Architecture & Design of Embedded Real-Time Systems (TI-AREM)
|
|
|
- Esmond Norris
- 10 years ago
- Views:
Transcription
1 Architecture & Design of Embedded Real-Time Systems (TI-AREM) Architectural Design Patterns 2. Components & Connectors and Component Architecture Patterns and UML 2.0 Ports (BPD. Chapter 4. p ) Version:
2 Agenda Component Notation Component-based architecture Pattern Component & Connectors ROOM Pattern Design with UML 2.0 Ports Slide 2
3 UML Component Notation (1) MyInterface «component» Component requiredinterface Provided interface Required interface An interface: defines operation signatures (name, parameters and return type) NB! UML 2.0 Component notation and concepts Slide 3
4 UML Component Notation (2) OrderEntry «component» Order Person Compact view «Interface» OrderEntry +create() +validatedetails() +addorderline() Detailed view «component» Order «use» «Interface» Person +create() +findbyname() +getdeatils() Slide 4
5 UML Component Notation (3) Assembly Connector Slide 5
6 Component-Based Architecture A component in UML is a run-time artifact that forms the basic replaceable unit of software Component examples: static libraries, dynamic link libraries (DLLs), OCX and ActiveX components Slide 6
7 Component Based Pattern Structure Slide 7
8 Component Based Pattern Example Slide 8
9 Slide 9
10 Component & Connectors Existing research has focused on Component structure Component Interfaces Component functionality More focus needed on component interactions embodied in the notation of software connectors Slide 10
11 Connectors Connector definition: Connectors mediates interactions among components, that is, they establish the rules that govern component interaction and specify any auxiliary mechanism required Connectors should be first-class modeling constructs Ref. Article: Towards a Taxanomy of Software Connectors Slide 11
12 ROOM Pattern ROOM (Real-Time Object-Oriented Methodology). The ROOM Pattern is appropriate when the interaction of some large-scale objects is complex and requires special means to mediate and control. Slide 12
13 ROOM Pattern Structure Slide 13
14 ROOM Pattern Example Slide 14
15 ROOM Ports (~UML Ports) Master: Comm Object isender ireceiver Slave: Comm Object ROOM Ports => UML 2.x Ports Slide 15
16 ROOM Pattern Example State Chart Model Slide 16
17 UML 2.0 Ports Ports The Ports subpackage provides mechanisms for isolating a classifier from its environment. This is achieved by providing a point for conducting interactions between the internals of the classifier and its environment. This interaction point is referred to as a port. Multiple ports can be defined for a classifier, enabling different interactions to be distinguished based on the port through which they occur. By decoupling the internals of the classifier from its environment, ports allow a classifier to be defined independently of its environment, making that classifier reusable in any environment that conforms to the interaction constraints imposed by its ports. Ref. UML 2.0 Superstructure spec. Slide 17
18 New UML 2.0 Concepts for Classes A port groups interfaces belonging to a particular stakeholder. A port can have as well provided as required interfaces. Ref. Article Architecting Systems with UML 2.0, IEEE Software jul/aug Slide 18
19 Example with Internal Structure Black Box View White Box View Structured Class Slide 19
20 Example with Behavioral Port Slide 20
21 Example: Home Alarm System version 1 home alarm detect intrusions <<extend>> occupation simulation «extend» intruder sound alarm arming and di sarming homeowner via keypad <<in clud e>> via remote code entry ch anging code <<inclu de>> Ref. Rhapsody 7.0 Slide 21
22 Home Alarm System version 1 Slide 22
