Complex event processing in reactive distributed systems

Size: px
Start display at page:

Download "Complex event processing in reactive distributed systems"

Transcription

1 Complex event processing in reactive distributed systems Ján JANÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, Bratislava, Slovakia 1 Introduction Abstract. Specific to the reactive computing is processing of potentially large volumes of incoming messages or events from various sources. It can be assumed that the number of resources and their diversity will only grow. For that reason we have analyzed common approaches in distributed systems development. We then introduce complex event processing and try to evaluate its assets concerning design, implementation, modifiability and flexibility. For this purpose, we implemented a functional model of an electronic toll collection system, based on system specification for Slovak conditions. Significant flexibility is achieved compared to those of the existing solutions. Thanks to growing computational power, ubiquitous network and the significance of IT in everyday s businesses, distributed systems are one of the most prevalent application types being developed today. Furthermore, as information systems take over more and more responsibility, more and more realtime (or reactive) systems are being developed. A distributed system can be defined as a system consisting of multiple independent (selfcontained) components that communicate with each other and coordinate their activity to achieve certain goal. Self-contained components means that each component has its own control mechanism and system resources. Typically, a distributed system consists of several computers communicating across network. A reactive system is a system that needs to response to changes in conditions (events) in a specific time interval, typically very short. Examples of reactive systems include all types of security and monitoring systems, fraud detection, industrial process controllers, flight operation systems or even a video player software. Logically, as distributed systems consist of more components, its complexity gets bigger as well. Another problem is the everincreasing amount of digital data. Although computational power increases rapidly too, Kenneth Cuckier assumes in an article in The Economist, that by this year Master study programme in field: Information Systems Supervisor: Dr. Ján Lang, Institute of Informatics and Software Engineering, Faculty of Informatics and Information Technologies STU in Bratislava IIT.SRC 2011, Bratislava, May 4, 2011, pp. 1 8.

2 2 UNSPECIFIED FIELD (2011), the amount of information created will exceed available storage more than two times [2]. Information systems, which are being more and more interconnected, now have to process a lot of diverse data. In such conditions, developing a real-time system, which needs to response promptly, without proper efficient technique(s) will in most cases lead to failure. In this paper, we looked at complex event processing (CEP) as a new approach addressing these problems and tried to evaluate its assets in reactive distributed systems design. In section 2 we briefly introduce common approaches in distributed systems design. Section 3 explains the basics of complex event processing. Section 4 explains how we used complex event processing in designing and implementing an electronic toll collection system. Results are mentioned in section 5. 2 Common approaches in distributed systems design Distributed systems first emerged with the development of computer networks. As the development progressed, common techniques for designing and implementing such systems were established. Two interesting concepts gained importance - service oriented architecture and event-driven architecture. 2.1 Service oriented architecture Service oriented architecture is an architectural style, in which functionality is provided by services, which can be discovered and used by clients. Clients and services are thus two main components defined by this architectural style. Service is a software entity which provides some basic or complex functionality to its clients. A client can be any software program, including another service. Other elements specified by SOA are mechanism of message transfering, communication protocol, service registry and others. It is almost a standard to use internet and HTTP protocol for communication, while services are located on different computers, thus creating a distributed system. It is however important to remember that SOA is more about concept and philosophy than about implementation specifics. The main goal of service oriented architecture is to increase reusability of individual components and flexibility and modifiability of large business systems, which were having problems with ever changing requirements, technologies et. al. [3]. It is thus very suitable for system integration. 2.2 Event-driven architecture Most computer systems are based on continuous execution of instructions, which means that the system itself determines what to do next. Event-driven architecture, on the contrary, is an architectural pattern in which system reacts to incoming data, represented by events. David Luckham defines an event as anything that happened or is currently happening [5]. When modeling an event-driven architecture, one has to identify all types of events that can occur in the problem domain. In an event-driven system, real world events are represented by software events. Software events need to have a common structure so they can be automatically processed by machines. Each software event is an instantiation of an event type, which defines what data an event carries. It is an analogy to object oriented programming, with event types standing for classes and (software) events standing for objects. Basic components of an event-driven system are event publishers (or event sources), event consumers and communication channels. Most important characteristics of event-driven architecture are that events are published asynchronously (the publisher does not wait for the consumer to process the previous event) and right after they occur. Main advantage of EDA is loose coupling of components (components don t know about each other). When compared to SOA, event-driven systems are asynchronous, opened to unexpected input, program flow is determined by data and relations between components are M:N (as opposed to SOA, where they are 1:1) [1]. We can see that characteristics of SOA and EDA are complementary and both architectural styles can be well used together.

