Complex event processing in reactive distributed systems
|
|
- Austen Dalton
- 6 years ago
- Views:
Transcription
1 Complex event processing in reactive distributed systems Ján JANÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, Bratislava, Slovakia 1 Introduction Abstract. Specific to the reactive computing is processing of potentially large volumes of incoming messages or events from various sources. It can be assumed that the number of resources and their diversity will only grow. For that reason we have analyzed common approaches in distributed systems development. We then introduce complex event processing and try to evaluate its assets concerning design, implementation, modifiability and flexibility. For this purpose, we implemented a functional model of an electronic toll collection system, based on system specification for Slovak conditions. Significant flexibility is achieved compared to those of the existing solutions. Thanks to growing computational power, ubiquitous network and the significance of IT in everyday s businesses, distributed systems are one of the most prevalent application types being developed today. Furthermore, as information systems take over more and more responsibility, more and more realtime (or reactive) systems are being developed. A distributed system can be defined as a system consisting of multiple independent (selfcontained) components that communicate with each other and coordinate their activity to achieve certain goal. Self-contained components means that each component has its own control mechanism and system resources. Typically, a distributed system consists of several computers communicating across network. A reactive system is a system that needs to response to changes in conditions (events) in a specific time interval, typically very short. Examples of reactive systems include all types of security and monitoring systems, fraud detection, industrial process controllers, flight operation systems or even a video player software. Logically, as distributed systems consist of more components, its complexity gets bigger as well. Another problem is the everincreasing amount of digital data. Although computational power increases rapidly too, Kenneth Cuckier assumes in an article in The Economist, that by this year Master study programme in field: Information Systems Supervisor: Dr. Ján Lang, Institute of Informatics and Software Engineering, Faculty of Informatics and Information Technologies STU in Bratislava IIT.SRC 2011, Bratislava, May 4, 2011, pp. 1 8.
2 2 UNSPECIFIED FIELD (2011), the amount of information created will exceed available storage more than two times [2]. Information systems, which are being more and more interconnected, now have to process a lot of diverse data. In such conditions, developing a real-time system, which needs to response promptly, without proper efficient technique(s) will in most cases lead to failure. In this paper, we looked at complex event processing (CEP) as a new approach addressing these problems and tried to evaluate its assets in reactive distributed systems design. In section 2 we briefly introduce common approaches in distributed systems design. Section 3 explains the basics of complex event processing. Section 4 explains how we used complex event processing in designing and implementing an electronic toll collection system. Results are mentioned in section 5. 2 Common approaches in distributed systems design Distributed systems first emerged with the development of computer networks. As the development progressed, common techniques for designing and implementing such systems were established. Two interesting concepts gained importance - service oriented architecture and event-driven architecture. 2.1 Service oriented architecture Service oriented architecture is an architectural style, in which functionality is provided by services, which can be discovered and used by clients. Clients and services are thus two main components defined by this architectural style. Service is a software entity which provides some basic or complex functionality to its clients. A client can be any software program, including another service. Other elements specified by SOA are mechanism of message transfering, communication protocol, service registry and others. It is almost a standard to use internet and HTTP protocol for communication, while services are located on different computers, thus creating a distributed system. It is however important to remember that SOA is more about concept and philosophy than about implementation specifics. The main goal of service oriented architecture is to increase reusability of individual components and flexibility and modifiability of large business systems, which were having problems with ever changing requirements, technologies et. al. [3]. It is thus very suitable for system integration. 2.2 Event-driven architecture Most computer systems are based on continuous execution of instructions, which means that the system itself determines what to do next. Event-driven architecture, on the contrary, is an architectural pattern in which system reacts to incoming data, represented by events. David Luckham defines an event as anything that happened or is currently happening [5]. When modeling an event-driven architecture, one has to identify all types of events that can occur in the problem domain. In an event-driven system, real world events are represented by software events. Software events need to have a common structure so they can be automatically processed by machines. Each software event is an instantiation of an event type, which defines what data an event carries. It is an analogy to object oriented programming, with event types standing for classes and (software) events standing for objects. Basic components of an event-driven system are event publishers (or event sources), event consumers and communication channels. Most important characteristics of event-driven architecture are that events are published asynchronously (the publisher does not wait for the consumer to process the previous event) and right after they occur. Main advantage of EDA is loose coupling of components (components don t know about each other). When compared to SOA, event-driven systems are asynchronous, opened to unexpected input, program flow is determined by data and relations between components are M:N (as opposed to SOA, where they are 1:1) [1]. We can see that characteristics of SOA and EDA are complementary and both architectural styles can be well used together.