23 Home Alarm System version 1 AlarmPkg «Facad e» AlarmController Without Using ports itsalarmcontroller 1 HardwarePkg thehardware 1 «Interface» IHardware Slide 23
24 AlarmController a Composite Class «Facade» AlarmController 1 t hekey pad:keypad 1 thelightcontroller:lightcontroller 1 1 thegreenled:led 1 theredled:led itsalarmcontroller thehardware 1 «Interf ace» IHardware setlight(alight:tlights,state:tonoff):void onarm():void ondisarm():void onkeyoff():void onkeyon():void onkey(n:int):void onmovement():void ondoor():void setled(ident:tled,state:tonoff):void setsiren(state:tonoff):void Slide 24
25 AlarmController State Diagram /init(); armed off evtemporise exiting active tm(exit_time) evarm detecting entering evdoor evdisarm evmovement tm(silence_time) evmovement tm(entry_time) intrusion tm(alarm_time) silence Slide 25
26 AlarmController Public Operations «Facade» AlarmController configure(ahardware:ihardware*):void AlarmController() flashgreenled():void onarm():void ondisarm():void ondoor():void onkey(n:int):void onkeyoff():void onkeyon():void onmovement():void evarm():void evmovement():void evdoor():void evtemporise():void evdisarm():void 1 itsalarmcontroller thehardware 1 «Interface» HardwarePkg::IHardware setlight(alight:tlights,state:t... onarm():void ondisarm():void onkeyoff():void onkeyon():void onkey(n:int):void onmovement():void ondoor():void setled(ident:tled,state:tono... setsiren(state:tonoff):void Slide 26
27 Possible Hardware Implementations AlarmHw 486Pkg Hw Poll Hw Irq AlarmHw 68kPkg SimulatedHw Pkg Hw guidlg «Interf ace» IHardw are onarm():void ondisarm():void onkeyoff() :void onkeyon():void onkey( n:int):void onmovement():void ondoor():void setled(ident:tled,state:to... setsiren(state:tonoff):void TestPkg Hw Slide 27
28 Home Alarm version 2 with Ports Ports are a new UML2.x modeling concept that allows strong encapsulation of classes from the environment. In this case, the Hardware and Alarm Controller are decoupled by specifying ports as their boundary interaction points. Slide 28
29 Package Diagram PORT: hwobserver With 3 provided interface AlarmPkg hwobserver IDoorListener,IKey Listener,IMov ementlistener HardwarePkg AbstractHW AbsHardware «F acade» AlarmController IKey Listener,I Mov ementlist ener, IDoorListener ctrl hwctrl ILedCtrl,ILightCtrl,ISirenCtrl PORT: ctrl PORT: hwctrl With 3 required interface ILedCt rl,ilight Ct rl,isirenctrl SimulatedHwPkg HwTestPkg guidlg Hw Slide 29
30 Home Alarm version 2 with Ports PORT: hwobserver hwobserver 1 «F acade» Alarm Controller thekeypad:keyp ad IDoorListener,IKey Listener,IMov ementlistener hw 1 thesiren:siren Co ntroll er ISirenCtrl PORT: hwctrl hw ILightC trl 1 th el igh tcontroller:lightc on trol ler hwc trl ILedC trl,ilightctrl,isirenc trl hw 1 thegreenled:led ILedCtrl hw 1 theredled:le d ILedC trl Slide 30
31 Classes: KeyPad, SirenController, Led newcode:int count:int oldcode:int Keypad Keypad() iscodecorrect():omboolean iscodeentered():omboolean changecode():void evkeyoff():void evkey():void evkeyon():void hw ISirenCtrl hw ILedCtrl SirenController setsirenon():void setsirenoff():void Led Led() evtoggle():void evflash():void evon():void evoff():void Slide 31
32 KeyPad State Diagram active armingdisarmingreprogr amming evkeyoff [IS_IN(cor rect)]/ itscontroller- >GEN(evDisarm) ; idle evkey/ codeentry newcode = (10 * new Code ) + params ->n; c ount++; evkey/ new Code = params->n; tm(5000) count=1; enteringcode ev KeyOff evkeyon [IS_IN(cor rect)]/ itscontroller- >GEN(evTemporise); [iscodeenter ed() ] evkeyon[is_in(different) ]/ changecode(); [IS_IN(notEntered) ] reprogramming [else] [is CodeCorrect()] waitoldcode currentcode evkey On [else] dif ferent correct evkeyoff [IS_IN(c orrect)] waitnew Code tm(3000) notentered tm(3000) tm(10000) 2 AND states Slide 32
