Integra(ng an Online Configura(on Checker with Exis(ng Management Systems: Applica(on to CIM/WBEM Environments

Size: px
Start display at page:

Download "Integra(ng an Online Configura(on Checker with Exis(ng Management Systems: Applica(on to CIM/WBEM Environments"

Transcription

1 Integra(ng an Online Configura(on Checker with Exis(ng Management Systems: Applica(on to CIM/WBEM Environments Ludi Akue, Emmanuel Lavinal, Thierry Desprats, Michelle Sibilla University of Toulouse IRIT Lab. France

2 Outline Configura(on verifica(on requirement in NSM Framework for run(me configura(on verifica(on MeCSV metamodel Configura(on constraints checker Applica(on of the framework in CIM/WBEM environments Experiments on the CIM System Virtualiza(on Profile SVM

3 Configura(on verifica(on requirement Configura(on and reconfigura(on are fundamental ac(vi(es in network and service management (the system s behavior is controlled by its configura(on) Management system Config. Install / deploy Monitor Decide Adjust New Config. New Config. Config. Correctness? Consistency? Adequacy? Managed Elements à Need to verify configurafons before their applicafon to guarantee the system s safe and correct operafon SVM

4 Configura(on verifica(on Currently, most related work address Use- case specific verifica(on [SANchk08] Structural integrity verifica(on [Hinrich04, Warren06, PoDIM07] Structural verificafon deals with type conformance, range of authorized values, syntac(c correctness Examples of structural verifica(on: The host name configura(on parameter must not be empty An IPv4 address must have 4 bytes Structural configura(on verifica(on is independent from a run(me Conf X is structurally valid Conf X is valid RT i SVM

5 Configura(on verifica(on (cont.) In today s dynamic environments, configura(ons are highly dependent on the opera(onal condi(ons We argue that an online configurafon verificafon capability is required to assess the configura(on s compliance regarding the current run(me context Examples of online/opera(onal verifica(on: The server hos(ng the HTTP service must be in a running state When applying the backup configura(on, the current number of clients must be less than 50% of the maximum number of clients Online configura(on verifica(on depends on a run(me Conf X is operationally valid in RT Y Conf X is valid RT i SVM

6 General approach for an online configura(on verifica(on Enhancing exis(ng management systems with a verifica(on func(onality Independent from a specific configura(on language or plahorm Enable an online configura(on verifica(on (coupled with a run(me monitoring) 2 1 Decide Monitor Management system Managed Elements 3 Runtime Conf. Verification Adjust à Approach based on a dedicated high- level language: MeCSV metamodel SVM

7 MeCSV: Metamodel for Configura(on Specifica(on & Valida(on MeCSV metamodel [L. Akue et al., VALID 2012] High- level language dedicated to configura(on verifica(on Simple but sufficient to express offline and online constraints Built around 3 capabili(es : ConfiguraFon descripfon: the ability to define a configura(on model for a given system Constraint expression: the ability to express constraints that configura(ons must respect for both structural and opera(onal validity Monitored data representafon: the ability to represent relevant opera(onal state data that influence the opera(onal validity of a configura(on SVM

8 ConfigurationComposition (from/uml/association) ///active/:/boolean ///level/:/constraintlevel «Stereotype» Constraint «Stereotype» Configuration «Stereotype» ManagedElement «Stereotype» StateParameter «Stereotype» ConfigurationParameter «Stereotype» ConstrainableElement «Stereotype» OfflineConstraint «Stereotype» OnlineConstraint «Stereotype» ConfigurationMetadata «Stereotype» ConstraintLevel «metaclass» Class «metaclass» NamedElement «metaclass» Enumeration «metaclass» Constraint «metaclass» Property ConfigurationReference (from/uml/association) ElementConfiguration (from/uml/association) evaluationcontext/[1] ownedconstraint/[*] settings/[*] metadata/[*] stateparameters/[*] constrainedelement/[*] «metaclass» Property [*] [*] [*] [*] MeCSV UML Profile Monitoring Configuration Constraints SVM

9 Framework for online configura(on verifica(on MeCSV Metamodel <<conforms to>> MeCSV inst. edit (at design and run(me) Management System Legacy Legacy mgmt mgmt info info verif. results Adapter Config. instance Current op. state verif. results Reference Model Config structure State Param. <<uses>> Cons- traints RunFme Checker Managed Elements Online configura(on checker SVM

10 Applica(on to CIM/WBEM standards Design Fme: genera(ng part of the MeCSV reference model from CIM schemas 1. Usage of the DMTF s CIM_SettingData configura(on parern 2. Defini(on of transforma(on rules (based on the QVT transforma(on language) between CIM setngs data and the MeCSV metamodel CIM design pauerns (ManagedElement, SettingData) QVT rules MeCSV Metamodel <<conforms to>> <<conforms to>> <<conforms to>> transforma(on Reference Model Config structure State Param. Cons- traints SVM

11 Applica(on to CIM/WBEM standards (cont.) RunFme: building a CIM2MeCSV adapter capable of Mapping at run(me CIM instances to MeCSV instances Gathering from the managed system the state parameters current values (used for online constraints evalua(on) Mgmt System WBEM server 1 Verify {sewng data inst.} 2 Get {state inst.} CIM2MeCSV Adapter (WBEM client) Verify MeCSV {conf + state inst.} 3 Reference Model Config structure State Param. <<uses>> Cons- traints RunFme Checker Managed Elements Online configura(on checker SVM

