Design of a Transoceanic Cable Protection System 1

advertisement
Design of a Transoceanic Cable
Protection System
Surveillance System
Undersea Fiber-Optic Cables
Mission Control
Isaac Geisler, Kumar Karra, Felipe Cardenas, Dane Underwood
1
Project Overview
• Submarine fiber optic cables carry 99% of all international communications.
• Billions of dollars are invested into the network, causing it to grow by 36%
annually since 2007.
• Between 100 and 150 cable damages occur each year.
• Up to 21% of causes are never identified.
• Each fault incurs millions of dollars in repair and loss of bandwidth.
• Our project seeks to monitor cables, identify threats, decrease cable
downtime and prevent damage whenever possible.
[TeleGeography, 2015] [Carter, 2011] [Ruggeri, 2014] [Burnett, 2014] [Khazan, 2013] [Main, 2015]
2
Agenda
1. Concept Definition
1.
Context, Stakeholder Analysis, Gap, Problem, Need
2. Operational Concept
Operational Concept, Model Framework, Operational Scenario, Stakeholder Changes, Design
Alternatives, Requirements, System Risks
3. Simulation and Analysis
Simulation Requirements, Framework, Validation, Utility
4. Project Management
WBS, Current Status
3
International Submarine Cable Network
Status 2015
343 Cable systems in service
53 Transoceanic, ‘long-haul’ systems
$11.8 billion investment in new
cables from 2008-2014
31 New cable systems worth $4.8
billion will come online by 2017.
[TeleGeography, 2015] [Ruggeri, 2014]
4
Wide Variety of Cable Systems
FLAG Atlantic-1 Cable
Connects US, UK and France
2.4 Tbps Capacity
14,500km total length
6500m max depth
$1.1 Billion Install cost
Known spying incident by
UK government
Jonah Cable
Connects Italy and Israel
7 Tbps Capacity
2,300 total length
4500m max depth
JASUKA Cable System
Interconnects Indonesia
and Malaysia
0.16 Tbps Capacity
10,860km total length
120m max depth
[TeleGeography, 2015] [NOAA, 2015] [Submarine Networks, 2015] [White, 2014]
5
Growing Bandwidth Demand
Transoceanic Bandwidth Projected Growth 2007-2020
800
Sub-Saharan African
Intercontinental
Activated Capacity in Tbps
700
600
Austrailia & New
Zealand
Intercontinental
500
North America - South
America
400
South Asia & Middle
East Intercontinental
300
Pan-East Asian
200
Transpacific
100
Transatlantic
0
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
Transoceanic capacity was 87 Tbps at year end 2013
Rate of capacity increase from 2007-2013 is 36% per year.
Projects planned to bring total capcity to 742 Tbps by early 2020’s
[Ruggeri, 2014]
6
Cables are Vulnerable to Threats
Transoceanic/transregional cables - FLAG Atlantic-1
SeaMeWe-3 Cable System
Connects 39 countries
0.48 Tbps Capacity
39,000km Total Length
7500m max depth
12 Reported Faults from 2005-2015
Over 1 year of cable downtime since 2005
Reported to have been spied on by the
Australian Government
[TeleGeography, 2015] [NOAA, 2015] [Submarine Networks, 2015] [SubTelForum, 2015]
7
Causes of Cable Faults
Sources of 2,162 Faults, 1959-2006
1200
1000
Approximately 150 faults reported per year.
Over 20% are cause unknown. Even when
the cause is known, identifying a
responsible party is difficult.
962
800
70% of faults occur in water of less than
200m deep.
600
460
400
Each fault costs millions of dollars in lost
bandwidth revenue and repair costs.
315
200
155
149
Component
Failure
Natural
Causes
No central database or logging of
threats/faults exists.
116
0
Fishing
Anchoring
[Carter, 2011] [Carter, 2009] [Hawn 2015]
Other
Unknown
New FCC regulations will mandate
reporting of US based cable faults.
8
Intentional Sabotage and Espionage
Increasing fears of intentional cable damage
Known incidents of sabotage, damage or
theft in Indonesia, Egypt and Libya.
Very difficult to prove intentional damage
after the fact
Russian ship Yantar, equipped with 2
submersibles capable of cutting cables
Increasing fears of cable espionage
Cable system transmits valuable financial
data, government communications
Known incidents of underwater devices
capable of reading data from the cables
[Bustraan, 2015] [Gertz, 2015] [Sanger, 2015] [Reuters, 2015] [Kirk, 2013] [Cahyafitri, 2013] [Malta Today, 2011]
9
Cable Protections - Armor
Advantages
Good protection against threats
Outer layers can be damaged without affecting cable
function
Tradeoffs
Significantly more expensive
Significantly heavier - complicates installation
Problems
Not possible at all depths –heavy cable will snap itself
More likely to entangle on anchors or fishing equipment still causes a fault, but more damaging to the cable and
the ship.