33 Test Configuration hwobserver 1 «Facade» thealarm Ctrl:AlarmController IDoorListener,IKeyLis tener,imovementlistener IKeyListener,IMovem entlistene r,idoorlistener ILedC trl,ilightctrl,isirenctrl ctrl 1 thehw:hw hwctrl ILedCtrl,ILightCtrl,ISi renc trl Slide 33
34 Rhapsody Implementation of a Port (1) PORT: hwobserver AlarmController IDoorListener, IKeyListener, IMovementListener «Interface» IDoorListener «Interface» IKeyListener «Interface» IMovementListener ondoor():void onkey(n:int):void onkeyoff():void onkeyon():void onarm():void ondisarm():void onmovement():void Auto generated Port Class AlarmController hwobserver_c::inbound_c Slide 34
35 Rhapsody Implementation of a Port (2) AlarmController PORT: hwctrl ILedCtrl, ILIghtCtrl, ISirenCtrl «Interface» ILedCtrl «Interface» ILightCtrl «Interface» ISirenCtrl setled(ident:tled,state:tonoff)... setlight(alight:tlights,stat... setsiren(state:tonoff):void hwctrl_c::outbound_c Auto generated Port Class Slide 35
36 Rhapsody Implementation of a Port (3) PORT: hwobserver AlarmController PORT: hwctrl ILedCtrl, ILIghtCtrl, ISirenCtrl IDoorListener, IKeyListener, IMovementListener hwobserver_c hwctrl_c InBound_C x OutBound_C IDoorListener IKeyListener IMovementListener x InBound_C OutBound_C ISirenCtrl ILightCtrl ILedCtrl Slide 36
37 Rhapsody Implementation of a Port (4) thehw: Hw ctrl:ctrl_c OutBound: OutBound_C thealarmcrtl: AlarmController hwobserver: hwobserver_c InBound: InBound_C InBound: InBound_C hwctrl: hwctrl_c OutBound: OutBound_C Slide 37
38 AlarmController thealarmctrl; Hw thehw; Test Setup thehw.getctrl()->setitsikeylistener( thealarmctrl.gethwobserver()->getitsikeylistener()); thehw.getctrl()->setitsimovementlistener( thealarmctrl.gethwobserver()->getitsimovementlistener()); thehw.getctrl()->setitsidoorlistener( thealarmctrl.gethwobserver()->getitsidoorlistener()); thealarmctrl.gethwctrl()->setitsiledctrl(thehw.getctrl()->getitsiledctrl()); thealarmctrl.gethwctrl()->setitsilightctrl(thehw.getctrl()->getitsilightctrl()); thealarmctrl.gethwctrl()->setitsisirenctrl(thehw.getctrl()->getitsisirenctrl()); Slide 38
39 UML 2.0 Component Diagram «Executable» Gui <<Usage>> HWAbsLib AlarmCtrlLib <<Usage>> Slide 39 <<Callback>> (via ports)
40 Summary Component patterns and ports: Component-Based Architecture ROOM Pattern (=>UML 2.x Ports) Designing with Ports in UML 2.x Slide 40
Designing a Home Alarm using the UML. And implementing it using C++ and VxWorks
Designing a Home Alarm using the UML And implementing it using C++ and VxWorks M.W.Richardson I-Logix UK Ltd. [email protected] This article describes how a simple home alarm can be designed using the UML
Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
Software Development in the Large!
Software Development in the Large! Peter Eeles Executive IT Architect, IBM [email protected] IBM Rational Software Development Conference 2007 2007 IBM Corporation Agenda IBM Rational Software Development
EMBEDDED SOFTWARE DEVELOPMENT: COMPONENTS AND CONTRACTS
EMBEDDED SOFTWARE DEVELOPMENT: COMPONENTS AND CONTRACTS David URTING, Stefan VAN BAELEN, Tom HOLVOET and Yolande BERBERS {David.Urting, Stefan.VanBaelen, Tom.Holvoet, Yolande.Berbers}@cs.kuleuven.ac.be
Applying 4+1 View Architecture with UML 2. White Paper
Applying 4+1 View Architecture with UML 2 White Paper Copyright 2007 FCGSS, all rights reserved. www.fcgss.com Introduction Unified Modeling Language (UML) has been available since 1997, and UML 2 was
Using UML Part One Structural Modeling Diagrams
UML Tutorials Using UML Part One Structural Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,
Explicit Connectors in Component Based Software Engineering for Distributed Embedded Systems. Dietmar Schreiner and Karl M.