12 CIM System Virtualiza(on Profile Case Study System virtualiza(on profile (simplified class diagram) HostedDependency ElementSettingData * 1 ComputerSystem SettingsDefineState * VirtualSystemSettingData HostedResourcePool ConcreteComponent * * * ResourcePool ResourceAllocationFromPool ResourceAllocationSettingData 0..1 * ElementSettingData 0..1 SVM

13 CIM System Virtualiza(on Profile Case Study Example Host1:System HostedResourcePool HostedDependency MEM:ResourcePool PoolID = "prim-mem1" Capacity = Primordial = True Reserved = ResourceType = 4 (Memory) AllocationUnits = "byte*2^10" CPU:ResourcePool PoolID = "prim-cpu1" Capacity = 100 Primordial = True Reserved = 50 ResourceType = 3 (Processor) AllocationUnits = "percent" VS1:ComputerSystem Name = "VS1" EnabledState = 2 (Enabled) ResourceAlloc FromPool ResourceAlloc FromPool SettingsDefineState VS1_VSSD:VSSettingData InstanceID = "VS1VSSD" VirtualSystemType = "Default" MRA1:ResourceAllocationSettingData InstanceID = "MRA1RASD" ResourceType = 4 (Memory) AllocationUnits = "byte*2^10" Reservation = PRA1:ResourceAllocationSettingData InstanceID = "PRA1RASD" ResourceType = 3 (Processor) AllocationUnits = "percent" Reservation = 25 ConcreteComponent Element SettingData Element SettingData x:vssettingdata x:vssettingdata x:vssettingdata x:vssettingdata x:vssettingdata x:rasettingdata SVM

14 Experimenta(on: design (me MeCSV reference model genera(on (from CIM VS profile) «ConfigRef» «ManagedElement» ComputerSystem «StateParameter» Name «StateParameter» EnabledState me «ElementConfig» conf «Configuration» VirtualSystemSettingData «ConfigParameter» InstanceId «ConfigParameter» VirtualSystemType «ConfigurationComposition» «ConfigRef» «ManagedElement» ResourcePool «StateParameter» PoolID «StateParameter» ResourceType «StateParameter» AllocationUnits «StateParameter» Capacity «StateParameter» Reserved me «ElementConfig» conf «Configuration» ResourceAllocationSettingData «ConfigParameter» InstanceId «ConfigParameter» ResourceType «ConfigParameter» AllocationUnits «ConfigParameter» Reservation SVM

15 Experimenta(on: design (me Adding constraints to the MeCSV reference model Offline constraints examples Every VirtualSystemSD instance must have a unique id Every VirtualSystemSD instance must include a sub configura(on ResourceAllocationSD of type Processor, Memory and Disk Every ResourceAllocationSD instance must have a Reservation > 0 Online constraints examples The VirtualSystemSD s state configura(on must be associated to a computer system instance in the enabled state The sum of the all the ResourceAllocationSD Reservations must not exceed the Capacity of the corresponding ResourcePool SVM

16 Experimenta(on: run(me Goals 1. Test the CIM2MeCSV adapter and measure its overhead (transforma(on and integra(on (me) 2. Test the online configura(on checker and measure the verifica(on (me (2) Verify {sewng data inst.} (1) Reference Model Mgmt System WBEM server Get {state inst.} CIM2MeCSV Adapter (WBEM client) Verify MeCSV {conf + state inst.} Conf. State Const. <<uses>> Managed Elements RunFme Checker Online configurafon checker Evalua(on according to different configura(on sizes and number of constraints SVM

17 Experimenta(on: run(me evalua(on setup CIM instances provided by OpenPegasus WBEM server (default repository provider) 3 scenarios Case 1: 1 host, 1 VM, ~ 180 config param. & 140 state param. Case 2: 1 host, 2 VM, ~ 360 config param. & 140 state param. Case 3: 1 host, 3 VM, ~ 800 config param. & 140 state param. 3 sets of OCL constraints 10 constraints (~ 70% offline & 30% online) 50 constraints (~ 70% offline & 30% online) 100 constraints (~ 70% offline & 30% online) SVM

18 Experimenta(on: run(me evalua(on results Verify {sewng data inst.} Reference Model Mgmt System WBEM server Get {state inst.} CIM2MeCSV Adapter (WBEM client) Verify MeCSV {conf + state inst.} <<uses>> Managed Elements RunFme Checker Online configurafon checker CIM2MeCSV%adapter's%overhead% Online%configura3on%checking%3me% Time%(in%ms)% 1800" 1600" 1400" 1200" 1000" 800" 600" 400" Total"1me" Instance" transfo." Time%(in%ms)% 1800" 1600" 1400" 1200" 1000" 800" 600" 400" 10"constraints" 50"constraints" 100"constraints" 200" 200" 0" Case"1" Case"2" Case"3" 0" Case"1" Case"2" Case"3" Case 1: 1 host, 1 VM, ~ 180 config param. & 140 state param. Case 2: 1 host, 2 VM, ~ 360 config param. & 140 state param. Case 3: 1 host, 3 VM, ~ 800 config param. & 140 state param. SVM