3 Ján Janík: Complex event processing in reactive distributed systems 3 3 Concepts of complex event processing Complex event processing is one of three general styles of event processing in event-driven architecture (the others being simple event processing and event stream processing). A complex event is created by analyzing and identifying the cause-and-effect relationships among other events, which is done by event correlation and aggregation. In a simplified way, a complex event consists of other events, which can be also complex, thus creating an event hierarchy. Furthermore, time and quantity constraints can be applied to event correlation, which significantly increases the capabilities of CEP. A good example can be an electronic banking system detecting a credit card fraud when two withdrawals from distant places are detected in a short time (short enough to be impossible to get from one place to the other) [6]. In this case, the system registers two events of type Withdrawal, each originating from a different place, that happen over a short period of time. When all of the conditions are met, the system detects a complex event Credit Card Fraud and can automatically carry out any necessary actions, like freezing the account and alerting the bank s employees. Event correlation is conducted by a special software component called event processing engine. Its efficiency is crucial to the whole system, as it must be able to process large amount of data in a very short time. Usability is also critical. CEP engine must provide an easy way to define complex events. Most existing event processing engines provide a specialized language, which is very similar to SQL (an overview of existing CEP engines can be found in [4]). Statements defining complex events contain a SELECT-FROM-WHERE clauses, with the only difference from SQL being that data are not persistent and stored, but processed as they arrive in a data stream. Because complex event processing is part of event-driven architecture, CEP systems have the same characteristics as EDA. The main contribution of CEP is simplification of implementation and efficiency of the system. Complex event processing is used in a range of applications, most notably in business process management, fraud detection systems, monitoring systems (industrial process monitoring, network monitoring, traffic monitoring), algorithmic trading, system integration and others [5]. We focused on the possibilities of utilization of CEP in real-time distributed systems. 4 Application of CEP in electronic toll collection system design We formulated following assumptions about the CEP technology: High modifiability and flexibility of CEP systems. Ability to change the system run-time. Suitable for system integration. Simple implementation (compared to common design and implementation techniques). High efficiency (processing up to tens of thousands of events per second). The goal of our work is to evaluate these assumptions when applied in reactive distributed system design. For this purpose, we decided to implement an electronic toll collection (ETC) system using complex event processing. Such system meets all the requirements: it works in an asynchronous environment, with large amount of data that need to be processed in real time, it should be easily modifiable and integrated with other systems. Another reason why we decided to implement this system is that it is an actual topic not only in Slovakia, but around the world. It is however important to mention that we implemented only a functional model, not the whole system, which exceeds the extent and focus of our work. 4.1 Designing a complex event processing system When designing a CEP system, additional steps must be conducted. First, event sources must be defined. In our functional model, we defined two event sources: on-board units (OBU) and tollgates.
4 4 UNSPECIFIED FIELD The former is a small device installed in clients vehicles, which constantly monitors their location and sends data to server as soon as it detects a transit through a toll road segment. The latter is a static enforcement equipment build along the toll road segments, which can communicate with OBUs of passing vehicles and check if they have OBU set up correctly and running. Second step consists of identifying all the event types in the problem domain. We defined ten event types - three basic, which originate directly from identified sources, and seven complex events. Every event type must have defined what data it carries (more precisely, what data events of this type carry), its source, input condition and what action to execute. Basic event types in proposed tolling system, their sources and data, are showed in table 4.1. Event type (event ID) Event source Data Toll Road Segment Transit (TRST) OBU vehicle ID, segment IT, timestamp Tollgate Vehicle Identified (TVI) Tollgate gate ID, vehicle ID, license number, timestamp Tollgate Vehicle Unidentified (TVU) Tollgate gate ID, license number, timestamp Table 1. Basic event types Toll Road Segment Transit occurs whenever a vehicle passes a toll road segment. In reaction to this event, payment from proper client s account must be carried out. Tollgate Vehicle Identified originates from tollgates and occurs whenever a vehicle passing a tollgate is properly identified, that means the tollgate successfully communicated with the on-board unit of the vehicle. On the contrary, Tollgate Vehicle Unidentified events arise when a vehicle passes a tollgate and the communication with the on-board unit was unsuccessful. In this case, the system should trigger an alarm and notify enforcment department. We will only present one complex event type as an example because mentioning all would exceed the extent of this paper. A good example is the event type Toll Road Transit Unregistered. Events of this type occur when a vehicle passes through a toll road segment, but the back office system receives no data about this fact from the on-board unit of the vehicle. To detect this event by CEP engine, two preconditions must be met: 1. The passing vehicle must be detected. This can be done only by tollgate, therefore a Tollgate Vehicle Identified event must occur first. Moreover, this event says that the vehicle s OBU is up and running and has responded correctly. 2. No data about passing the segment from the OBU are recieved. That means, no Toll Road Segment Transit event (with proper vehicle ID and segment ID) is received in a given time interval. This event can indicate a technical problem, for example a malfunctioning GPRS module of the OBU, but also a potential fraud. In reaction, the system should issue a warning. With all the event sources and event types identified, the system design then continues with usual steps like architecture definition etc. Small portions of the rest of the design and implementation are explained in the next section. 5 Results In this chapter we present the results we reached mainly in the stages of design and implementation.