Unarmored
[Carter, 2011] [Burnett, 2014] [AKORN, 2012]
Single Armor
Double Armor
10
Cable Protections - Burial
Advantages
Provides good protection against most threats
Makes sabotage or espionage more difficult
Can be buried in up to 2000m of water
Tradeoffs
Very slow process: 0.2-0.5 km/h burial rate
High cost - ~$12,000 per hour
Disrupts marine environment
Can slow and increase cost of fault repairs
Problems
Only possible in soft seabed
Becomes exposed over time
Little protection against anchors
[Burnett 2014] [Carter, 2011] [KIS-ORCA, 2015]
11
Cable Protections - Legal
Cables are protected by international organizations and treaties
● International Cable Protection Committee (ICPC)
● Atlantic Cable Maintenance & Repair Agreement (ACMA)
● North American Submarine Cable Association (NASCA)
Protections include:
● Cable protection zones
● Up to $300,000 fines
● Liability of repair costs
● Civil or criminal charges
[Carter, 2011] [Burnett, 2014] [Carter, 2009]
12
Repair Process and Delays
Threat Causes Fault
Poor data collection,
difficult to determine
threat causes and fault
probabilities
Find Fault Location,
Notify Repair Ship
Delays due to inaccurate
or slow fault location info
Not enough repair ships
to service all faults
Delays due to permitting
and contracting ships
[Rain, 2009] [Carter, 2011] [Kokusai, 2010]
Repair Ship Travel
Delays due to
inaccurate or slow
fault location info
Delays due to poor
weather
Repair
Delays due to
inaccurate or slow
fault location info
Delays due to poor
weather
13
Repair Delay Distributions
Fault finding and
Notification Delay
1 + WEIB(6.78, 1.07)
Repair Ship Travel
1 + WEIB(2.07, 1.26)
Telegeography Study
Delay and Travel times
2008 - 2012
Data from 456 faults
Data from 40 countries
Analyzed data with Arena Input Analyzer
[Telegeography, 2014] [Rain, 2009]
Repair Time On-Site
3 + LOGN(1.73, 2.02)
Tyco Telecommunications Estimates
Generated distribution based on Tyco
Telecommunications estimates
Lognormal shape
Minimum of 3 days
Mean of 4 days
Possibility of long delays
14
Major Stakeholder Interactions
Service
Insurance
Companies
Telecommunication
Companies
$$$
Large
Technology
Companies
Latin
America
Financial
Institutions
Europe
Southeast
Asia
Espionage
$$$
Economic Growth
$$$
Middle
East /North
Africa
$$$
Cable
Maintenance
Cable
Installation
US Gov .
Agencies
Service
$$$
Economic Growth
Political Capital
End Users
Service
Shipping
Companies
—
$$$ Litigation for damages
Threat of Espionage
Ports
Fishing
Industry
Interactions
Cable Service
/
Benefit (Operating)
Installation Repair
Benefit (Non-Operating)
Submarine Fiber -Optic
Cables
Risk /Damage
Damage / Service Disruption
Threat
[Ruggeri, 2014]
15
Performance Gap
• Reduce the number of cable damages by 30% per year.
• Increase surveillance on cables from 0% to 80% of the entire
length of the cable.
• Reduce mean notification time by 2 days.
Current
Desired
Time
[Carter, 2011],[Telegeography 2015]
Expected Mean Notification Time
Notification Time (Days)
Cable Damages
Expected Cable Damages vs. Time
7
6
5
4
Current
Desired
3
2
1
0
2015
2020
2025
2030
Year
16
Problem Statement
•
There are over 150 cable faults every year
•
Primary causes are fishing and shipping incidents
•
21% go undetected and unidentified
•
It takes roughly 3 weeks and over $3 million to locate and fix
a damaged cable
[Burnett, 2011]
17
Need Statement
There is a need to increase surveillance of cables in order to
decrease the number of faults, increase the rate of detection, and
improve the mean notification time of damaged cables.
Win-win scenarios will be achieved by:
• Minimizing damage by preventing identified threats
• Minimizing down time by increasing fault reaction time
• Mitigating threats through identification
• Increasing the value of investment through long-term savings
in cost
18
Agenda
1. Concept Definition
1.
Context, Stakeholder Analysis, Gap, Problem, Need
2. Operational Concept
Operational Concept, Model Framework, Operational Scenario, Stakeholder Changes, Design
Alternatives, Requirements, System Risks
3. Simulation and Analysis
Simulation Requirements, Framework, Validation, Utility
4. Project Management
WBS, Current Status
19
Operational Concept
1. Identification
●
Identify surface-level threats
●
Identify underwater threats
●
Identify fault locations and extent of damage
2. Prevention
●
Prevent damage before it happens by monitoring shipping and fishing.
●
Detect underwater threats prior to fault
●
Provide deterrance to both accidental and intentional through identification
3. Organization of Repair
●
Notify reparair companies of fault type and location
20
OPSCON - Model Framework
21
OPSCON - Model Framework
22
Mission Control
23
Stakeholder Changes
Service
Insurance
Companies
Telecommunication
Companies
$$$
Large
Technology
Companies
Latin
America
Financial
Institutions
Europe
Southeast
Asia
Espionage
$$$
Economic Growth
$$$
Middle
East /North
Africa
$$$
Cable
Maintenance
Cable
Installation
US Gov .
Agencies
Service
$$$
Economic Growth
Political Capital
End Users
Service
Shipping
Companies
—
$$$ Litigation for damages
Threat of Espionage
Ports
Fishing
Industry
Interactions
Cable Service
/
Benefit (Operating)
Installation Repair
Benefit (Non-Operating)
Submarine Fiber -Optic
Cables
Risk /Damage
Damage / Service Disruption
Threat
[Ruggeri, 2014]
24
Stakeholder Changes
Service
Insurance
Companies
Telecommunication
Companies
$$$
Large
Technology
Companies
Latin
America
Financial
Institutions
Europe
Southeast
Asia
Espionage
$$$
Economic Growth
$$$
Middle
East /North
Africa
$$$
Cable
Maintenance
Cable
Installation
US Gov .
