TMT SOFTWARE REQUIREMENTS FOR LOW-LEVEL SUBSYSTEMS
|
|
|
- Tobias Sparks
- 10 years ago
- Views:
Transcription
1 TMT SOFTWARE REQUIREMENTS FOR LOW-LEVEL SUBSYSTEMS TMT.SFT.DRD REL05 October 15, 2012
2 TMT.SFT.DRD REL05 PAGE 2 OF 16 TABLE OF CONTENTS 1 INTRODUCTION Purpose Scope Audience Applicable Documents Reference Documents Change Record Acronyms INTEGRATION OF LOW-LEVEL DEVICE CONTROLLERS, HARDWARE AND SUBSYSTEMS Hardware Control Daemons LOW-LEVEL SUBSYSTEM DESCRIPTION External Interfaces Terminology REQUIREMENTS FOR LOW-LEVEL SUBSYSTEMS System Constraints Time Access Requirements Software Subsystem Design Requirements Lifecycle Design Requirements Hardware Requirements Application Protocol Requirements Subsystem Functional Requirements Lifecycle Functional Requirements Configuration Functional Requirements Command Functional Requirements Status Functional Requirements Logging Functional Requirements User Interface Requirements SOFTWARE DEVELOPMENT AND TESTING Software Development Process Software Testing and Simulation DOCUMENTATION AND REVIEWS 15 7 GUIDELINES AND RECOMMENDATIONS User Interface Standards... 16
3 TMT.SFT.DRD REL05 PAGE 3 OF 16
4 TMT.SFT.DRD REL05 PAGE 4 OF 16 1 INTRODUCTION This document is the Design Requirements Document (DRD) for software that is included in what TMT calls low-level subsystems. In the TMT software system a low-level subsystem is not a general term; rather, it indicates a kind of software/hardware system with specific characteristics. The characteristics are listed and discussed in Section 3, but are also listed here. A low-level software subsystem is identified by the following characteristics: The software is tightly coupled to or embedded in a vendor-delivered hardware system. The functionality of the software is limited in scope to control of hardware and has limited capabilities. The functionality of the system does not require any kind of information or configuration change for different science observing modes. The system and software must be a standalone product (autonomous) with no dependencies on other TMT systems (other than the TMT Software Safety System). The software is delivered as a final product with the subsystem. The software is not expected to change over the lifetime of the project, or changes will be infrequent requiring considerable observatory resources and planning. This document includes the requirements and recommendations for software executing in lowlevel subsystems that must be integrated into the TMT software system. TMT prefers that system software for low-level hardware control be built and integrated using the following approaches in the order shown: 1. A Type 4 PLC/PAC system. 2. A Type 1 built with networked controllers and TMT Assemblies and HCDs. 3. As Type 2 third-party vendor provided hardware (not generally applicable to entire subsystems). 4. As a Type 3 low-level subsystem that meets the requirements of this document. While low-level software subsystems are sometimes necessary, the low-level subsystem integration approach is not the preferred TMT approach. Using a Type 3 software approach requires explicit permission from TMT. Because of its characteristics, it requires this special requirements document. This document is part of the Observatory Software Design Phase Documentation Plan (RD01). 1.1 PURPOSE Low-level software subsystems have unique characteristics within the TMT software architecture and design. Because of their unique characteristics, design requirements are needed to ensure that the low-level software subsystem can be successfully integrated, tested, and maintained over the lifetime of the Observatory. 1.2 SCOPE This document provides software requirements and recommendations for software that is to be developed for TMT low-level subsystems. 1.3 AUDIENCE This document is targeted primarily towards software developers who are designing and implementing software as part of the TMT construction phase and reviewers of the TMT software system.
5 TMT.SFT.DRD REL05 PAGE 5 OF APPLICABLE DOCUMENTS AP01 AP02 AP03 AP04 AP05 AP06 OSW TN003 TMT Software Testing and Simulation, TMT.SFT.TEC TMT Software Management Plan, TMT.SEN.SPE (to be revised). TMT Environmental, Safety and Health Process Guidelines, TMT.PMO.MGT TMT Software Development Process, TMT.SFT.TEC (not yet available). OSW TN002 - TMT Guidelines for Software Safety, TMT.SFT.TEC OSW TN004 TMT Software Review Deliverables, TMT.SFT.TEC REFERENCE DOCUMENTS RD01 RD02 RD03 RD04 OSW Design Phase Documentation Plan (TMT.SFT.TEC ). OSW TN001-Responsibilities of OMOA Layers, TMT.SFT.TEC TMT Software Vision, TMT.SFT.TEC TMT Software Technical Architecture, TMT.SFT.TEC (not yet available). 1.6 CHANGE RECORD Revision Date Who Modifications DRF01 May 4, 2012 KG Initial Draft DRF02 May 23, 2012 KG Updated with new requirements and modifications. DRF03 June 15, 2012 KG Updates based on M. Sirota comments. REL04 July 9, 2012 KG Additional updates based on M. Sirota comments. Converted to REL. REL05 Oct 15, 2012 KG Included preferred implementation choices. 1.7 ACRONYMS API Application Programmer Interface DRD Design Requirements Document EUI Engineering User Interface HCD Hardware Control Daemon LSS Low-level Software Subsystem OSW Observatory Software TBD To Be Determined TMT Thirty Meter Telescope