Explicit Connectors in Component Based Software Engineering for Distributed Embedded Systems Dietmar Schreiner and Karl M. Göschka Vienna University of Technology Institute of Information Systems, Distributed
Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
Applying Use Cases to Microcontroller Code Development. Chris Gilbert Cypress Semiconductor
Applying Use Cases to Microcontroller Code Development Chris Gilbert Cypress Semiconductor Agenda Why Use Cases Microcontroller Project Development Use Cases Defined Use Cases Composition General Example
UML - Getting Started EA v4.0
UML - Getting Started Codegeneration with Enterprise Architect How to generate Code from an Enterprise Architect UML Model with the help of and Willert Software Tools RXF (Realtime execution Framework)
Using UML to Construct a Model Driven Solution for Unified Access to Disparate Data
Using UML to Construct a Model Driven Solution for Unified Access to Disparate Data Randall M. Hauch VP Development, Chief Architect Metadata Management OMG's Second Workshop on UML for Enterprise Applications:
A hypervisor approach with real-time support to the MIPS M5150 processor
ISQED Wednesday March 4, 2015 Session 5B A hypervisor approach with real-time support to the MIPS M5150 processor Authors: Samir Zampiva ([email protected]) Carlos Moratelli ([email protected])
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
Conceptual Model for Enterprise Governance. Walter L Wilson
Conceptual Model for Walter L Wilson Agenda Define the and Architecture Define a Ground Station as an Business Process Define Define Levels and Types of Introduce Model Define effects of Engineering 2
UML other structural. diagrams. (Implementation Diagrams UML 1.5) Università di Padova. Facoltà di Scienze MM.FF.NN. Informatica - anno 2009-10
Università di Padova Facoltà di Scienze MM.FF.NN Informatica - anno 2009-10 Corso di Ingegneria del Software - B UML other structural diagrams (Implementation Diagrams UML 1.5) v 2.3 Renato Conte - UML:
Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation
Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation Despite significant efforts to improve engineering practices and technologies,
Automotive System and Software Architecture
Automotive System and Software Architecture Yanja Dajsuren 2IW80 Software specification and architecture March 25, 2014 Which one has more software? Chevrolet Volt, an example modern day car Boeing 787,
Requirements engineering
Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and
IRA 423/08. Designing the SRT control software: Notes to the UML schemes. Andrea Orlati 1 Simona Righini 2
Designing the SRT control software: Notes to the UML schemes Andrea Orlati 1 Simona Righini 2 1 - I.N.A.F. Istituto di Radioastronomia. 2 Dip. Astronomia - Università degli Studi di Bologna. Dicembre 2008
Chap 1. Introduction to Software Architecture
Chap 1. Introduction to Software Architecture 1. Introduction 2. IEEE Recommended Practice for Architecture Modeling 3. Architecture Description Language: the UML 4. The Rational Unified Process (RUP)
Software Architecture Document
Software Architecture Document Natural Language Processing Cell Version 1.0 Natural Language Processing Cell Software Architecture Document Version 1.0 1 1. Table of Contents 1. Table of Contents... 2
Viewpoint Modeling. Agenda. 1. Viewpoint Modeling 2. ODS, Enterprise Architecture, Viewpoints, Models 3. Modeling approaches and standards
Viewpoint Modeling Antonio Vallecillo Universidad de Málaga Dpto. Lenguajes y Ciencias de la Computación [email protected] http://www.lcc.uma.es/~av Master en Ingeniería del Software e Inteligencia Artificial
A Management Tool for Component-Based Real-Time Supervision and Control Systems
A Management Tool for Component-Based Real-Time Supervision and Control Systems Sandro Santos Andrade, Raimundo José de Araújo Macêdo Distributed Systems Laboratory (LaSiD) Post-Graduation Program on Mechatronics
The Role of the Software Architect
IBM Software Group The Role of the Software Architect Peter Eeles [email protected] 2004 IBM Corporation Agenda Architecture Architect Architecting Requirements Analysis and design Implementation
Patterns in. Lecture 2 GoF Design Patterns Creational. Sharif University of Technology. Department of Computer Engineering
Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 2 GoF Design Patterns Creational 1 GoF Design Patterns Principles Emphasis on flexibility and reuse through decoupling of classes. The underlying
IBM Certified BPM Application Developer IBM Business Process Manager Express or Standard Edition V8.5.5
