LCCI (Large-scale Complex Critical Infrastructures)
|
|
- Griffin Ferguson
- 6 years ago
- Views:
Transcription
1
2 LCCI (Large-scale Complex Critical Infrastructures) 1 LCCIs are Internet-scale constellations of heterogeneous systems glued together into a federated and open system by a data distribution middleware. The shift towards Internet is considered a necessary step to overcome the limitations of the monolithic and closed architectures used traditionally to build critical systems (e.g., SCADA architectures). Real world example is the novel framework for Air Traffic Management (ATM) that EuroCONTROL is developing within the SESAR EU Joint Undertaking.
3 LCCI (Large-scale Complex Critical Infrastructures) 2 New challenges rise from LCCIs that push the frontiers of current technologies. Data distribution task becomes crucial and has to be: Reliability: deliveries have to be guaranteed despite failures may happen; Timeliness: messages must reach their destinations at the right time, without breaking temporal constraints; Scalability: performance is affected neither by the time nor by the LCCI size. The challenge is to find the best data distribution paradigm able to meet the aforementioned requirements.
4 Outline of SWIM concept 3 SWIM (System Wide Information Management) aims to establish a seamless interoperability among heterogeneous ATM stakeholders: common data representation; coherent view on current ATM information (e.g. Flight Data, Aeronautical Data, Weather). It may be seen as a common data/service bus on which systems having to interoperate are connected. Close in spirit to a middleware solution for LCCI.
5 SWIM prototype 4 The prototype (named SWIM-BOX ) has been conceived as a sort of Gateway/Mediator across legacy applications: Completely distributed architecture; Designed using a domain based approach (Flight, Surveillance, etc); Implemented using a standard based approach; Well known data and information models (e.g. ICOG2); Standard technologies (Web Services, EJB, DDS); DDS-compliant middleware for sharing data. Legacy A SWIM- BOX SWIM Network SWIM- BOX Legacy B Adapte r A Adapte r B Legacy site Common Infrastructure Legacy site
6 Some challenges 5 How subsystems (as COTS) involved into LCCI impacts on its dependability? What are the effects on LCCI if DDS-compliant middleware is invoked with erroneous inputs? Robustness testing provides answers to these questions: Help vendors evaluating their implementations; Help clients selecting several solutions. Tests cost reduction automating tests procedure. Automating tests results classification.
7 Our goal Assessing the robustness middleware What does robustness mean? 6 of DDS-compliant The degree to which a system operates correctly in the presence of exceptional inputs or stressful environmental conditions [IEEE Std ]. Dependability with respect to external faults, which characterizes a system reaction to a specific class of faults [Avizienis 04]. Robustness testing features: Only the system interface has to be known; Source code is not needed (black-box approach); Injecting exceptional input through API; Do not alter data and structure" internally; Select carefully inputs and stressful conditions that cause the activation of faults representative of actual situations.
8 Robustness Testing Approaches 7 Robustness testing: stressing the public interface of the application/system/api with invalid and exceptional values: From Application To System Under Test (Top-Down); From OS to System Under Test (Bottom-UP). API called with exceptional values Application DDS Middleware OS syscall Operating System OS return with exceptional values
9 Robustness Testing Approaches 8 Robustness testing: stressing the public interface of the application/system/api with invalid and exceptional values: From Application To System Under Test (Top-Down); From OS to System Under Test (Bottom-UP). API called with exceptional values Application DDS Middleware OS syscall Operating System OS return with exceptional values
10 Robustness Testing Approaches 9 Robustness testing: stressing the public interface of the application/system/api with invalid and exceptional values: From Application To System Under Test (Top-Down); From OS to System Under Test (Bottom-UP). Workload stands for a set of valid calls. It s needed to stress each operation of the device under test. Fault model is a set of rules applied at API to expose robustness problems. Failure mode classification characterizes the behavior of the system under test while executing the workload in the presence of fault model.
11 Fault Injection: WWW dilemma 10 What to inject? Fault model -> Fault List Where to inject? At API interface level Method with higher occurrences (Method list) When to inject? At only one invocation of methods (Trigger list) Injection library Fault list Method list Trigger List Fault, Model and Trigger lists define our Injection library
12 Faults list 11 The rules list applied during the API invocation: Each method input is tested with all robustness values one for time. E.g., void replace(int a, String b).
