AADL-Modelling of Plug&Play Weapon System Architecture
|
|
- Cecily Stafford
- 7 years ago
- Views:
Transcription
1 AADL-Modelling of Plug&Play Weapon System Architecture A. Windisch and H. Schlatt EADS Military Aircraft, Systems Engineering AADL Workshop 2005
2 Contents Introduction Notational Issues and Modelling Approach The PnP System Architecture Open Modelling Issues Conclusion Page 2 AADL Workshop, Paris, October 2005
3 Introduction Aircraft/ Aircraft ASI Mission MSI Page 3 AADL Workshop, Paris, October 2005
4 Introduction Aircraft/Carriage / Aircraft Carriage Mission ASI CSSI MSI CSI CSSI MSCI MMSI Miniature Mission s Page 4 AADL Workshop, Paris, October 2005
5 Introduction Reference Architecture Page 5 AADL Workshop, Paris, October 2005
6 Contents Introduction Graphical Notation and Modelling Approach The PnP System Architecture Open Modelling Issues Conclusion Page 6 AADL Workshop, Paris, October 2005
7 Graphical Notation - Components Data Device Thread Memory Bus Process Processor Software Platform System Composite Page 7 AADL Workshop, Paris, October 2005
8 Graphical Notation - Features Data Port Immediate Event Port Event Data Port Delayed Ports <name> client Client / Server server Subprograms Connections Page 8 AADL Workshop, Paris, October 2005
9 Modelling Approach The PnP technical architecture defines several protocol layers which provide the means for network transparent control and communication between the aircraft and the weapon systems A concise system model should reflect this generic hierarchical layered communication infrastructure and not put any constraints on the actual physical architecture of the aircraft/weapon system Modelling approach suggested in this presentation is based on abstract buses (protocols) and abstract processors (virtual machines) which are currently developed as part of the AADL Page 9 AADL Workshop, Paris, October 2005
10 Contents Introduction Graphical Notation and Modelling Approach The PnP System Architecture Open Modelling Issues Conclusion Page 10 AADL Workshop, Paris, October 2005
11 Physical Architecture A/C Platform Avionics Bus (e.g. 1553) Comms IF Computer Mission Computer Mgmt System #1 (Weapon) Air Data Link (e.g. Link16) Dynamic connectivity, i.e. air data link used for communication with weapon after release Can be modelled in terms of modes (omitted in graphics) Page 11 AADL Workshop, Paris, October 2005
12 Physical Architecture (cont d) A/C Platform Avionics Bus (e.g. 1553) Comms IF Computer Mission Computer Mgmt System Carriage Bus #1 (Weapon) #n (Weapon) Air Data Link (e.g. Link16) Page 12 AADL Workshop, Paris, October 2005
13 Functional Architecture A/C Functions Mission Process SMS Process SDFile Process Control Protocol <abstract> Control API API Initialise Transfer Data Release Communication between system functions is based on abstract store control protocol which provides API Page 13 AADL Workshop, Paris, October 2005
14 Control Protocol Control Protocol <abstract> refined to Control Protocol <refined> Control FSM Control FSM Control FSM Communication Protocol <abstract> Communication API API Page 14 AADL Workshop, Paris, October 2005
15 Communication Protocol Communication Protocol <abstract> refined to Communication Protocol <pre-lauch> Comms FSM Comms FSM Comms FSM Comms FSM LL Comms Protocol <1553> Page 15 AADL Workshop, Paris, October 2005
16 Communication Protocol (cont d) Communication Protocol <abstract> refined to Communication Protocol <post-launch> Comms FSM2 Comms FSM2 LL Comms Protocol <link16> Page 16 AADL Workshop, Paris, October 2005
17 Abstract Physical Architecture A/C Platform LL LL Comms API API (2) (2) Messages via via air air data link. link. Avionics Bus LL LL Comms API API (1) (1) Messages via via avionics bus. Comms IF Computer Mission Computer Mgmt System Carriage Abstract Processors Communication services are are provided as as subprogram features Air Data Link Page 17 AADL Workshop, Paris, October 2005 #1 (Weapon) Bus Message Router Transparent routing of of all all store communication messages between avionics & weapon bus bus #n (Weapon)
18 PnP A/C Functions Systems Architecture SDFile Control Protocol Comms Protocol Router Communication Protocol Avionics Bus (e.g. 1553) Comms IF Computer Mission Computer Mgmt System Carriage Bus #1 (Weapon) #n (Weapon) Page 18 AADL Workshop, Paris, October 2005 Air Data Link (e.g. Link16)
19 Contents Introduction Graphical Notation and Modelling Approach The PnP System Architecture Open Modelling Issues Conclusion Page 19 AADL Workshop, Paris, October 2005
20 Open Modelling Issues I01: The hierarchical refinement of protocols into systems requires a generic specification of protocol layers which is unfolded at instantiation time (e.g. see VHDL generics) I02: The system boundaries of the presented model show the layered architecture of the distributed system, however, an integration perspective might be desirable where the system boundaries reflect the borders of the physical systems I03: The graphical representation of binding between layers requires an huge amount of arrows. This could be reduced by means of a deployment view. Page 20 AADL Workshop, Paris, October 2005