Agencies
Service
$$$
Economic Growth
Political Capital
End Users
Increased Uptime
—
UISS Protected Cables
/
Installation Repair
Loss Prevention
Benefit (Non-Operating)
Threat
Fishing
Industry
Prevent Agency Espionage
Reduced Revenue
Cable Service
Ports
No litigation
Increased Security
Interactions
Benefit (Operating)
Shipping
Companies
Environmental
Groups
Environmental Damage
Damage Prevention
New Market
[Ruggeri, 2014]
System
Manufacturers
25
Stakeholder Changes
Positive
Entity
Current System
With System
Owners
Low Reliability
Increased Uptime
Governments
Threat of Espionage
Increased Security
Maritime Industry
Vessel Damage/Litigation
Prevention/Clarity
System Manufacturers
No Market
Increased Revenue
Entity
Problem
Solution
Repair Companies
Reduced Revenue
Shift Resources from Repair
to Monitoring/Installation
Environmental Groups
Disruption of Ecosystem
Extensive Testing/Minimal
invasiveness
Negative
[Ruggeri, 2014]
26
Surface Identification Alternative
Marine Traffic Monitoring and Warning (MTMW)
Automatic ID System (AIS)
Capabilities
Required on all ships over 299 tons
Tracks location, speed, ID
GPS updates every 10-180 seconds
Limitations
100-200 nm range
Only tracks surface ships
Ships must have active transponder
[MarineTraffic, 2015] [USCG, 2010]
27
Underwater Identification Alternative - Active
Underwater Surveillance and Threat Detection (USTD)
Kongsberg Seaglider with
Synthetic Aperture Sonar (SAS)
Seaglider Capabilities
1,000 meter depth rating
7,200 hour battery life
0.9 km/hour cruise speed
Returns to surface to relay information
SAS Capabilities
300 meter signal range
3 cm resolution
6,000 meter depth rating
Kongsberg Seaglider
[NOAA, 2015], [WHOI, 2015],[Garmin, 2015]
28
Underwater Identification Alternative - Active
Platform Alternatives
Sonar Alternatives
Autonomous Underwater Vehicles (AUV)
Raytheon AQ/ANS-20A Minehunting Sonar
Kongsberg REMUS 6000 AUV
Kongsberg HUGIN AUV
Klein System AUV 5000 V2
Compressed High Intensity Radar Pulse
(CHIRP)
Widely used in sport and commercial fishing
Very high-resolution images
Up to 300 meter signal range
Remote Operated Vehicles (ROV)
ASI Falcon ROV
Oceaneering NEXXUS ROV
Oceaneering Millenium Plus ROV
Side-scan and Multibeam
Used heavily for oceanographic purposes
Very reliable and tested extensively
Lower resolution but greater coverage area
[Oceaneering, 2015], [Raytheon, 2015], [Kongsberg, 2015], [ASI-Marine, 2015]
29
Underwater Identification Alternative - Passive
Underwater Surveillance and Threat Detection (USTD)
Node Network with Hydrophones
Network Capabilities
Stationary nodes installed along cables
Communication with surface buoys
Up to 3 year life span
Hydrophone Capabilities
Listens for noise instead of emitting signal
Up to 16 km listening range
Several localization techniques
3,500 meter tested depth rating
Underwater Node Network
[NEC, 2014]
30
Prevention and Repair
Organization
Prevention
• All identification alternatives will relay data on threats to
mission control
• Mission control will send messages based on threat type:
• Messages to marine traffic to prevent accidental damage
• Messages to relevant authorities (e.g. USCG) to intervene
for sabotage or espionage threats.
Organization of Repair
• In case of faults, mission control will relay
accurate fault type and location data
gathered by identification alternatives to
repair companies.
• Aim to significantly reduce location finding
and repair notification delays.
[Steward, 2015] [Fachot, 2012]
31
Mission Requirements
MR 1.0
MR 1.1
The system shall prevent cable damage and reduce incidents by
30% per year.
The system shall survey and monitor 80% or the total cable
length.
MR 2.0
The system shall identify the potential threat to the cable.
MR 3.0
The system shall reduce cable downtime by 30%.
MR 3.1
The system shall identify location of cable damage 50% faster.
32
Functional Requirements
FR 1.0
The system shall monitor and survey cables.
FR 1.1
The system shall be able to operate at depths greater than 1,000 meters.
FR 1.2
The system shall have at least a 95% uptime.
FR 2.0
FR 2.1
The system shall identify threats.
The system shall aggregate collected information to determine safety of
cables.
FR 3.0
The system shall detect cable faults.
FR 4.0
The system shall allow communication with outside stakeholders
FR 5.0
The system shall perform self-monitoring to ensure the safety of the system.
33
Design Requirements
DR 1.0
The system shall have an above water subsystem.
DR 1.1
The system shall have servers that manage all collected data integrally.
DR 1.2
The system shall have data processing technology.
DR 1.3
The system shall display the data to the operator.
DR 1.4
The system shall have communication equipment.
DR 2.0
The system may have an underwater subsystem.
DR 2.1
The system shall have communications equipment for exchanging
information with the above water subsystem.
DR 2.2
The system shall have threat detection technology.
DR 2.2.1 The system shall have sonar sensor technology.
DR 2.2.2 The system shall have a platform for sonar sensor technology.
34
System Risks - FMEA
Failure
S
L
D
RPN
Mitigation
Tapped Cables: Human action
undetected and cables are
tapped.
