Isec413 Spring2021
Isec413 Spring2021
Introduction
Software:
• Operating systems, data base systems, middleware,
• Browsers, applications, utilities, firewalls, ...
Concepts of system
architectures (2/5)
Connectors (Communication)
Hardware:
• Communication links:
routers, switches, public telephone, network, leased lines, virtual
private networks, …
Software:
• Communication protocols:
TCP/IP, SNMP, HTTP, FTP …, Linkage
• Conventions:
procedure calls, remote procedure calls, thread initiation, ...
Concepts of system
architectures (3/5)
Modern enterprise system architectures integrate
computation and communication:
Computation Communication
Metcalf’s Law
Moore’s Law
Speed and Cost
MIPS
WAN
Processing Costs
LAN
Storage Size and Costs
Main Memory SAN
Secondary Storage
Enterprise
System
Architectures
Concepts of system
architectures (4/5)
Architecture properties:
Functional properties: Must satisfy domain-specific functional requirements
and specifications
Non-functional properties (the “ilities”):
• Must satisfy performance, availability, reliability, safety, security,
survivability, maintainability, usability, manageability, … properties
Architecture trade-offs:
Properties can conflict
Trade-offs seek optimal combinations of properties based on cost/benefit
analysis
Concepts of system
architectures (5/5)
The Stages of Enterprise Information System
Architectures:
Batch – 60s and 70s
• SW enabler: programming languages, job control
• Business motivation: automate clerical tasks
On-line transaction processing – 80s
• SW enabler: networking, databases, transaction monitors
• Business motivation: automate the front office
Integrated systems – 90s
• SW enabler: internet standards, middleware, components
• Business motivation: opening the business to the web
Web services – 00s
• A possible fourth in the near future
• SW enabler: standards for data and services, composability
• Business motivation: efficiency, reduce IT costs?
An information system
architecture
is a specification for development of a system
composed of hardware and software components and
connectors
whose external behavior satisfies the enterprise mission
and business requirements
Enterprise mission and System
business requirements operation
Design Validate
Design
System System
architecture development
Validate
Architecture and the system development
cycle
Define concept of operations for the enterprise/ business mission and the
Requirements system requirements
External behavior
Define components and Software and data
Architecture their connections Hardware and network
24
The furnace system
example
• Remote temperature sensor (RTS) system exists to measure
temperatures of a set of 16 furnaces and
report them to 16 clients (one furnace per client, client-server architecture)
• Normal scenario
A client requests that the RTS server changes the schedule for temperature
readings for a furnace (each furnace can report on a different periodic
schedule)
A furnace temperature is read by the RTS server and sent to the client based
on the current schedule for readings
The furnace system
example
• Three architectures are proposed
Client-server
Client-server-server
Client-intelligent cache-server
LAN
Furnace client 1
Furnace 1 RTS Server
Furnace client 2
Furnace 2
... ...
Temperatures
Exercise
• Give some examples of attack scenarios for the option1.
Attack scenarios -- 1
Man-in-Middle attack
Use TCP intercept tool to modify temperature values during transmission
Man-in-Middle Attack
LAN
Furnace client 1
Furnace 2 Attacker
...
...
LAN
Furnace 2
... Furnace client 2
Furnace 16 ...
Furnace client 16
Attacker
Furnace system architecture -
option 2
Furnace 1 RTS Server 1
LAN
Furnace 2
Furnace client 1
...
Furnace 8
Furnace client 2
...
Furnace 9 RTS Server 2
Furnace client 16
Furnace 10
...
Each server is primary to 8 clients and backup
Furnace 16 to 8 clients
Furnace system architecture -
option 3
LAN
IC Furnace client 1
Furnace 1 RTS Server
IC Furnace client 2
Furnace 2
... ...
LAN
Furnace client 1
Furnace 1 RTS Server
Furnace client 2
Furnace 2
... ...
Temperatures
Furnace system architecture -
option 2
Furnace 1 RTS Server 1
LAN
Furnace 2
Furnace client 1
...
Furnace 8
Furnace client 2
...
Furnace 9 RTS Server 2
Furnace client 16
Furnace 10
...
Each server is primary to 8 clients and backup
Furnace 16 to 8 clients
Furnace system architecture -
option 3
LAN
IC Furnace client 1
Furnace 1 RTS Server
IC Furnace client 2
Furnace 2
... ...
E/D = encryption/decryption
Security analysis: just
encryption/decryption
Adding encryption requires additional estimates:
Attack Component Value