3 Ján Janík: Complex event processing in reactive distributed systems 3 3 Concepts of complex event processing Complex event processing is one of three general styles of event processing in event-driven architecture (the others being simple event processing and event stream processing). A complex event is created by analyzing and identifying the cause-and-effect relationships among other events, which is done by event correlation and aggregation. In a simplified way, a complex event consists of other events, which can be also complex, thus creating an event hierarchy. Furthermore, time and quantity constraints can be applied to event correlation, which significantly increases the capabilities of CEP. A good example can be an electronic banking system detecting a credit card fraud when two withdrawals from distant places are detected in a short time (short enough to be impossible to get from one place to the other) [6]. In this case, the system registers two events of type Withdrawal, each originating from a different place, that happen over a short period of time. When all of the conditions are met, the system detects a complex event Credit Card Fraud and can automatically carry out any necessary actions, like freezing the account and alerting the bank s employees. Event correlation is conducted by a special software component called event processing engine. Its efficiency is crucial to the whole system, as it must be able to process large amount of data in a very short time. Usability is also critical. CEP engine must provide an easy way to define complex events. Most existing event processing engines provide a specialized language, which is very similar to SQL (an overview of existing CEP engines can be found in [4]). Statements defining complex events contain a SELECT-FROM-WHERE clauses, with the only difference from SQL being that data are not persistent and stored, but processed as they arrive in a data stream. Because complex event processing is part of event-driven architecture, CEP systems have the same characteristics as EDA. The main contribution of CEP is simplification of implementation and efficiency of the system. Complex event processing is used in a range of applications, most notably in business process management, fraud detection systems, monitoring systems (industrial process monitoring, network monitoring, traffic monitoring), algorithmic trading, system integration and others [5]. We focused on the possibilities of utilization of CEP in real-time distributed systems. 4 Application of CEP in electronic toll collection system design We formulated following assumptions about the CEP technology: High modifiability and flexibility of CEP systems. Ability to change the system run-time. Suitable for system integration. Simple implementation (compared to common design and implementation techniques). High efficiency (processing up to tens of thousands of events per second). The goal of our work is to evaluate these assumptions when applied in reactive distributed system design. For this purpose, we decided to implement an electronic toll collection (ETC) system using complex event processing. Such system meets all the requirements: it works in an asynchronous environment, with large amount of data that need to be processed in real time, it should be easily modifiable and integrated with other systems. Another reason why we decided to implement this system is that it is an actual topic not only in Slovakia, but around the world. It is however important to mention that we implemented only a functional model, not the whole system, which exceeds the extent and focus of our work. 4.1 Designing a complex event processing system When designing a CEP system, additional steps must be conducted. First, event sources must be defined. In our functional model, we defined two event sources: on-board units (OBU) and tollgates.

4 4 UNSPECIFIED FIELD The former is a small device installed in clients vehicles, which constantly monitors their location and sends data to server as soon as it detects a transit through a toll road segment. The latter is a static enforcement equipment build along the toll road segments, which can communicate with OBUs of passing vehicles and check if they have OBU set up correctly and running. Second step consists of identifying all the event types in the problem domain. We defined ten event types - three basic, which originate directly from identified sources, and seven complex events. Every event type must have defined what data it carries (more precisely, what data events of this type carry), its source, input condition and what action to execute. Basic event types in proposed tolling system, their sources and data, are showed in table 4.1. Event type (event ID) Event source Data Toll Road Segment Transit (TRST) OBU vehicle ID, segment IT, timestamp Tollgate Vehicle Identified (TVI) Tollgate gate ID, vehicle ID, license number, timestamp Tollgate Vehicle Unidentified (TVU) Tollgate gate ID, license number, timestamp Table 1. Basic event types Toll Road Segment Transit occurs whenever a vehicle passes a toll road segment. In reaction to this event, payment from proper client s account must be carried out. Tollgate Vehicle Identified originates from tollgates and occurs whenever a vehicle passing a tollgate is properly identified, that means the tollgate successfully communicated with the on-board unit of the vehicle. On the contrary, Tollgate Vehicle Unidentified events arise when a vehicle passes a tollgate and the communication with the on-board unit was unsuccessful. In this case, the system should trigger an alarm and notify enforcment department. We will only present one complex event type as an example because mentioning all would exceed the extent of this paper. A good example is the event type Toll Road Transit Unregistered. Events of this type occur when a vehicle passes through a toll road segment, but the back office system receives no data about this fact from the on-board unit of the vehicle. To detect this event by CEP engine, two preconditions must be met: 1. The passing vehicle must be detected. This can be done only by tollgate, therefore a Tollgate Vehicle Identified event must occur first. Moreover, this event says that the vehicle s OBU is up and running and has responded correctly. 2. No data about passing the segment from the OBU are recieved. That means, no Toll Road Segment Transit event (with proper vehicle ID and segment ID) is received in a given time interval. This event can indicate a technical problem, for example a malfunctioning GPRS module of the OBU, but also a potential fraud. In reaction, the system should issue a warning. With all the event sources and event types identified, the system design then continues with usual steps like architecture definition etc. Small portions of the rest of the design and implementation are explained in the next section. 5 Results In this chapter we present the results we reached mainly in the stages of design and implementation.