6 TMT.SFT.DRD REL05 PAGE 6 OF 16 2 INTEGRATION OF LOW-LEVEL DEVICE CONTROLLERS, HARDWARE AND SUBSYSTEMS An important concern of the TMT software architecture is the integration of hardware and software subsystems. The Observing Mode Oriented Architecture (OMOA) adopted by TMT is a simple, layered approach that provides support for the integration of hardware. This document does not describe the OMOA layering in depth. Please see RD02, RD03 and RD04 for more information on the TMT software system, OMOA layers and their responsibilities. The lowest layer in the OMOA software system, called the Hardware Control Layer, consists of all the controllable devices that are available for use in the observatory and the software that communicates with the hardware controllers. Software components in this layer, called Hardware Control Daemons (HCD), are responsible for communication with a hardware device or system and integrating it into the TMT system. The possibilities for hardware integration are shown with four cases. The first two cases shown in Figure 1 represent the integration of individual hardware components. These two cases represent the preferred approach for integrating hardware. Figure 1: This application shows all OMOA layers. Hardware such as motion control is integrated through network connections to Hardware Control Daemons in the Hardware Control Layer. Networked Controllers (1). In case 1, the HCD represents a networked piece of hardware with communication over Ethernet using TCP/IP-based protocols. The example (number 1 in Figure 1) shows a multi-axis, networked motion controller such as those provided by Galil or Delta Tau. The HCD communicates using a standard application protocol such as SSH or HTTP over TCP/IP with a task-focused API. TMT plans on providing support for specific motion controllers. Vendor Provided Hardware Product (2). In case 2, an off-the-shelf product is integrated. Similar to scenario 1, the HCD provides communication with the product. The off-the-shelf
7 TMT.SFT.DRD REL05 PAGE 7 OF 16 product defines the communication protocol. The TMT requirement is for Ethernet-based protocols when available, but in some situations this may not be possible. The details of the vendor product application protocol are encapsulated in the HCD. Unlike case 1, in case 2 the controlled device is a complete, purchased, of-the-shelf component. The example here is a purchased robot system for storage of masks like the one planned for the MOBIE/WFOS instrument. In Figure 2, parts of Telescope Controls are used to demonstrate integration cases 3 and 4. These two cases show the integration of complete subsystems that may include both software and hardware. Figure 2: Integration cases 3 and 4 show the integration of entire software/hardware subsystems. Low-level Subsystem (3). Case 3, the subject of this DRD, is the situation where a collaborator or vendor is creating an entire software/hardware subsystem for inclusion in the TMT software system. A defining characteristic of case 3 is that unique software is being written for the lowlevel subsystem. The subsystem is called non-conforming because it is not based on and does not use TMT Common Software. As with other cases, the low-level subsystem is represented by an HCD in the TMT software system. The HCD encapsulates the low-level subsystem s application protocol, which is based on TCP/IP over Ethernet. The case 3 example in Figure 2 shows the M3 control system implemented as a low-level subsystem. Programmable Logic Controller (PLC)/Programmable Automation Controller (PAC) (4). With case 4, a software/hardware subsystem is constructed from a commercial PLC or PAC. This case is like 3, but in case 4 the software is written using tools provided by the PLC/PAC
8 TMT.SFT.DRD REL05 PAGE 8 OF 16 vendor. The communication protocol is typically determined by the vendor product. The figure shows an example enclosure control system consisting of multiple PAC/PLC chassis connected via a network fieldbus like EtherCat. In this example, the protocol is specified by the use of EtherCat. TMT is working towards supporting one or more standards in this area. Example systems are National Instrument hardware or Allen-Bradley PLCs. EtherCat is a deterministic Ethernet-based fieldbus choice. 2.1 HARDWARE CONTROL DAEMONS The OMOA Hardware Control Layer is populated with software components called Hardware Control Daemons (HCD). Each HCD manages one hardware controller, low-level subsystem, or PAC/PLC system as discussed in the previous section. To understand the functionality required in a low-level system, it is necessary to understand the role and function of the HCD. The following are characteristics and responsibilities of HCDs. Each HCD acts as proxy representing the remote hardware system in the TMT software system. At this layer in the software each HCD and its hardware is autonomous; any required synchronization with other hardware is handled in a higher layer. In cases 3 and 4, the subsystem itself cannot depend on or control other TMT systems. Each HCD acts as an adapter and provides a uniform software interface and feature set focused on hardware control to the layers above. HCDs for multi-channel hardware controllers must support access to all channels, multiplex access to the controller and support multiple asynchronous client requests and responses. HCDs monitor the status and state of their hardware controllers and generate telemetry events, health and alarms in the TMT software system. HCDs will often convert input user or engineering units to units appropriate for the hardware. HCDs encapsulate the protocol and transport needed by a hardware controller. This may require vendor libraries. The HCD provides a way to integrate an external system. An HCD can implement a vendor-specific communication protocol allowing testing at a low level while providing uniform integration with the final system. The HCD provides a suitable location for device simulation allowing end-to-end system testing without hardware presence (AP01). The Hardware Control Daemons are always executing, and each can be accessed at any time by the software layers above. 3 LOW-LEVEL SUBSYSTEM DESCRIPTION A low-level software subsystems is one of the expected types of software systems that must be integrated into the TMT software system as described in case 3 of Figure 2. To be classified as a low-level subsystem the software/hardware system must satisfy the following characteristics: The software is tightly coupled to a vendor-delivered hardware system. The functionality of the software is limited in scope and may have limited capabilities. The system and software must be a standalone product with no dependencies on other TMT systems. The software is delivered as a final product with the subsystem. The software is stable and is not expected to change over the lifetime of the project. Or changes will be infrequent requiring considerable observatory resources and planning. The following points are typically true for software for a low-level system.
