LCCI (Large-scale Complex Critical Infrastructures)

Size: px
Start display at page:

Download "LCCI (Large-scale Complex Critical Infrastructures)"

Transcription

1

2 LCCI (Large-scale Complex Critical Infrastructures) 1 LCCIs are Internet-scale constellations of heterogeneous systems glued together into a federated and open system by a data distribution middleware. The shift towards Internet is considered a necessary step to overcome the limitations of the monolithic and closed architectures used traditionally to build critical systems (e.g., SCADA architectures). Real world example is the novel framework for Air Traffic Management (ATM) that EuroCONTROL is developing within the SESAR EU Joint Undertaking.

3 LCCI (Large-scale Complex Critical Infrastructures) 2 New challenges rise from LCCIs that push the frontiers of current technologies. Data distribution task becomes crucial and has to be: Reliability: deliveries have to be guaranteed despite failures may happen; Timeliness: messages must reach their destinations at the right time, without breaking temporal constraints; Scalability: performance is affected neither by the time nor by the LCCI size. The challenge is to find the best data distribution paradigm able to meet the aforementioned requirements.

4 Outline of SWIM concept 3 SWIM (System Wide Information Management) aims to establish a seamless interoperability among heterogeneous ATM stakeholders: common data representation; coherent view on current ATM information (e.g. Flight Data, Aeronautical Data, Weather). It may be seen as a common data/service bus on which systems having to interoperate are connected. Close in spirit to a middleware solution for LCCI.

5 SWIM prototype 4 The prototype (named SWIM-BOX ) has been conceived as a sort of Gateway/Mediator across legacy applications: Completely distributed architecture; Designed using a domain based approach (Flight, Surveillance, etc); Implemented using a standard based approach; Well known data and information models (e.g. ICOG2); Standard technologies (Web Services, EJB, DDS); DDS-compliant middleware for sharing data. Legacy A SWIM- BOX SWIM Network SWIM- BOX Legacy B Adapte r A Adapte r B Legacy site Common Infrastructure Legacy site

6 Some challenges 5 How subsystems (as COTS) involved into LCCI impacts on its dependability? What are the effects on LCCI if DDS-compliant middleware is invoked with erroneous inputs? Robustness testing provides answers to these questions: Help vendors evaluating their implementations; Help clients selecting several solutions. Tests cost reduction automating tests procedure. Automating tests results classification.

7 Our goal Assessing the robustness middleware What does robustness mean? 6 of DDS-compliant The degree to which a system operates correctly in the presence of exceptional inputs or stressful environmental conditions [IEEE Std ]. Dependability with respect to external faults, which characterizes a system reaction to a specific class of faults [Avizienis 04]. Robustness testing features: Only the system interface has to be known; Source code is not needed (black-box approach); Injecting exceptional input through API; Do not alter data and structure" internally; Select carefully inputs and stressful conditions that cause the activation of faults representative of actual situations.

8 Robustness Testing Approaches 7 Robustness testing: stressing the public interface of the application/system/api with invalid and exceptional values: From Application To System Under Test (Top-Down); From OS to System Under Test (Bottom-UP). API called with exceptional values Application DDS Middleware OS syscall Operating System OS return with exceptional values

9 Robustness Testing Approaches 8 Robustness testing: stressing the public interface of the application/system/api with invalid and exceptional values: From Application To System Under Test (Top-Down); From OS to System Under Test (Bottom-UP). API called with exceptional values Application DDS Middleware OS syscall Operating System OS return with exceptional values

10 Robustness Testing Approaches 9 Robustness testing: stressing the public interface of the application/system/api with invalid and exceptional values: From Application To System Under Test (Top-Down); From OS to System Under Test (Bottom-UP). Workload stands for a set of valid calls. It s needed to stress each operation of the device under test. Fault model is a set of rules applied at API to expose robustness problems. Failure mode classification characterizes the behavior of the system under test while executing the workload in the presence of fault model.

11 Fault Injection: WWW dilemma 10 What to inject? Fault model -> Fault List Where to inject? At API interface level Method with higher occurrences (Method list) When to inject? At only one invocation of methods (Trigger list) Injection library Fault list Method list Trigger List Fault, Model and Trigger lists define our Injection library

12 Faults list 11 The rules list applied during the API invocation: Each method input is tested with all robustness values one for time. E.g., void replace(int a, String b).

13 Method list 12 Profiling different applications using DDScompliant middleware product: Ping-pong application; Touchstone: benchmarking framework for evaluating the performance of OMG DDS compliant implementations; SWIM-BOX. The methods occurrences have been measured for each applications: Only a limited set core of all available methods are invoked; The same occurrences distribution is noted for all applications Method list involved the methods with higher occurrences.

