWS
Cell Broadcast
EAS
CMAS
NWEM
(HazCollect)
EDXL
All communications
are protected using
the Security Fabric
CEF
• 1220 subscribing
organizations
• 1300 communities
This will be part of the emergency response system for SmartAmerica.
- 131. The cybersecurity threat sharing
needs to be performed between multiple communities
to be effective.
Subscriber
Subscriber
Subscriber
Subscriber
Subscriber
Context
Top Secret
Secret
Unclassified
F
F
Threat
Connect
STIX
Custom
Community
Community
Community
1300
Communities
1200
Subscribers
On-Premises Cloud
UI
API
Private Cloud
Threat Connect
Cloud Platform
Amazon EC2
Broker
Sources
Free, $, other
The data arrangements can be hierarchical
to facilitate multi agency awareness.
IODEF
- 132. At a higher level of correlation,
the Saturn cyberthreat real-time analysis
system will literally run rings around attacks.
Self-organizing Adaptive Technology Underlying Resilient Networks
- 133. The “Concierge” Service
• Attention! Some of the co-ops have very tiny IT staffs. (Like
one person)
• The coming cyber attacks will be very sophisticated.
• Even the central staff will sometimes be challenged to deal
with the complexities associated with cyberdefense.
• Thus, even with collaboration and data sharing, from time to
time, a co-op technician would like to have an “OnStar”
button to push to get instant help on demand from a
specialist.
This Concierge service from ThreatConnect may be very desirable.
Saturn comes in here to see the bigger picture.
- 135. Scope of the SmartAmerica Challenge
vs. the Production Rollout
- 136. SmartAmerica Architecture
“Open, secure, high-confidence and collaborative CPS network “
CPS
Communications
Fabric
Healthcare TBs*
Transportation TBs*Energy TBs*
Emergency Response
System TBs*
Building TBs*
Smart Manufacturing TBs*
SmartAmerica
Data Center(s)Avionics TBs* Technology TBs*
NRECA + NRTC
FirstNet + AlertSense
Terremark
MIT CIC
Alphaville
Pecan Street
Industrial
Internet
Security
Fabric
- 137. Our part of the demonstration will feature the
initial use of the Industrial Internet.
• Chuck Speicher will be the principal leader for this effort.
• General Electric will be a key member of the effort.
• Internet2 will be a primary contributor for the effort.
• There will be many other partners from the Security Fabric
Alliance that will participate.
• We will feature concepts from the NRECA and NRTC
inspired movement for the smart grid element.
• Other elements will be added where advantageous.
- 138. Let it be said that the Industrial Internet started right here.
- 139. As envisioned, Internet2 would eventually provide the requested
DWDM-based network for the Industrial Internet.
Ultimately, there would be four regional control centers but all serve as redundant backups.
There are 27 core points that connect to feeders.
- 140. However, if we are true to our strategy, we should never design
a thing without first understanding its next greater context.
And the rest as they say will be called history.
- 141. The objective is unusual:
Arbitrary results are not the point!
What we do is not so important as how we do it.
Lean development will produce lasting results in half the time
and cost half as much.
We are producing the real production product,
not conducting a high school science experiment.
We will learn the “other 90%” of what we need to learn
using this TPS process.
- 143. Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
- 144. ePDC
Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
RTDMS
PMU
ePDC
Subnet
- 145. ePDC
Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
RTDMS
PMU
ePDC
Subnet
One Box
HAN Gateway
TeMix
Transactive
Energy
- 146. ePDC
Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
RTDMS
PMU
ePDC
Subnet
One Box
HAN Gateway
TeMix
Transactive
Energy
Threat
Connect
Saturn
- 148. In the iterative nature of the agile lean development,
the customer recommends the following beta candidates:
• MCNC – North Carolina (distribution)
• Pedernales – Texas (distribution)
• Tri-State – Colorado (generation and transmission)
• Grant County PUD – Washington (muni)
• San Diego Gas & Electric – California (IOU)
• SPEC – Texas (generation and transmission - wind)
• Fort Myers – Florida (smart community – solar)
We should be true to the Agile Manifesto and let the scope float a bit
based on what is learned in each two week sprint.
- 149. Agile Lean Development:
an integral part of the process
• The frame of reference for this program is the lean mindset.