9 TMT.SFT.DRD REL05 PAGE 9 OF 16 The low-level software is not using TMT Common Software. The low-level software may be built using tools and languages that are not part of the TMT standards. The low-level software subsystem communicates with the TMT software system through a protocol that created by and is unique to the low-level subsystem. A low-level subsystem, as described in scenario 3 in Section 2, is unique in that it is the only scenario where the communication protocol between the low-level system and the HCD is a design decision for the subsystem. In the other three cases, the application protocol is established by the purchased vendor product or TMT. It is the only scenario where a software component is designed without the benefit of the TMT Common Software. Due to the uniqueness of case 3, special requirements are required. While low-level software subsystems are sometimes necessary, the low-level subsystem integration approach is not the preferred TMT approach. 3.1 EXTERNAL INTERFACES The context of a low-level software subsystem is shown in the following figure. The low-level software subsystem is at the center of the figure. Figure 3: Low-level software subsystem context diagram The low-level software subsystem communicates via an application protocol with a TMT Hardware Control Daemon. Other TMT software may also communicate directly with the lowlevel software subsystem. In most all cases, the low-level software subsystem communicates with hardware via hardwarespecific protocols. An Engineering User Interface or Other TMT Software may connect directly to the low-level software subsystem. The communication network is Ethernet. The Engineering User Interface must understand and use the low-level subsystem protocol.
10 3.2 TERMINOLOGY TMT.SFT.DRD REL05 PAGE 10 OF 16 For the purposes of this document it will be assumed that the HCD or other TMT software systems exchange messages. The set of capabilities supported by the low-level system is called its Application Programming Interface (API). The phrase TMT software systems shall be used to refer to TMT produced programs that interact with the low-level subsystem using its API to exchange messages. A TMT software system software component exchanging messages with the low-level system is called a client. 4 REQUIREMENTS FOR LOW-LEVEL SUBSYSTEMS This section includes requirements on low-level subsystem software. The requirements of this document pertain only to low-level subsystems (case 3 of Figure 2). In the following, a low-level subsystem or low-level software subsystem is referred to as LLS. 4.1 SYSTEM CONSTRAINTS This section includes requirements that constrain the low-level software subsystem and protocol. [REQ-3-OSW-LLS-0010] The LLS software should be targeted for deployment on standard TMT computer hardware. Specifics of this hardware are TBD. Discussion: Some systems may need unique computer equipment. If necessary this should be demonstrated during system reviews. [REQ-3-OSW-LLS-0020] The LLS software should be targeted for deployment on the standard TMT operating system. The current requirement is for a Unix-like operating system (e.g., Linux or Solaris) Discussion: Details of TMT standard operating systems are TBD, but the Unix-like requirement will be retained. Most TMT systems do not require a real-time operating system. TMT will standardize on a solution for real-time systems. [REQ-3-OSW-LLS-0030] The LLS shall be compatible with TMT network standards. Discussion: Details of the TMT network standards are TBD. The baseline is for 10 GbE. [REQ-3-OSW-LLS-0040] The LLS shall be compatible with TMT environmental and survival standards and requirements (see [REQ-1-ORD-1050] through [REQ-1-ORD-1550]). [REQ-3-OSW-LLS-0050] The LLS shall not use nor depend on any version of the Windows operating system for its intended use during TMT operations. Discussion: In some cases a Windows operating system may be used to develop a low-level system and this is acceptable, but it can not be necessary to run the software during operations. 4.2 TIME ACCESS REQUIREMENTS The following requirements pertain to low-level subsystems that require and use accurate and precise time. [REQ-3-OSW-LLS-0100] The LLS shall use the TMT network Time Bus for access to precision time. For the most precise time, the LLS shall use the standard, supported TMT Time Bus card. The TMT Time Bus is based on Precision Time Protocol, IEEE