19 Conclusion and future work Framework for online configura(on verifica(on based on a dedicated (minimal) metamodel named MeCSV Provide online constraints verifica(on for configura(on applicability Enrich exis(ng mgmt systems with a configura(on verifica(on capability Applica(on to CIM/WBEM environments Mapping rules from CIM modeling parerns to MeCSV constructs Run(me adapter to retrieve state parameters from a WBEM server Future work Improve the mapping between standard management informa(on models and MeCSV constructs (in par(cular for the verifica(on results) Ease the specifica(on of constraints (deriva(on from requirements?) SVM

20 Thank you! SVM

This is an author-deposited version published in : Eprints ID : 13241

This is an author-deposited version published in :  Eprints ID : 13241 Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited

More information

Memory Resource Virtualization Profile

Memory Resource Virtualization Profile 1 2 3 4 Document Number: DSP1045 Date: 2009-07-14 Version: 1.0.0 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: E 9 DSP1045 10 11 12 13 14 15 16 17 18 19 20 21 22

More information

Storage Resource Virtualization Profile

Storage Resource Virtualization Profile 1 2 3 4 5 Document Number: DSP1047 Date: 2010-04-22 Version: 1.0.0 6 7 8 9 Document Type: Specification Document Status: DMTF Standard Document Language: E DSP1047 10 11 12 13 14 15 16 17 18 19 20 21 22

More information

CISC327 - So*ware Quality Assurance

CISC327 - So*ware Quality Assurance CISC327 - So*ware Quality Assurance Lecture 8 Introduc

More information

Ethernet Port Resource Virtualization Profile

Ethernet Port Resource Virtualization Profile 1 2 3 4 5 6 Document Number: DSP1050 Date: 2010-02-04 Profile Version: 1.0.0b Document version: 0.7.3 7 8 9 10 11 12 13 14 Information for work in progress version: This document is subject to change at

More information

Common Information Modeling for Advanced Virtual Ethernet Switches

Common Information Modeling for Advanced Virtual Ethernet Switches Common Information Modeling for Advanced Virtual Switches John Parchem - Partner Architect, Microsoft Corporation Vice-Chair, SVPC Virtual Networking, DMTF Hemal V. Shah - Associate Technical Director,

More information

System Virtualization Profile

System Virtualization Profile 1 2 3 4 Document Number: Date: 2010-04-22 Version: 1.0.0 5 6 7 8 Document Type: Specification Document Status: DMTF Standard Document Language: E 9 10 Copyright Notice Copyright 2007, 2010 Distributed

More information

CLOUD SERVICES. Cloud Value Assessment.

CLOUD SERVICES. Cloud Value Assessment. CLOUD SERVICES Cloud Value Assessment www.cloudcomrade.com Comrade a companion who shares one's ac8vi8es or is a fellow member of an organiza8on 2 Today s Agenda! Why Companies Should Consider Moving Business

More information

Preliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016)

Preliminary ACTL-SLOW Design in the ACS and OPC-UA context. G. Tos? (19/04/2016) Preliminary ACTL-SLOW Design in the ACS and OPC-UA context G. Tos? (19/04/2016) Summary General Introduc?on to ACS Preliminary ACTL-SLOW proposed design Hardware device integra?on in ACS and ACTL- SLOW

More information

Oracle VM Workshop Applica>on Driven Virtualiza>on

Oracle VM Workshop Applica>on Driven Virtualiza>on Oracle VM Workshop Applica>on Driven Virtualiza>on Simon COTER Principal Product Manager Oracle VM & VirtualBox simon.coter@oracle.com hnps://blogs.oracle.com/scoter November 25th, 2015 Copyright 2014

More information

Model Transforma.on. Krzysztof Czarnecki Genera.ve So:ware Development Lab University of Waterloo, Canada gsd.uwaterloo.ca

Model Transforma.on. Krzysztof Czarnecki Genera.ve So:ware Development Lab University of Waterloo, Canada gsd.uwaterloo.ca Model Transforma.on Krzysztof Czarnecki Genera.ve So:ware Development Lab University of Waterloo, Canada gsd.uwaterloo.ca Modeling Wizards Summer School, Oct. 1, 2010, Oslo, Norway What is model transforma.on?

More information

Virtual Networking Management White Paper

Virtual Networking Management White Paper Version 1.0.0a Status: Informational Publication Date: February 18, 2011 DSP2025 wgv 0.8.3 Information for work in progress version: IMPORTANT: This specification is not a standard. It does not necessarily

More information

System Modeling Environment

System Modeling Environment System Modeling Environment Requirements, Architecture and Implementa

More information

PhD in Computer And Control Engineering XXVII cycle. Torino February 27th, 2015.

PhD in Computer And Control Engineering XXVII cycle. Torino February 27th, 2015. PhD in Computer And Control Engineering XXVII cycle Torino February 27th, 2015. Parallel and reconfigurable systems are more and more used in a wide number of applica7ons and environments, ranging from

More information

RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0

RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0 software development simplified RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0 Eric Westfall - Indiana University JASIG 2011 For those who don t know Kuali Rice consists of mul8ple sub-

More information

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons.

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons. Virtualization Yifu Rong Introduction Virtualiza5on provide an abstract environment to run applica5ons. Virtualiza5on technologies have a long trail in the history of computer science. Why we interested?