14 Failure mode classification 13 CRASH scale has been utilized to classify the robustness problems Catastrophic: node crashes and OS hangs, DDS provider do not deliver messages correctly. Restart: DDS provider becomes unresponsive and must be terminated by force. Abort: Abnormal termination when invoking API. Silent: Faulty submitted value doesn t rise exceptions, despite this message are or aren t transmitted. Hindering: returned error code is incorrect. Further and suitable levels have been added: non conformity: fault is not indicated as should be. DDS API analysis has been performed for results classification. Golden run has been run for each injecting value to understand the system behavior.

15 Test automation: JFault Injection Tool (JFIT) 14 Pros: Cons: Java-based implementation; No knowledge about the SUT; Run-time methods interception and values mutation: Exploiting java reflection; Monitoring status and output of the SUT. Only methods with primitive types (i.e. String, int, ) are taken into account; Off line and by hand results classification.

16 High level architecture of JFIT 15 All robustness test are carried out according with the Injection library; Controller is in charge for tests management and runs them through the Activator; Interceptor catches the methods invocation to SUT and injects, by Injector, the faults one for time Monitor records the output at Pub and Sub side. MONITOR CONTROLLER ACTIVATOR System Under Test INTERCEPTO R INJECTOR

17 Test execution stages 16 Preliminary execution of the workload without faults To understand the normal behavior Starting robustness testing DDS initialitation Workload execution Monitoring & Logging Injection phase Golden run One fault for time No faults are injected

18 Tests Results DDS middleware: OpenSplice implementation; No QoS features have been defined (Best Effort); 17 According with the failure mode classification the achieved results are as follows: no Catastrophic, Abort and Hindering problems have been evidenced: Neither node crashes and nor OS hangs; No abnormal termination when invoking API; No erroneous returned error code. 13% of robustness tests have shown Restart problems: Experiment doesn t response and must be terminated by force. 45% of robustness tests have risen Silent problems: No exception has been thrown by DDS;

19 Tests Results Faults distribution between Silent and Restart. Int faults types String faults types 18 Faults types

20 Conclusions 19 Our approach can automatically test the core set of DDS methods; A significant fraction of tests shows some robustness issues raised when exceptional values are submitted to OpenSplice APIs (e.g., large strings, or big integers); The ability to reach a consistent system state before performing fault injection makes us confident of the results.

21 Conclusions 20 Our approach can automatically test the core set of DDS methods; A significant fraction of tests shows some robustness issues raised when exceptional values are submitted to OpenSplice APIs (e.g., large strings, or big integers); The ability to reach a consistent system state before performing fault injection makes us confident of the results. Ongoing activities Testing all parameters types and not only primitive types; Automating results classification; Running tests in presence of quality of service mechanisms; Carrying out the same tests with other DDS-compliant middleware.

22 References 21 [Avizienis 04] A. Avizienis, J.C. Laprie, B. Randell, C. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. Dependable Secure Computing, [Koopman 02] P. Koopman. What's Wrong With Fault Injection As A Benchmarking Tool?. in Proc. DSN 2002 Workshop on Dependability Benchmarking, pp. F , Washington, D.C.,USA, [Koopman 99] Koopman P., DeVale J., Comparing the robustness of POSIX operating, Proceedings of Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing, [Johansson 07] Johansson A., Suri N., Murphy B. On the selection of Error models for OS Robustness Evaluation Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, [Miller 95] B.P. Miller et al, Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities., Technical report, 1995.

23 22

24 23 Test Scenario A receiver is waiting for messages The Transmitter sends burst of messages for a while then terminates Further details JFIT DDS middleware: OpenSplice implementation No QoS features have been defined (Best Effort) A P I in te rc e p to r A P I in je c to r Mo nito rin g Mo n ito rin g JFIT

25 Pub/Sub paradigm 24 Pub/Sub reveals effective to federate heterogeneous systems Space, time and synchronization decoupling enforce scalability Asynchronous multi-point communication good to devise cooperating systems HERALD CORBA NS GREEN JEDI HERMES SIENA DREAM JMS Among the plethora of Pub/Sub alternatives DDS exhibits better performances, higher scalability and larger set of offered QoS Widely used in large scope initiatives addressing wide area scenarios E.g., it has been investigating as the data distribution system into SESAR project through SWIM middleware infrastructure

Data Consistency with SPLICE Middleware. Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division

Data Consistency with SPLICE Middleware. Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division Data Consistency with SPLICE Middleware Leslie Madden Chad Offenbacker Naval Surface Warfare Center Dahlgren Division Slide 1 6/30/2005 Background! US Navy Combat Systems are evolving to distributed systems