11 TMT.SFT.DRD REL05 PAGE 11 OF 16 [REQ-3-OSW-LLS-0110] The LLS shall be fully compatible and operate properly during any leap-second events without requiring human intervention. 4.3 SOFTWARE SUBSYSTEM DESIGN REQUIREMENTS The design of the low-level software system must follow the requirements in this section Lifecycle Design Requirements [REQ-3-OSW-LLS-0200] The LLS computing system shall be able to go from the power off state to being fully-operational and able to receive and execute commands from the TMT software systems without human involvement. [REQ-3-OSW-LLS-0210] The LLS computing system shall be able to go from the power off state to being fully-operational and able to receive and execute commands in 30 seconds or less. [REQ-3-OSW-LLS-0220] It shall be possible for TMT software systems to remotely remove power from the LLS computer. Discussion: To enable this, the LLS may require remotely accessible power control Hardware Requirements [REQ-3-OSW-LLS-0300] The LLS should use networked hardware controllers and avoid using board-based controller boards unless absolutely necessary. Discussion: The LLS is acting in the same role as the HCD in scenario 1 of Figure 1. Reliance on specific boards makes long-term maintenance of the software and hardware system more difficult. [REQ-3-OSW-LLS-0310] The communication between the TMT software systems and the LLS shall be based on Ethernet technologies. 4.4 APPLICATION PROTOCOL REQUIREMENTS The requirements in this section pertain to the design and implementation of the protocol used to exchange messages between a TMT client program and the LLS. [REQ-3-OSW-LLS-0400] Protocol design choices must be made in collaboration with TMT and TMT must authorize protocol choices. [REQ-3-OSW-LLS-0405] The communication protocol between the TMT software systems and the LLS shall be based on TCP/IP. [REQ-3-OSW-LLS-0410] The communication protocol shall provide a periodic heartbeat at 1Hz that minimally demonstrates the LLS is online and operating properly. [REQ-3-OSW-LLS-0415] The communication protocol must support connection and reconnection without human involvement. [REQ-3-OSW-LLS-0420] Connection and reconnection to the system should not impact the system s proper operation. [REQ-3-OSW-LLS-0425] The protocol between the TMT software systems and the LLS shall properly support multiple, concurrent messages between the LLS and one or more clients. [REQ-3-OSW-LLS-0430] The protocol between the TMT software systems and the LLS shall be bi-directional allowing messages to flow in both directions simultaneously. [REQ-3-OSW-LLS-0435] The LLS shall acknowledge that commands have been received with a positive or negative acknowledgment.
12 TMT.SFT.DRD REL05 PAGE 12 OF 16 [REQ-3-OSW-LLS-0440] The protocol between the TMT software systems and the LLS shall not depend on polling by the client for proper operation. [REQ-3-OSW-LLS-0445] The LLS protocol shall not limit the functionality of the LLS, the number of simultaneous clients, nor number or types of messages that can pass between the TMT software systems and the low-level subsystem. [REQ-3-OSW-LLS-0450] All numeric values used in the protocol should be of the same type (e.g., double, integer, etc.) if possible to minimize conversion errors. [REQ-3-OSW-LLS-0455] The protocol should be based on available, well-tested communication libraries. Under no circumstances should the subsystem protocol be written from scratch based on low-level operating system calls (i.e., sockets). Discussion: It is not necessary to make choices on implementation libraries in But in 2012, library examples that satisfy 0445 are: ZeroMQ ( or an implementation of AMQP ( such as RabbitMQ ( A REST-based HTTP protocol is appropriate for some systems. [REQ-3-OSW-LLS-0460] The LLS developer shall deliver a client side library that allows full use of the LLS API. Discussion: The client library is used during testing and during operations. 4.5 SUBSYSTEM FUNCTIONAL REQUIREMENTS The following are requirements on the functionality of the low-level subsystem and the API used by TMT client software to interact with the low-level subsystem Lifecycle Functional Requirements [REQ-3-OSW-LLS-0600] It shall be possible for TMT software systems to halt the LLS software using the LLS API. Discussion: For the this requirement, halt means safely stop all LLS software while leaving the operating system running. (It may be necessary for some systems to safely park associated hardware prior to halting LLS software.) [REQ-3-OSW-LLS-0610] It shall be possible for TMT software systems to shutdown the LLS using the LLS API. Discussion: For the this requirement, shutdown means safely park any associated hardware, safely halt all software, and then power down the computer. (Shutdown of the OS may also be necessary.) [REQ-3-OSW-LLS-0620] The LLS shutdown task should take no more than 30 seconds. [REQ-3-OSW-LLS-0630] It shall be possible for TMT software systems to soft restart the LLS software system using the LLS API. Discussion: For the this requirement, it is necessary to halt the LLS software and restart the software through initialization until ready for use. The OS is not stopped and the hardware is not power cycled. [REQ-3-OSW-LLS-0635] The LLS soft restart task should take no more than 30 seconds. [REQ-3-OSW-LLS-0640] It shall be possible for TMT software systems to remotely remove power from the LLS computer using the LLS API.