10
4
8
320
Use logged surveillance data to
identify suspicious activity in
above surface and underwater.
System Self-Security: System
is damaged by human threat.
10
9
2
180
Surveillance must be covert and
hidden from human threats. Be
prepared for maintenance in case
damage occurs.
Communication: Cannot
communicate through technical
means or language barrier.
9
10
1
90
Maintain and provide difference
communciation means.Learn local
language to warn ships and
fishing vessels.
Severity (S): 1 (less severe) - 10 (very severe)
Likelihood (L): 1 (less likely to occur) - 10 (almost certain to occur)
Detection (D): 1 (able to detect before problem) - 10 (almost unable to detect before it occurs)
35
System Risks - FMEA
Failure
S
L
D
RPN
Mitigation
Intentional Damage
Undetected: Human action
undetected and cables are cut.
8
5
1
40
Use logged surveillance data to
identify suspicious activity in
above surface and underwater.
Accidental Damage
Undetected: Ship and fishing
vessels not warned of CPZ,
damages cable.
6
3
1
18
Keep constant monitoring of ship
traffic in CPZ. Inform ships in
vicinity of fault and identify cause.
Natural causes and disaster
on System: System and/or
subsystem(s) is inoperable
because of natural disaster.
8
1
1
8
Keep constant monitoring of ROV
and sonar system to determine
functionality. Have maintenance
ready to be performed if
damaged.
Severity (S): 1 (less severe) - 10 (very severe)
Likelihood (L): 1 (less likely to occur) - 10 (almost certain to occur)
Detection (D): 1 (able to detect before problem) - 10 (almost unable to detect before it occurs)
36
Agenda
1. Concept Definition
1.
Context, Stakeholder Analysis, Gap, Problem, Need
2. Operational Concept
Operational Concept, Model Framework, Operational Scenario, Stakeholder Changes, Design
Alternatives, Requirements, System Risks
3. Simulation and Analysis
Simulation Requirements, Framework, Validation, Utility
4. Project Management
WBS, Current Status
37
Simulation Requirements
SR 1.0
The simulation shall model a representative cable system as closely as possible.
SR 2.0
The simulation shall generate threats at interarrival times based on research
data.
SR 3.0
The simulation shall determine the utility of various design alternatives by
tracking cost, detection chances, fault prevention and cable downtime reduction.
SR 4.0
The simulation shall generate all possible data from random distributions based
on collected research.
SR 5.0
The simulation shall output results to a comma separated text file that can be
analyzed.
SR 6.0
The number of simulation replications shall be determined by a 10% halfwidth
and 95% confidence interval.
38
Design of Experiment
Inputs
Cable
Active Alt(s)
Passive Alt(s)
Surface
Replications
1
FLAG Atlantic-1
None
None
None
7700
2
FLAG Atlantic-1
Seaglider AUV w/ SAS
None
None
7700
3
FLAG Atlantic-1
Remus 6000 AUV w/ SAS
None
None
7700
4
FLAG Atlantic-1
None
Hydrophone
None
7700
5
FLAG Atlantic-1
None
None
AIS System
7700
6
FLAG Atlantic-1
Seaglider AUV w/ SAS
Hydrophone
None
7700
7
FLAG Atlantic-1
Seaglider AUV w/ SAS
None
AIS System
7700
8
FLAG Atlantic-1
Seaglider AUV w/ SAS
Hydrophone
AIS System
7700
9
FLAG Atlantic-1
Remus 6000 AUV w/ SAS
Hydrophone
None
7700
10
…
…
…
…
…
11
Jonah Cable
None
None
None
7700
12
Jonah Cable
Seaglider AUV w/ SAS
None
None
7700
13
…
…
…
…
…
39
Simulating the FA-1 Cable
FLAG Atlantic-1 (FA-1) Cable System
NOAA Bathymetric Map
Estimates of depths through
long cable sections
[Telegeography, 2015] [NOAA, 2015]
40
Java Simulation Model
Implemented
Design
Alternatives
Implemented
Cable Model
41
Estimating Poisson Interarrival
Estimate probability of each fault based on data from 2,162 fault
study. Allocate unknown threats to other types, add in sabotage and
espionage threats.