More information

Western Michigan University

Western Michigan University CS-6030 Cloud compu;ng Google App engine Sepideh Mohammadi Summer II 2017 Western Michigan University content Categories of cloud compu;ng Google cloud plaborm Google App Engine Storage technologies Datastore

More information

Design Principles & Prac4ces

Design Principles & Prac4ces Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on

More information

CS251 Programming Languages Spring 2016, Lyn Turbak Department of Computer Science Wellesley College

CS251 Programming Languages Spring 2016, Lyn Turbak Department of Computer Science Wellesley College Functions in Racket CS251 Programming Languages Spring 2016, Lyn Turbak Department of Computer Science Wellesley College Racket Func+ons Functions: most important building block in Racket (and 251) Functions/procedures/methods/subroutines

More information

Object Oriented Design (OOD): The Concept

Object Oriented Design (OOD): The Concept Object Oriented Design (OOD): The Concept Objec,ves To explain how a so8ware design may be represented as a set of interac;ng objects that manage their own state and opera;ons 1 Topics covered Object Oriented

More information

A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection

A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection Patrícia Dockhorn Costa Izon Thomas Mielke Isaac Pereira João Paulo A. Almeida jpalmeida@ieee.org http://nemo.inf.ufes.br

More information

Model- Based Security Tes3ng with Test Pa9erns

Model- Based Security Tes3ng with Test Pa9erns Model- Based Security Tes3ng with Test Pa9erns Julien BOTELLA (Smartes5ng) Jürgen GROSSMANN (FOKUS) Bruno LEGEARD (Smartes3ng) Fabien PEUREUX (Smartes5ng) Mar5n SCHNEIDER (FOKUS) Fredrik SEEHUSEN (SINTEF)

More information

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure

More information

Configura)on Management Founda)ons. Leonardo Gresta Paulino Murta

Configura)on Management Founda)ons. Leonardo Gresta Paulino Murta Configura)on Management Founda)ons Leonardo Gresta Paulino Murta leomurta@ic.uff.br Configura)on Item Hardware or so@ware aggrega)on subject to configura)on management Examples: CM plan Requirement Engineering

More information

Crea?ng Cloud Apps with Oracle Applica?on Builder Cloud Service

Crea?ng Cloud Apps with Oracle Applica?on Builder Cloud Service Crea?ng Cloud Apps with Oracle Applica?on Builder Cloud Service Shay Shmeltzer Director of Product Management Oracle Development Tools and Frameworks @JDevShay hpp://blogs.oracle.com/shay This App you

More information

COSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan

COSC 310: So*ware Engineering. Dr. Bowen Hui University of Bri>sh Columbia Okanagan COSC 310: So*ware Engineering Dr. Bowen Hui University of Bri>sh Columbia Okanagan 1 Admin A2 is up Don t forget to keep doing peer evalua>ons Deadline can be extended but shortens A3 >meframe Labs This

More information

Automated System Analysis using Executable SysML Modeling Pa8erns

Automated System Analysis using Executable SysML Modeling Pa8erns Automated System Analysis using Executable SysML Modeling Pa8erns Maged Elaasar* Modelware Solu

More information

ON THE REUSE OF RTL ASSERTIONS IN SYSTEMC TLM VERIFICATION

ON THE REUSE OF RTL ASSERTIONS IN SYSTEMC TLM VERIFICATION ON THE REUSE OF RTL ASSERTIONS IN SYSTEMC TLM VERIFICATION Nicola Bombieri 1,2 Franco Fummi 1,2, Graziano Pravadelli 1,2, Valerio Garnieri 1, Francesco Stefanni 1, Tara Ghasempouri 2, Michele Lora 2, Giovanni

More information

Scalability in a Real-Time Decision Platform

Scalability in a Real-Time Decision Platform Scalability in a Real-Time Decision Platform Kenny Shi Manager Software Development ebay Inc. A Typical Fraudulent Lis3ng fraud detec3on architecture sync vs. async applica3on publish messaging bus request

More information

Func+on applica+ons (calls, invoca+ons)

Func+on applica+ons (calls, invoca+ons) Func%ons in Racket Racket Functions: most important building block in Racket (and 25) Functions/procedures/methods/subroutines abstract over computations Like Java methods, Python functions have arguments

More information

Automated Generation of Adaptive Test Plans for Self- Adaptive Systems. Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015

Automated Generation of Adaptive Test Plans for Self- Adaptive Systems. Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015 Automated Generation of Adaptive Test Plans for Self- Adaptive Systems Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015 Motivation Run- 9me tes9ng provides assurance for self- adap9ve systems (SAS)

More information

IMS Standards in Ac:on

IMS Standards in Ac:on IMS Standards in Ac:on Colin Smythe (IMS Chief Architect) csmythe@imsglobal.org 1 From the Specifica:on to Adop:on The aim is improve learning Crea:ng an interoperability specifica:on is only part of the

More information

This is an author-deposited version published in : Eprints ID : 15085

This is an author-deposited version published in :   Eprints ID : 15085 Open Archive TOULOUSE Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible. This is an author-deposited

More information

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud

More information

KVM Forum 2007 Tucson, Arizona

KVM Forum 2007 Tucson, Arizona Standard-based Systems Management Solution for KVM KVM Forum 2007 Tucson, Arizona Heidi Eckhart heidieck@linux.vnet.ibm.com Open Hypervisor Team IBM Linux Technology Center August 30 th 2007 Linux is a

More information

Objec0ves. Gain understanding of what IDA Pro is and what it can do. Expose students to the tool GUI

Objec0ves. Gain understanding of what IDA Pro is and what it can do. Expose students to the tool GUI Intro to IDA Pro 31/15 Objec0ves Gain understanding of what IDA Pro is and what it can do Expose students to the tool GUI Discuss some of the important func