13 TMT.SFT.DRD REL05 PAGE 13 OF 16 Discussion: To enable this, the LLS may require remotely accessible power control. This may happen without halting the software. It is assumed this will not park hardware nor halt the LLS software. [REQ-3-OSW-LLS-0650] It shall be possible for TMT software systems to hard restart the LLS using the LLS API. Discussion: For the this requirement, hard restart means park hardware, shutdown software, shutdown the computer, remove power from the computer, and reapply power to the computer causing the computer to enter the start/initialization process. [REQ-3-OSW-LLS-0660] The LLS hard restart task should take no more than 60 seconds Configuration Functional Requirements [REQ-3-OSW-LLS-0700] The LLS software shall be easily configurable to run on any properly configured TMT computer system. Any configuration of the LLS should not require changes to the source code, recompilation, or client calls through the LLS API. Discussion: The goal here is that the software not have embedded parameters that must be changed in order to replace the computer it runs on. [REQ-3-OSW-LLS-0710] The LLS API shall support the loading of all run-time system parameters or configuration files from the TMT software system during LLS startup and initialization. Discussion: Many systems will require static parameters or lookup tables that are used for proper operation of the LLS. These values will be stored in TMT databases and loaded into the subsystem at any time. The API should support the ability to initialize itself with new values for parameters or configuration files written from the TMT databases. [REQ-3-OSW-LLS-0720] The LLS API shall support the reading of all system parameters or configuration files from the TMT software system at any time for storage in TMT databases. Discussion: It should be possible for TMT software to gather all operational configuration parameters needed for run-time operation in order to store them in the Configuration Service Command Functional Requirements In the following normal operations indicates that the system is fully initialized and operating as it is designed to operate. [REQ-3-OSW-LLS-0800] The LLS shall be available to receive commands from TMT software systems at all times when it is in the normal operational state. [REQ-3-OSW-LLS-0810] The LLS shall support receiving commands from multiple TMT software systems when in normal operation. Discussion: The goal is to ensure that an Engineering User Interface program, a logging program and the TCS HCD can all operate at the same time. [REQ-3-OSW-LLS-0820] The LLS should return command errors to the TMT software systems. [REQ-3-OSW-LLS-0830] It shall be possible for the TMT software systems to set and get all public writable subsystem parameters using the LLS API. Discussion: Here parameters means any values that describe the state or status of the subsystem or any hardware it controls.
14 TMT.SFT.DRD REL05 PAGE 14 OF 16 [REQ-3-OSW-LLS-0840] It shall be possible for the TMT software systems to get values for any public read-only subsystem parameter using the LLS API. The API should support getting 1, several, or all values with a single API call. [REQ-3-OSW-LLS-0850] It shall be possible for a TMT software system to determine if actions (such as hardware activities) due to commands are executing or completed using the LLS API Status Functional Requirements Status pertains to values that describe the state of the low-level subsystem or hardware it controls or monitors. The subsystem state consists of one or more status items. [REQ-3-OSW-LLS-0900] The LLS shall monitor the values of important parameters and make them available as status items. [REQ-3-OSW-LLS-0910] The LLS shall allow one or more status items to be retrieved in a single command from a TMT software system using the LLS API. Discussion: A publish/subscribe implementation is also a possibility for notifying clients of status changes. [REQ-3-OSW-LLS-0920] The LLS status retrieval response should minimally indicate the status item name, value and units for each status item retrieved. [REQ-3-OSW-LLS-0930] The LLS shall provide status that allows a TMT software system to determine if any controlled hardware is in motion or idle. [REQ-3-OSW-LLS-0940] The LLS shall provide a heartbeat status item to any client that notifies the client that it is able to communicate at the rate of 1Hz Logging Functional Requirements [REQ-3-OSW-LLS-1000] The LLS API shall allow the option of logging subsets of low-level subsystem status or state parameters. [REQ-3-OSW-LLS-1010] The LLS API shall allow logging information to pass from the low level subsystem to a TMT software system. 4.6 USER INTERFACE REQUIREMENTS [REQ-3-OSW-LLS-1100] The LLS shall provide a user interface that allows full engineering-level monitoring and control of the LLS. This user interface shall be called the Engineering User Interface (EUI). [REQ-3-OSW-LLS-1110] The LLS EUI shall be implemented as a Graphical User Interface. [REQ-3-OSW-LLS-1120] The LLS EUI shall use the LLS-provided client library to communicate with the LLS using the LLS protocol. [REQ-3-OSW-LLS-1130] The LLS EUI shall be usable from any computer that has access to the LLS through the TMT network. [REQ-3-OSW-LLS-1140] The LLS EUI shall be usable at any time including during normal, operational use of the LLS. [REQ-3-OSW-LLS-1150] The LLS EUI shall allow all necessary engineering-oriented control of the LLS including shutdown, startup, restart (both soft and hard), and initialization. [REQ-3-OSW-LLS-1160] The use of the LLS EUI shall not impact performance of the system at any time. [REQ-3-OSW-LLS-1170] The LLS EUI shall use TMT user interface standards unless they are inadequate.