5 Ján Janík: Complex event processing in reactive distributed systems 5 Figure 1. System architecture without CEP 5.1 Assets of CEP in system design To demonstrate the advantages of complex event processing in system design, we proposed a second system architecture, which does not use CEP, and compared it to the actual architecture of our system. This architecture is displayed in figure 1. There are eight components. Adapter OBU and Adapter Tollgate are software and hardware modules, which are responsible for receiving data from on-board units and tollgates and transforming them into proper format, so they can be processed by the rest of the system. Because there is limited space, we won t explain the purpose of the rest of the components. As virtually all of the components represent individual subsystems, effective and transparent communication is cruicial for the system. We decided to use enterprise service bus to address this requirement and services to implement most of the functionality. This will have a positive impact on the system from several aspects (reusability, flexibility, transparent communication, simplified logic), however, components are still tightly coupled and form a spaghetti achitecture. Consider the following example. When vehicle detects a transit through a toll road, the data flow from OBU Adapter to Monitoring and Billing modules. Both Modules need data from Client Account Administration module. If Monitoring detects something suspicious, it might communicate with external systems and Enforcement. Enforcement might communicate with external systems independently again, and so on. When considering a system that uses CEP, the architecture remains the same, with the only new component being CEP Server, which contains a CEP engine and communication interfaces. Although it is almost the same as the previous architecture, using CEP significantly affects the system behaviour. The data now flow from adapters to CEP Server, where they are processed. The Engine then decides what actions to carry out. For example, if a vehicle passes through a toll road segment, the data are first sent to the engine, which analyzes it and invokes proper services from other modules. The role of the engine is to look at the system as a whole and react to what is happening. The logic is now centralized and simplified, with the only component that needs to know about the others being CEP server. It is obvious that modifying a system with decoupled components and centralized logic is much easier than modifying one with interconnected components and the logic spread across the whole system.