5 Ján Janík: Complex event processing in reactive distributed systems 5 Figure 1. System architecture without CEP 5.1 Assets of CEP in system design To demonstrate the advantages of complex event processing in system design, we proposed a second system architecture, which does not use CEP, and compared it to the actual architecture of our system. This architecture is displayed in figure 1. There are eight components. Adapter OBU and Adapter Tollgate are software and hardware modules, which are responsible for receiving data from on-board units and tollgates and transforming them into proper format, so they can be processed by the rest of the system. Because there is limited space, we won t explain the purpose of the rest of the components. As virtually all of the components represent individual subsystems, effective and transparent communication is cruicial for the system. We decided to use enterprise service bus to address this requirement and services to implement most of the functionality. This will have a positive impact on the system from several aspects (reusability, flexibility, transparent communication, simplified logic), however, components are still tightly coupled and form a spaghetti achitecture. Consider the following example. When vehicle detects a transit through a toll road, the data flow from OBU Adapter to Monitoring and Billing modules. Both Modules need data from Client Account Administration module. If Monitoring detects something suspicious, it might communicate with external systems and Enforcement. Enforcement might communicate with external systems independently again, and so on. When considering a system that uses CEP, the architecture remains the same, with the only new component being CEP Server, which contains a CEP engine and communication interfaces. Although it is almost the same as the previous architecture, using CEP significantly affects the system behaviour. The data now flow from adapters to CEP Server, where they are processed. The Engine then decides what actions to carry out. For example, if a vehicle passes through a toll road segment, the data are first sent to the engine, which analyzes it and invokes proper services from other modules. The role of the engine is to look at the system as a whole and react to what is happening. The logic is now centralized and simplified, with the only component that needs to know about the others being CEP server. It is obvious that modifying a system with decoupled components and centralized logic is much easier than modifying one with interconnected components and the logic spread across the whole system.

6 6 UNSPECIFIED FIELD 5.2 Assets of CEP in implementation To demonstrate the assets of CEP in implementation, we will show an example of a complex event definition of the complex event specified in section 4.1. SELECT tvi.vehicle_id AS vehicle_id, tvi.gate_id AS gate_id, tvi.timestamp AS timestamp FROM TVI.win:length(1) AS tvi, TRST.win:time(5 sec) AS trst WHERE tvi.vehicle_id!= trst.vehicle_id OR tvi.segment_id!= trst.segment_id This rules compares each Tollgate Vehicle Identified event with a 5 second window of Toll Road Segment Transit events. The complex event is detected if no TRST event that matches TVI s vehicle ID and segment ID occured during the 5 second window. If we should program this functionality in a common programming language, the service processing data from tollgates would have to launch a timer each time it recieves data about a vehicle passing through a tollgate and call another service to check if the OBU did not send data about passing that segment. This is of course very impractial and decreases flexibility. Our assumptions are that CEP might reduce the time needed for implementation a certain functionality up to 5 times. 6 Conclusion In this paper we discussed the application of complex event processing in reactive distributed system design. One of the reasons why we decided to address this issue is that it is a new and interesting concept, yet it has not expanded to its full potential. We tried to evaluate the assets of CEP from several asspects by implementing a functional model of an electronic toll collection system. Despite the fact that our work is not finished, some results were reached already in the stages of design and implementation. Our next goal is to perform a benchmark test of system s performance and conduct a more in-depth analysis of system s modifiability and flexibility, as well as provide a more formal metrics for evaluating the heftiness of implementation. Acknowledgement: This work was partially supported by the Slovak Research and Development Agency under the contract No. APVV References [1] COVINGTON, R. Event-Driven Architecture and SOA: Complimentary Architectures for the Enterprise. [online] December Available at Docs/SIG Meetings/Dec. 05/ pdf [2] CUKIER, K. Data, data everywhere. [online] February 25th, Available at [3] FRONCKOWIAK, J. SOA Best Practices and Design Patterns: Keys To Successful Service- Oriented Architecture Implementation. [online] March 3rd, Available at Best Practices and Design Patterns - Key to Successful Service Oriented Architecture Implementation.pdf [4] CEP Vendors. [online] February 2nd, Available at id=47 [5] LUCKHAM, D. The Power of Events. 5. act. publication. Addison-Wesley, August s. ISBN [6] NEAL, L. Complex-Event Processing Poised for Growth. Computer [online] April, 2009, Volume 42, Issue 4, pp

what do we mean by event processing now, a checklist of capabilities in current event processing tools and applications,

what do we mean by event processing now, a checklist of capabilities in current event processing tools and applications, A View of the Current State of Event Processing what do we mean by event processing now, complex event processing, a checklist of capabilities in current event processing tools and applications, next steps

More information

Introduction in Eventing in SOA Suite 11g

Introduction in Eventing in SOA Suite 11g Introduction in Eventing in SOA Suite 11g Ronald van Luttikhuizen Vennster Utrecht, The Netherlands Keywords: Events, EDA, Oracle SOA Suite 11g, SOA, JMS, AQ, EDN Introduction Services and events are highly

More information

Modeling Systems Using Design Patterns

Modeling Systems Using Design Patterns Modeling Systems Using Design Patterns Jaroslav JAKUBÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia jakubik@fiit.stuba.sk

More information

Modules of Content Management Systems and their Reusability

Modules of Content Management Systems and their Reusability Modules of Content Management Systems and their Reusability Michal JAKUBÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic

More information

COM R. Schulte

COM R. Schulte R. Schulte Research Note 7 July 2003 Commentary Event-Driven Applications: Definition and Taxonomy Simple event-driven applications are becoming widespread in mainstream enterprises. More-powerful complex-event

More information

Interface-based enterprise and software architecture mapping

Interface-based enterprise and software architecture mapping Interface-based enterprise and software architecture mapping Aziz Ahmad Rais Department of Information Technologies University of Economics, Prague Prague, Czech Republic aziz.rais@vse.cz aziz.ahmad.rais@gmail.com

More information

Designing and debugging real-time distributed systems

Designing and debugging real-time distributed systems Designing and debugging real-time distributed systems By Geoff Revill, RTI This article identifies the issues of real-time distributed system development and discusses how development platforms and tools

More information

webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse

webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse December 2008 webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse By Chris Pottinger, Sr. Manager Product Development, and Juergen Lind, Sr. Product

More information

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data

Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data Losing Control: Controls, Risks, Governance, and Stewardship of Enterprise Data an eprentise white paper tel: 407.591.4950 toll-free: 1.888.943.5363 web: www.eprentise.com Author: Helene Abrams www.eprentise.com

More information

Caching Spreading Activation Search

Caching Spreading Activation Search Caching Spreading Activation Search Ján SUCHAL Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia suchal@fiit.stuba.sk Abstract.Spreading

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

CS4514 Real-Time Systems and Modeling

CS4514 Real-Time Systems and Modeling CS4514 Real-Time Systems and Modeling Fall 2015 José M. Garrido Department of Computer Science College of Computing and Software Engineering Kennesaw State University Real-Time Systems RTS are computer

More information

Client-server Basics. 1. Motivation

Client-server Basics. 1. Motivation Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices

More information

Privacy Policy. Effective date: 21 May 2018

Privacy Policy. Effective date: 21 May 2018 Privacy Policy Effective date: 21 May 2018 We at Meetingbird know you care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn

More information

TIBCO Complex Event Processing Evaluation Guide

TIBCO Complex Event Processing Evaluation Guide TIBCO Complex Event Processing Evaluation Guide This document provides a guide to evaluating CEP technologies. http://www.tibco.com Global Headquarters 3303 Hillview Avenue Palo Alto, CA 94304 Tel: +1

More information

Chapter 8 Web Services Objectives

Chapter 8 Web Services Objectives Chapter 8 Web Services Objectives Describe the Web services approach to the Service- Oriented Architecture concept Describe the WSDL specification and how it is used to define Web services Describe the

More information

Universal Communication Component on Symbian Series60 Platform

Universal Communication Component on Symbian Series60 Platform Universal Communication Component on Symbian Series60 Platform Róbert Kereskényi, Bertalan Forstner, Hassan Charaf Department of Automation and Applied Informatics Budapest University of Technology and

More information

CS 307: Software Engineering. Lecture 10: Software Design and Architecture

CS 307: Software Engineering. Lecture 10: Software Design and Architecture CS 307: Software Engineering Lecture 10: Software Design and Architecture Prof. Jeff Turkstra 2017 Dr. Jeffrey A. Turkstra 1 Announcements Discuss your product backlog in person or via email by Today Office

More information

Enabling industry 4.0 Event-driven architectures and smart micro services

Enabling industry 4.0 Event-driven architectures and smart micro services Enabling industry 4.0 Event-driven architectures and smart micro services Dr., Systems and control, Chalmers Chalmers, Automation +46 (0)768 979561 Kristofer.bengtsson@chalmers.se The key to industry 4.0

More information

Programming Without a Call Stack: Event-driven Architectures

Programming Without a Call Stack: Event-driven Architectures Programming Without a Call Stack: Event-driven Architectures Gregor Hohpe Google www.eaipatterns.com Gregor Hohpe Programming Without a Call Stack: Event-driven Architectures Slide 1 About Me Distributed

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

Extension Course Introduction to Process Automation Version 9.0

Extension Course Introduction to Process Automation Version 9.0 Extension Course -9005 Introduction to Process Automation Version 9.0 Information in this document is subject to change without notice and does not represent a commitment on the part of Technical Difference,

More information

Concept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities

Concept White Paper. Concepts for Proposed Content of Eventual Standard(s) for Project : Real-Time Monitoring and Analysis Capabilities Concept White Paper Concepts for Proposed Content of Eventual Standard(s) for Project 2009-02: Real-Time Monitoring and Analysis Capabilities Real-time Monitoring and Analysis Capabilities Standard Drafting

More information

Amit. Amit - Active Middleware. Technology Overview. IBM Research Lab in Haifa Active Technologies October 2002

Amit. Amit - Active Middleware. Technology Overview. IBM Research Lab in Haifa Active Technologies October 2002 Amit Amit - Active Middleware Technology Overview IBM Research Lab in Haifa Active Technologies October 2002 OUTLINE: The Active Technologies Amit Active Middleware Technology Related Active Management