15 TMT.SFT.DRD REL05 PAGE 15 OF 16 Discussion: It may be possible for the LLS to use all or a subset of the TMT user interface standards. For instance, it may only be possible to use the recommended toolkit. TMT user interface standards are not yet defined. 5 SOFTWARE DEVELOPMENT AND TESTING Low-level subsystem software is part of the TMT software system and must follow the processes and testing strategies of other software projects that are part of TMT. 5.1 SOFTWARE DEVELOPMENT PROCESS [REQ-3-OSW-LLS-2000] The LLS software development process must comply with the TMT Software Management Plan (AP02). [REQ-3-OSW-LLS-2010] The LLS software development process must comply with the TMT Software Development Process (AP04). [REQ-3-OSW-LLS-2230] The LLS must follow the TMT software safety process (AP05). 5.2 SOFTWARE TESTING AND SIMULATION [REQ-3-OSW-LLS-2100] Software testing of the LLS must follow the approaches of AP01. [REQ-3-OSW-LLS-2110] The LLS must provide a suite of unit tests that test the components within low-level subsystem software system. [REQ-3-OSW-LLS-2115] The LLS must provide a full suite of acceptance tests to test public functionality of the LLS using the client library. [REQ-3-OSW-LLS-2120] The LLS must provide a suitable simulation mode controllable through the LLS API that allows specific components within the subsystem to be simulated as well as the entire LLS. Discussion: Simulation means that the low-level software system appears to be operating properly even if the controllable hardware is not present or broken (see AP01). 6 DOCUMENTATION AND REVIEWS Low-level systems are required to provide the same design documentation as all TMT software projects. Documentation is tied to the review process. [REQ-3-OSW-LLS-2200] The LLS must provide documentation and participate in reviews according to the TMT review process and review deliverables for software (AP06). [REQ-3-OSW-LLS-2210] The LLS must provide all source code, any build system and other files for the subsystem. Any special development tools required to build the software must be provided upon delivery. [REQ-3-OSW-LLS-2220] The LLS communication protocol must be fully documented using formal methods such as a Backus-Naur Form (BNF). 7 GUIDELINES AND RECOMMENDATIONS The following are recommendations for designers of low-level software systems. While not requirements at this time, if these guidelines are not followed, it is necessary to make a very good case during reviews for not following them during the review process. Any libraries used in the LLS should be based on open-source over off-the-shelf software. All libraries must include source code.
16 TMT.SFT.DRD REL05 PAGE 16 OF USER INTERFACE STANDARDS TMT will define standards for operations user interfaces. These standards will be supported by the TMT software engineering support team. These standards will include toolkits and platforms that satisfy the TMT requirements for remote use and standardized look. At this time, these standards are TBD. User interface approaches change rapidly and it is too early in the project to make decisions. User interfaces may be browser-based. Browser-based tools are the suggested approach to be used for planning purposes at this time.
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
OSW TN002 - TMT GUIDELINES FOR SOFTWARE SAFETY TMT.SFT.TEC.11.022.REL07
OSW TN002 - TMT GUIDELINES FOR SOFTWARE SAFETY TMT.SFT.TEC.11.022.REL07 August 22, 2012 TMT.SFT.TEC.11.022.REL07 PAGE 2 OF 15 TABLE OF CONTENTS 1 INTRODUCTION 3 1.1 Audience... 3 1.2 Scope... 3 1.3 OSW
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Cisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Visual Programming of Logic, Motion, and Robotics
ADVANCED Motion Controls October 2014 Visual Programming of Logic, Motion, and Robotics Sándor Barta Overview The art of programming consists of mentally translating a workflow into a sequential programming
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
SCADA Questions and Answers
SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center
Advanced Server Virtualization: Vmware and Microsoft Platforms in the Virtual Data Center Marshall, David ISBN-13: 9780849339318 Table of Contents BASIC CONCEPTS Introduction to Server Virtualization Overview
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Chapter 6 Essentials of Design and the Design Activities
Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major
DCS110 CATVisor COMMANDER
Broadband Cable Networks April 13, 2006 1(5) DCS110 CATVisor COMMANDER Introduction CATVisor Commander is the standalone software tool for configuring, adjusting and monitoring Teleste Headend and HFC
Cisco ROSA Video Service Manager (VSM) Version 05.03
Data Sheet Cisco ROSA Video Service Manager (VSM) Version 05.03 The Cisco ROSA Video Service Management (VSM) system provides service providers with a complete, powerful solution for the management of
Management of VMware ESXi. on HP ProLiant Servers
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
Linear Motion and Assembly Technologies Pneumatics Service. Industrial Ethernet: The key advantages of SERCOS III
Electric Drives and Controls Hydraulics Linear Motion and Assembly Technologies Pneumatics Service profile Drive & Control Industrial Ethernet: The key advantages of SERCOS III SERCOS III is the open,
Use Cases for Target Management Eclipse DSDP-Target Management Project
Use Cases for Target Management Eclipse DSDP-Target Management Project Martin Oberhuber, Wind River Systems [email protected] Version 1.1 June 22, 2005 Status: Draft Public Review Use Cases
Shoal: IaaS Cloud Cache Publisher
University of Victoria Faculty of Engineering Winter 2013 Work Term Report Shoal: IaaS Cloud Cache Publisher Department of Physics University of Victoria Victoria, BC Mike Chester V00711672 Work Term 3
Component-based Robotics Middleware
Component-based Robotics Middleware Software Development and Integration in Robotics (SDIR V) Tutorial on Component-based Robotics Engineering 2010 IEEE International Conference on Robotics and Automation
Instrumentation Software Profiling
Instrumentation Software Profiling Software Profiling Instrumentation of a program so that data related to runtime performance (e.g execution time, memory usage) is gathered for one or more pieces of the