Information Prix Nb voucher: Prix des Voucher(s) N.C. 0 Vouchers N.C. IBM Certified BPM Application Developer IBM Business Process Manager Express or Standard Edition V8.5.5 Label Test IBM Certified BPM
SysML Modelling Language explained
Date: 7 th October 2010 Author: Guillaume FINANCE, Objet Direct Analyst & Consultant UML, the standard modelling language used in the field of software engineering, has been tailored to define a modelling
Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53
Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software
Model Transformations and Code Generation
Model Transformations and Code Generation Ecole IN2P3 Temps Réel [email protected] 2 École d été, 26.11 08h30 10h00: Cours S1 Component models CCM and FCM (connectors) CCM CORBA component model
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2006 Vol. 5, No. 6, July - August 2006 On Assuring Software Quality and Curbing Software
An Architecture-Based Approach for Component-Oriented Development
An Architecture-Based Approach for Component-Oriented Development Feng Chen, Qianxiang Wang, Hong Mei, Fuqing Yang Department of Computer Science and Technology, Peking University, Beijing 100871, P.R.China
Huawei Network Edge Security Solution
Huawei Network Edge Security Huawei Network Edge Security Solution Enterprise Campus Network HUAWEI TECHNOLOGIES CO., LTD. Huawei Network Edge Security Solution Huawei Network Edge Security 1 Overview
UNIFACE Component-based. Development Methodology UNIFACE V7.2. 151157206-00 Revision 0 Dec 2000 UMET
UNIFACE Component-based Development Methodology UNIFACE V7.2 151157206-00 Revision 0 Dec 2000 UMET UNIFACE Component-based Development Methodology Revision 0 Restricted Rights Notice This document and
Tool Support for Software Variability Management and Product Derivation in Software Product Lines
Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,
Component-Oriented Engineering
Component-Oriented Engineering... the dawn of a new era in embedded software development productivity Francis Bordeleau and Ross MacLeod Zeligsoft May 2008 Component-Oriented Engineering the dawn of a
Model-Driven Software Development for Robotics: an overview
Model-Driven Software Development for Robotics: an overview IEEE-ICRA2011 Workshop on Software Development and Integration in Robotics Jan F. Broenink, Maarten M. Bezemer Control Engineering, University
i. Node Y Represented by a block or part. SysML::Block,
OMG SysML Requirements Traceability (informative) This document has been published as OMG document ptc/07-03-09 so it can be referenced by Annex E of the OMG SysML specification. This document describes
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED CONCEPTUALIZATION MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED CONCEPTUALIZATION MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
Designing Real-Time and Embedded Systems with the COMET/UML method
By Hassan Gomaa, Department of Information and Software Engineering, George Mason University. Designing Real-Time and Embedded Systems with the COMET/UML method Most object-oriented analysis and design
Software Testing. Definition: Testing is a process of executing a program with data, with the sole intention of finding errors in the program.
Software Testing Definition: Testing is a process of executing a program with data, with the sole intention of finding errors in the program. Testing can only reveal the presence of errors and not the
Developing SOA solutions using IBM SOA Foundation
Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this
F-16 Modular Mission Computer Application Software
F-16 Modular Mission Computer Application Software Achieving Cross-Platform Compatibility with Increased Productivity and Quality using the OMG s Model Driven Architecture Lauren E. Clark Chief Engineer
Introduction to Simulink & Stateflow. Coorous Mohtadi
Introduction to Simulink & Stateflow Coorous Mohtadi 1 Key Message Simulink and Stateflow provide: A powerful environment for modelling real processes... and are fully integrated with the MATLAB environment.
Standard Glossary of Terms Used in Software Testing. Version 3.01
Standard Glossary of Terms Used in Software Testing Version 3.01 Terms Used in the Expert Level Test Automation - Engineer Syllabus International Software Testing Qualifications Board Copyright International
Object-Oriented Systems Analysis and Design
Object-Oriented Systems Analysis and Design Noushin Ashrafi Professor of Information System University of Massachusetts-Boston Hessam Ashrafi Software Architect Pearson Education International CONTENTS
Software Engineering/Courses Description Introduction to Software Engineering Credit Hours: 3 Prerequisite: 0306211(Computer Programming 2).