Normalized
Probability of
Probability of Fault
Fault Type
type
P * 0.5
faults/year
Threat
Est. Prob. threat Threats per year of Threats per hour of
Interarrival rate
results in fault
each type
each type
in hours
Fishing
0.444
0.541
0.2704
0.05
5.408
0.000617356
1619.8
Anchoring
0.156
0.190
0.0950
0.25
0.380
0.000043382
23051.2
Component
0.072
0.088
0.0438
1.00
0.044
0.000005006
199776.7
Natural
0.069
0.084
0.0420
0.10
0.420
0.000047970
20846.3
Espionage
0.04
0.049
0.0244
0.00
0.024
0.000002740
365000.0
Sabotage
0.04
0.049
0.0244
1.00
0.024
0.000002781
359598.0
Total
0.821
1
0.5
2.4
6.300
0.000719234
1390.4
For 1 Cable:
Serious threats per year
Threat interarrival rate
Poisson mean λ
[Carter 2011]
6.3
1390.4 hours
0.00750628
42
Java Simulation Parameters
Threat
Probability
Loiter time
Distributions [N(μ, σ)]
Fault Conversion
Probability
Fishing
0.541
N(2, 0.5)
0.05
Anchoring
0.19
N(12, 6)
0.25
Component
0.088
0
1.00
Natural
0.084
N(48, 24)
0.10
Espionage
0.049
N(4380, 1095)
0.00
Sabotage
0.049
N(4, 1)
1.00
Example Normal Dist
Fishing Loiter Time
N(2, 0.5)
Delay, Travel, Repair and Downtime Calculations
Based on distributions, specific to the FA-1 Cable
downtime = notifyDelay + travelTime + repairTime
Lost Bandwidth and Repair Cost Calculations
capacity = 2.4 Tbps
10 Gbps rental rate = bandUnitCost = $25,000 (est)
shipCost = $12,000 per hour (est)
bandwidthCost = downtime * bandUnitCost * capacity
repairCost = (travelTime + repairTime) * shipCost
Detection probabilities:
Based on platform, sonar, other
parameters
Interaction of UISS Agent and
threat type, location and depth
Still being implemented
[Carter, 2011] [Carter, 2009] [Burnett 2014] [Rain, 2009] [Burnett, 2010]
43
FA-1 Simulation Output: As-Is
For the As-Is case:
66 threats and 4 faults over 10 years
301 hours (12.5 days) of downtime per fault
$2.4 million in repair costs per fault
$2.4 million in lost bandwidth per fault
44
Validation
As-is Simulation
•
•
Outputs “as-is” simulation compared to
historical data
z-distribution with 95% confidence interval
UISS Simulation
•
•
•
•
[37]
No hard data on system (does not exist)
Ensure “as-is” simulation is accurate
Ensure accuracy of input data and parameters
Clearly layout assumptions of model
45
Utility Analysis
Stakeholder
Prevention
Identification Downtime
Lifespan
Private
0.40
0.29
0.23
0.18
Government
0.40
0.23
0.26
0.11
● Prevention > Identification > Downtime ~ Lifespan
● Specific utility function for each model scenario
● Based on stakeholder needs
● Further decomposition
46
Agenda
1. Concept Definition
1.
Context, Stakeholder Analysis, Gap, Problem, Need
2. Operational Concept
Operational Concept, Model Framework, Operational Scenario, Stakeholder Changes, Design
Alternatives, Requirements, System Risks
3. Simulation and Analysis
Simulation Requirements, Framework, Validation, Utility
4. Project Management
WBS, Current Status
47
Work Breakdown Structure
48
A task is critical if there is no room in the schedule for it to slip.
Learn more about managing your project's critical path.
Project Management
Name
Start
Finish
Remaining
Work
Resource Names
Practice Presentation
Sun 10/4/15
Sun 10/4/15
2 hrs
Dane,Felipe,Isaac
,Kumar
R&U Project Plan
Sun 10/4/15
Tue 10/6/15
5 hrs
Isaac,Kumar
R&U Concept Definition
Sun 10/4/15
Mon 10/5/15
1 hr
Dane
R&U System Alternatives
Sun 10/4/15
Mon 10/5/15
1 hr
Isaac
R&U CONOPS
Tue 10/6/15
Thu 10/8/15
10 hrs
Isaac,Kumar,Felip
e
R&U System Model
Mon 10/5/15
Thu 10/8/15
10 hrs
Dane
R&U SOW
Wed 10/7/15
Thu 10/8/15
5 hrs
Kumar
Practice Presentation
Sun 10/25/15
Sun 10/25/15
4 hrs
Dane,Felipe,Isaac
,Kumar
R&U System Alternatives
Sun 10/25/15
Mon 10/26/15
4 hrs
Felipe,Isaac,Kum
ar
R&U System Model
Mon
10/26/15
Tue 10/27/15
10 hrs
Dane,Felipe,Isaac
,Kumar
R&U Utilitiy Analysis and
Recommendations
Tue 10/27/15
Wed 10/28/15
4 hrs
Kumar
utility function extension
Thu 11/5/15
Fri 11/6/15
8 hrs
Dane,Isaac,Felipe
,Kumar
R&U System Model
Fri 11/6/15
Sat 11/7/15
6 hrs
Dane,Felipe,Isaac
,Kumar
R&U Utility Analysis and
Recommendations
Sat 11/7/15
Sat 11/7/15
6 hrs
Dane,Felipe,Isaac
,Kumar
Current Status
●
●
●
●
●
Phase 7 completed
EV: $36,180
AC: $34,200
Cost Variance: $1,980
Ahead of schedule
49
Questions?
50
WBS
● Deliverable Oriented-Phased Planning system
● Allows for Review and Update process
● Granular control over scheduling/cost variances
● 3 hour work day per member (21hrs per week)
● $60 per hour for each resource
51
Timeline
52
Critical Tasks
53
Validation
•
Test Sim “as-is” with historical data
•
As sim expands, add more statistics
•
Z distribution (n>1000)
•
95% confidence interval
Sim
Confidence Interval
Actual
# Faults/Year
0.49 per year
0.4272 per year
Downtime
12 days
11 days
54
Earned Value Management
● Assuming 21 hour work weeks.
● Overhead - 1:1 Ratio of Indirect costs to direct costs.
● $30/hr X 2 = $60 hourly rate.
● Project duration: 9/13/15 - 5/13/16
Individual Total (9/13- Team Total (9/135/13)
5/13)
Planned Time
(Hours)
623.8
2495.2
Planned Value (PV)
$37,428
$149,712
55
EVMS (10/25/15)
Current Status
●
●
●
●
●
Phase 4 completed
EV: $21,900
AC: $18,403
Cost Variance: $2,640
Ahead of schedule
56
Project Management Risks
Risk
S
L
D
RPN
Mitigation
Critical Tasks
9
8
5
360
Start early and allot extra time for critical
tasks.