• Delivery of value to delighted customers is the goal.
• We will use Kanban to manage the flow of learning during the
quarterly releases, the two week sprints, and the scrum
meetings.
– The backlog
– The in process sprints
– The finished feature support
• Optimization and the elimination of waste and technical debt
go on forever.
- 151. Estimated Phase 1 Schedule
Milestone Week ending
• Kickoff meeting 1
• Objectives section complete 1
• Requirements assessment section
complete 8
• Strategy section complete 9
• Technology evaluation section
complete 9
• Architecture section complete 11
• Leadership presentation 12
• NRECA management presentation 13
- 152. Solution provider SEs
Acquisition SEs
At large scale, the effort is divided into
parallel threads with cross-thread interactions.
Architecture Development
Modeling & Simulation
Interface Management
Data Characterization
Requirements Management
Milestone Documentation
Scheduling
Integration & Test
SE Functional Role Focus
Cross-Thread Analysis Focus
Mission Thread SE Focus
Deployment/Baseline Focus
Deployment Team Focus
Thread 1 Thread NThread 2
Presentation/Query Interface
Policies/metadata/knowledge management
Analytic processing
Data ingest processing
End-to-end security The thread leaders are the key
to complex systems engineering.
- 153. Phase 2 parallel threads currently include:
1. Creation of the Security Fabric Management Agent Simulator
2. Deployment of the systems management servers
3. Creation of the Industrial Internet on the I2 lambda rail
4. Implementation of the Cloud Broker
5. Implementation of the neighborhood LTE picocells
6. Implementation of the GridSense sensors
7. Implementation of the Subnet substation servers
8. Implementation of the takeout node with data ingest server
9. Implementation of the GridSense InSite analytics
10. Implementation of the EPG visualization service
11. Implementation of the SETI data sharing and emergency notification
12. Implementation of the CyberThreat Collaboration Network
13. Implementation of Saturn and the Concierge Service
14. Implementation of the Transactive Energy pilot
15. Followed by an interim demonstration of capability
The entire system will be continuously integrated and tested each day.
- 155. Virtual Organization
• Organizing entities use a structure that resembles a network
rather than a hierarchy.
• Organizations are driven to virtual forms to be more:
– Flexible
– Agile
– Responsive
– Inexpensive
- 156. Architecture and Task Allocation
Low
High
Good
Bad
Coupling
Cohesion
High
Low
This is easier when the team locations align with the architecture a bit.
- 157. The Loss of “Communication Richness”
• Rich “high-touch” communication is defined as
two-way interaction involving more than one
sensory channel.
• A substantial portion (80%) is non-verbal and
implicit. It consists of body language such as:
– Gestures
– Facial expressions
– Postures
• Richer media conveys more information and
emotion.
- 158. We need to decide how we are going to do
these things this time:
• Colocation period
• Scrum calls
– Electronic kanban boards to plan and follow progress
– Continuous delivery system (integration, testing, &
deployment)
– Configuration management and automated build
processes
• Regroup huddles
• Estimates
• Funding process
- 161. The Timeless Way of Building
Indeed this ageless character has nothing, in the end, to do
with languages.
The language, and the processes which stem from it, merely
release the fundamental order which is native to us all.
They do not teach us,
they only remind us of what we know already,
and of what we shall discover time and time
again,
when we release our ideas and opinions,
and do exactly what emerges
from ourselves.
- 175. Osterwalder - Business Model Canvas - page 1
Element Sub-element Semantics
Business
model
Name The name of the business model
Short description Short description of the business model [extension to Osterwalder’s canvas]
Market players/
competition
Who are the relevant players in the market, running this business model? How competitive is the business
model? [extension to Osterwalder’s canvas]
Maturity level What is the level of maturity of the business model within the market? (e.g. innovative, well established)
[extension to Osterwalder’s canvas]
Priority What is the priority (relevance, importance) of the business model from a CSP perspective? [extension to
Osterwalder’s canvas]
Customer
/Market
Customer
Segment
What is the customer segment(s), addressed by the business model?
Customer Segments define the different groups of people or organizations an enterprise aims to reach and serve. A
customer segment is a sub-set of a market made up of people or organizations with one or more characteristics that
cause them to demand similar product and/or services based on qualities of those products such as price or function.