More information

Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék. Code Genera*on

Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék. Code Genera*on Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Code Genera*on Designing modeling languages Metamodel: a model of models o Abstract syntax o Concrete syntax

More information

REsources linkage for E-scIence - RENKEI -

REsources linkage for E-scIence - RENKEI - REsources linkage for E-scIence - - hlp://www.e- sciren.org/ REsources linkage for E- science () is a research and development project for new middleware technologies to enable e- science communi?es. ""

More information

The Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO

The Open Group. DMTF Global Management Conference June 18, Allen Brown President & CEO The Open Group DMTF Global Management Conference June 18, 2003 Allen Brown President & CEO a.brown@opengroup.org 44 Montgomery Street Suite 960 San Francisco, CA 94104 USA Tel +1 415 374 8280 ext. 235

More information

SMI-S Manage all the things!!! Chris Lionetti NetApp

SMI-S Manage all the things!!! Chris Lionetti NetApp SMI-S Manage all the things!!! Chris Lionetti NetApp Abstract SMI-S; Manage all the things!!! A chronicle of the development and evolution of the SMI-S protocol that manages multi-vendor environments.

More information

CS 465 Final Review. Fall 2017 Prof. Daniel Menasce

CS 465 Final Review. Fall 2017 Prof. Daniel Menasce CS 465 Final Review Fall 2017 Prof. Daniel Menasce Ques@ons What are the types of hazards in a datapath and how each of them can be mi@gated? State and explain some of the methods used to deal with branch

More information

Boot Control Profile. Document Number: DSP1012. Date: Version: Document Type: Specification. Document Status: Final Standard

Boot Control Profile. Document Number: DSP1012. Date: Version: Document Type: Specification. Document Status: Final Standard 1 2 3 4 5 Document Number: DSP1012 Date: 2008-11-03 Version: 1.0.0 6 Boot Control Profile 7 8 9 Document Type: Specification Document Status: Final Standard Document Language: E 1 2 3 4 5 6 7 8 9 10 11

More information

Discovery in the WBEM Architecture (Infrastructure Discovery)

Discovery in the WBEM Architecture (Infrastructure Discovery) Discovery in the WBEM Architecture (Infrastructure Discovery) 3:15 pm- 4:05 pm Thursday Winston Bumpus, Novell, Inc. Director of Standards, Karl Schopmeyer, Open Group / Application WG Chair The Problem

More information

Graphical Editors 2. GMF. Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék

Graphical Editors 2. GMF. Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Graphical Editors 2. GMF Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék GMF Graphical Modeling Framework Goal o Graphical edi:ng of DSLs o Model- based, with

More information

Overview. About the Common Information Model. Send documentation comments to CHAPTER

Overview. About the Common Information Model. Send documentation comments to CHAPTER CHAPTER 1 The Cisco MDS 9000 Family of multilayer directors and fabric switches provide an industry standard application programming interface (API) using the Storage Management Initiative Specification

More information

Common Criteria Crypto Working Group. Interna'onal Cryptographic Module Conference 2017 Fritz Bollmann (BSI) Mary Baish (NIAP)

Common Criteria Crypto Working Group. Interna'onal Cryptographic Module Conference 2017 Fritz Bollmann (BSI) Mary Baish (NIAP) Common Criteria Crypto Working Group Interna'onal Cryptographic Module Conference 2017 Fritz Bollmann (BSI) Mary Baish (NIAP) Crypto in Common Criteria Cryptography is ubiquitous in Common Criteria Protec'on

More information

Developing an IDE4L Grid

Developing an IDE4L Grid Developing an IDE4L Grid Presenter: Antonino Riccobono, Ph.D. RWTH Aachen University Project Coordinator: Prof. Sami Repo Tampere University of Technology 5 th November 2014 SLIDE 2 Contents Overview of

More information

Enforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags

Enforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags Enforcing Network- Wide Policies in the Presence of Dynamic Middlebox Ac>ons using FlowTags Seyed K. Fayazbakhsh *, Luis Chiang, Vyas Sekar *, Minlan Yu, Jeffrey Mogul * CMU, Deutsche Telekom, USC, Google

More information

The balancing act: Research vs. Produc7on. Kobus Van der Merwe

The balancing act: Research vs. Produc7on. Kobus Van der Merwe The balancing act: Research vs. Produc7on Kobus Van der Merwe 1 The balancing act: and Research vs. Produc7on Kobus Van der Merwe 2 Context All started with 3 Context All started with NSF program manager

More information

A generic conceptual framework for selfmanaged

A generic conceptual framework for selfmanaged A generic conceptual framework for selfmanaged environments E. Lavinal, T. Desprats, and Y. Raynaud IRIT, UMR 5505 - Paul Sabatier University 8 route de Narbonne, F-3062 Toulouse cedex 9 {lavinal, desprats,

More information

Clinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang

Clinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang 1 Agenda How is metadata currently managed within the industry? Five key problems with current approaches.