More information

COMPARING ROBUSTNESS OF AIS-BASED MIDDLEWARE IMPLEMENTATIONS

COMPARING ROBUSTNESS OF AIS-BASED MIDDLEWARE IMPLEMENTATIONS COMPARING ROBUSTNESS OF AIS-BASED MIDDLEWARE IMPLEMENTATIONS ZOLTÁN MICSKEI, ISTVÁN MAJZIK Department of Measurement and Information Systems Budapest University of Technology and Economics, Magyar Tudósok

More information

RobusTest: Towards a Framework for Automated Testing of Robustness in Software

RobusTest: Towards a Framework for Automated Testing of Robustness in Software RobusTest: Towards a Framework for Automated Testing of Robustness in Software Ali Shahrokni, Robert Feldt Department of Computer Science and Engineering Chalmers University of Technology Gothenburg, Sweden

More information

Fault Injection Seminar

Fault Injection Seminar Fault Injection Seminar Summer Semester 2015 Daniel Richter, Lena Herscheid, Prof. Andreas Polze Operating Systems and Middleware Group Hasso Plattner Institute 23/04/2015 Fault Injection Seminar 1 Dependability

More information

European Sky ATM Research (SESAR) [5][6] in Europe both consider the implementation of SWIM as a fundamental element for future ATM systems.

European Sky ATM Research (SESAR) [5][6] in Europe both consider the implementation of SWIM as a fundamental element for future ATM systems. (FIXM) and the weather information exchange model 1. INTRODUCTION With the rapid increase in local and global air traffic, the system-wide operational information exchange and life-cycle management technologies

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Vortex OpenSplice. Python DDS Binding

Vortex OpenSplice. Python DDS Binding Vortex OpenSplice Python DDS Binding ist.adlinktech.com 2018 Table of Contents 1. Background... 3 2. Why Python DDS Binding is a Big Deal... 4 2 1. Background 1.1 Python Python Software Foundation s Python

More information

DDS Interoperability in SWIM

DDS Interoperability in SWIM DDS Interoperability in SWIM OMG Real Time and Embedded Workshop Paris - April 17 th, 2012 Outline SWIM a key enabler of future ATM SWIM thread within SESAR SWIM FO/IOP Profile Interaction Patterns SWIM

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/58 Definition Distributed Systems Distributed System is

More information

02 - Distributed Systems

02 - Distributed Systems 02 - Distributed Systems Definition Coulouris 1 (Dis)advantages Coulouris 2 Challenges Saltzer_84.pdf Models Physical Architectural Fundamental 2/60 Definition Distributed Systems Distributed System is

More information

Software Robustness Testing Service

Software Robustness Testing Service Software Robustness Testing Service http://www.ices.cmu.edu/ballista John P. DeVale devale@cmu.edu - (412) 268-4264 - http://www.ece.cmu.edu/~jdevale,qvwlwxwh IRU &RPSOH[ (QJLQHHUHG 6\VWHPV Overview: Ballista

More information

Ballista Design and Methodology

Ballista Design and Methodology Ballista Design and Methodology October 1997 Philip Koopman Institute for Complex Engineered Systems Carnegie Mellon University Hamershlag Hall D-202 Pittsburgh, PA 15213 koopman@cmu.edu (412) 268-5225

More information

Middleware Mediated Transactions & Conditional Messaging

Middleware Mediated Transactions & Conditional Messaging Middleware Mediated Transactions & Conditional Messaging Expert Topic Report ECE1770 Spring 2003 Submitted by: Tim Chen John C Wu To: Prof Jacobsen Date: Apr 06, 2003 Electrical and Computer Engineering

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Distributed transactions (quick refresh) Layers of an information system Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways

Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways Building High-Assurance Systems out of Software Components of Lesser Assurance Using Middleware Security Gateways A PrismTech Product Line OMG's First Software Assurance Workshop: Working Together for

More information

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D.

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D. Vortex Whitepaper Intelligent Data Sharing for the Business-Critical Internet of Things Version 1.1 June 2014 Angelo Corsaro Ph.D., CTO, PrismTech Vortex Whitepaper Version 1.1 June 2014 Table of Contents

More information

Failure analysis of an ORB in presence of faults

Failure analysis of an ORB in presence of faults DSoS Failure analysis of an ORB in presence of faults Report Version: Deliverable IC3 Report Preparation Date: 1 October 2001 Classification: Public Circulation Contract Start Date: 1 April 2000 Duration:

More information

Robustness Testing of Autonomy Software

Robustness Testing of Autonomy Software Robustness Testing of Autonomy Software Milda Zizyte, PhD Candidate advised by Dr. Philip Koopman, ECE dept. Casidhe Hutchison, Milda Zizyte, Patrick E. Lanigan, David Guttendorf, Michael Wagner, Claire

More information

Today: Distributed Middleware. Middleware

Today: Distributed Middleware. Middleware Today: Distributed Middleware Middleware concepts Case study: CORBA Lecture 24, page 1 Middleware Software layer between application and the OS Provides useful services to the application Abstracts out

More information

Chapter 2 System Models

Chapter 2 System Models CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical

More information

Designing High Performance IEC61499 Applications on Top of DDS

Designing High Performance IEC61499 Applications on Top of DDS ETFA2013 4th 4DIAC Users Workshop Designing High Performance IEC61499 Applications on Top of DDS Industrial communications Complex Different solutions at the different layers Fieldbus at bottom layers:

More information

Middleware for Embedded Adaptive Dependability (MEAD)

Middleware for Embedded Adaptive Dependability (MEAD) Middleware for Embedded Adaptive Dependability (MEAD) Real-Time Fault-Tolerant Middleware Support Priya Narasimhan Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA 15213-3890

More information

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies.

Chapter Outline. Chapter 2 Distributed Information Systems Architecture. Layers of an information system. Design strategies. Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 2 Distributed Information Systems Architecture Chapter Outline

More information

Connecting ESRI to Anything: EAI Solutions

Connecting ESRI to Anything: EAI Solutions Connecting ESRI to Anything: EAI Solutions Frank Weiss P.E., ESRI User s Conference 2002 Agenda Introduction What is EAI? Industry trends Key integration issues Point-to-point interfaces vs. Middleware

More information

The Architecture of a Resilience Infrastructure for Computing and Communication Systems

The Architecture of a Resilience Infrastructure for Computing and Communication Systems The Architecture of a Resilience Infrastructure for Computing and Communication Systems Algirdas Avižienis University of California, Los Angeles, USA, and Vytautas Magnus University, Kaunas, Lithuania

More information

Data-Centric Architecture for Space Systems

Data-Centric Architecture for Space Systems Data-Centric Architecture for Space Systems 3 rd Annual Workshop on Flight Software, Nov 5, 2009 The Real-Time Middleware Experts Rajive Joshi, Ph.D. Real-Time Innovations Our goals are the same but not

More information

DS 2009: middleware. David Evans

DS 2009: middleware. David Evans DS 2009: middleware David Evans de239@cl.cam.ac.uk What is middleware? distributed applications middleware remote calls, method invocations, messages,... OS comms. interface sockets, IP,... layer between

More information

Today: Distributed Objects. Distributed Objects

Today: Distributed Objects. Distributed Objects Today: Distributed Objects Case study: EJBs (Enterprise Java Beans) Case study: CORBA Lecture 23, page 1 Distributed Objects Figure 10-1. Common organization of a remote object with client-side proxy.

More information

System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012

System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012 System Wide Information Management (SWIM) PENS Symposium Brussels, 17 October 2012 THIS PRESENTATION IS ABOUT Introduction Principles & Definition Governance Logical models Technical infrastructure Open

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition. Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures

More information

A Low-Cost Correction Algorithm for Transient Data Errors

A Low-Cost Correction Algorithm for Transient Data Errors A Low-Cost Correction Algorithm for Transient Data Errors Aiguo Li, Bingrong Hong School of Computer Science and Technology Harbin Institute of Technology, Harbin 150001, China liaiguo@hit.edu.cn Introduction

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction

Distributed Systems Principles and Paradigms. Chapter 01: Introduction Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter

More information

Chapter 1: Distributed Information Systems

Chapter 1: Distributed Information Systems Chapter 1: Distributed Information Systems Contents - Chapter 1 Design of an information system Layers and tiers Bottom up design Top down design Architecture of an information system One tier Two tier

More information

OTS 1.1 vs. OTS 1.2 Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments

OTS 1.1 vs. OTS 1.2 Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments Approvers Function Name Approvers comments Reviewers Function Name Reviewers comments REFERENCE : 000xxx CLASSIFICATION: Information OWNER : Arjuna Lab CONTENTS Page 1 Introduction... 3 1.1 Scope... 3

More information

Estimating Fault-Detection and Fail-Over Times for Nested Real-Time CORBA Applications

Estimating Fault-Detection and Fail-Over Times for Nested Real-Time CORBA Applications Estimating Fault-Detection and Fail-Over Times for Nested Real-Time CORBA Applications Sukanya Ratanotayanon (speaker) School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 389 Tel:

More information

Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance

Computing and Communications Infrastructure for Network-Centric Warfare: Exploiting COTS, Assuring Performance for Network-Centric Warfare: Exploiting COTS, Assuring Performance Dr. James P. Richardson Mr. Lee Graba Mr. Mukul Agrawal Honeywell International, Inc. {james.p.richardson,lee.graba,mukul.agrawal}@honeywell.com

More information

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges

More information

CA464 Distributed Programming

CA464 Distributed Programming 1 / 25 CA464 Distributed Programming Lecturer: Martin Crane Office: L2.51 Phone: 8974 Email: martin.crane@computing.dcu.ie WWW: http://www.computing.dcu.ie/ mcrane Course Page: "/CA464NewUpdate Textbook

More information

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS

CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating system? A collection of software modules to assist programmers in enhancing system efficiency, flexibility, and robustness An Extended Machine

More information

Overview. Distributed Systems. Distributed Software Architecture Using Middleware. Components of a system are not always held on the same host

Overview. Distributed Systems. Distributed Software Architecture Using Middleware. Components of a system are not always held on the same host Distributed Software Architecture Using Middleware Mitul Patel 1 Overview Distributed Systems Middleware What is it? Why do we need it? Types of Middleware Example Summary 2 Distributed Systems Components

More information

Chapter 16. Layering a computing infrastructure

Chapter 16. Layering a computing infrastructure : Chapter 16 by David G. Messerschmitt Layering a computing infrastructure Applications Application components Middleware Operating system Network 2 1 Spanning layer Application Distributed object management

More information

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan.

Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan. Distributed Object-Based Systems The WWW Architecture Web Services Handout 11 Part(a) EECS 591 Farnam Jahanian University of Michigan Reading List Remote Object Invocation -- Tanenbaum Chapter 2.3 CORBA

More information

Application Servers in E-Commerce Applications

Application Servers in E-Commerce Applications Application Servers in E-Commerce Applications Péter Mileff 1, Károly Nehéz 2 1 PhD student, 2 PhD, Department of Information Engineering, University of Miskolc Abstract Nowadays there is a growing demand

More information

Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java

Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java Real-time & Embedded Systems Workshop July 2007 Building Successful Real-time Distributed Systems in Java Andrew Foster Product Manager PrismTech Corporation The Case for Java in Enterprise Real-Time Systems

More information

Interprocess Communication

Interprocess Communication Interprocess Communication Reading: Silberschatz chapter 4 Additional Reading: Stallings chapter 6 EEL 358 1 Outline Introduction Shared memory systems POSIX shared memory Message passing systems Direct

More information

Adaptive Fault Tolerant Systems: Reflective Design and Validation

Adaptive Fault Tolerant Systems: Reflective Design and Validation 1 Adaptive Fault Tolerant Systems: Reflective Design and Validation Marc-Olivier Killijian Dependable Computing and Fault Tolerance Research Group Toulouse - France 2 Motivations Provide a framework for

More information

Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola

Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola The Smart-M3 Semantic Information Broker (SIB) Plug-in Extension: Implementation and Evaluation Experiences Paolo Bellavista Veronica Conti Carlo Giannelli Jukka Honkola 20.11.2012 - SN4MS'12 DISI, Università

More information

Chapter 5: Distributed objects and remote invocation

Chapter 5: Distributed objects and remote invocation Chapter 5: Distributed objects and remote invocation From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Figure 5.1 Middleware layers Applications

More information

Container Services for High Confidence Software

Container Services for High Confidence Software Container Services for High Confidence Software Gary J. Vecellio, William M. Thomas, and Robert M. Sanders The MITRE Corporation 7515 Colshire Drive McLean, VA 22102-7508 {vecellio,bthomas,rsanders}@mitre.org

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.

More information

Software Architecture Patterns

Software Architecture Patterns Software Architecture Patterns *based on a tutorial of Michael Stal Harald Gall University of Zurich http://seal.ifi.uzh.ch/ase www.infosys.tuwien.ac.at Overview Goal Basic architectural understanding

More information

People tell me that testing is

People tell me that testing is Software Testing Mark Micallef mark.micallef@um.edu.mt People tell me that testing is Boring Not for developers A second class activity Not necessary because they are very good coders 1 What is quality?