21 Open Modelling Issues Integration Perspective SDFile Syntactically incorrect AADL specification!! Comms IF Computer Mission Computer Avionics Bus (e.g. 1553) Mgmt System Air Data Link (e.g. Link16) Carriage #1 (Weapon) Bus #n (Weapon) Potentially a tool issue rather than a language aspect Aircraft Page 21 AADL Workshop, Paris, October 2005 System
22 Contents Introduction Graphical Notation and Modelling Approach The PnP System Architecture Open Modelling Issues Conclusion Page 22 AADL Workshop, Paris, October 2005
23 Conclusion This presentation showed a first approach of a PnP system architecture which focuses on the layered approach taken by the PnP technical architecture Modelling was based on the notion of abstract buses (protocols) and abstract processors (virtual machines) The approach allows for the explicit specification of all network transparent APIs, i.e. the store control API and the store communication API Page 23 AADL Workshop, Paris, October 2005
AADL et la conception des logiciels
AADL et la conception des logiciels Pierre Dissaux, journée Féria/SVF, 2 décembre 2003 System Lifecycle System Engineering System Integration Hardware Engineering Software Engineering from System Engineering
More informationSTAR-LAUNCH AND NETWORK DISCOVERY
STAR-LAUNCH AND NETWORK DISCOVERY Session: SpaceWire Networks and Protocols Long Paper Stuart Mills, Chris McClements STAR-Dundee, c/o School of Computing, University of Dundee, Dundee, Scotland, UK Steve
More informationTowards automated software component configuration and deployment
Towards automated software component configuration and deployment Vincent Lestideau, Noureddine Belkhatir, Pierre-Yves Cunin Adele Team Bat C LSR-IMAG, 220 rue de la chimie Domaine Universitaire, BP 53
More informationSCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
More informationAN AIR TRAFFIC MANAGEMENT (ATM) SYSTEM PERFORMANCE MODEL ETMS
AN AIR TRAFFIC NAGEMENT (ATM) SYSTEM PERFORNCE MODEL Edward J. Modzelesky, Tejal Topiwala, Sarah E. Stalnaker, Michael A. Hermes, The MITRE Corporation, McLean, VA Abstract In this paper, we discuss our
More informationSocket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
More informationApplication Architectures
Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch
More informationArchitecture Description Languages
Architecture Description Languages Stefan Björnander The Department of Computer Science and Electronics Mälardalen University Abstract An Architecture Description Language (ADL) is a language designed
More informationModel-Based Software Quality Assurance with the Architecture Analysis and Design Language
AIAA Infotech@Aerospace Conference andaiaa Unmanned...Unlimited Conference 6-9 April 2009, Seattle, Washington AIAA 2009-2034 Model-Based Software Quality Assurance with the Architecture Analysis
More informationSOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
More informationChapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
More informationCHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message
More informationGround System Architecture Workshop
Ground System Architecture Workshop Defining System Interfaces in System of Systems with SOA 2010 Northrop Grumman Corporation. All rights reserved. (Log # DSD 10 13) March 1-4, 2010 Jean Tsao Yeng-Zhong
More information12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
More informationQuesCom FS400 Fax & SMS Communication Router
QuesCom FS400 Fax & SMS Communication Router Sales Documentation Oct 2012 Headquarters "Les Algorithmes Pythagore B" 2000 Route des Lucioles 06410 BIOT - FRANCE Phone: +33 4 97 04 19 30 Fax: +33 4 97 04
More informationCisco Intercloud Fabric for Business
Data Sheet Cisco Intercloud Fabric for Business Combining the Benefits of Public and Private Clouds in a Hybrid Cloud Cisco Intercloud Fabric for Business enables enterprises to create a seamless hybrid
More informationToday. Intro to real-time scheduling Cyclic executives. Scheduling tables Frames Frame size constraints. Non-independent tasks Pros and cons
Today Intro to real-time scheduling Cyclic executives Scheduling tables Frames Frame size constraints Generating schedules Non-independent tasks Pros and cons Real-Time Systems The correctness of a real-time
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationAgent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
More informationOracle WebLogic Server 11g Administration
Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and
More informationCopyright 2011 - bizagi
Copyright 2011 - bizagi 1. Process Automation with bizagi... 3 Description... 3 Objectives... 3 Target Audience Profile... 4 Duration... 4 2. Part I Basic concepts to build a bizagi solution... 5 Description...