More information

Founda'ons of So,ware Engineering. Lecture 11 Intro to QA, Tes2ng Claire Le Goues

Founda'ons of So,ware Engineering. Lecture 11 Intro to QA, Tes2ng Claire Le Goues Founda'ons of So,ware Engineering Lecture 11 Intro to QA, Tes2ng Claire Le Goues 1 Learning goals Define so;ware analysis. Reason about QA ac2vi2es with respect to coverage and coverage/adequacy criteria,

More information

Computation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM):

Computation Independent Model (CIM): Platform Independent Model (PIM): Platform Specific Model (PSM): Implementation Specific Model (ISM): viii Preface The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information

More information

SQL Injec*on. By Robin Gonzalez

SQL Injec*on. By Robin Gonzalez SQL Injec*on By Robin Gonzalez Some things that can go wrong Excessive and Unused Privileges Privilege Abuse Input Injec>on Malware Week Audit Trail Other things that can go wrong Storage Media Exposure

More information

Ontology engineering. Valen.na Tamma. Based on slides by A. Gomez Perez, N. Noy, D. McGuinness, E. Kendal, A. Rector and O. Corcho

Ontology engineering. Valen.na Tamma. Based on slides by A. Gomez Perez, N. Noy, D. McGuinness, E. Kendal, A. Rector and O. Corcho Ontology engineering Valen.na Tamma Based on slides by A. Gomez Perez, N. Noy, D. McGuinness, E. Kendal, A. Rector and O. Corcho Summary Background on ontology; Ontology and ontological commitment; Logic

More information

Tightly Integrated: Mike Cormier Bill Thackrey. Achieving Fast Time to Value with Splunk. Managing Directors Splunk Architects Concanon LLC

Tightly Integrated: Mike Cormier Bill Thackrey. Achieving Fast Time to Value with Splunk. Managing Directors Splunk Architects Concanon LLC Copyright 2014 Splunk Inc. Tightly Integrated: Achieving Fast Time to Value with Splunk Mike Cormier Bill Thackrey Managing Directors Splunk Cer@fied Architects Concanon LLC Disclaimer During the course

More information

Strategies for Selecting the Right Open Source Framework for Cross-Browser Testing

Strategies for Selecting the Right Open Source Framework for Cross-Browser Testing BW6 Test Automation Wednesday, June 6th, 2018, 1:30 PM Strategies for Selecting the Right Open Source Framework for Cross-Browser Testing Presented by: Eran Kinsbruner Perfecto Brought to you by: 350 Corporate

More information

Con$nuous Integra$on Development Environment. Kovács Gábor

Con$nuous Integra$on Development Environment. Kovács Gábor Con$nuous Integra$on Development Environment Kovács Gábor kovacsg@tmit.bme.hu Before we start anything Select a language Set up conven$ons Select development tools Set up development environment Set up

More information

Hardware- assisted Virtualization

Hardware- assisted Virtualization Hardware- assisted Virtualization Pra$k Shah (pcshah) Rohan Pa$l (rspa$l) 15-612 Opera,ng System Prac,cum Carnegie Mellon University 1 Agenda Introduc)on to VT- x CPU virtualiza)on with VT- x VMX VMX Transi$ons

More information

Leveraging User Session Data to Support Web Applica8on Tes8ng

Leveraging User Session Data to Support Web Applica8on Tes8ng Leveraging User Session Data to Support Web Applica8on Tes8ng Authors: Sebas8an Elbaum, Gregg Rotheermal, Srikanth Karre, and Marc Fisher II Presented By: Rajiv Jain Outline Introduc8on Related Work Tes8ng

More information

Origin- des*na*on Flow Measurement in High- Speed Networks

Origin- des*na*on Flow Measurement in High- Speed Networks IEEE INFOCOM, 2012 Origin- des*na*on Flow Measurement in High- Speed Networks Tao Li Shigang Chen Yan Qiao Introduc*on (Defini*ons) Origin- des+na+on flow between two routers is the set of packets that

More information

hashfs Applying Hashing to Op2mize File Systems for Small File Reads

hashfs Applying Hashing to Op2mize File Systems for Small File Reads hashfs Applying Hashing to Op2mize File Systems for Small File Reads Paul Lensing, Dirk Meister, André Brinkmann Paderborn Center for Parallel Compu2ng University of Paderborn Mo2va2on and Problem Design

More information

Review of the DCMI Abstract Model

Review of the DCMI Abstract Model Review of the DCMI Abstract Model Thomas Baker, DCMI Joint Mee>ng of the DCMI Architecture Forum and W3C Library Linked Data Incubator Group 22 October 2010 DRAFT SLIDES 2010-10- 06 Early 2000s DC straddling

More information

Combining Real Time Emula0on of Digital Communica0ons between Distributed Embedded Control Nodes with Real Time Power System Simula0on

Combining Real Time Emula0on of Digital Communica0ons between Distributed Embedded Control Nodes with Real Time Power System Simula0on 1 Combining Real Time Emula0on of Digital Communica0ons between Distributed Embedded Control Nodes with Real Time Power System Simula0on Ziyuan Cai and Ming Yu Electrical and Computer Eng., Florida State

More information

Modifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on

Modifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on Modifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on ICMC16 O?awa, Canada 18-20 May 2016 Presented by Alan Gornall Introduc.on I provide cer.fica.on support to my clients: compliance

More information

Alterna(ve Architectures

Alterna(ve Architectures Alterna(ve Architectures COMS W4118 Prof. Kaustubh R. Joshi krj@cs.columbia.edu hep://www.cs.columbia.edu/~krj/os References: Opera(ng Systems Concepts (9e), Linux Kernel Development, previous W4118s Copyright

More information

RISC-V, Rocket, and RoCC Spring 2017 James Mar2n

RISC-V, Rocket, and RoCC Spring 2017 James Mar2n RISC-V, Rocket, and RoCC Spring 2017 James Mar2n What s new in Lab 2: In lab 1, you built a SHA3 unit that operates in isola2on We would like Sha3Accel to act as an accelerator for a processor Lab 2 introduces