More information

APM. Object Monitor. Object Lab. Richard Hayton & Scarlet Schwiderski

APM. Object Monitor. Object Lab. Richard Hayton & Scarlet Schwiderski APM POSEIDON HOUSE CASTLE PARK CAMBRIDGE CB3 0RD UNITED KINGDOM +44 1223 515010 Fax +44 1223 359779 Email: apm@ansa.co.uk URL: http://www.ansa.co.uk Object Lab Object Monitor Richard Hayton & Scarlet Schwiderski

More information

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases

AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf

More information

Complex or Simple Event Processing by David Luckham

Complex or Simple Event Processing by David Luckham Complex or Simple Event Processing by David Luckham Some people, I m told, get scared when they hear the word complex, as in Complex Event Processing (CEP). They want to hear simple event processing or

More information

The Open Group SOA Ontology Technical Standard. Clive Hatton

The Open Group SOA Ontology Technical Standard. Clive Hatton The Open Group SOA Ontology Technical Standard Clive Hatton The Open Group Releases SOA Ontology Standard To Increase SOA Adoption and Success Rates Ontology Fosters Common Understanding of SOA Concepts

More information

Web Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics

Web Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2014.02.28 2014.02.28 Valdas Rapševičius. Java Technologies 1 Outline Introduction to SOA SOA Concepts:

More information

OPC DataHub Offers Advanced Tunnelling of Process Data

OPC DataHub Offers Advanced Tunnelling of Process Data OPC DataHub Offers Advanced Tunnelling of Process Data By Paul Benford and Robert McIlvride, Cogent Real-Time Systems Inc. & Colin Winchester, Software Toolbox, Inc. In today s process control environment,

More information

UMP Alert Engine. Status. Requirements

UMP Alert Engine. Status. Requirements UMP Alert Engine Status Requirements Goal Terms Proposed Design High Level Diagram Alert Engine Topology Stream Receiver Stream Router Policy Evaluator Alert Publisher Alert Topology Detail Diagram Alert

More information

Chapter 2 Distributed Computing Infrastructure

Chapter 2 Distributed Computing Infrastructure Slide 2.1 Web Serv vices: Princ ciples & Te echno ology Chapter 2 Distributed Computing Infrastructure Mike P. Papazoglou mikep@uvt.nl Slide 2.2 Topics Distributed computing and Internet protocols The

More information

Complex Event Processing A brief overview

Complex Event Processing A brief overview Complex Event Processing A brief overview Dávid István davidi@inf.mit.bme.hu Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Event Key concepts o An immutable

More information

FAQ (Basic) Sybase CEP Option R4

FAQ (Basic) Sybase CEP Option R4 FAQ (Basic) Sybase CEP Option R4 DOCUMENT ID: DC01023-01-0400-01 LAST REVISED: February 2010 Copyright 2010 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and to any

More information

Web Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics

Web Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2015.02.19 Outline Introduction to SOA SOA Concepts: Services Loose Coupling Infrastructure SOA Layers

More information

Happy Birthday, Ajax4jsf! A Progress Report

Happy Birthday, Ajax4jsf! A Progress Report Happy Birthday, Ajax4jsf! A Progress Report By Max Katz, Senior Systems Engineer, Exadel Ajax4jsf is turning one soon and what a year it will have been. It was an amazing ride for all of us here at Exadel.

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,

More information

OPC DataHub Offers Advanced Tunnelling of Process Data

OPC DataHub Offers Advanced Tunnelling of Process Data OPC DataHub Offers Advanced Tunnelling of Process Data By Paul Benford and Robert McIlvride, Cogent Real-Time Systems Inc. & Colin Winchester, Software Toolbox, Inc. In today s process control environment,

More information

XVIII. Software Architectures

XVIII. Software Architectures XVIII. Software Architectures Software Architectures UML Packages Client-Server vs Peer-to-Peer 3-Tier and 4-Tier Architectures Horizontal Layers and Vertical Partitions The Model-View-Controller Architecture

More information

An Introduction to Software Architecture. David Garlan & Mary Shaw 94

An Introduction to Software Architecture. David Garlan & Mary Shaw 94 An Introduction to Software Architecture David Garlan & Mary Shaw 94 Motivation Motivation An increase in (system) size and complexity structural issues communication (type, protocol) synchronization data

More information

Improving Adaptive Hypermedia by Adding Semantics

Improving Adaptive Hypermedia by Adding Semantics Improving Adaptive Hypermedia by Adding Semantics Anton ANDREJKO Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic andrejko@fiit.stuba.sk

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

20. Business Process Analysis (2)

20. Business Process Analysis (2) 20. Business Process Analysis (2) DE + IA (INFO 243) - 31 March 2008 Bob Glushko 1 of 38 3/31/2008 8:00 AM Plan for Today's Class Process Patterns at Different Levels in the "Abstraction Hierarchy" Control

More information

PANEL Streams vs Rules vs Subscriptions: System and Language Issues. The Case for Rules. Paul Vincent TIBCO Software Inc.