More informationDistributed Systems. Security concepts; Cryptographic algorithms; Digital signatures; Authentication; Secure Sockets
I. Introduction II. Fundamental Concepts of Architecture models; network architectures: OSI, Internet and LANs; interprocess communication III. Time and Global States Clocks and concepts of time; Event
More informationARINC 653. An Avionics Standard for Safe, Partitioned Systems
ARINC 653 An Avionics Standard for Safe, Partitioned Systems 1 Courtesy of Wind River Inc. 2008 IEEE-CS Seminar June 4 th, 2008 Agenda Aerospace Trends IMA vs. Federated ARINC 653 Main concepts Safety
More informationSentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
More informationDigital Advisory Services Professional Service Description Network Assessment
Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,
More informationPresentation of the AADL: Architecture Analysis and Design Language
Presentation of the AADL: Architecture Analysis and Design Language Outline 1. AADL a quick overview 2. AADL key modeling constructs 1. AADL components 2. Properties 3. Component connection 3. AADL: tool
More information2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts
Chapter 2 Introduction to Distributed systems 1 Chapter 2 2.1 What are distributed systems? What are systems? Different kind of systems How to distribute systems? 2.2 Communication concepts Client-Server
More informationSOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems
SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE
More informationintroducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
More informationThe SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München boehmw@in.tum.de Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
More informationExam Name: IBM WebSphere Process Server V6.2,
Vendor: IBM Exam Code: 000-375 Exam Name: IBM WebSphere Process Server V6.2, System Administration Version: DEMO 1.A company has an IBM WebSphere Process Server clustered environment running. A system
More informationTable of Contents. Preface. Chapter 1 Introduction 1.1 Background. 1.2 Problem description. 1.3 The role of standardization. 1.4 Scope and objectives
Table of Contents Table of Contents Preface Chapter 1 Introduction 1.1 Background 1.2 Problem description 1.3 The role of standardization 1.4 Scope and objectives 1.5 Approach 1.6 Related work 1.7 General
More informationSOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
More informationLehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
More informationIntroduction into Web Services (WS)
(WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationMonitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
More informationAC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY
AC 2009-2223: A VIRTUALIZED NETWORK TEACHING LABORATORY Eric Freudenthal, University of Texas, El Paso Eric Freudenthal is an Assistant Professor of computer science at the University of Texas at El Paso.