More information

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014

PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 PANEL: Cybersecurity Experimenta7on of the Future (CEF) CSET Workshop August 18, 2014 Goal of the Panel Engage the workshop par/cipants in an interac/ve discussion of the experimenta/on capabili/es and

More information

Observa(on Processing. Nancy Collins or

Observa(on Processing. Nancy Collins or Observa(on Processing Nancy Collins nancy@ucar.edu or dart@ucar.edu Roadmap What s in an Observa(on Provided tools and capabili(es Observa(on sources Observa(on and representa(veness error Types, Kinds,

More information

Monitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines

Monitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines Monitoring & Analy.cs Working Group Ini.a.ve PoC Setup & Guidelines Copyright 2017 Open Networking User Group. All Rights Reserved Confiden@al Not For Distribu@on Outline ONUG PoC Right Stuff Innova@on

More information

CH3: C# Programming Basics BUILD YOUR OWN ASP.NET 4 WEB SITE USING C# & VB

CH3: C# Programming Basics BUILD YOUR OWN ASP.NET 4 WEB SITE USING C# & VB CH3: C# Programming Basics BUILD YOUR OWN ASP.NET 4 WEB SITE USING C# & VB Outlines of today s lecture In this lecture we will explore the following C# programming fundamentals: Control Events Event Subrou=nes

More information

DMTF Common Information Model (CIM) Specification

DMTF Common Information Model (CIM) Specification DMTF CIM Readme Version 2.15.0 DMTF Common Information Model (CIM) Specification Readme Version 2.15.0 April 2007 This document describes the changes that have been incorporated into the CIM schema for

More information

Proofs about Programs

Proofs about Programs Proofs about Programs Program Verification (Rosen, Sections 5.5) TOPICS Program Correctness Preconditions & Postconditions Program Verification Assignment Statements Conditional Statements Loops Composition

More information

Integrated Access Control Policy Management Profile

Integrated Access Control Policy Management Profile 1 2 3 4 Document Number: DSP1106 Date: 2011-09-16 Version: 1.0.0 5 6 Integrated Access Control Policy Management Profile 7 8 9 Document Type: Specification Document Status: DMTF Standard Document Language:

More information

Habanero-Java Library: a Java 8 Framework for Multicore Programming

Habanero-Java Library: a Java 8 Framework for Multicore Programming Habanero-Java Library: a Java 8 Framework for Multicore Programming PPPJ 2014 September 25, 2014 Shams Imam, Vivek Sarkar shams@rice.edu, vsarkar@rice.edu Rice University https://wiki.rice.edu/confluence/display/parprog/hj+library

More information

How to sleep *ght and keep your applica*ons running on IPv6 transi*on. The importance of IPv6 Applica*on Tes*ng

How to sleep *ght and keep your applica*ons running on IPv6 transi*on. The importance of IPv6 Applica*on Tes*ng How to sleep *ght and keep your applica*ons running on IPv6 transi*on The importance of IPv6 Applica*on Tes*ng About this presenta*on It presents a generic methodology to test the IPv6 func*onality of

More information

Welcome and introduction to SU 2

Welcome and introduction to SU 2 Welcome and introduction to SU 2 SU 2 Release Version 2. Workshop Stanford University Tuesday, January 5 th, 23 Dr. F. Palacios and Prof. J. J. Alonso Department of Aeronautics & Astronautics Stanford

More information

A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling

A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling A Demand Side Management Framework Driven by Ambient Services and Consumer Profiling Konstan>nos Tsatsakis k.tsatsakis@hypertech.gr Anastasios Tsitsanis HYPERTECH S.A. Mission & Objec>ves Explore alterna1ve

More information

Orchestrated Network Services with LSO, SDN and NFV

Orchestrated Network Services with LSO, SDN and NFV Host Sponsor Co- Sponsor Orchestrated Network Services with LSO, SDN and NFV Darryl Stork Regional Director WebNMS 1 PresentaBon Agenda Overview of LSO, SDN, NFV, and the Third Network Using LSO, SDN and

More information

Architectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2

Architectural Requirements Phase. See Sommerville Chapters 11, 12, 13, 14, 18.2 Architectural Requirements Phase See Sommerville Chapters 11, 12, 13, 14, 18.2 1 Architectural Requirements Phase So7ware requirements concerned construc>on of a logical model Architectural requirements

More information

OpenWorld 2015 Oracle Par22oning

OpenWorld 2015 Oracle Par22oning OpenWorld 2015 Oracle Par22oning Did You Think It Couldn t Get Any Be6er? Safe Harbor Statement The following is intended to outline our general product direc2on. It is intended for informa2on purposes

More information

For more information about how to cite these materials visit

For more information about how to cite these materials visit Author(s): Jeremy York, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution Noncommercial Share Alike 3.0 License: http://creativecommons.org/licenses/by-nc-sa/3.0/

More information

RaceMob: Crowdsourced Data Race Detec,on

RaceMob: Crowdsourced Data Race Detec,on RaceMob: Crowdsourced Data Race Detec,on Baris Kasikci, Cris,an Zamfir, and George Candea School of Computer & Communica3on Sciences Data Races to shared memory loca,on By mul3ple threads At least one