More information

Chapter 10 DISTRIBUTED OBJECT-BASED SYSTEMS

Chapter 10 DISTRIBUTED OBJECT-BASED SYSTEMS DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 10 DISTRIBUTED OBJECT-BASED SYSTEMS Distributed Objects Figure 10-1. Common organization of a remote

More information

Characterization of COTS Microkernel-based Systems using MAFALDA

Characterization of COTS Microkernel-based Systems using MAFALDA Characterization of COTS Microkernel-based Systems using MAFALDA Jean-Charles Fabre LAAS-CNRS Toulouse, France IFIP Working Group 1.4 Meeting Paraty, Brazil March 1-3, 21 Problem statement Building executive

More information

Commercial Real-time Operating Systems An Introduction. Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory

Commercial Real-time Operating Systems An Introduction. Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory Commercial Real-time Operating Systems An Introduction Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory swamis@iastate.edu Outline Introduction RTOS Issues and functionalities LynxOS

More information

INTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV

INTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV INTRODUCTION TO Object Oriented Systems 1 CHAPTER 1 Introduction to Object Oriented Systems Preview of Object-orientation. Concept of distributed object systems, Reasons to distribute for centralized objects.

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Testing Techniques

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

Building Dependable COTS Microkernel-based Systems using MAFALDA

Building Dependable COTS Microkernel-based Systems using MAFALDA Building Dependable COTS Microkernel-based Systems using MAFALDA Jean-Charles Fabre, Manuel Rodríguez, Jean Arlat, Frédéric Salles and Jean-Michel Sizun LAAS-CNRS Toulouse, France PRDC-2000, UCLA, Los

More information

Automated Robustness Testing of Off-the-Shelf Software Components

Automated Robustness Testing of Off-the-Shelf Software Components Automated Robustness Testing of Off-the-Shelf Software Components Nathan Kropp Phil Koopman Dan Siewiorek Carnegie Mellon University http://www.ices.cmu.edu/ballista Institute for Complex Engineered Systems

More information

Design and Implementation of High Performance and Availability Java RMI Server Group

Design and Implementation of High Performance and Availability Java RMI Server Group Design and Implementation of High Performance and Availability Java RMI Group 1. Introduction Tianjing Xu University of Auckland, Auckland, New Zealand txu012@ec.auckland.ac.nz Nowadays, providing high

More information

Network Working Group Request for Comments: 1679 Category: Informational K. O Donoghue NSWC-DD August 1994

Network Working Group Request for Comments: 1679 Category: Informational K. O Donoghue NSWC-DD August 1994 Network Working Group Request for Comments: 1679 Category: Informational D. Green P. Irey D. Marlow K. O Donoghue NSWC-DD August 1994 HPN Working Group Input to the IPng Requirements Solicitation Status

More information

Gustavo Alonso, ETH Zürich. Web services: Concepts, Architectures and Applications - Chapter 1 2

Gustavo Alonso, ETH Zürich. Web services: Concepts, Architectures and Applications - Chapter 1 2 Chapter 1: Distributed Information Systems Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 1 Design

More information

Dependable Computing Clouds for Cyber-Physical Systems

Dependable Computing Clouds for Cyber-Physical Systems Dependable Computing Clouds for Cyber-Physical Systems Dependability Issues in Cloud Computing (DISCCO) Workshop October 11 th, 2012 Douglas C. Schmidt d.schmidt@vanderbilt.edu Institute for Software Integrated

More information

Verification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process

Verification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process Verification and Validation Assuring that a software system meets a user s needs Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 19,20 Slide 1

More information

Expressing Fault Tolerant Algorithms with MPI-2. William D. Gropp Ewing Lusk

Expressing Fault Tolerant Algorithms with MPI-2. William D. Gropp Ewing Lusk Expressing Fault Tolerant Algorithms with MPI-2 William D. Gropp Ewing Lusk www.mcs.anl.gov/~gropp Overview Myths about MPI and Fault Tolerance Error handling and reporting Goal of Fault Tolerance Run

More information

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006

Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 Implementing a Ground Service- Oriented Architecture (SOA) March 28, 2006 John Hohwald Slide 1 Definitions and Terminology What is SOA? SOA is an architectural style whose goal is to achieve loose coupling

More information

ITP 140 Mobile Technologies. Databases Client/Server

ITP 140 Mobile Technologies. Databases Client/Server ITP 140 Mobile Technologies Databases Client/Server Databases Data: recorded facts and figures Information: knowledge derived from data Databases record data, but they do so in such a way that we can produce

More information

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one

More information

An Update on CORBA Performance for HPEC Algorithms. Bill Beckwith Objective Interface Systems, Inc.

An Update on CORBA Performance for HPEC Algorithms. Bill Beckwith Objective Interface Systems, Inc. An Update on CORBA Performance for HPEC Algorithms Bill Beckwith Objective Interface Systems, Inc. Email: bill.beckwith@ois.com CORBA technology today surrounds HPEC-oriented subsystems. In recent years

More information

Efficient Stimulus Generation for Testing Embedded Distributed Systems The FlexRay Example

Efficient Stimulus Generation for Testing Embedded Distributed Systems The FlexRay Example Efficient Stimulus Generation for Testing Embedded Distributed Systems The FlexRay Example Eric Armengaud, Andreas Steininger University of Technology Vienna Embedded Computing Systems Group Treitlsstr.