Channel What are the relevant channels (communication as well as sales & distribution channels) to reach the addressed
customers? Channels (communication, distribution & sales channels) comprise a company´s interface with
customers. Channels are customer touch points that play an important role in the customer experience.
Relationship What kind of relationship is expected by the customer/needs to be established for the business model? (e.g. self-
service, communities, personal assistance). Relationships can range from personal to automated.
Product
Offering
Value proposition What kind of products and services are offered to the customer? What value will be delivered through the business
model?
The value proposition is the reason why customers turn to one company over another. It solves a customer problem
or satisfies a customer need. Each value proposition consists of a selected bundle of products and/or services that
caters to the requirements of a specific customer segment. In this sense, the value proposition is an aggregation, or
bundle, of benefits that a company offers customers.
- 176. Element Sub-
element
Semantics
C2M
(concept to
market)
Key
Activities
Key activities are the most important things a company must do to make its business model work. What are the key
activities, to launch the offers product/services to the market, to establish the channels, to maintain the customer
relationship and to ensure the revenue streams? (e.g. development of community site, implementation of new
billing concepts).
Key
Resources
Key resources are the most important assets required to make a business model work. What are the required key
resources, to launch the offers product/services to the market, to establish the channels, to maintain the customer
relationship and to ensure the revenue streams? (e.g. development of community site, implementation of new
billing concepts).
Key
Partners
Who are the key suppliers/partners, what are the key activities and resources, which need to be acquired from
those? (e.g. external call center, supplementary content from a content provider)
Enterprise
Management
Cost
Structure
The Cost Structure describes the most important costs incurred to operate the business model.
Revenue
Streams
Revenue Streams are the cash a company generates from each Customer Segment; A business model can involve
several different types of Revenue Streams:
• Transaction revenues resulting from one-time customer payments;
• Recurring revenues resulting from ongoing payments to either deliver a Value Proposition to customers or provide
post-purchase customer support;
-Shared Revenue – resulting from operations carried out by a B2B partner who uses enterprise’s products or
services to generate its own revenue from its own end customer but does not pay upfront or recurrent for
products/services from the enterprise – just % of actual revenue;
- 3-rd party revenue – revenue from a 3-rd party to include its own services in the enterprise offerings to its
customer segments.
Osterwalder - Business Model Canvas - page 2
- 177. Element Sub-element Semantics
Barriers Business
related
What are the business related barriers, to implement the business model? (e.g. high risk regarding
cash flow) [extension to Osterwalder’s canvas]
Technical What are the technical barriers to implementing the business model? (e.g. high risk due to immature
technology) [extension to Osterwalder’s canvas]
Drivers Strategic
portfolio
What are the drivers to implement the business model regarding the strategic portfolio planning? (e.g.
complementary to the existing portfolio strategy) [extension to Osterwalder’s canvas]
Revenue
Streams
What are the drivers to implement the business model regarding the revenue streams? (e.g. new
revenue opportunities to compensate decreasing airtime prices) [extension to Osterwalder’s canvas]
Touchpoints/Use
Cases
Upstream What are the key touchpoint/use cases/interaction patterns to interact with upstream customers? (e.g.
registering app in app store).Upstream customers are B2B partners/enterprise customers (e.g.
retailers, media, advertisers, utilities, finance etc.) [extension to Osterwalder’s canvas]
Downstream What are the key touchpoint/use cases/interaction patterns to interact with downstream customers?
(e.g. end customer billing). Downstream customers are the end users of a product or service, this can
be consumers as well as companies [extension to Osterwalder’s canvas]
Osterwalder - Business Model Canvas - page 3
- 178. BT’s Cloud Service Broker
Low Cost
Compute
- for test and dev
Secure SaaS
- e.g. CRM
Private Compute
job
- e.g. pharma,
finance
Extra resources-
- e.g. legacy
Application out of
space/power
CollaborationLow Cost
Compute
Secure SaaS
- e.g. CRM
Private Compute
job
Extra resources-
- e.g. legacy
Application out of
space/power
Collaboration
Low SLA
SaaS
BPOS
Provider
High SLA
Compute
Commerce
MPLS
Connected
VDC
Video
Low SLA
Compute Low cost
Storage
High SLA
Carrier
Preventing
Runaway costs
Security
Avoiding Vendor
lock-in
Application
Performance
Compliance
and Audit
Transparency
Assurance
Cloud Service
Broker
(EEP)
Monitor & Assure
Compliance and
Audit
The “Ecosystem Enablement Platform” (EEP) fulfills the role of the CSB
- 179. The NRTC has a variety of broadband services that could
be tunneled through the Industrial Internet.