More information

Introduc)on to Plug- in Development

Introduc)on to Plug- in Development Introduc)on to Plug- in Development Eclipse Based Development and Integra)on h:p://www.inf.mit.bme.hu/edu/courses/eafi Budapes( Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek

More information

MulG-Vendor Key Management with KMIP

MulG-Vendor Key Management with KMIP MulG-Vendor Key Management with KMIP Tim Hudson CTO Cryptso2 tjh@cryptso2.com GS13A 19-May-2016 1:35pm Key Management 1000011010100100101100101010000010101000101001101001111010001100 Key Management Standards

More information

High-Level Synthesis Creating Custom Circuits from High-Level Code

High-Level Synthesis Creating Custom Circuits from High-Level Code High-Level Synthesis Creating Custom Circuits from High-Level Code Hao Zheng Comp Sci & Eng University of South Florida Exis%ng Design Flow Register-transfer (RT) synthesis - Specify RT structure (muxes,

More information

Mastering Enterprise Metadata with Seman2c Modeling

Mastering Enterprise Metadata with Seman2c Modeling Unlocking the Power of Seman4c Knowledge Mastering Enterprise Metadata with Seman2c Modeling 1 Enterprise Metadata: The descrip4on of the organiza4onal context processes, roles, policies, products and

More information

SEDA An architecture for Well Condi6oned, scalable Internet Services

SEDA An architecture for Well Condi6oned, scalable Internet Services SEDA An architecture for Well Condi6oned, scalable Internet Services Ma= Welsh, David Culler, and Eric Brewer University of California, Berkeley Symposium on Operating Systems Principles (SOSP), October

More information

Decision Support Systems

Decision Support Systems Decision Support Systems 2011/2012 Week 3. Lecture 5 Previous Class: Data Pre- Processing Data quality: accuracy, completeness, consistency, 4meliness, believability, interpretability Data cleaning: handling

More information

Collateral Damage. Impact of Frequent Policy Changes on Vendors and Customers

Collateral Damage. Impact of Frequent Policy Changes on Vendors and Customers Collateral Damage Impact of Frequent Policy Changes on Vendors and Customers Joshua Brickman Director, Security Evalua:ons Oracle Global Product Security Glenn BruneFe Dis:nguished Security Architect Oracle

More information

Jeff Gooding Southern California Edison. Innovation at Southern California Edison

Jeff Gooding Southern California Edison. Innovation at Southern California Edison Jeff Gooding Southern California Edison Innovation at Southern California Edison Understand Cultural Risk Aversion to Innova

More information

Register Alloca.on Deconstructed. David Ryan Koes Seth Copen Goldstein

Register Alloca.on Deconstructed. David Ryan Koes Seth Copen Goldstein Register Alloca.on Deconstructed David Ryan Koes Seth Copen Goldstein 12th Interna+onal Workshop on So3ware and Compilers for Embedded Systems April 24, 12009 Register Alloca:on Problem unbounded number

More information

Model based Design. Embedded Systems Engineering Benedikt Huber WS 2010/ Model based Design

Model based Design. Embedded Systems Engineering Benedikt Huber WS 2010/ Model based Design Model based Design Embedded Systems Engineering Benedikt Huber WS 2010/11 1 Overview Introduction System Theory Model Driven Architecture (MDA) MATLAB/SimuLink Demo Summary 2 History General Systems Theory

More information

Database Machine Administration v/s Database Administration: Similarities and Differences

Database Machine Administration v/s Database Administration: Similarities and Differences Database Machine Administration v/s Database Administration: Similarities and Differences IOUG Exadata Virtual Conference Vivek Puri Manager Database Administration & Engineered Systems The Sherwin-Williams

More information

The informa(on model at Banco de Portugal: innova(ve and flexible data solu(ons

The informa(on model at Banco de Portugal: innova(ve and flexible data solu(ons The informa(on model at Banco de Portugal: innova(ve and flexible data solu(ons João Cadete de Matos Director, Sta1s1cs Department 15 May 2014 CEMLA Mee(ng on Financial Informa(on Needs for Sta(s(cs, Macropruden(al

More information

Reusability of So/ware- Defined Networking Applica=ons: A Run=me, Mul=- Controller Approach

Reusability of So/ware- Defined Networking Applica=ons: A Run=me, Mul=- Controller Approach Reusability of So/ware- Defined Networking Applica=ons: A Run=me, Mul=- Controller Approach Roberto Doriguzzi Corin (CREATE- NET), Pedro A. Aranda Gu=érrez (Telefonica), Elisa Rojas (Telcaria), Holger

More information

Applica'on-level protocols, AAA, Management, Security

Applica'on-level protocols, AAA, Management, Security LP-WAN BOF Applica'on-level protocols, AAA, Management, Security Rafa Mar'n Lopez (rafa@um.es) Dan García Carrillo (dan.garcia@um.es) LP-WAN network access control Only authen'cated and authorized nodes

More information

M2 STL PPC. Introduc2on to SCADE. Philippe Esling, Carlos Agon. 1 M2 STL PPC UPMC

M2 STL PPC. Introduc2on to SCADE. Philippe Esling, Carlos Agon. 1 M2 STL PPC UPMC M2 STL PPC Introduc2on to SCADE Philippe Esling, Carlos Agon esling@ircam.fr 1 M2 STL PPC UPMC SCADE: Basic no2ons Goals and aims SCADE is aimed towards crea:ng cri2cal, reac2ve, embedded so=ware. 2 M2

More information