0305203 0305280 0305301 0305302 Software Engineering/Courses Description Introduction to Software Engineering Prerequisite: 0306211(Computer Programming 2). This course introduces students to the problems
ATV Data Link Simulator: A Development based on a CCSDS Layers Framework
SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2089 ATV Data Link Simulator: A Development based on a CCSDS
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance
Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance Sponsored by the U.S. Department of Homeland Security (DHS), the Software Engineering Institute
Development Process Automation Experiences in Japan
Development Process Automation Experiences in Japan Dr. Olaf Kath ikv ++ technologies ag Germany ikv++ technologies ag 2007 who we are core business optimization and automation of our customer s system
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3
Component-based Development Process and Component Lifecycle Ivica Crnkovic 1, Stig Larsson 2, Michel Chaudron 3 1 Mälardalen University, Västerås, Sweden, [email protected] 2 ABB Corporate Research,
Introduction to software architecture
Learning Unit 1 Introduction to software architecture Contents Introduction............................................... 7 1.1 What is software architecture?................................. 7 1.1.1
8. Master Test Plan (MTP)
8. Master Test Plan (MTP) The purpose of the Master Test Plan (MTP) is to provide an overall test planning and test management document for multiple levels of test (either within one project or across
Design principles in Test Suite Architecture
Design principles in Test Suite Architecture InSTA 2015 (International workshop on Software Test Architecture) Graz, Austria 2015/4/13(Mon) Nishi, Yasuharu The University of Electro-Communications, Japan
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
TMT SOFTWARE REQUIREMENTS FOR LOW-LEVEL SUBSYSTEMS
TMT SOFTWARE REQUIREMENTS FOR LOW-LEVEL SUBSYSTEMS TMT.SFT.DRD.12.001.REL05 October 15, 2012 TMT.SFT.DRD.12.001.REL05 PAGE 2 OF 16 TABLE OF CONTENTS 1 INTRODUCTION 4 1.1 Purpose... 4 1.2 Scope... 4 1.3
IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII
IP Interface for the Somfy Digital Network (SDN) & RS485 URTSII Internet Protocol (IP) Interface Product Options Cat # 1810815 IP Interface Only Cat # 1810870: Interface and DB9/RJ45 Adapter (9015028)
OPEN ESB 2.3 TUTORIAL. (Throttling in BPEL SE)
OPEN ESB 2.3 TUTORIAL (Throttling in BPEL SE) ABOUT LOGICOY LogiCoy incorporated in February 2009. Headquarters in Los Angeles, California with 24/7 offices in US, U.K., and India, is a Global Information
Unified Batch & Stream Processing Platform
Unified Batch & Stream Processing Platform Himanshu Bari Director Product Management Most Big Data Use Cases Are About Improving/Re-write EXISTING solutions To KNOWN problems Current Solutions Were Built
Integration, testing and debugging of C code together with UML-generated sources
Integration, testing and debugging of C code together with UML-generated sources Old C code Fig. 1: Adding tram traffic lights to a traffic intersection Introduction It will soon no longer be possible
A Methodology for the Development of New Telecommunications Services
A Methodology for the Development of New Telecommunications Services DIONISIS X. ADAMOPOULOS Centre for Communication Systems Research School of Elec. Eng., IT and Mathematics University of Surrey Guildford
Construction Principles and Design Patterns. Flyweight, Bridge, Builder
Construction Principles and Design Patterns Flyweight, Bridge, Builder 1 The Flyweight Design Pattern: Structure Use: To avoid employing a large number of objects with similar state When objects with intrinsic
In this Lecture you will Learn: Development Process. Unified Software Development Process. Best Practice
In this Lecture you will Learn: Development Chapter 5C About the Unified Software Development How phases relate to workflows in an iterative life cycle An approach to system development Major activities
FIREWALL POLICY November 2006 TNS POL - 008
FIREWALL POLICY November 2006 TNS POL - 008 Introduction Network Security Services (NSS), a department of Technology and Network Services, operates a firewall to enhance security between the Internet and
Enterprise Integration: operational models of business processes and workflow systems *
Enterprise Integration: operational models of business processes and workflow systems. 1 Enterprise Integration: operational models of business processes and workflow systems * G.Bruno 1, C.Reyneri 2 and
Incorporating Aspects into the UML
Incorporating Aspects into the UML Mark Basch University of North Florida Department of Computer and Information Sciences Jacksonville, FL 32224-2645 (904) 620-2985 [email protected] Arturo Sanchez University
Proposal for a Vehicle Tracking System (VTS)
Proposal for a Vehicle Tracking System (VTS) 2 Executive Summary Intelligent Instructions is an IT product development and consulting company. At Intelligent Instructions, we focus on the needs of the
Price: see your VeriFone sales representative. Per student, Excluding VAT.