13 Method list 12 Profiling different applications using DDScompliant middleware product: Ping-pong application; Touchstone: benchmarking framework for evaluating the performance of OMG DDS compliant implementations; SWIM-BOX. The methods occurrences have been measured for each applications: Only a limited set core of all available methods are invoked; The same occurrences distribution is noted for all applications Method list involved the methods with higher occurrences.
14 Failure mode classification 13 CRASH scale has been utilized to classify the robustness problems Catastrophic: node crashes and OS hangs, DDS provider do not deliver messages correctly. Restart: DDS provider becomes unresponsive and must be terminated by force. Abort: Abnormal termination when invoking API. Silent: Faulty submitted value doesn t rise exceptions, despite this message are or aren t transmitted. Hindering: returned error code is incorrect. Further and suitable levels have been added: non conformity: fault is not indicated as should be. DDS API analysis has been performed for results classification. Golden run has been run for each injecting value to understand the system behavior.
15 Test automation: JFault Injection Tool (JFIT) 14 Pros: Cons: Java-based implementation; No knowledge about the SUT; Run-time methods interception and values mutation: Exploiting java reflection; Monitoring status and output of the SUT. Only methods with primitive types (i.e. String, int, ) are taken into account; Off line and by hand results classification.
16 High level architecture of JFIT 15 All robustness test are carried out according with the Injection library; Controller is in charge for tests management and runs them through the Activator; Interceptor catches the methods invocation to SUT and injects, by Injector, the faults one for time Monitor records the output at Pub and Sub side. MONITOR CONTROLLER ACTIVATOR System Under Test INTERCEPTO R INJECTOR
17 Test execution stages 16 Preliminary execution of the workload without faults To understand the normal behavior Starting robustness testing DDS initialitation Workload execution Monitoring & Logging Injection phase Golden run One fault for time No faults are injected
18 Tests Results DDS middleware: OpenSplice implementation; No QoS features have been defined (Best Effort); 17 According with the failure mode classification the achieved results are as follows: no Catastrophic, Abort and Hindering problems have been evidenced: Neither node crashes and nor OS hangs; No abnormal termination when invoking API; No erroneous returned error code. 13% of robustness tests have shown Restart problems: Experiment doesn t response and must be terminated by force. 45% of robustness tests have risen Silent problems: No exception has been thrown by DDS;
19 Tests Results Faults distribution between Silent and Restart. Int faults types String faults types 18 Faults types
20 Conclusions 19 Our approach can automatically test the core set of DDS methods; A significant fraction of tests shows some robustness issues raised when exceptional values are submitted to OpenSplice APIs (e.g., large strings, or big integers); The ability to reach a consistent system state before performing fault injection makes us confident of the results.
21 Conclusions 20 Our approach can automatically test the core set of DDS methods; A significant fraction of tests shows some robustness issues raised when exceptional values are submitted to OpenSplice APIs (e.g., large strings, or big integers); The ability to reach a consistent system state before performing fault injection makes us confident of the results. Ongoing activities Testing all parameters types and not only primitive types; Automating results classification; Running tests in presence of quality of service mechanisms; Carrying out the same tests with other DDS-compliant middleware.
22 References 21 [Avizienis 04] A. Avizienis, J.C. Laprie, B. Randell, C. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. Dependable Secure Computing, [Koopman 02] P. Koopman. What's Wrong With Fault Injection As A Benchmarking Tool?. in Proc. DSN 2002 Workshop on Dependability Benchmarking, pp. F , Washington, D.C.,USA, [Koopman 99] Koopman P., DeVale J., Comparing the robustness of POSIX operating, Proceedings of Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing, [Johansson 07] Johansson A., Suri N., Murphy B. On the selection of Error models for OS Robustness Evaluation Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, [Miller 95] B.P. Miller et al, Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities., Technical report, 1995.