More information

Intelligent Event Processing in Quality of Service (QoS) Enabled Publish/Subscribe (Pub/Sub) Middleware

Intelligent Event Processing in Quality of Service (QoS) Enabled Publish/Subscribe (Pub/Sub) Middleware Intelligent Event Processing in Quality of Service (QoS) Enabled Publish/Subscribe (Pub/Sub) Middleware Joe Hoffert jhoffert@dre.vanderbilt.edu http://www.dre.vanderbilt.edu/~jhoffert/ CS PhD Student Vanderbilt

More information

CDA 5140 Software Fault-tolerance. - however, reliability of the overall system is actually a product of the hardware, software, and human reliability

CDA 5140 Software Fault-tolerance. - however, reliability of the overall system is actually a product of the hardware, software, and human reliability CDA 5140 Software Fault-tolerance - so far have looked at reliability as hardware reliability - however, reliability of the overall system is actually a product of the hardware, software, and human reliability

More information

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems Algirdas Avižienis Vytautas Magnus University, Kaunas, Lithuania and University of California, Los

More information

CAS 703 Software Design

CAS 703 Software Design Dr. Ridha Khedri Department of Computing and Software, McMaster University Canada L8S 4L7, Hamilton, Ontario Acknowledgments: Material based on Software by Tao et al. (Chapters 9 and 10) (SOA) 1 Interaction

More information

Outline. Definition of a Distributed System Goals of a Distributed System Types of Distributed Systems

Outline. Definition of a Distributed System Goals of a Distributed System Types of Distributed Systems Distributed Systems Outline Definition of a Distributed System Goals of a Distributed System Types of Distributed Systems What Is A Distributed System? A collection of independent computers that appears

More information

Using Tcl Mobile Agents for Monitoring Distributed Computations

Using Tcl Mobile Agents for Monitoring Distributed Computations Using Tcl Mobile Agents for Monitoring Distributed Computations Dilyana Staneva, Emil Atanasov Abstract: Agents, integrating code and data mobility, can be used as building blocks for structuring distributed

More information

Evaluation of Embedded Operating System by a Software Method *

Evaluation of Embedded Operating System by a Software Method * Jan. 2006, Volume 3, No.1 (Serial No.14) Journal of Communication and Computer, ISSN1548-7709, USA * Junjie Peng 1, Jun Ma 2, Bingrong Hong 3 (1,3 School of Computer Science & Engineering, Harbin Institute

More information

3C05 - Advanced Software Engineering Thursday, April 29, 2004

3C05 - Advanced Software Engineering Thursday, April 29, 2004 Distributed Software Architecture Using Middleware Avtar Raikmo Overview Middleware What is middleware? Why do we need middleware? Types of middleware Distributed Software Architecture Business Object

More information

Self Checking Network Protocols: A Monitor Based Approach

Self Checking Network Protocols: A Monitor Based Approach Self Checking Network Protocols: A Monitor Based Approach Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue University

More information

Appendix A - Glossary(of OO software term s)

Appendix A - Glossary(of OO software term s) Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component

More information

Benchmarking The Dependability of Windows NT4, 2000 and XP *

Benchmarking The Dependability of Windows NT4, 2000 and XP * Benchmarking The Dependability of Windows NT4, 2000 and XP * Ali Kalakech, Karama Kanoun, Yves Crouzet and Jean Arlat LAAS-CNRS, 7, Avenue Colonel Roche 31077 Toulouse Cedex 4, France {kalakech, kanoun,

More information

Why testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties

Why testing and analysis. Software Testing. A framework for software testing. Outline. Software Qualities. Dependability Properties Why testing and analysis Software Testing Adapted from FSE 98 Tutorial by Michal Young and Mauro Pezze Software is never correct no matter what developing testing technique is used All software must be

More information

On the Design and Implementation of a Generalized Process for Business Statistics

On the Design and Implementation of a Generalized Process for Business Statistics On the Design and Implementation of a Generalized Process for Business Statistics M. Bruno, D. Infante, G. Ruocco, M. Scannapieco 1. INTRODUCTION Since the second half of 2014, Istat has been involved

More information

Remote Invocation. 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics

Remote Invocation. 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics Remote Invocation Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Introduction 2. Remote Method Invocation (RMI) 3. RMI Invocation Semantics From the First Lecture (Architectural Models)...