PANEL Streams vs Rules vs Subscriptions: System and Language Issues. The Case for Rules. Paul Vincent TIBCO Software Inc. PANEL Streams vs Rules vs Subscriptions: System and Language Issues The Case for Rules Paul Vincent TIBCO Software Inc. Rules, rules, everywhere Data aquisition Data processing Workflow Data relationships

More information

OBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis

OBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis UNIT I INTRODUCTION OBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis Design Implementation Testing Maintenance

More information

OPC DataHub Offers Advanced Tunnelling of Process Data

OPC DataHub Offers Advanced Tunnelling of Process Data OPC DataHub Offers Advanced Tunnelling of Process Data By Paul Benford and Robert McIlvride, Cogent Real-Time Systems Inc. & Colin Winchester, Software Toolbox, Inc. In today s process control environment,

More information

Enn Õunapuu

Enn Õunapuu Asünkroonsed teenused Enn Õunapuu enn.ounapuu@ttu.ee Määrang Asynchronous processing enables methods to return immediately without blocking on the calling thread. Consumers request asynchronous processing

More information

Integrating Systems with Event Driven Architecture. Eoin Woods

Integrating Systems with Event Driven Architecture. Eoin Woods Integrating Systems with Event Driven Architecture Eoin Woods www.eoinwoods.info About Me Software architect at UBS Investment Bank responsible for synthetic equity platform Software architect for ~10

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

Esper. Luca Montanari. MIDLAB. Middleware Laboratory

Esper. Luca Montanari. MIDLAB. Middleware Laboratory Esper Luca Montanari montanari@dis.uniroma1.it Esper Open Source CEP and ESP engine Available for Java as Esper, for.net as NEsper Developed by Codehaus http://esper.codehaus.org/ (write esper complex

More information

USING DATA MODEL PATTERNS FOR RAPID APPLICATIONS DEVELOPMENT

USING DATA MODEL PATTERNS FOR RAPID APPLICATIONS DEVELOPMENT USING DATA MODEL PATTERNS FOR RAPID APPLICATIONS DEVELOPMENT David C. Hay Essential Strategies, Inc. :+$7$5('$7$02'(/3$77(516" The book Data Model Patterns: Conventions Thought 1 presents a set standard

More information

Shaw Privacy Policy. 1- Our commitment to you

Shaw Privacy Policy. 1- Our commitment to you Privacy Policy last revised on: Sept 16, 2016 Shaw Privacy Policy If you have any questions regarding Shaw s Privacy Policy please contact: privacy@shaw.ca or use the contact information shown on any of

More information

Object-Oriented Design

Object-Oriented Design Object-Oriented Design Lecture 14: Design Workflow Department of Computer Engineering Sharif University of Technology 1 UP iterations and workflow Workflows Requirements Analysis Phases Inception Elaboration

More information

Workflow Modeling for Implementing Complex, CAD-Based, Design Methodologies

Workflow Modeling for Implementing Complex, CAD-Based, Design Methodologies Workflow Modeling for Implementing Complex, CAD-Based, Design Methodologies J. Stavash and J. Wedgwood M. Forte Lockheed Martin Advanced Technology Laboratories Rockwell International Corporation Camden,

More information

NMCS2 MIDAS Outstation Algorithm Specification

NMCS2 MIDAS Outstation Algorithm Specification traffic systems and signing TR 2177 Issue H NMCS2 MIDAS Outstation Algorithm Specification Crown Copyright 2009 First published 1994 Printed and published by the Highways Agency Page 1 NOTE: This document

More information

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold. T0/06-6 revision 0 Date: March 0, 2006 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular documentation

More information

Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux

Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux Kernel Korner AEM: A Scalable and Native Event Mechanism for Linux Give your application the ability to register callbacks with the kernel. by Frédéric Rossi In a previous article [ An Event Mechanism

More information

1 Software Architecture

1 Software Architecture Some buzzwords and acronyms for today Software architecture Design pattern Separation of concerns Single responsibility principle Keep it simple, stupid (KISS) Don t repeat yourself (DRY) Don t talk to

More information

SonarJ White Paper. Sonar stands for Software and Architecture. It is meant to support software developers and architects in their daily work.

SonarJ White Paper. Sonar stands for Software and Architecture. It is meant to support software developers and architects in their daily work. SonarJ White Paper Sonar stands for Software and Architecture. It is meant to support software developers and architects in their daily work. Software over its lifecycle needs to be changed, adapted, enhanced

More information

Service-Oriented Architecture

Service-Oriented Architecture Service-Oriented Architecture The Service Oriented Society Imagine if we had to do everything we need to get done by ourselves? From Craftsmen to Service Providers Our society has become what it is today

More information

Event Metamodel and Profile (EMP) Proposed RFP Updated Sept, 2007

Event Metamodel and Profile (EMP) Proposed RFP Updated Sept, 2007 Event Metamodel and Profile (EMP) Proposed RFP Updated Sept, 2007 Robert Covington, CTO 8425 woodfield crossing boulevard suite 345 indianapolis in 46240 317.252.2636 Motivation for this proposed RFP 1.