23 22
24 23 Test Scenario A receiver is waiting for messages The Transmitter sends burst of messages for a while then terminates Further details JFIT DDS middleware: OpenSplice implementation No QoS features have been defined (Best Effort) A P I in te rc e p to r A P I in je c to r Mo nito rin g Mo n ito rin g JFIT
25 Pub/Sub paradigm 24 Pub/Sub reveals effective to federate heterogeneous systems Space, time and synchronization decoupling enforce scalability Asynchronous multi-point communication good to devise cooperating systems HERALD CORBA NS GREEN JEDI HERMES SIENA DREAM JMS Among the plethora of Pub/Sub alternatives DDS exhibits better performances, higher scalability and larger set of offered QoS Widely used in large scope initiatives addressing wide area scenarios E.g., it has been investigating as the data distribution system into SESAR project through SWIM middleware infrastructure
Data Consistency with SPLICE Middleware. Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division
Data Consistency with SPLICE Middleware Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division Slide 1 6/30/2005 Background! US Navy Combat Systems are evolving to distributed systems
More informationCOMPARING ROBUSTNESS OF AIS-BASED MIDDLEWARE IMPLEMENTATIONS
COMPARING ROBUSTNESS OF AIS-BASED MIDDLEWARE IMPLEMENTATIONS ZOLTÁN MICSKEI, ISTVÁN MAJZIK Department of Measurement and Information Systems Budapest University of Technology and Economics, Magyar Tudósok
More informationRobusTest: Towards a Framework for Automated Testing of Robustness in Software
RobusTest: Towards a Framework for Automated Testing of Robustness in Software Ali Shahrokni, Robert Feldt Department of Computer Science and Engineering Chalmers University of Technology Gothenburg, Sweden
More informationFault Injection Seminar
Fault Injection Seminar Summer Semester 2015 Daniel Richter, Lena Herscheid, Prof. Andreas Polze Operating Systems and Middleware Group Hasso Plattner Institute 23/04/2015 Fault Injection Seminar 1 Dependability
More informationEuropean Sky ATM Research (SESAR) [5][6] in Europe both consider the implementation of SWIM as a fundamental element for future ATM systems.
(FIXM) and the weather information exchange model 1. INTRODUCTION With the rapid increase in local and global air traffic, the system-wide operational information exchange and life-cycle management technologies
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationVortex OpenSplice. Python DDS Binding
Vortex OpenSplice Python DDS Binding ist.adlinktech.com 2018 Table of Contents 1. Background... 3 2. Why Python DDS Binding is a Big Deal... 4 2 1. Background 1.1 Python Python Software Foundation s Python
More informationDDS Interoperability in SWIM
DDS Interoperability in SWIM OMG Real Time and Embedded Workshop Paris - April 17 th, 2012 Outline SWIM a key enabler of future ATM SWIM thread within SESAR SWIM FO/IOP Profile Interaction Patterns SWIM
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is
More information02 - Distributed Systems
02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is
More informationSoftware Robustness Testing Service
Software Robustness Testing Service http://www.ices.cmu.edu/ballista John P. DeVale devale@cmu.edu - (412) 268-4264 - http://www.ece.cmu.edu/~jdevale,qvwlwxwh IRU &RPSOH[ (QJLQHHUHG 6\VWHPV Overview: Ballista
More informationBallista Design and Methodology
Ballista Design and Methodology October 1997 Philip Koopman Institute for Complex Engineered Systems Carnegie Mellon University Hamershlag Hall D-202 Pittsburgh, PA 15213 koopman@cmu.edu (412) 268-5225
More informationMiddleware Mediated Transactions & Conditional Messaging
Middleware Mediated Transactions & Conditional Messaging Expert Topic Report ECE1770 Spring 2003 Submitted by: Tim Chen John C Wu To: Prof Jacobsen Date: Apr 06, 2003 Electrical and Computer Engineering
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline
More informationBuilding High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways
Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways A PrismTech Product Line OMG's First Software Assurance Workshop: Working Together for
More informationVortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D.
Vortex Whitepaper Intelligent Data Sharing for the Business-Critical Internet of Things Version 1.1 June 2014 Angelo Corsaro Ph.D., CTO, PrismTech Vortex Whitepaper Version 1.1 June 2014 Table of Contents
More informationFailure analysis of an ORB in presence of faults
DSoS Failure analysis of an ORB in presence of faults Report Version: Deliverable IC3 Report Preparation Date: 1 October 2001 Classification: Public Circulation Contract Start Date: 1 April 2000 Duration:
More informationRobustness Testing of Autonomy Software
Robustness Testing of Autonomy Software Milda Zizyte, PhD Candidate advised by Dr. Philip Koopman, ECE dept. Casidhe Hutchison, Milda Zizyte, Patrick E. Lanigan, David Guttendorf, Michael Wagner, Claire
More informationToday: Distributed Middleware. Middleware
Today: Distributed Middleware Middleware concepts Case study: CORBA Lecture 24, page 1 Middleware Software layer between application and the OS Provides useful services to the application Abstracts out
More informationChapter 2 System Models
CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical
More informationDesigning High Performance IEC61499 Applications on Top of DDS
ETFA2013 4th 4DIAC Users Workshop Designing High Performance IEC61499 Applications on Top of DDS Industrial communications Complex Different solutions at the different layers Fieldbus at bottom layers:
More informationMiddleware for Embedded Adaptive Dependability (MEAD)
Middleware for Embedded Adaptive Dependability (MEAD) Real-Time Fault-Tolerant Middleware Support Priya Narasimhan Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA 15213-3890
More informationChapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies.