6 6 UNSPECIFIED FIELD 5.2 Assets of CEP in implementation To demonstrate the assets of CEP in implementation, we will show an example of a complex event definition of the complex event specified in section 4.1. SELECT tvi.vehicle_id AS vehicle_id, tvi.gate_id AS gate_id, tvi.timestamp AS timestamp FROM TVI.win:length(1) AS tvi, TRST.win:time(5 sec) AS trst WHERE tvi.vehicle_id!= trst.vehicle_id OR tvi.segment_id!= trst.segment_id This rules compares each Tollgate Vehicle Identified event with a 5 second window of Toll Road Segment Transit events. The complex event is detected if no TRST event that matches TVI s vehicle ID and segment ID occured during the 5 second window. If we should program this functionality in a common programming language, the service processing data from tollgates would have to launch a timer each time it recieves data about a vehicle passing through a tollgate and call another service to check if the OBU did not send data about passing that segment. This is of course very impractial and decreases flexibility. Our assumptions are that CEP might reduce the time needed for implementation a certain functionality up to 5 times. 6 Conclusion In this paper we discussed the application of complex event processing in reactive distributed system design. One of the reasons why we decided to address this issue is that it is a new and interesting concept, yet it has not expanded to its full potential. We tried to evaluate the assets of CEP from several asspects by implementing a functional model of an electronic toll collection system. Despite the fact that our work is not finished, some results were reached already in the stages of design and implementation. Our next goal is to perform a benchmark test of system s performance and conduct a more in-depth analysis of system s modifiability and flexibility, as well as provide a more formal metrics for evaluating the heftiness of implementation. Acknowledgement: This work was partially supported by the Slovak Research and Development Agency under the contract No. APVV References [1] COVINGTON, R. Event-Driven Architecture and SOA: Complimentary Architectures for the Enterprise. [online] December Available at Docs/SIG Meetings/Dec. 05/ pdf [2] CUKIER, K. Data, data everywhere. [online] February 25th, Available at [3] FRONCKOWIAK, J. SOA Best Practices and Design Patterns: Keys To Successful Service- Oriented Architecture Implementation. [online] March 3rd, Available at Best Practices and Design Patterns - Key to Successful Service Oriented Architecture Implementation.pdf [4] CEP Vendors. [online] February 2nd, Available at id=47 [5] LUCKHAM, D. The Power of Events. 5. act. publication. Addison-Wesley, August s. ISBN [6] NEAL, L. Complex-Event Processing Poised for Growth. Computer [online] April, 2009, Volume 42, Issue 4, pp
what do we mean by event processing now, a checklist of capabilities in current event processing tools and applications,
A View of the Current State of Event Processing what do we mean by event processing now, complex event processing, a checklist of capabilities in current event processing tools and applications, next steps
More informationIntroduction in Eventing in SOA Suite 11g
Introduction in Eventing in SOA Suite 11g Ronald van Luttikhuizen Vennster Utrecht, The Netherlands Keywords: Events, EDA, Oracle SOA Suite 11g, SOA, JMS, AQ, EDN Introduction Services and events are highly
More informationModeling Systems Using Design Patterns
Modeling Systems Using Design Patterns Jaroslav JAKUBÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia jakubik@fiit.stuba.sk
More informationModules of Content Management Systems and their Reusability
Modules of Content Management Systems and their Reusability Michal JAKUBÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic
More informationCOM R. Schulte
R. Schulte Research Note 7 July 2003 Commentary Event-Driven Applications: Definition and Taxonomy Simple event-driven applications are becoming widespread in mainstream enterprises. More-powerful complex-event
More informationInterface-based enterprise and software architecture mapping
Interface-based enterprise and software architecture mapping Aziz Ahmad Rais Department of Information Technologies University of Economics, Prague Prague, Czech Republic aziz.rais@vse.cz aziz.ahmad.rais@gmail.com
More informationDesigning and debugging real-time distributed systems
Designing and debugging real-time distributed systems By Geoff Revill, RTI This article identifies the issues of real-time distributed system development and discusses how development platforms and tools
More informationwebmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse
December 2008 webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse By Chris Pottinger, Sr. Manager Product Development, and Juergen Lind, Sr. Product
More informationLosing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data
Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com
More informationCaching Spreading Activation Search
Caching Spreading Activation Search Ján SUCHAL Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia suchal@fiit.stuba.sk Abstract.Spreading
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationCS4514 Real-Time Systems and Modeling
CS4514 Real-Time Systems and Modeling Fall 2015 José M. Garrido Department of Computer Science College of Computing and Software Engineering Kennesaw State University Real-Time Systems RTS are computer
More informationClient-server Basics. 1. Motivation
Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices
More informationPrivacy Policy. Effective date: 21 May 2018
Privacy Policy Effective date: 21 May 2018 We at Meetingbird know you care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn
More informationTIBCO Complex Event Processing Evaluation Guide
TIBCO Complex Event Processing Evaluation Guide This document provides a guide to evaluating CEP technologies. http://www.tibco.com Global Headquarters 3303 Hillview Avenue Palo Alto, CA 94304 Tel: +1
More informationChapter 8 Web Services Objectives
Chapter 8 Web Services Objectives Describe the Web services approach to the Service- Oriented Architecture concept Describe the WSDL specification and how it is used to define Web services Describe the
More informationUniversal Communication Component on Symbian Series60 Platform
Universal Communication Component on Symbian Series60 Platform Róbert Kereskényi, Bertalan Forstner, Hassan Charaf Department of Automation and Applied Informatics Budapest University of Technology and
More informationCS 307: Software Engineering. Lecture 10: Software Design and Architecture
CS 307: Software Engineering Lecture 10: Software Design and Architecture Prof. Jeff Turkstra 2017 Dr. Jeffrey A. Turkstra 1 Announcements Discuss your product backlog in person or via email by Today Office
More informationEnabling industry 4.0 Event-driven architectures and smart micro services
Enabling industry 4.0 Event-driven architectures and smart micro services Dr., Systems and control, Chalmers Chalmers, Automation +46 (0)768 979561 Kristofer.bengtsson@chalmers.se The key to industry 4.0
More informationProgramming Without a Call Stack: Event-driven Architectures
Programming Without a Call Stack: Event-driven Architectures Gregor Hohpe Google www.eaipatterns.com Gregor Hohpe Programming Without a Call Stack: Event-driven Architectures Slide 1 About Me Distributed
More informationSTOCKTON UNIVERSITY PROCEDURE DEFINITIONS
STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act
More informationExtension Course Introduction to Process Automation Version 9.0
Extension Course -9005 Introduction to Process Automation Version 9.0 Information in this document is subject to change without notice and does not represent a commitment on the part of Technical Difference,
More informationConcept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities
Concept White Paper Concepts for Proposed Content of Eventual Standard(s) for Project 2009-02: Real-Time Monitoring and Analysis Capabilities Real-time Monitoring and Analysis Capabilities Standard Drafting
More informationAmit. Amit - Active Middleware. Technology Overview. IBM Research Lab in Haifa Active Technologies October 2002
Amit Amit - Active Middleware Technology Overview IBM Research Lab in Haifa Active Technologies October 2002 OUTLINE: The Active Technologies Amit Active Middleware Technology Related Active Management
More informationAPM. Object Monitor. Object Lab. Richard Hayton & Scarlet Schwiderski
APM POSEIDON HOUSE CASTLE PARK CAMBRIDGE CB3 0RD UNITED KINGDOM +44 1223 515010 Fax +44 1223 359779 Email: apm@ansa.co.uk URL: http://www.ansa.co.uk Object Lab Object Monitor Richard Hayton & Scarlet Schwiderski
More informationAdvOSS AAA: Architecture, Call flows and implementing emerging business use cases
AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf
More informationComplex or Simple Event Processing by David Luckham
Complex or Simple Event Processing by David Luckham Some people, I m told, get scared when they hear the word complex, as in Complex Event Processing (CEP). They want to hear simple event processing or
More informationThe Open Group SOA Ontology Technical Standard. Clive Hatton
The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts
More informationWeb Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2014.02.28 2014.02.28 Valdas Rapševičius. Java Technologies 1 Outline Introduction to SOA SOA Concepts:
More informationOPC DataHub Offers Advanced Tunnelling of Process Data
OPC DataHub Offers Advanced Tunnelling of Process Data By Paul Benford and Robert McIlvride, Cogent Real-Time Systems Inc. & Colin Winchester, Software Toolbox, Inc. In today s process control environment,
More informationUMP Alert Engine. Status. Requirements
UMP Alert Engine Status Requirements Goal Terms Proposed Design High Level Diagram Alert Engine Topology Stream Receiver Stream Router Policy Evaluator Alert Publisher Alert Topology Detail Diagram Alert
More informationChapter 2 Distributed Computing Infrastructure
Slide 2.1 Web Serv vices: Princ ciples & Te echno ology Chapter 2 Distributed Computing Infrastructure Mike P. Papazoglou mikep@uvt.nl Slide 2.2 Topics Distributed computing and Internet protocols The
More informationComplex Event Processing A brief overview
Complex Event Processing A brief overview Dávid István davidi@inf.mit.bme.hu Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Event Key concepts o An immutable
More informationFAQ (Basic) Sybase CEP Option R4
FAQ (Basic) Sybase CEP Option R4 DOCUMENT ID: DC01023-01-0400-01 LAST REVISED: February 2010 Copyright 2010 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and to any
More informationWeb Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2015.02.19 Outline Introduction to SOA SOA Concepts: Services Loose Coupling Infrastructure SOA Layers
More informationHappy Birthday, Ajax4jsf! A Progress Report
Happy Birthday, Ajax4jsf! A Progress Report By Max Katz, Senior Systems Engineer, Exadel Ajax4jsf is turning one soon and what a year it will have been. It was an amazing ride for all of us here at Exadel.