More informationParallels Mac Management v4.0
Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks
More informationService Oriented Architectures Using DoDAF1
1 Service Oriented Architectures Using DoDAF1 Huei-Wan Ang, Fatma Dandashi, Michael McFarren The Mitre Corporation The MITRE Corp. 7515 Colshire Dr. McLean, VA 22102 hwang(at)mitre.org, dandashi(at)mitre.org,
More informationChapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
More informationTD 271 Rev.1 (PLEN/15)
INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 15 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2009-2012 English only Original: English Question(s): 12/15 Geneva, 31 May - 11 June 2010 Source:
More informationAlgorithms, Flowcharts & Program Design. ComPro
Algorithms, Flowcharts & Program Design ComPro Definition Algorithm: o sequence of steps to be performed in order to solve a problem by the computer. Flowchart: o graphical or symbolic representation of
More informationChapter 12: Multiprocessor Architectures. Lesson 09: Cache Coherence Problem and Cache synchronization solutions Part 1
Chapter 12: Multiprocessor Architectures Lesson 09: Cache Coherence Problem and Cache synchronization solutions Part 1 Objective To understand cache coherence problem To learn the methods used to solve
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationPeer-to-Peer SIP Mode with FXS and FXO Gateways
Peer-to-Peer SIP Mode with FXS and FXO Gateways New Rock s SIP based VoIP gateways with FXS and FXO ports support peer-to-peer mode which has many applications in deploying enterprise multi-site telephone
More informationfor Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later
for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later Copyright 2014, Lucid Innovations Limited. All Rights Reserved Lucid Research
More informationM.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
More informationCISC 1600 Introduction to Multi-media Computing
CISC 1600 Introduction to Multi-media Computing Spring 2012 Instructor : J. Raphael Email Address: Course Page: Class Hours: raphael@sci.brooklyn.cuny.edu http://www.sci.brooklyn.cuny.edu/~raphael/cisc1600.html
More informationNVO3: Network Virtualization Problem Statement. Thomas Narten narten@us.ibm.com. IETF 83 Paris March, 2012
NVO3: Network Virtualization Problem Statement Thomas Narten narten@us.ibm.com IETF 83 Paris March, 2012 High-Level Motivation Imagine a data center Could be cloud provider, hosting center, enterprise
More informationVIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationKernel Types System Calls. Operating Systems. Autumn 2013 CS4023
Operating Systems Autumn 2013 Outline 1 2 Types of 2.4, SGG The OS Kernel The kernel is the central component of an OS It has complete control over everything that occurs in the system Kernel overview
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationTrademark Notice. General Disclaimer
Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment
More informationOM2012 Network Monitoring. Phil Bracher Sr. Premier Field Engineer Microsoft Corporation
OM2012 Network Monitoring Phil Bracher Sr. Premier Field Engineer Microsoft Corporation Continuous Availability of the Management Group: Resource Pooling Config service Scale and Federation Data Access
More informationInternet Protocol Address
SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give
More informationSteps Towards a DoS-resistant Internet Architecture. Mark Handley Adam Greenhalgh University College London
Steps Towards a DoS-resistant Internet Architecture Mark Handley Adam Greenhalgh University College London Denial-of-Service Attacker attempts to prevent the victim from doing any useful work. Flooding
More informationNetwork Address Translation (NAT)
Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network
More informationChapter 2 Database System Concepts and Architecture
Chapter 2 Database System Concepts and Architecture Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 2 Outline Data Models, Schemas, and Instances Three-Schema Architecture
More informationQuestions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
More informationThe OSI Model and the TCP/IP Protocol Suite
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
More informationDynamism and Data Management in Distributed, Collaborative Working Environments
Dynamism and Data Management in Distributed, Collaborative Working Environments Alexander Kipp 1, Lutz Schubert 1, Matthias Assel 1 and Terrence Fernando 2, 1 High Performance Computing Center Stuttgart,
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More informationEngr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila
Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Application Architectures Ref: Chapter 13 Software Engineering By Ian Sommerville, 7th Edition
More informationInternet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
More informationC/S Basic Concepts. The Gartner Model. Gartner Group Model. GM: distributed presentation. GM: distributed logic. GM: remote presentation
C/S Basic Concepts The Gartner Model Contents: 2-tier Gartner Model Winsberg s Model / Balance Example 3-tier n-tier Became de facto reference model Recognizes 5 possible modes of distribution: distributed
More informationProtocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
More informationA P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt
A SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt IETF65, Dallas March 25, 2006 Eunsoo Shim Sathya Narayanan Greg Daley Panasonic Digital Networking Laboratory Two Layer Approach
More informationChapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
More informationInternet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
More informationAccessing BlackBerry Data Services Using Wi-Fi Networks
Accessing BlackBerry Data Services Using Wi-Fi Networks 2007 Research In Motion Limited. All rights reserved. 2 of 7 Contents Introduction...3 Wi-Fi access to BlackBerry data services...3 Priority for