More information

SIEM Solutions from McAfee

SIEM Solutions from McAfee SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an

More information

Complexity Analysis of Routing Algorithms in Computer Networks

Complexity Analysis of Routing Algorithms in Computer Networks Complexity Analysis of Routing Algorithms in Computer Networks Peter BARTALOS Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 84 6 Bratislava, Slovakia

More information

2010 Online Banking Security Survey:

2010 Online Banking Security Survey: 2010 Online Banking Security Survey: ZeuS-Like Malware Rapidly Outpaces All Other Online Banking Threats PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536

More information

Credit where Credit is Due. Goals for this Lecture. Introduction to Design

Credit where Credit is Due. Goals for this Lecture. Introduction to Design Credit where Credit is Due Lecture 17: Intro. to Design (Part 1) Kenneth M. Anderson Object-Oriented Analysis and Design CSCI 6448 - Spring Semester, 2002 Some material presented in this lecture is taken

More information

Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations

Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations Virginia Department of Transportation Hampton Roads Bridge-Tunnel Action Plan Implementing the Independent Review Panel Recommendations Initial Panel Charge August 2009 To review existing policies and

More information

Strategy for information security in Sweden

Strategy for information security in Sweden Strategy for information security in Sweden 2010 2015 STRATEGY FOR SOCIETAL INFORMATION SECURITY 2010 2015 1 Foreword In today s information society, we process, store, communicate and duplicate information

More information

Protecting Your SaaS Investment: Monitoring Office 365 Performance

Protecting Your SaaS Investment: Monitoring Office 365 Performance Protecting Your SaaS Investment: Monitoring Office 365 Performance Utilizing the ExtraHop platform to ensure high performance from your Office 365 applications Achieving Higher Productivity and Business

More information

Unified management of heterogeneous sensors for complex event processing

Unified management of heterogeneous sensors for complex event processing Risk Analysis VI 445 Unified management of heterogeneous sensors for complex event processing M. Valdés, I. Nieto, V. Guardiola, D. Gil & A. Gómez-Skarmeta University of Murcia, Spain Abstract The turn

More information

Prog. Logic Devices Schematic-Based Design Flows CMPE 415. Designer could access symbols for logic gates and functions from a library.

Prog. Logic Devices Schematic-Based Design Flows CMPE 415. Designer could access symbols for logic gates and functions from a library. Schematic-Based Design Flows Early schematic-driven ASIC flow Designer could access symbols for logic gates and functions from a library. Simulator would use a corresponding library with logic functionality

More information

Application Architectures, Design Patterns

Application Architectures, Design Patterns Application Architectures, Design Patterns Martin Ledvinka martin.ledvinka@fel.cvut.cz Winter Term 2017 Martin Ledvinka (martin.ledvinka@fel.cvut.cz) Application Architectures, Design Patterns Winter Term

More information

A Messaging-Based Integration Architecture for Print Production Workflow Systems

A Messaging-Based Integration Architecture for Print Production Workflow Systems A Messaging-Based Integration Architecture for Print Production Workflow Systems Claes Buckwalter Digital Media, ITN, Linköping University, Sweden Abstract A print production workflow consists of a number

More information

Designing Issues For Distributed Computing System: An Empirical View

Designing Issues For Distributed Computing System: An Empirical View ISSN: 2278 0211 (Online) Designing Issues For Distributed Computing System: An Empirical View Dr. S.K Gandhi, Research Guide Department of Computer Science & Engineering, AISECT University, Bhopal (M.P),

More information

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold. T0/04-023 revision 2 Date: September 06, 2005 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular

More information

Comprehensive Guide to Evaluating Event Stream Processing Engines

Comprehensive Guide to Evaluating Event Stream Processing Engines Comprehensive Guide to Evaluating Event Stream Processing Engines i Copyright 2006 Coral8, Inc. All rights reserved worldwide. Worldwide Headquarters: Coral8, Inc. 82 Pioneer Way, Suite 106 Mountain View,

More information

Legal framework of ensuring of cyber security in the Republic of Azerbaijan

Legal framework of ensuring of cyber security in the Republic of Azerbaijan Legal framework of ensuring of cyber security in the Republic of Azerbaijan Bakhtiyar N.Mammadov Ministry of Communications and Information Technologies Head of Legal and HR Department ITU WSIS Thematic

More information

Legacy Transaction Integration TM In a Service-oriented Architecture (SOA)

Legacy Transaction Integration TM In a Service-oriented Architecture (SOA) November 2003 Legacy Transaction Integration TM In a Service-oriented Architecture (SOA) Introduction Over the next year or so, every serious IT analyst and software vendor will figuratively jump upon

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

CAS 703 Software Design

CAS 703 Software Design Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction

More information

ENTERPRISE SUBSCRIBER GUIDE

ENTERPRISE SUBSCRIBER GUIDE ENTERPRISE SUBSCRIBER GUIDE Enterprise Subscriber Guide 880 Montclair Road Suite 400 Birmingham, AL 353 www. TABLE OF CONTENTS Table of Contents Introduction...6 Logging In...6 Navigation Bar, Sub-Menu