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
Five Essential Components for Highly Reliable Data Centers
GE Intelligent Platforms Five Essential Components for Highly Reliable Data Centers Ensuring continuous operations with an integrated, holistic technology strategy that provides high availability, increased
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER
NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER Understanding what a PAC is starts from the understanding of PLC. A PLC is a Programmable Logic while
EView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this
Special FEATURE. By Heinrich Munz
Special FEATURE By Heinrich Munz Heinrich Munz of KUKA Roboter discusses in this article how to bring Microsoft Windows CE and WindowsXP together on the same PC. He discusses system and application requirements,
OPC COMMUNICATION IN REAL TIME
OPC COMMUNICATION IN REAL TIME M. Mrosko, L. Mrafko Slovak University of Technology, Faculty of Electrical Engineering and Information Technology Ilkovičova 3, 812 19 Bratislava, Slovak Republic Abstract
- An Essential Building Block for Stable and Reliable Compute Clusters
Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative
Addressing the SAP Data Migration Challenges with SAP Netweaver XI
Addressing the SAP Data Migration Challenges with SAP Netweaver XI Executive Summary: Whether it is during the final phases of a new SAP implementation, during SAP upgrades and updates, during corporate
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Hirschmann Networking Interoperability in a
Automation and Network Solutions Hirschmann Networking Interoperability in a PROFInet Environment Hirschmann Interoperability White Paper Rev. 1.1 Contents Hirschmann Networking Interoperability in a Profinet
Data Grids. Lidan Wang April 5, 2007
Data Grids Lidan Wang April 5, 2007 Outline Data-intensive applications Challenges in data access, integration and management in Grid setting Grid services for these data-intensive application Architectural
Open EMS Suite. O&M Agent. Functional Overview Version 1.2. Nokia Siemens Networks 1 (18)
Open EMS Suite O&M Agent Functional Overview Version 1.2 Nokia Siemens Networks 1 (18) O&M Agent The information in this document is subject to change without notice and describes only the product defined
Oracle PeopleSoft CRM Integration into the Contact Center. Technical Integration Brief
Oracle PeopleSoft CRM Integration into the Contact Center Technical Integration Brief Table of Contents Table of Contents... 2 Introduction... 3 Integration Overview... 4 Customer Need... 5 Process Scenario...
Backup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
Enhanced Diagnostics Improve Performance, Configurability, and Usability
Application Note Enhanced Diagnostics Improve Performance, Configurability, and Usability Improved Capabilities Available for Dialogic System Release Software Application Note Enhanced Diagnostics Improve
Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
Elements of robot assisted test systems
1 (9) Matti Vuori, 2013-12-16 RATA project report Elements of robot assisted test systems Table of contents: 1. General... 2 2. Overall view to the system the elements... 2 3. There are variations for
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
PROFINET the Industrial Ethernet standard. Siemens AG 2013. Alle Rechte vorbehalten.
the Industrial Ethernet standard is 100% Ethernet is Ethernet Ethernet is the established standard in the IT world for fast exchange of data (IEEE 802.3) is always full duplex simultaneous communication
VCE Vision Intelligent Operations Version 2.5 Technical Overview
Revision history www.vce.com VCE Vision Intelligent Operations Version 2.5 Technical Document revision 2.0 March 2014 2014 VCE Company, 1 LLC. Revision history VCE Vision Intelligent Operations Version
Tools for ITIL Capacity Management: How not to spend 100,000
Tools for ITIL Capacity Management: How not to spend 100,000 Danny Quilton Capacitas [email protected] Abstract Capacity Management requires data to produce meaningful deliverables such as models
A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011
A Data Centric Approach for Modular Assurance The Real-Time Middleware Experts Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 Gabriela F. Ciocarlie Heidi Schubert
Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities
Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities Wireless Infrastructure, Article 3-15-2012 The federal government recognizes that standards based
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Service-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Operating Systems 4 th Class
Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science
JoramMQ, a distributed MQTT broker for the Internet of Things
JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
You were seeking a protocol translator. Eaton delivered a vital data flow processor.
You were seeking a protocol translator. Eaton delivered a vital data flow processor. Your power system is a critical, integral part your organization s technological infrastructure. Ensuring availability,
Industry White Paper. Ensuring system availability in RSView Supervisory Edition applications
Industry White Paper Ensuring system availability in RSView Supervisory Edition applications White Paper Ensuring system availability in RSView Supervisory Edition applications Rockwell Software, Visualization
A standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist [email protected] Copyright IBM Corporation 2005. All rights
CatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director
System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical
High Availability Option for Windows Clusters Detailed Design Specification
High Availability Option for Windows Clusters Detailed Design Specification 2008 Ingres Corporation Project Name Component Name Ingres Enterprise Relational Database Version 3 Automatic Cluster Failover
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
Functionality Considerations in Custom SCADA Development Tools
Functionality Considerations in Custom SCADA Development Tools Timothy P. Creegan STRACT Supervisory control and data acquisition (SCADA) software is used to control and monitor processes throughout industry.