More information

Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing

Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing In designing vehicle communication networks, security test procedures play an important role in the development process. Fuzz testing, which originated

More information

MATERIALS AND METHOD

MATERIALS AND METHOD e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Evaluation of Web Security Mechanisms

More information

Eurocontrol ATN Trials End System - Status Update

Eurocontrol ATN Trials End System - Status Update ATNP/WG3/WP 15-18 17 January 1999 EUROCONTROL AERONAUTICAL TELECOMMUNICATION NETWORK PANEL WORKING GROUP 3 (APPLICATIONS AND UPPER LAYERS) Honolulu, USA, 19-22 January 1999 (Information paper) Eurocontrol

More information

Experiences with Component Interference on Shared Hardware Resources

Experiences with Component Interference on Shared Hardware Resources Experiences with Component Interference on Shared Hardware Resources Philip Koopman IFIP WG 10.4 Meeting, March 2004 & Electrical Computer ENGINEERING Overview: Memory as a shared resource Ballista testing

More information

VERIFYING SOFTWARE ROBUSTNESS. Ross Collard Collard & Company

VERIFYING SOFTWARE ROBUSTNESS. Ross Collard Collard & Company VERIFYING SOFTWARE ROBUSTNESS Ross Collard Collard & Company OVERVIEW Software is robust if it can tolerate such problems as unanticipated events, invalid inputs, corrupted internally stored data, improper

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Using a Real-time, QoS-based ORB to Intelligently Manage Communications Bandwidth in a Multi-Protocol Environment

Using a Real-time, QoS-based ORB to Intelligently Manage Communications Bandwidth in a Multi-Protocol Environment Using a Real-time, QoS-based ORB to Intelligently Manage Communications Bandwidth in a Multi-Protocol Environment Bill Beckwith Objective Interface Systems, Inc. +1 703 295 6500 bill.beckwith@ois.com http://www.ois.com

More information

A Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels. M. Schwarz M. Chaari, B.-A. Tabacaru, W.

A Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels. M. Schwarz M. Chaari, B.-A. Tabacaru, W. A Meta-Model-Based Approach for Semantic Fault Modeling on Multiple Abstraction Levels M. Schwarz M. Chaari, B.-A. Tabacaru, W. Ecker Outline Motivation Objectives Limitations Concept Simulation Conclusion

More information

Signal Theory, Telematics and Communications Department. UGR DDS Profile. 22nd July, 2010 Granada

Signal Theory, Telematics and Communications Department. UGR DDS Profile. 22nd July, 2010 Granada UGR DDS Profile 22nd July, 2010 Granada 1 Universidad de Granada DDS research activities 2 Outline UGR people DDS middleware UGR main DDS contributions Results (research projects and publications) Contact

More information

Wind River. All Rights Reserved.

Wind River. All Rights Reserved. 1 Using Simulation to Develop and Maintain a System of Connected Devices Didier Poirot Simics Technical Account Manager THE CHALLENGES OF DEVELOPING CONNECTED ELECTRONIC SYSTEMS 3 Mobile Networks Update

More information

Analysis of System Bus Transaction Vulnerability in SystemC TLM Design Platform

Analysis of System Bus Transaction Vulnerability in SystemC TLM Design Platform Analysis of System Bus Transaction Vulnerability in SystemC TLM Design Platform YUNG-YUAN CHEN, CHUNG-HSIEN HSU, AND KUEN-LONG LEU + Department of Computer Science and Information Engineering Chung-Hua

More information

Priya Narasimhan. Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA

Priya Narasimhan. Assistant Professor of ECE and CS Carnegie Mellon University Pittsburgh, PA OMG Real-Time and Distributed Object Computing Workshop, July 2002, Arlington, VA Providing Real-Time and Fault Tolerance for CORBA Applications Priya Narasimhan Assistant Professor of ECE and CS Carnegie

More information

Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance

Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance Outline Introduction and Motivation Software-centric Fault Detection Process-Level Redundancy Experimental Results

More information

How to Break Software by James Whittaker

How to Break Software by James Whittaker How to Break Software by James Whittaker CS 470 Practical Guide to Testing Consider the system as a whole and their interactions File System, Operating System API Application Under Test UI Human invokes

More information

TU Wien. Shortened by Hermann Härtig The Rationale for Time-Triggered (TT) Ethernet. H Kopetz TU Wien December H. Kopetz 12.

TU Wien. Shortened by Hermann Härtig The Rationale for Time-Triggered (TT) Ethernet. H Kopetz TU Wien December H. Kopetz 12. TU Wien 1 Shortened by Hermann Härtig The Rationale for Time-Triggered (TT) Ethernet H Kopetz TU Wien December 2008 Properties of a Successful Protocol 2 A successful real-time protocol must have the following

More information