More information

2 Background: Service Oriented Network Architectures

2 Background: Service Oriented Network Architectures 2 Background: Service Oriented Network Architectures Most of the issues in the Internet arise because of inflexibility and rigidness attributes of the network architecture, which is built upon a protocol

More information

Issues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan

Issues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan Issues, lessons learned through the eyes of JPCERT/CC on the vulnerability handling framework in Japan Masaki Kubo, Takayuki Uchiyama JPCERT Coordination Center Vulnerability Coordination Group Agenda

More information

Network Tester: A Generation and Evaluation of Diagnostic Communication in IP Networks

Network Tester: A Generation and Evaluation of Diagnostic Communication in IP Networks 2018IEEE.Personaluseofthismaterialispermitted.PermissionfromIEEEmustbeobtainedforallotheruses,inanycurrent or future media, including reprinting/republishing this material for advertising or promotional

More information

Networking for a dynamic infrastructure: getting it right.

Networking for a dynamic infrastructure: getting it right. IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for

More information

Architectural Styles I

Architectural Styles I Architectural Styles I Software Architecture VO/KU (707023/707024) Roman Kern KTI, TU Graz 2015-01-07 Roman Kern (KTI, TU Graz) Architectural Styles I 2015-01-07 1 / 86 Outline 1 Non-Functional Concepts

More information

Application Oriented Networks: An SOA Perspective

Application Oriented Networks: An SOA Perspective Oriented s: An SOA Perspective www.thbs.com Introduction Service Oriented Architecture is the hot topic of discussion in IT circles today. So much so, in fact, that SOA is being seen by many as the future

More information

INTERNATIONAL TELECOMMUNICATION UNION. SPECIFICATIONS OF SIGNALLING SYSTEM No. 7

INTERNATIONAL TELECOMMUNICATION UNION. SPECIFICATIONS OF SIGNALLING SYSTEM No. 7 INTERNATIONAL TELECOMMUNICATION UNION Q.74 TELECOMMUNICATION (0/9) STANDARDIZATION SECTOR OF ITU SPECIFICATIONS OF SIGNALLING SYSTEM. 7 SIGNALLING SYSTEM. 7 SIGNALLING CONNECTION CONTROL PART PROCEDURES

More information

Variables and Data Representation

Variables and Data Representation You will recall that a computer program is a set of instructions that tell a computer how to transform a given set of input into a specific output. Any program, procedural, event driven or object oriented

More information

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application Out of the Fog: Use Case Scenarios Industry Application Smart Cities Visual Security & Surveillance 0 Executive Summary Surveillance and security cameras are being deployed worldwide in record numbers

More information

Influence of Design Patterns Application on Quality of IT Solutions

Influence of Design Patterns Application on Quality of IT Solutions Influence of Design Patterns Application on Quality of IT Solutions NADINA ZAIMOVIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo

More information

Improving QoE With Better Device Management

Improving QoE With Better Device Management Improving QoE With Better Device Management An Incognito white paper Updated April 2015 2015 Incognito Software Systems Inc. All rights reserved. Contents Abstract... 2 Service Provider Challenges... 2

More information

Oracle Java CAPS Intelligent Event Processor (IEP) User's Guide

Oracle Java CAPS Intelligent Event Processor (IEP) User's Guide Oracle Java CAPS Intelligent Event Processor (IEP) User's Guide Part No: 8 6 March 0 Copyright 00, 0, Oracle and/or its affiliates. All rights reserved. License Restrictions Warranty/Consequential Damages

More information

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud David Linthicum A Better Approach to Leveraging an OpenStack Private Cloud 1 Executive Summary The latest bi-annual survey data of OpenStack users

More information

PBX Fraud Information

PBX Fraud Information PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks

More information

A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology

A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology International Workshop on Energy Performance and Environmental 1 A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology P.N. Christias

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

How to Route Internet Traffic between A Mobile Application and IoT Device?

How to Route Internet Traffic between A Mobile Application and IoT Device? Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup

More information

An Evaluation of the Advantages of Moving from a VHDL to a UVM Testbench by Shaela Rahman, Baker Hughes

An Evaluation of the Advantages of Moving from a VHDL to a UVM Testbench by Shaela Rahman, Baker Hughes An Evaluation of the Advantages of Moving from a VHDL to a UVM Testbench by Shaela Rahman, Baker Hughes FPGA designs are becoming too large to verify by visually checking waveforms, as the functionality

More information

FastTrack: An Optimized Transit Tracking System for the MBTA

FastTrack: An Optimized Transit Tracking System for the MBTA FastTrack: An Optimized Transit Tracking System for the MBTA A Group of 3 MIT Students in 6.033 Contents 1 Introduction 1 2 Data Storage 2 3 Data Collection and Distribution 3 3.1 Location Data........................................

More information

QoS-aware model-driven SOA using SoaML

QoS-aware model-driven SOA using SoaML QoS-aware model-driven SOA using SoaML Niels Schot A thesis submitted for the degree of MSc Computer Science University of Twente EEMCS - TRESE: Software Engineering Group Examination committee: Luís Ferreira

More information