More informationWebsite Privacy Policy
Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,
More informationOPC DataHub Offers Advanced Tunnelling of Process Data
OPC DataHub Offers Advanced Tunnelling of Process Data By Paul Benford and Robert McIlvride, Cogent Real-Time Systems Inc. & Colin Winchester, Software Toolbox, Inc. In today s process control environment,
More informationXVIII. Software Architectures
XVIII. Software Architectures Software Architectures UML Packages Client-Server vs Peer-to-Peer 3-Tier and 4-Tier Architectures Horizontal Layers and Vertical Partitions The Model-View-Controller Architecture
More informationAn Introduction to Software Architecture. David Garlan & Mary Shaw 94
An Introduction to Software Architecture David Garlan & Mary Shaw 94 Motivation Motivation An increase in (system) size and complexity structural issues communication (type, protocol) synchronization data
More informationImproving Adaptive Hypermedia by Adding Semantics
Improving Adaptive Hypermedia by Adding Semantics Anton ANDREJKO Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic andrejko@fiit.stuba.sk
More informationIntroduction to Distributed Systems
Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]
More information20. Business Process Analysis (2)
20. Business Process Analysis (2) DE + IA (INFO 243) - 31 March 2008 Bob Glushko 1 of 38 3/31/2008 8:00 AM Plan for Today's Class Process Patterns at Different Levels in the "Abstraction Hierarchy" Control
More informationPANEL Streams vs Rules vs Subscriptions: System and Language Issues. The Case for Rules. Paul Vincent TIBCO Software Inc.
PANEL Streams vs Rules vs Subscriptions: System and Language Issues The Case for Rules Paul Vincent TIBCO Software Inc. Rules, rules, everywhere Data aquisition Data processing Workflow Data relationships
More informationOBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis
UNIT I INTRODUCTION OBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis Design Implementation Testing Maintenance
More informationOPC DataHub Offers Advanced Tunnelling of Process Data
OPC DataHub Offers Advanced Tunnelling of Process Data By Paul Benford and Robert McIlvride, Cogent Real-Time Systems Inc. & Colin Winchester, Software Toolbox, Inc. In today s process control environment,
More informationEnn Õunapuu
Asünkroonsed teenused Enn Õunapuu enn.ounapuu@ttu.ee Määrang Asynchronous processing enables methods to return immediately without blocking on the calling thread. Consumers request asynchronous processing
More informationIntegrating Systems with Event Driven Architecture. Eoin Woods
Integrating Systems with Event Driven Architecture Eoin Woods www.eoinwoods.info About Me Software architect at UBS Investment Bank responsible for synthetic equity platform Software architect for ~10
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationEsper. Luca Montanari. MIDLAB. Middleware Laboratory
Esper Luca Montanari montanari@dis.uniroma1.it Esper Open Source CEP and ESP engine Available for Java as Esper, for.net as NEsper Developed by Codehaus http://esper.codehaus.org/ (write esper complex
More informationUSING DATA MODEL PATTERNS FOR RAPID APPLICATIONS DEVELOPMENT
USING DATA MODEL PATTERNS FOR RAPID APPLICATIONS DEVELOPMENT David C. Hay Essential Strategies, Inc. :+$7$5('$7$02'(/3$77(516" The book Data Model Patterns: Conventions Thought 1 presents a set standard
More informationShaw Privacy Policy. 1- Our commitment to you
Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of
More informationObject-Oriented Design
Object-Oriented Design Lecture 14: Design Workflow Department of Computer Engineering Sharif University of Technology 1 UP iterations and workflow Workflows Requirements Analysis Phases Inception Elaboration
More informationWorkflow Modeling for Implementing Complex, CAD-Based, Design Methodologies
Workflow Modeling for Implementing Complex, CAD-Based, Design Methodologies J. Stavash and J. Wedgwood M. Forte Lockheed Martin Advanced Technology Laboratories Rockwell International Corporation Camden,
More informationNMCS2 MIDAS Outstation Algorithm Specification
traffic systems and signing TR 2177 Issue H NMCS2 MIDAS Outstation Algorithm Specification Crown Copyright 2009 First published 1994 Printed and published by the Highways Agency Page 1 NOTE: This document
More information2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.