Requirements
Inflation and
Unexpected Scope
Expansion
8
8
5
320
Have weekly meetings to ensure project
is still in scope and progress is made.
Misspecification and
Errors
10
5
5
250
Team members meet weekly to discuss
progress of project and hold each other
accountable.
Simulation
9
5
5
225
Set objectives before simulation begins
to clarify goals of simulation. Research
thoroughly beforehand. Start before Fall
semester ends and work through winter
break.
Severity (S): 1(less severe) - 10 (very severe)
Likelihood (L): 1 (less likely to occur) - 10 (almost certain to occur)
Detection (D): 1 (able to detect before problem) - 10 (almost unable to detect before it occurs)
57
Project Management Risks
Risk
S
L
D
RPN
Mitigation
Background
Information
8
7
3
168
Use open source data and sensible
estimations.
Stakeholders
8
5
3
120
Justify solution by achieving
stakeholder's feasible objectives.
Communication with
Sponsor
3
5
6
90
Allow ample time for sponsor to
respond.
Severity (S): 1(less severe) - 10 (very severe)
Likelihood (L): 1 (less likely to occur) - 10 (almost certain to occur)
Detection (D): 1 (able to detect before problem) - 10 (almost unable to detect before it occurs)
58
Functional Block Diagram
59
Design Alternative Matrix
Alternative
Platform
Sonar
Traffic Monitoring
1
None
None
MTMW
2.1.1
AUV
SAS
None
2.1.2
AUV
CHIRP
None
2.1.3
AUV
HP
None
2.1.4
AUV
SSM
None
2.2.1
ROV
SAS
None
2.2.2
ROV
CHIRP
None
…
…
…
…
2.n.m
n-platform
m-sonar
None
3.1.1
AUV
SAS
MTMW
3.1.2
AUV
CHIRP
MTMW
…
…
…
…
3.n.m
n-platform
m-sonar
MTMW
60
Design Alternative 1: Marine Traffic
Monitoring and Warning (MTMW)
Mission Control
Marine Traffic Monitoring
and Warning
Warning Message to
Vessel
61
Design Alternative 2: USTD
Mission Control
Platform Alternative
Sonar Alternative
62
Design Alternative 3: MTMW and USTD
Mission Control
Platform Alternative
Sonar Alternative
Images copyright www.wikimedia.com, www.unmanned.co.uk, www.adweek.com
Ship-based Communication
63
[1] Synthetic Aperture Sonar
● Objective: to produce very high resolution
images along with bathymetry (depth
information).
● Up to 10X higher resolution than current
sonar.
● Uses consecutive pings along with acoustic
beams to determine depth.
● Current status: relatively new and could
replace side-scan sonar.
Image copyright whoi.edu
64
[2] CHIRP
● Compressed High Intensity Radar
Pulse
● Objective: to produce detailed images of
fish, objects, or seabeds.
● Uses bursts of signals to help compensate
for inconsistencies in sonar detection,
primarily with fish.
● Current status: used mostly for fishing.
Also used for producing detailed images
in shallow water.
Image copyright www.garmin.com
65
[3] Side-scan and Multibeam
● Multibeam sonar
● Transmits signal directly below ship’s
hull.
● Return signal is converted to depth.
● Side-scan sonar
● Energy is transmitted in the shape of a
fan that sweeps the seafloor, usually 100
meters wide.
● Return echo produces an image of the
sea floor.
Image copyright www.whoi.edu
66
Sonar Design Alternatives
[4] Sidescan and
Multibeam
[1] SAS
[2] CHIRP
[3]
Hydrophones
Max Depth
6,000 m
6,800 m
3,500 m
4,000 m
Signal
Range/Listening
Range
300 m
300 m
1-15,000 Hz
Up to 16 km
400 m
Resolution
3 cm
15 mm
204 dB re 1
V/µPa
30.5 cm
Frequency
175 kHz
350-650 kHz
46 kHz
150-1800
kHz
67
Platform Design Alternatives
[1] AUV/UUV
[2] ROV (Shiptowed)
[3] Sonar
Network
Max Depth
4,000 m
4,000 m
Up to 7,000 m
Operating Time
Up to 6,000 hours
0.25-2 m/s
Dependent on ship
capabilities
833-1290 days
Range
Dependent on
Speed and
Operating Time
Up to 10 km by
tether
Unlimited
~$1.2-2 million
ROV cost +
$26,000$55,000/day
operating cost
Very High and
Dangerous
Cost
68
[4] Hydrophones
● Objective: To listen for sounds, rather than
Hydrophone vs. Microphone
emitting signals and listening for echos.
● Used heavily in marine biology and
submarines - anti-submarine warfare and
navigation.
● First used in WWI
● Relays detection information to an on-board
or on-shore monitor.
Image copyright www.ccrma.stanford.edu
69
[1] Autonomous/Unmanned Undersea
Vehicles
● AUV/UUV
● Can be programmed to travel specific
routes, record data, scan for objects,
etc.
● Equipped with on-board computer
and sonar, cameras, and other sensors.
● Lithium-ion battery is most common
power source..
Images copyright asi-group.com
70
[2] Remote Operated Vehicles
● ROV
● Large fleet of ROVs with multiple
capabilities.
● Connected via tether and contains
propulsion engines to maneuver.