The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities
Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities Wireless Infrastructure, Article 12-29-2011 The federal government, and the Department of
Configuration & Build Management
Object-Oriented Software Engineering Using UML, Patterns, and Java Configuration & Build Management Outline of the Lecture Purpose of Software Configuration Management (SCM) Some Terminology Software Configuration
Network Data Management Protocol (NDMP) White Paper
Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective
CiscoWorks Resource Manager Essentials 4.3
. Data Sheet CiscoWorks Resource Manager Essentials 4.3 Product Overview CiscoWorks Resource Manager Essentials (RME) 4.3 is the cornerstone application of CiscoWorks LAN Management Solution (LMS). CiscoWorks
Ebase Xi Agile Service Oriented Architecture
Ebase Xi Agile Service Oriented Architecture Ebase Xi is an agile service oriented architecture that accelerates and simplifies the delivery of business applications. The Xi platform combines process management,
From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller
White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller
Automated Target Testing with TTCN-3: Experiences from WiMAX Call Processing Features
Automated Target Testing with TTCN-3: Experiences from WiMAX Call Processing Features By Bhaskar Rao G Srinath Y Sridhar Y Jitesh M Motorola India Pvt Ltd, Hyderabad [email protected] 23 November
Detailed Design Report
Detailed Design Report Chapter 9 Control System MAX IV Facility CHAPTER 9.0. CONTROL SYSTEM 1(9) 9. Control System 9.1. Introduction...2 9.1.1. Requirements... 2 9.2. Design...3 9.2.1. Guidelines... 3
PIE. Internal Structure
PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution
Semaphore T BOX Applications in Data Center Facilities
Semaphore T BOX Applications in Data Center Facilities Introduction Data centers must reliably provide 24/7/365 operation. For automation and monitoring of the facility, use of a rugged, reliable RTU is
Network Management Basics
CHAPTER 6 Chapter Goal Become familiar with the basic functions of a network management system. Introduction This chapter describes functions common to most network-management architectures and protocols.
How To Use The Dcml Framework
DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application
CHAPTER 15: Operating Systems: An Overview
CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint
A Study on Architecture of Private Cloud Based on Virtual Technology
A Study on Architecture of Private Cloud Based on Virtual Technology Zhao Huaming National Science Library, Chinese Academy of Sciences Beijing, China Abstract with the cloud service platform of National
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Native, Hybrid or Mobile Web Application Development
Native, Hybrid or Mobile Web Application Development Learn more about the three approaches to mobile application development and the pros and cons of each method. White Paper Develop a Mobile Application
High rate and Switched WiFi. WiFi 802.11 QoS, Security 2G. WiFi 802.11a/b/g. PAN LAN Cellular MAN
Security Issues and Quality of Service in Real Time Wireless PLC/SCADA Process Control Systems Dr. Halit Eren & Dincer Hatipoglu Curtin University of Technology (Perth Australia) 2/27/2008 1 PRESENTATION
Service Oriented Architecture
Service Oriented Architecture Version 9 2 SOA-2 Overview Ok, now we understand the Web Service technology, but how about Service Oriented Architectures? A guiding analogy Terminology excursion Service,
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
ASTERIX Format Analysis and Monitoring Tool
ASTERIX Format Analysis and Monitoring Tool Reference: SUR/STFRDE/APAT-SRS Status: Released Edition: 1.0 Date: 27 August 1998 Authors: Bruno Lambin, Tarkan Sevim Table of Contents 1. Introduction 1.1.
Performance Testing Uncovered
Performance Testing Uncovered First Presented at: NobleStar Systems Corp. London, UK 26 Sept. 2003 Scott Barber Chief Technology Officer PerfTestPlus, Inc. Performance Testing Uncovered Page 1 Performance
FIVE SIGNS YOU NEED HTML5 WEBSOCKETS
FIVE SIGNS YOU NEED HTML5 WEBSOCKETS A KAAZING WHITEPAPER Copyright 2011 Kaazing Corporation. All rights reserved. FIVE SIGNS YOU NEED HTML5 WEBSOCKETS A KAAZING WHITEPAPER HTML5 Web Sockets is an important
PATROL Internet Server Manager Technical Brief
PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
WHAT IS SCADA? A. Daneels, CERN, Geneva, Switzerland W.Salter, CERN, Geneva, Switzerland. Abstract 2 ARCHITECTURE. 2.1 Hardware Architecture
International International Conference Conference Accelerator on Accelerator and Large and Experimental Large Experimental Physics Control Physics Systems, Control 1999, Systems Trieste, Italy WHAT IS
EBERSPÄCHER ELECTRONICS automotive bus systems. solutions for network analysis
EBERSPÄCHER ELECTRONICS automotive bus systems solutions for network analysis DRIVING THE MOBILITY OF TOMORROW 2 AUTOmotive bus systems System Overview Analyzing Networks in all Development Phases Control
Architecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
POSIX : Certified by IEEE and The Open Group a briefing.
POSIX : Certified by IEEE and The Open Group a briefing. The Source for POSIX Certification http://posixcertified.ieee.org January 2006. Acknowledgements: Thanks to Michael Gonzalez for several of the
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Office Automation. Industrial Automation. Information Technology and Automation Systems in Industrial Applications. Product Development.
Information Technology and Automation Systems in Industrial Suppliers Customers Corporate Office Automation Product Development Sales and Customer Services Finance Industrial Automation Main Focus in our
Backup Strategies for Integrity Virtual Machines
Backup Strategies for Integrity Virtual Machines Introduction...2 Basic Aspects of Data Protection for Virtual Environments...2 Backup and Recovery from the VM Host System...3 Backup and Recovery of Individual
Time Monitoring Tool Software Requirements Specifications. Version <1.0>
Time Monitoring Tool Software Requirements Specifications Version Revision History Date Version Description Author First version Martin Robillard Page 2 of 18 Table of Contents
Tracer Summit Web Server
Tracer Summit Web Server Web-based access for the Tracer Summit building automation system March 2003 BAS-PRC014-EN Introduction The Tracer Summit Web Server provides the ability to operate a Tracer Summit