T0/06-6 revision 0 Date: March 0, 2006 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular documentation
More informationKernel Korner AEM: A Scalable and Native Event Mechanism for Linux
Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux Give your application the ability to register callbacks with the kernel. by Frédéric Rossi In a previous article [ An Event Mechanism
More information1 Software Architecture
Some buzzwords and acronyms for today Software architecture Design pattern Separation of concerns Single responsibility principle Keep it simple, stupid (KISS) Don t repeat yourself (DRY) Don t talk to
More informationSonarJ White Paper. Sonar stands for Software and Architecture. It is meant to support software developers and architects in their daily work.
SonarJ White Paper Sonar stands for Software and Architecture. It is meant to support software developers and architects in their daily work. Software over its lifecycle needs to be changed, adapted, enhanced
More informationService-Oriented Architecture
Service-Oriented Architecture The Service Oriented Society Imagine if we had to do everything we need to get done by ourselves? From Craftsmen to Service Providers Our society has become what it is today
More informationEvent Metamodel and Profile (EMP) Proposed RFP Updated Sept, 2007
Event Metamodel and Profile (EMP) Proposed RFP Updated Sept, 2007 Robert Covington, CTO 8425 woodfield crossing boulevard suite 345 indianapolis in 46240 317.252.2636 Motivation for this proposed RFP 1.
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationComplexity Analysis of Routing Algorithms in Computer Networks
Complexity Analysis of Routing Algorithms in Computer Networks Peter BARTALOS Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 84 6 Bratislava, Slovakia
More information2010 Online Banking Security Survey:
2010 Online Banking Security Survey: ZeuS-Like Malware Rapidly Outpaces All Other Online Banking Threats PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536
More informationCredit where Credit is Due. Goals for this Lecture. Introduction to Design
Credit where Credit is Due Lecture 17: Intro. to Design (Part 1) Kenneth M. Anderson Object-Oriented Analysis and Design CSCI 6448 - Spring Semester, 2002 Some material presented in this lecture is taken
More informationVirginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations
Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations Initial Panel Charge August 2009 To review existing policies and
More informationStrategy for information security in Sweden
Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information
More informationProtecting Your SaaS Investment: Monitoring Office 365 Performance
Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business
More informationUnified management of heterogeneous sensors for complex event processing
Risk Analysis VI 445 Unified management of heterogeneous sensors for complex event processing M. Valdés, I. Nieto, V. Guardiola, D. Gil & A. Gómez-Skarmeta University of Murcia, Spain Abstract The turn
More informationProg. Logic Devices Schematic-Based Design Flows CMPE 415. Designer could access symbols for logic gates and functions from a library.
Schematic-Based Design Flows Early schematic-driven ASIC flow Designer could access symbols for logic gates and functions from a library. Simulator would use a corresponding library with logic functionality
More informationApplication Architectures, Design Patterns
Application Architectures, Design Patterns Martin Ledvinka martin.ledvinka@fel.cvut.cz Winter Term 2017 Martin Ledvinka (martin.ledvinka@fel.cvut.cz) Application Architectures, Design Patterns Winter Term
More informationA Messaging-Based Integration Architecture for Print Production Workflow Systems
A Messaging-Based Integration Architecture for Print Production Workflow Systems Claes Buckwalter Digital Media, ITN, Linköping University, Sweden Abstract A print production workflow consists of a number
More informationDesigning Issues For Distributed Computing System: An Empirical View
ISSN: 2278 0211 (Online) Designing Issues For Distributed Computing System: An Empirical View Dr. S.K Gandhi, Research Guide Department of Computer Science & Engineering, AISECT University, Bhopal (M.P),
More information2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.