• OTT & TVE services
– Video services
• Walt Disney comprehensive long term
distribution sports, news,
entertainment
• NBCUniversal comprehensive content
affiliation
• 100 HD channels
– NeoNova Cloud Services
– ViaSat Satellite Distribution
– Exede satellite broadband services
– Telispire – MVNO services
– WiMax service
– Planning for First Responder
network
• Power services
– OATI demand response options
– Efacec – Advanced Control Services
– Clevest – workforce management
and smart grid operations
– Power Secure LED lighting
– Sensus – Flexnet AMI; smart
meters; distribution automation;
demand response
– GeoNav – nVIEW 360o
– TenKsolar – solar voltaic systems
– Wind farm deployment
– Milsoft and Clevest MultiSpeak
certification
- 180. “The Prolog”
The Tower of Babel is alive and well in the 21st Century.
In general, it is a good thing to address this reality right up front.
- 181. Frames of Reference
• According to cognitive scientists, we all interpret our surroundings
through frames – mental constructs that shape our perspectives of
the world.
• Frames are sets of beliefs about what elements to pay attention to
and how these elements interact with each other.
• Frames place significant limits on our perspective; we can only see
what our frames tell us is meaningful, and we usually ignore what
lies outside the boundaries.
• Most of us are unaware of the way our background and
experience shape the way we frame our decisions and actions;
only a few of us consciously adjust our frames as if we were
photographers.
• In fact, we seldom even think about the direction in which we are
pointing our cameras.
- 182. Frames of Reference
• Everyone shapes his or her view of the world through framing, and
people with different backgrounds are likely to see their
surroundings through vastly different frames.
• By themselves, frames are not inherently good or bad…
they just are.
• However, evidence has shown that certain frames are more likely
than others to lead to long-term success.
We need to derive a good pattern language to get things properly rolling.
- 184. Ecosystem & Partnering Capabilities Articulation
Suggested Procedure
• Discover “repeatable” functional building blocks
from different business models
– Describe business model
using Osterwalder’s Business
Model Canvas
– Derive “ecosystem” canvas and
find “repeatable” patterns
– Derive reusable “architecture
building blocks”
• Refinement of a candidate architecture to a detailed architecture
blueprint
• Implementation of prototype scenarios
- 187. Change Control Interactions
Ring 2
Change Mgt
Change Control
Service Locator
Service Provider
Service
Consumer
Workflow
Control
Attestation
Directory
Service
Repository
Transition
Control
1
2
3
4
5
Dynamic
Binding
Promote &
Store
Activate
Service Instance
8
6
7
KerberosDirectory
1
9
Credentials include
Chain of Trust Certificates
- 190. Change in Level of Trust Between Sites
Trust
Time
Sufficient level
to work together
effectively
Kick-off
meeting Milestone
meeting
“MBFA”
(Management by Flying Around)
High Tech
Requires
High Touch
- 191. But the greatest engineering achievement of the 21st Century
is likely to be the reengineering of the electric grid into
secure, resilient, agile fractal patterns.
- Annonymous
- 192. But the greatest engineering achievement of the 21st Century
is likely to be the reengineering of the electric grid into
secure, resilient, agile fractal patterns.
- Annonymous
(Aye, but there is always a grain of truth
in every word spoken in jest.)
- William Shakespeare
- 193. Characteristics of Teams: Yesterday vs. Today
Traditional Teams Virtual Teams
Co-located members Distributed members
Face-to-face interaction Electronic communication
Members from the same Members from different
Organization organizations
Hierarchical Networked
Mostly informal communication Continuous structured
communication
Position authority Process and knowledge
authority
Informal distribution (push) Information access (pull)
Information on paper Information electronic
Sharing completed work Continuous sharing of
incomplete work
Knowledge hoarding Knowledge sharing
Transparent process Computer-visible process
Culture learned through osmosis Culture learned through
electronic-based
communications and artifacts