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline
More informationConnecting ESRI to Anything: EAI Solutions
Connecting ESRI to Anything: EAI Solutions Frank Weiss P.E., ESRI User s Conference 2002 Agenda Introduction What is EAI? Industry trends Key integration issues Point-to-point interfaces vs. Middleware
More informationThe Architecture of a Resilience Infrastructure for Computing and Communication Systems
The Architecture of a Resilience Infrastructure for Computing and Communication Systems Algirdas Avižienis University of California, Los Angeles, USA, and Vytautas Magnus University, Kaunas, Lithuania
More informationData-Centric Architecture for Space Systems
Data-Centric Architecture for Space Systems 3 rd Annual Workshop on Flight Software, Nov 5, 2009 The Real-Time Middleware Experts Rajive Joshi, Ph.D. Real-Time Innovations Our goals are the same but not
More informationDS 2009: middleware. David Evans
DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between
More informationToday: Distributed Objects. Distributed Objects
Today: Distributed Objects Case study: EJBs (Enterprise Java Beans) Case study: CORBA Lecture 23, page 1 Distributed Objects Figure 10-1. Common organization of a remote object with client-side proxy.
More informationSystem Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012
System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012 THIS PRESENTATION IS ABOUT Introduction Principles & Definition Governance Logical models Technical infrastructure Open
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures
More informationA Low-Cost Correction Algorithm for Transient Data Errors
A Low-Cost Correction Algorithm for Transient Data Errors Aiguo Li, Bingrong Hong School of Computer Science and Technology Harbin Institute of Technology, Harbin 150001, China liaiguo@hit.edu.cn Introduction
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter
More informationChapter 1: Distributed Information Systems
Chapter 1: Distributed Information Systems Contents - Chapter 1 Design of an information system Layers and tiers Bottom up design Top down design Architecture of an information system One tier Two tier
More informationOTS 1.1 vs. OTS 1.2 Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments
Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments REFERENCE : 000xxx CLASSIFICATION: Information OWNER : Arjuna Lab CONTENTS Page 1 Introduction... 3 1.1 Scope... 3
More informationEstimating Fault-Detection and Fail-Over Times for Nested Real-Time CORBA Applications
Estimating Fault-Detection and Fail-Over Times for Nested Real-Time CORBA Applications Sukanya Ratanotayanon (speaker) School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 389 Tel:
More informationComputing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance
for Network-Centric Warfare: Exploiting COTS, Assuring Performance Dr. James P. Richardson Mr. Lee Graba Mr. Mukul Agrawal Honeywell International, Inc. {james.p.richardson,lee.graba,mukul.agrawal}@honeywell.com
More informationEnterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges
More informationCA464 Distributed Programming
1 / 25 CA464 Distributed Programming Lecturer: Martin Crane Office: L2.51 Phone: 8974 Email: martin.crane@computing.dcu.ie WWW: http://www.computing.dcu.ie/ mcrane Course Page: "/CA464NewUpdate Textbook
More informationCHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating system? A collection of software modules to assist programmers in enhancing system efficiency, flexibility, and robustness An Extended Machine
More informationOverview. Distributed Systems. Distributed Software Architecture Using Middleware. Components of a system are not always held on the same host
Distributed Software Architecture Using Middleware Mitul Patel 1 Overview Distributed Systems Middleware What is it? Why do we need it? Types of Middleware Example Summary 2 Distributed Systems Components
More informationChapter 16. Layering a computing infrastructure
: Chapter 16 by David G. Messerschmitt Layering a computing infrastructure Applications Application components Middleware Operating system Network 2 1 Spanning layer Application Distributed object management
More informationDistributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan.
Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan Reading List Remote Object Invocation -- Tanenbaum Chapter 2.3 CORBA
More informationApplication Servers in E-Commerce Applications
Application Servers in E-Commerce Applications Péter Mileff 1, Károly Nehéz 2 1 PhD student, 2 PhD, Department of Information Engineering, University of Miskolc Abstract Nowadays there is a growing demand
More informationReal-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java
Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java Andrew Foster Product Manager PrismTech Corporation The Case for Java in Enterprise Real-Time Systems
More informationInterprocess Communication
Interprocess Communication Reading: Silberschatz chapter 4 Additional Reading: Stallings chapter 6 EEL 358 1 Outline Introduction Shared memory systems POSIX shared memory Message passing systems Direct
More informationAdaptive Fault Tolerant Systems: Reflective Design and Validation
1 Adaptive Fault Tolerant Systems: Reflective Design and Validation Marc-Olivier Killijian Dependable Computing and Fault Tolerance Research Group Toulouse - France 2 Motivations Provide a framework for
More informationPaolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola
The Smart-M3 Semantic Information Broker (SIB) Plug-in Extension: Implementation and Evaluation Experiences Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola 20.11.2012 - SN4MS'12 DISI, Università
More informationChapter 5: Distributed objects and remote invocation
Chapter 5: Distributed objects and remote invocation From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Figure 5.1 Middleware layers Applications
More informationContainer Services for High Confidence Software
Container Services for High Confidence Software Gary J. Vecellio, William M. Thomas, and Robert M. Sanders The MITRE Corporation 7515 Colshire Drive McLean, VA 22102-7508 {vecellio,bthomas,rsanders}@mitre.org
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.
More informationSoftware Architecture Patterns
Software Architecture Patterns *based on a tutorial of Michael Stal Harald Gall University of Zurich http://seal.ifi.uzh.ch/ase www.infosys.tuwien.ac.at Overview Goal Basic architectural understanding
More informationPeople tell me that testing is
Software Testing Mark Micallef mark.micallef@um.edu.mt People tell me that testing is Boring Not for developers A second class activity Not necessary because they are very good coders 1 What is quality?
More informationChapter 10 DISTRIBUTED OBJECT-BASED SYSTEMS
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 10 DISTRIBUTED OBJECT-BASED SYSTEMS Distributed Objects Figure 10-1. Common organization of a remote
More informationCharacterization of COTS Microkernel-based Systems using MAFALDA
Characterization of COTS Microkernel-based Systems using MAFALDA Jean-Charles Fabre LAAS-CNRS Toulouse, France IFIP Working Group 1.4 Meeting Paraty, Brazil March 1-3, 21 Problem statement Building executive
More informationCommercial Real-time Operating Systems An Introduction. Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory
Commercial Real-time Operating Systems An Introduction Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory swamis@iastate.edu Outline Introduction RTOS Issues and functionalities LynxOS
More informationINTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV
INTRODUCTION TO Object Oriented Systems 1 CHAPTER 1 Introduction to Object Oriented Systems Preview of Object-orientation. Concept of distributed object systems, Reasons to distribute for centralized objects.
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Testing Techniques
More informationData Model Considerations for Radar Systems
WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,
More informationBuilding Dependable COTS Microkernel-based Systems using MAFALDA
Building Dependable COTS Microkernel-based Systems using MAFALDA Jean-Charles Fabre, Manuel Rodríguez, Jean Arlat, Frédéric Salles and Jean-Michel Sizun LAAS-CNRS Toulouse, France PRDC-2000, UCLA, Los
More informationAutomated Robustness Testing of Off-the-Shelf Software Components
Automated Robustness Testing of Off-the-Shelf Software Components Nathan Kropp Phil Koopman Dan Siewiorek Carnegie Mellon University http://www.ices.cmu.edu/ballista Institute for Complex Engineered Systems
More informationDesign and Implementation of High Performance and Availability Java RMI Server Group
Design and Implementation of High Performance and Availability Java RMI Group 1. Introduction Tianjing Xu University of Auckland, Auckland, New Zealand txu012@ec.auckland.ac.nz Nowadays, providing high
More informationNetwork Working Group Request for Comments: 1679 Category: Informational K. O Donoghue NSWC-DD August 1994
Network Working Group Request for Comments: 1679 Category: Informational D. Green P. Irey D. Marlow K. O Donoghue NSWC-DD August 1994 HPN Working Group Input to the IPng Requirements Solicitation Status
More informationGustavo Alonso, ETH Zürich. Web services: Concepts, Architectures and Applications - Chapter 1 2
Chapter 1: Distributed Information Systems Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 1 Design
More informationDependable Computing Clouds for Cyber-Physical Systems
Dependable Computing Clouds for Cyber-Physical Systems Dependability Issues in Cloud Computing (DISCCO) Workshop October 11 th, 2012 Douglas C. Schmidt d.schmidt@vanderbilt.edu Institute for Software Integrated