Images copyright asi-group.com
71
[3] Sonar Network
● Uses a network of sonar nodes
(hydrophones) and communicates
with on-board or onshore station.
● Long Baseline Localization: Fixed
location of nodes along with time
delay allow for localization of
objects.
● Extremely comprehensive and
would provide excellent coverage.
● Very costly to install at depths
greater than 200 meters.
● Can provide accuracy within 5
meters.
Image copyright www.nec.com
72
Further Simulation Work
In Progress
Complete implementation of agents
Calculate detection probabilities of
alternatives
Account for various movement
patterns of AUVs/ROVs
Determine costs for alternatives
Model additional cable systems
To be Implemented
Add dimensions to cable model to
account for vertical and lateral movement
Add movement of appropriate threats
73
Design Alternatives - Control Center
● Need for a control center to operate, monitor and communicate
with the system.
● Could also serve as a base to communicate with outside
stakeholders.
● Shipping and fishing vessels
● Law enforcement
● Military, etc.
● Centers of operation would be regional and offer faster and
more reliable communication.
74
Positive Changes
Entity
Current System
With System
Owners
Low Reliability
Increased Uptime
Governments
Threat of Espionage
Increased Security
Maritime Industry
Vessel Damage/Litigation Prevention/Clarity
System Manufacturers
No Market
Increased Revenue
Negative Changes
Entity
Problem
Solution
Repair Companies
Reduced Revenue
Shift Resources from
Repair to Monitoring
Environmental Groups
Disruption of Ecosystem
Extensive
Testing/Minimal
invasiveness
75
Sources
[1]
TeleGeography. (2015, September 15). Submarine Cable Map [Online]. Available: http://www.submarinecablemap.com/#/
[2]
Reuters. (2015, August 26). Libya's land phone line system breaks down after cables were damaged [Online]. Available:
https://www.dailystar.com.lb/News/Middle-East/2015/Aug26/312843-libyas-land-phone-line-system-breaks-down-after-cables-were-damaged.ashx
[3]
J. Kirk. (2013, March 27). Sabotage suspected in Egypt submarine cable cut [Online]. Available:
http://www.computerworld.com/article/2495954/internet/sabotage-suspected-in-egypt-submarine-cable-cut.html
[4]
F. Cahyafitri and R. Cahyafitri. (2013, June 29). Indosat spends Rp 10 billion replacing stolen underwater cable [Online]. Available:
http://www.thejakartapost.com/news/2013/06/29/indosat-spends-rp-10-billion-replacing-stolen-underwater-cable.html
[5]
Malta Today. (2011, November 14). Damaged GO submarine cable repaired [Online]. Available:
http://www.maltatoday.com.mt/news/national/13804/damaged-go-submarine-cable-repaired#.Vhkz3_lViko
[6]
M. Islam. (2015, May 8). Submarine Cable plans to sell bandwidth to Italian firm at low price [Online]. Available:
http://www.thedailystar.net/business/submarine-cable-plans-sell-bandwidth-italian-firm-low-price-80342
[7]
J. Hawn. (2015, September 18). FCC considers new rules for submarine cables [Online]. Available:
http://www.rcrwireless.com/20150918/policy/submarine-cables-may-get-new-fcc-rules-tag15
[8]
L. Hedges. (2015, March 19). Top five telecoms projects [Online]. Available:
http://www.hibernianetworks.com/corp/wp-content/uploads/2013/02/Top-five-telecoms-projects-2015_Capacity-Magazine_April-2015.pdf
[9]
F. Lardinois. (2015, May 11). Microsoft invests in 3 undersea cable projects to improve its data center connectivity [Online]. Available:
http://techcrunch.com/2015/05/11/microsoft-invests-in-3-undersea-cable-projects-to-improve-its-data-center-connectivity/#.hhwwya:w2DQ
[10]
L. Carter et al. “Submarine cables and the oceans: connecting the world” UNEP-WCMC/UNEP/ICPC. Cambridge, UK, Biodiversity
Series No. 31, 2009.
[11]
L. Carter and D. Burnett. (2011). About Submarine Telecommunications Cables [Online]. Available:
https://www.iscpc.org/documents/?id=1752
76
Sources
[12]
W. Rain. (2009, December 14). Problems faced by Industry in the repair of damaged submarine
telecommunications cables inside maritime jurisdictional claims [Online]. Available:
http://cil.nus.edu.sg/wp/wp-content/uploads/2009/10/Wolfgang-Rain-Session-3.pdf
[13]
Y. Ruggeri et al. “Submarine Telecoms Industry Report” Terabit Consulting. Cambridge,MA, Issue 3, 2014.
[14]
“Global Bandwidth Research Service Executive Summary” TeleGeography. Washington D.C. 2015
[15]
“Australia & Pacific Bandwidth Review” TeleGeography. Washington D.C. February, 2015.
[16]
US Coast Guard. (2010, July 13). Types of Automatic Identification Systems [Online]. Available:
http://www.navcen.uscg.gov/?pageName=typesAIS
[17]
“Technical characteristics for an automatic identification system using time-division multiple access in the VHF maritime mobile band” Intl.
Telecommunication Unit –
Radiocommunication, Geneva, Switzerland, Recommendation, ITU-R M.1371-4, April 2010.