More informationCompatibleOne Open Source Cloud Broker Architecture Overview
CompatibleOne Open Source Cloud Broker Architecture Overview WHITE PAPER October 2012 Table of Contents Abstract 2 Background 2 Disclaimer 2 Introduction 2 Section A: CompatibleOne: Open Standards and
More informationCLOUD COMPUTING & WINDOWS AZURE
CLOUD COMPUTING & WINDOWS AZURE WORKSHOP Overview This workshop is an introduction to cloud computing and specifically Microsoft s public cloud offering in Windows Azure. Windows Azure has been described
More informationMobile Communication An overview Lesson 07 Introduction to Mobile Computing
Mobile Communication An overview Lesson 07 Introduction to Mobile Computing Oxford University Press 2007. All rights reserved. 1 Mobile computing A Definition The process of computation on a mobiledevice
More informationOperating System Organization. Purpose of an OS
Slide 3-1 Operating System Organization Purpose of an OS Slide 3-2 es Coordinate Use of the Abstractions he Abstractions Create the Abstractions 1 OS Requirements Slide 3-3 Provide resource abstractions
More informationComputer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University
Computer Networks Introduc)on to Naming, Addressing, and Rou)ng Week 09 College of Information Science and Engineering Ritsumeikan University MAC Addresses l MAC address is intended to be a unique identifier
More informationWindows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE PF1000 Overview. IT Network Global Solutions Division UNIVERGE Support Center
Windows Server 2012 Hyper-V Virtual Switch Extension Software UNIVERGE Overview IT Network Global Solutions Division UNIVERGE Support Center ProgrammableFlow API architecture Microsoft VSEM Provider Third
More informationRequirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationHow To Write A Composition Engine In A Microsoft Ip System
Service composition in IMS using Java EE SIP servlet containers Torsten Dinsing, Göran AP Eriksson, Ioannis Fikouras, Kristoffer Gronowski, Roman Levenshteyn, Per Pettersson and Patrik Wiss The IP Multimedia
More informationSecurity Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
More informationAdvanced Analysis and Design
Advanced Analysis and Design Architectural Styles Professor David S. Rosenblum Department of Computer Science http://www.cs.ucl.ac.uk/staff/d.rosenblum/ Architectural Styles A set of design rules that
More informationAdoption of SDN: Progress Update
Adoption of SDN: Progress Update Stuart Elby VP, Network Architecture & Technology 17 April 2012 Services Migration to the Cloud Service intelligence distributed across dedicated network elements Opportunity:
More informationAn Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
More informationLesson 4 Web Service Interface Definition (Part I)
Lesson 4 Web Service Interface Definition (Part I) Service Oriented Architectures Module 1 - Basic technologies Unit 3 WSDL Ernesto Damiani Università di Milano Interface Definition Languages (1) IDLs
More informationCoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
More informationHigher Computing Science Course Assessment Specification (C716 76)
Higher Computing Science Course Assessment Specification (C716 76) Valid from August 2014 This edition: June 2015, version 1.3 This specification may be reproduced in whole or in part for educational purposes
More informationFinal exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
More informationWhat s New in SharePoint 2016 (On- Premise) for IT Pros
What s New in SharePoint 2016 (On- Premise) for IT Pros This article is based on notes taken during a public presentation at the Microsoft Ignite event by presenter Bill Baer. A video of the session can
More informationvsphere Client Hardware Health Monitoring VMware vsphere 4.1
Technical Note vsphere Client Hardware Health Monitoring VMware vsphere 4.1 Purpose of This Document VMware vsphere provides health monitoring data for ESX hardware to support datacenter virtualization.
More informationYou can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
More informationMEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied
More informationSCADE System 17.0. Technical Data Sheet. System Requirements Analysis. Technical Data Sheet SCADE System 17.0 1
SCADE System 17.0 SCADE System is the product line of the ANSYS Embedded software family of products and solutions that empowers users with a systems design environment for use on systems with high dependability
More informationFOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW
I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new
More informationArchitectures for Distributed Real-time Systems
SDP Workshop Nashville TN 13 Dec 2001 Architectures for Distributed Real-time Systems Michael W. Masters NSWCDD Building Systems for the Real World What is the Problem? Capability sustainment Affordable
More informationTSP s RIM Package. TSP s Innovate. Server Monitoring Services Top 10 Monitoring Parameters. Firewall Monitoring Services Monitoring Parameters
TSP s RIM Package TSP s unique RIM (Remote Infrastructure Management) package has always been a favorite with new entrants to infrastructure management. Designed to offer the best value for money and with
More informationNovell LDAP Proxy Server
AUTHORIZED DOCUMENTATION Best Features Guide Novell LDAP Proxy Server 1.0 October 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use
More informationInternet Concepts. What is a Network?
Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,
More informationNetwork Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013
Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center
More informationCompositional Security Evaluation: The MILS approach
Compositional Security Evaluation: The MILS approach John Rushby and Rance DeLong Computer Science Laboratory SRI International Menlo Park CA USA Primary affiliation: LynuxWorks John Rushby, Rance DeLong,
More information