T0/04-023 revision 2 Date: September 06, 2005 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular
More informationComprehensive Guide to Evaluating Event Stream Processing Engines
Comprehensive Guide to Evaluating Event Stream Processing Engines i Copyright 2006 Coral8, Inc. All rights reserved worldwide. Worldwide Headquarters: Coral8, Inc. 82 Pioneer Way, Suite 106 Mountain View,
More informationLegal framework of ensuring of cyber security in the Republic of Azerbaijan
Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic
More informationLegacy Transaction Integration TM In a Service-oriented Architecture (SOA)
November 2003 Legacy Transaction Integration TM In a Service-oriented Architecture (SOA) Introduction Over the next year or so, every serious IT analyst and software vendor will figuratively jump upon
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationCAS 703 Software Design
Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction
More informationENTERPRISE SUBSCRIBER GUIDE
ENTERPRISE SUBSCRIBER GUIDE Enterprise Subscriber Guide 880 Montclair Road Suite 400 Birmingham, AL 353 www. TABLE OF CONTENTS Table of Contents Introduction...6 Logging In...6 Navigation Bar, Sub-Menu
More information2 Background: Service Oriented Network Architectures
2 Background: Service Oriented Network Architectures Most of the issues in the Internet arise because of inflexibility and rigidness attributes of the network architecture, which is built upon a protocol
More informationIssues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan
Issues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan Masaki Kubo, Takayuki Uchiyama JPCERT Coordination Center Vulnerability Coordination Group Agenda
More informationNetwork Tester: A Generation and Evaluation of Diagnostic Communication in IP Networks
2018IEEE.Personaluseofthismaterialispermitted.PermissionfromIEEEmustbeobtainedforallotheruses,inanycurrent or future media, including reprinting/republishing this material for advertising or promotional
More informationNetworking for a dynamic infrastructure: getting it right.
IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for
More informationArchitectural Styles I
Architectural Styles I Software Architecture VO/KU (707023/707024) Roman Kern KTI, TU Graz 2015-01-07 Roman Kern (KTI, TU Graz) Architectural Styles I 2015-01-07 1 / 86 Outline 1 Non-Functional Concepts
More informationApplication Oriented Networks: An SOA Perspective
Oriented s: An SOA Perspective www.thbs.com Introduction Service Oriented Architecture is the hot topic of discussion in IT circles today. So much so, in fact, that SOA is being seen by many as the future
More informationINTERNATIONAL TELECOMMUNICATION UNION. SPECIFICATIONS OF SIGNALLING SYSTEM No. 7
INTERNATIONAL TELECOMMUNICATION UNION Q.74 TELECOMMUNICATION (0/9) STANDARDIZATION SECTOR OF ITU SPECIFICATIONS OF SIGNALLING SYSTEM. 7 SIGNALLING SYSTEM. 7 SIGNALLING CONNECTION CONTROL PART PROCEDURES
More informationVariables and Data Representation
You will recall that a computer program is a set of instructions that tell a computer how to transform a given set of input into a specific output. Any program, procedural, event driven or object oriented
More informationOut of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application
Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers
More informationInfluence of Design Patterns Application on Quality of IT Solutions
Influence of Design Patterns Application on Quality of IT Solutions NADINA ZAIMOVIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo
More informationImproving QoE With Better Device Management
Improving QoE With Better Device Management An Incognito white paper Updated April 2015 2015 Incognito Software Systems Inc. All rights reserved. Contents Abstract... 2 Service Provider Challenges... 2
More informationOracle Java CAPS Intelligent Event Processor (IEP) User's Guide
Oracle Java CAPS Intelligent Event Processor (IEP) User's Guide Part No: 8 6 March 0 Copyright 00, 0, Oracle and/or its affiliates. All rights reserved. License Restrictions Warranty/Consequential Damages
More informationA Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum
A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users
More informationPBX Fraud Information
PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks
More informationA web application serving queries on renewable energy sources and energy management topics database, built on JSP technology
International Workshop on Energy Performance and Environmental 1 A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology P.N. Christias
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationHow to Route Internet Traffic between A Mobile Application and IoT Device?
Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup
More informationAn Evaluation of the Advantages of Moving from a VHDL to a UVM Testbench by Shaela Rahman, Baker Hughes
An Evaluation of the Advantages of Moving from a VHDL to a UVM Testbench by Shaela Rahman, Baker Hughes FPGA designs are becoming too large to verify by visually checking waveforms, as the functionality
More informationFastTrack: An Optimized Transit Tracking System for the MBTA
FastTrack: An Optimized Transit Tracking System for the MBTA A Group of 3 MIT Students in 6.033 Contents 1 Introduction 1 2 Data Storage 2 3 Data Collection and Distribution 3 3.1 Location Data........................................
More informationQoS-aware model-driven SOA using SoaML
QoS-aware model-driven SOA using SoaML Niels Schot A thesis submitted for the degree of MSc Computer Science University of Twente EEMCS - TRESE: Software Engineering Group Examination committee: Luís Ferreira
More information