Price: see your VeriFone sales representative. Per student, Excluding VAT. COURSE OUTLINE EMEA Verix and VxV Programmers Course This course is a combination of Verix and Verix V Training Course. Verix
A Process Model for Software Architecture
272 A Process Model for Software A. Rama Mohan Reddy Associate Professor Dr. P Govindarajulu Professor Dr. M M Naidu Professor Department of Computer Science and Engineering Sri Venkateswara University
Introduction to software architecture
Open Learning Universiteit Unit 1 Learning Unit 1 Introduction to software architecture Contents Introduction............................................... 7 1.1 What is softwarearchitecture?.................................
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED DISCOVERY AND ANALYSIS MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED DISCOVERY AND ANALYSIS MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
Source Code Translation
Source Code Translation Everyone who writes computer software eventually faces the requirement of converting a large code base from one programming language to another. That requirement is sometimes driven
A methodology for secure software design
A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 [email protected] 1. Introduction A good percentage of the
Requirements engineering and quality attributes
Open Learning Universiteit Unit 2 Learning Unit 2 Requirements engineering and quality attributes Contents Introduction............................................... 21 2.1 Important concepts........................................
A SoC design flow based on UML 2.0 and SystemC
A SoC design flow based on UML 2.0 and SystemC Sara Bocchio 1, Elvinia Riccobene 2, Alberto Rosti 1, and Patrizia Scandurra 3 1 STMicroelectronics, AST Agrate Lab R&I, Italy {sara.bocchio, alberto.rosti}@st.com
This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.
How To Configure Port Forwarding using Virtual Host to access devices on Internal network Applicable to versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates
Using UML Part Two Behavioral Modeling Diagrams
UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,
What is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
Trends in Embedded Software Development in Europe. Dr. Dirk Muthig [email protected]
Trends in Embedded Software Development in Europe Dr. Dirk Muthig [email protected] Problems A software project exceeds the budget by 90% and the project time by 120% in average Project Management
Web Service Implementation Methodology
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 Web Service Implementation Methodology Public Review Draft 1.0, 05 September 2005
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED BUSINESS INTEGRATION MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED BUSINESS INTEGRATION MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
How To Understand The Dependency Inversion Principle (Dip)
Embedded Real-Time Systems (TI-IRTS) General Design Principles 1 DIP The Dependency Inversion Principle Version: 22-2-2010 Dependency Inversion principle (DIP) DIP: A. High level modules should not depend
The Concern-Oriented Software Architecture Analysis Method
The Concern-Oriented Software Architecture Analysis Method Author: E-mail: Student number: Supervisor: Graduation committee members: Frank Scholten [email protected] s0002550 Dr. ir. Bedir Tekinerdoǧan
LabVIEW Advanced Programming Techniques
LabVIEW Advanced Programming Techniques SECOND EDITION Rick Bitter Motorola, Schaumburg, Illinois Taqi Mohiuddin MindspeedTechnologies, Lisle, Illinois Matt Nawrocki Motorola, Schaumburg, Illinois @ CRC
Software Component Specification Using Design by Contract
Software Component Specification Using Design by Contract Yi Liu and H. Conrad Cunningham Department of Computer and Information Science University of Mississippi 237 Kinard Hall University, MS 38677 USA
A HW/SW Codesign Methodology based on UML
A HW/SW Codesign Methodology based on UML How to apply a model based UML design for an embedded system By Senior Consultant Kim Bjerge ([email protected]) Copyright 2008 Danish Technological Institute
An Approach to Software Architecture Description Using UML
An Approach to Software Architecture Description Using UML Henrik Bærbak Christensen, Aino Corry, and Klaus Marius Hansen Department of Computer Science, University of Aarhus Aabogade 34, 8200 Århus N,
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Verification and Validation of Software Components and Component Based Software Systems
Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research [email protected]
Object Oriented Programming. Risk Management
Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling
Adding a PIB to the MIB Configuration and integration of advanced monitoring
Adding a PIB to the MIB Configuration and integration of advanced monitoring Steven Van den Berghe 1 st Scampi Workshop Amsterdam - 27 January 03 What I think I ll be talking about Demand for measurements
Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
CS 589 Project Smart Home Hub, Phase I Due before 9am on October 21, 2015
CS 589 Project Smart Home Hub, Phase I Due before 9am on October 21, 2015 Overview So far, we have learned the basics and underlying principles of embedded software and systems, and have begun to study
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
Control Technology Corporation CTC Monitor User Guide Doc. No. MAN-1030A Copyright 2001 Control Technology Corporation All Rights Reserved Printed in USA The information in this document is subject to