[18]
Kokusai Cable Ship Co. (2010) Optical Submarine Cable Repair Method [Online]. Available: http://www.kkcs.co.jp/english/solutionRepairingMethod.html
[19]
D. Burnett. Submarine Cables: The Handbook of Law and Policy. Boston, MA: Martinus Nijhoff, 2014.
[20]
A. Chang. (2013, April 2). Why Undersea Internet Cables Are More Vulnerable Than You Think [Online]. Available:
http://www.wired.com/2013/04/how-vulnerable-are-undersea-internet-cables/
[21]
O. Khazan. (2013, July 16). The Creepy, Long-Standing Practice of Undersea Cable Tapping [Online]. Available:
http://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/
[22]
W. Landay, “The Navy Unmanned Undersea Vehicle (UUV) Master Plan,” Nov. 2004. [Online]. Available:
http://www.navy.mil/navydata/technology/uuvmp.pdf
[23]
[24]
"Side Scan Sonar." NOAA's Office of Coast Survey. 2015. [Online]. Available: http://www.nauticalcharts.noaa.gov/hsd/SSS.html.
"Harbor Monitoring Network System." NEC.com. N.p., 2015. Web. 31 Aug. 2015.
http://www.nec.com/en/global/solutions/safety/critical_infra/harbormonitoring.html.
77
Sources
[25]
“Harbor Monitoring Network System,” NEC, 2015. [Online]. Available:
http://www.nec.com/en/global/solutions/safety/critical_infra/harbormonitoring.html.
[26]
“Autonomous Underwater Surveilance System Network,” L3 Oceania, 2014. [Online]. Available:
http://www2.l-3com.com/oceania//products/maritime_aussnet.htm.
[27]
“ROV Fleet,” ASI-Marine, 2015. [Online]. Available:
http://www.asigroup.com/system/assets/attachments/000/000/181/original/ROV_Fleet.pdf.
[28]
[29]
D. Main. (2015, April 2). Undersea Cables Transport 99 Percent of International Data [Online]. Available:
http://www.newsweek.com/undersea-cables-transport-99-percent-international-communications-319072
S. Whitehead. “Submarine Cable Testing” Anritsu Corp., Richardson, TX, Application Note MW90010A, Dec. 2010.
[30]
D. R. Burnett, “Recovery of Cable Repair Ship Cost Damages from Third Parties That Injure Submarine Cables,” Tul. Mar. L.J., vol. 35, p.
103, 2011 2010.
[31]
A. Palmer-Felgate et al. “Marine Maintenance in the Zones - A Global Comparison of Repair Commencement Times” presented at the
SubOptic Conference
Presentation, Paris, France, May 2013.
[32]
G. White. (2014, November 20). Spy cable revealed: how telecoms firm worked with GCHQ [Online]. Available:
http://www.channel4.com/news/spy-cable-revealed-how-telecoms-firm-worked-with-gchq
[33] B. Gertz. (2015, September 22). Russian Spy Ship Makes Port Call in Caribbean [Online]. Available: http://freebeacon.com/national-security/russianspy-ship-makes-port-call-in-caribbean/
[34] D. Sanger and E. Schmitt. (2015, October 25). Russian Ships Near Data Cables Are Too Close For U.S. Comfort
[Online]. Available: http://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html?_r=0
[35] L. Stewart. (2015, February 2). 20,000 leagues under the sea... a trawler hit an internet cable and sent broadband into meltdown [Online]. Available:
http://www.belfasttelegraph.co.uk/technology/20000-leagues-under-the-sea-a-trawler-hit-an-internet-cable-and-sent-broadband-into-meltdown-31009132.html
[36] M. Fachot. (April 2012). Safety at sea from shore and space: Additional and improved international standards for maritime safety [Online]. Available:
http://iecetech.org/issue/2012-04/Safety-at-sea-from-shore-and-space
[37]
https://www.google.com/search?q=validation&rlz=1C1CHWA_enUS642US642&espv=2&biw=1536&bih=825&source=lnms&tbm=isch&sa=X&ved=0ahU
KEwi-9NL4oZ7JAhWGPCYKHWxcDEgQ_AUIBygC#imgrc=NaXG1PmRWU9SrM%3A
78
Causes of Cable Faults
Approximately 150 faults reported per
year.
Over 20% are cause unknown. Even
when the cause is known, identifying a
responsible party is difficult.
70% of faults occur in water of less than
200m deep.
Each faults costs millions of dollars in
lost bandwidth revenue and repair costs.
No central database or logging of
threats/faults exists.
New FCC regulations will mandate
reporting of US based cable faults.
79
Design Alternatives - Ship Monitoring
and Communications
● Automatic ID system (AIS) transponder
required on all vessels larger than 299 tons
● Live GPS updates every 10sec to 3 minutes
[16]
● Ship ID, position, speed, navigation status
[16]
● Can send text messages [16]
● Marine VHF radio system required on all
commercial vessels and all vessels over 20m
in length
● 100-200 nm range
● Required monitoring of Channel 16 for
emergency and safety messages
Image copyright marinetraffic.com
80
Design Alternatives - Fault Location Finding
Shunt Fault (electrical)
● Use PFE (power feed equipment) to vary
voltage at CLS to find approximate location
of cable fault based on known voltage drop
per km.
● Onsite at all CLS servicing cables with
repeaters.
● Not very accurate, many additional factors
Optical Fault [29]
● Use Coherent / Optical Time Delay
Refractometer (COTDR/OTDR)
● Test pulse of known pulse width, measure
light backscattering to determine fault
location
● Can quickly determine fault segment and
linear location of fault to as close as 10m
● Not equipped at most CLSs
Images copyright Advantest
81
EVMS
82
Download