More informationVerification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process
Verification and Validation Assuring that a software system meets a user s needs Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 19,20 Slide 1
More informationExpressing Fault Tolerant Algorithms with MPI-2. William D. Gropp Ewing Lusk
Expressing Fault Tolerant Algorithms with MPI-2 William D. Gropp Ewing Lusk www.mcs.anl.gov/~gropp Overview Myths about MPI and Fault Tolerance Error handling and reporting Goal of Fault Tolerance Run
More informationImplementing a Ground Service- Oriented Architecture (SOA) March 28, 2006
Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling
More informationITP 140 Mobile Technologies. Databases Client/Server
ITP 140 Mobile Technologies Databases Client/Server Databases Data: recorded facts and figures Information: knowledge derived from data Databases record data, but they do so in such a way that we can produce
More informationA Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction
A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one
More informationAn Update on CORBA Performance for HPEC Algorithms. Bill Beckwith Objective Interface Systems, Inc.
An Update on CORBA Performance for HPEC Algorithms Bill Beckwith Objective Interface Systems, Inc. Email: bill.beckwith@ois.com CORBA technology today surrounds HPEC-oriented subsystems. In recent years
More informationEfficient Stimulus Generation for Testing Embedded Distributed Systems The FlexRay Example
Efficient Stimulus Generation for Testing Embedded Distributed Systems The FlexRay Example Eric Armengaud, Andreas Steininger University of Technology Vienna Embedded Computing Systems Group Treitlsstr.
More informationIntelligent Event Processing in Quality of Service (QoS) Enabled Publish/Subscribe (Pub/Sub) Middleware
Intelligent Event Processing in Quality of Service (QoS) Enabled Publish/Subscribe (Pub/Sub) Middleware Joe Hoffert jhoffert@dre.vanderbilt.edu http://www.dre.vanderbilt.edu/~jhoffert/ CS PhD Student Vanderbilt
More informationCDA 5140 Software Fault-tolerance. - however, reliability of the overall system is actually a product of the hardware, software, and human reliability
CDA 5140 Software Fault-tolerance - so far have looked at reliability as hardware reliability - however, reliability of the overall system is actually a product of the hardware, software, and human reliability
More informationAn Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems
An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems Algirdas Avižienis Vytautas Magnus University, Kaunas, Lithuania and University of California, Los
More informationCAS 703 Software Design
Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction
More informationOutline. Definition of a Distributed System Goals of a Distributed System Types of Distributed Systems
Distributed Systems Outline Definition of a Distributed System Goals of a Distributed System Types of Distributed Systems What Is A Distributed System? A collection of independent computers that appears
More informationUsing Tcl Mobile Agents for Monitoring Distributed Computations
Using Tcl Mobile Agents for Monitoring Distributed Computations Dilyana Staneva, Emil Atanasov Abstract: Agents, integrating code and data mobility, can be used as building blocks for structuring distributed
More informationEvaluation of Embedded Operating System by a Software Method *
Jan. 2006, Volume 3, No.1 (Serial No.14) Journal of Communication and Computer, ISSN1548-7709, USA * Junjie Peng 1, Jun Ma 2, Bingrong Hong 3 (1,3 School of Computer Science & Engineering, Harbin Institute
More information3C05 - Advanced Software Engineering Thursday, April 29, 2004
Distributed Software Architecture Using Middleware Avtar Raikmo Overview Middleware What is middleware? Why do we need middleware? Types of middleware Distributed Software Architecture Business Object
More informationSelf Checking Network Protocols: A Monitor Based Approach
Self Checking Network Protocols: A Monitor Based Approach Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue University
More informationAppendix A - Glossary(of OO software term s)
Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component
More informationBenchmarking The Dependability of Windows NT4, 2000 and XP *
Benchmarking The Dependability of Windows NT4, 2000 and XP * Ali Kalakech, Karama Kanoun, Yves Crouzet and Jean Arlat LAAS-CNRS, 7, Avenue Colonel Roche 31077 Toulouse Cedex 4, France {kalakech, kanoun,
More informationWhy testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties
Why testing and analysis Software Testing Adapted from FSE 98 Tutorial by Michal Young and Mauro Pezze Software is never correct no matter what developing testing technique is used All software must be
More informationOn the Design and Implementation of a Generalized Process for Business Statistics
On the Design and Implementation of a Generalized Process for Business Statistics M. Bruno, D. Infante, G. Ruocco, M. Scannapieco 1. INTRODUCTION Since the second half of 2014, Istat has been involved
More informationRemote Invocation. 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics
Remote Invocation Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics From the First Lecture (Architectural Models)...
More informationFending Off Cyber Attacks Hardening ECUs by Fuzz Testing
Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing In designing vehicle communication networks, security test procedures play an important role in the development process. Fuzz testing, which originated
More informationMATERIALS AND METHOD
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Evaluation of Web Security Mechanisms
More informationEurocontrol ATN Trials End System - Status Update
ATNP/WG3/WP 15-18 17 January 1999 EUROCONTROL AERONAUTICAL TELECOMMUNICATION NETWORK PANEL WORKING GROUP 3 (APPLICATIONS AND UPPER LAYERS) Honolulu, USA, 19-22 January 1999 (Information paper) Eurocontrol
More informationExperiences with Component Interference on Shared Hardware Resources
Experiences with Component Interference on Shared Hardware Resources Philip Koopman IFIP WG 10.4 Meeting, March 2004 & Electrical Computer ENGINEERING Overview: Memory as a shared resource Ballista testing
More informationVERIFYING SOFTWARE ROBUSTNESS. Ross Collard Collard & Company
VERIFYING SOFTWARE ROBUSTNESS Ross Collard Collard & Company OVERVIEW Software is robust if it can tolerate such problems as unanticipated events, invalid inputs, corrupted internally stored data, improper
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationUsing a Real-time, QoS-based ORB to Intelligently Manage Communications Bandwidth in a Multi-Protocol Environment
Using a Real-time, QoS-based ORB to Intelligently Manage Communications Bandwidth in a Multi-Protocol Environment Bill Beckwith Objective Interface Systems, Inc. +1 703 295 6500 bill.beckwith@ois.com http://www.ois.com
More informationA Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels. M. Schwarz M. Chaari, B.-A. Tabacaru, W.
A Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels M. Schwarz M. Chaari, B.-A. Tabacaru, W. Ecker Outline Motivation Objectives Limitations Concept Simulation Conclusion
More informationSignal Theory, Telematics and Communications Department. UGR DDS Profile. 22nd July, 2010 Granada
UGR DDS Profile 22nd July, 2010 Granada 1 Universidad de Granada DDS research activities 2 Outline UGR people DDS middleware UGR main DDS contributions Results (research projects and publications) Contact
More informationWind River. All Rights Reserved.
1 Using Simulation to Develop and Maintain a System of Connected Devices Didier Poirot Simics Technical Account Manager THE CHALLENGES OF DEVELOPING CONNECTED ELECTRONIC SYSTEMS 3 Mobile Networks Update
More informationAnalysis of System Bus Transaction Vulnerability in SystemC TLM Design Platform
Analysis of System Bus Transaction Vulnerability in SystemC TLM Design Platform YUNG-YUAN CHEN, CHUNG-HSIEN HSU, AND KUEN-LONG LEU + Department of Computer Science and Information Engineering Chung-Hua
More informationPriya Narasimhan. Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA
OMG Real-Time and Distributed Object Computing Workshop, July 2002, Arlington, VA Providing Real-Time and Fault Tolerance for CORBA Applications Priya Narasimhan Assistant Professor of ECE and CS Carnegie
More informationUsing Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance Outline Introduction and Motivation Software-centric Fault Detection Process-Level Redundancy Experimental Results
More informationHow to Break Software by James Whittaker
How to Break Software by James Whittaker CS 470 Practical Guide to Testing Consider the system as a whole and their interactions File System, Operating System API Application Under Test UI Human invokes
More informationTU Wien. Shortened by Hermann Härtig The Rationale for Time-Triggered (TT) Ethernet. H Kopetz TU Wien December H. Kopetz 12.
TU Wien 1 Shortened by Hermann Härtig The Rationale for Time-Triggered (TT) Ethernet H Kopetz TU Wien December 2008 Properties of a Successful Protocol 2 A successful real-time protocol must have the following
More information