ATV Data Link Simulator: A Development based on a CCSDS Layers Framework
|
|
- Silvester Lee
- 8 years ago
- Views:
Transcription
1 SpaceOps 2010 Conference<br><b><i>Delivering on the Dream</b></i><br><i>Hosted by NASA Mars April 2010, Huntsville, Alabama AIAA ATV Data Link Simulator: A Development based on a CCSDS Layers Framework Javier Peña 1 and Nick Priborsky 2 LSE Space Engineering and Operations AG, Münchner Str 20, Wessling, 82234, Germany Fabio Sintoni 3 KIBB GbR, David-Gilly-Str 1, Berlin, 14469, Germany and Jean-Christophe Ronnet 4 ESA, 18 Ave Edouard Belin, Toulouse, 31401, France I. Introduction Following the first ATV mission ( Jules Verne ), ESA identified the need to procure a data flow simulator that is capable of supporting the test of the complete TM and TC chain including the RF links. The main objectives of the simulator are to Help troubleshooting activities in case of anomalies Verify correct configuration and operation of Ground Segment Equipment Test the configuration and operation of Ground Segment Equipment prior to tests with the spacecraft such as System Validation Tests As the physical layer of the ATV mission uses the SQPN (Staggered Quadrature Pseudo-random Noise) modulation format, it is not possible to use existing ESA simulators since they do not support SQPN modulation. In order to reduce costs, it was proposed to use an existing spare TM/TC baseband unit to simulate the RF part of the ATV spacecraft. The TM/TC Baseband Unit is normally used to receive TM and transmit TC. In this case however, it is used to transmit TM and receive TC thereby mimicking the behavior of the ATV spacecraft. Unfortunately, the baseband unit is not capable of supporting all required functions of the coding layer in such a setup. Therefore a solution had to be found that is capable of adding the missing functions to the system. LSE Space Engineering and Operations AG was able to propose a cost efficient solution based on a development framework that had already been developed for another project. The name of the framework is CCSDS Layer Framework and was part of the development of GSAT. GSAT is a generic satellite simulator that fully implements the relevant CCSDS protocols. It is used by LSE Space as a generic spacecraft simulator to test ground segment equipment and to train staff. The CCSDS Layer Framework is a Java library that encapsulates the following CCSDS Recommendations: CCSDS B-1 TM Synchronisation and Channel Coding CCSDS B-1 TM Space Data Link Protocol CCSDS B-1 Space Packet CCSDS B-1 TC Synchronisation and Channel Coding 1 Senior Software/Ground Systems Engineer, Javier.pena[at]lsespace.com 2 Ground Systems Engineering Manager, Nick.priborsky[at]lsespace.com 3 ATV Ground Segment Engineer, sintoni[at]kibb-space.com 4 Head of the ATV Ground Segment Section, Jean-Christophe.Ronnet[at]esa.int 1 Copyright 2010 by the, Inc. All rights reserved.
2 CCSDS B-1 TC Space Data Link Protocol CCSDS B-1 Communications Operation Procedure-1 It allows a software developer to efficiently implement the CCSDS layers of a given spacecraft mission and perform mission specific adaptations. This paper presents the design and implementation of the CCSDS Layers Framework and the advantages of using such a framework on the basis of the development of the ATV Data Link Simulator. II. Architecture of the CCSDS Layers Framework The architecture of the CCSDS Layers Framework is best described with the help of an example. This example will use the CCSDS TM Coding Layer. A. Example of CCSDS TM Coding Layer The CCSDS recommendations not only define the protocols that are going to be used but also which services shall be provided by each layer. Following figure gives an outline of the functionalities that the Space Telemetry Coding Layer provides: Figure 1: CCSDS Coding Layer 2
3 As can be seen in Figure 1, only the attachment of the Attached Sync Marker is a mandatory function that must be performed by the Coding Layer. It is up to the mission designers to define which other functions need to be used due to mission constraints. The fact that some services are mandatory and some are optional needs to be reflected by the framework in order to enable the developer to easily configure the mandatory and optional parts of the layer. Additionally, the CCSDS Recommendation defines two service primitives for the coding layer: 1) ChannelAccess.request (frame): The upper layer (master channel layer) requests the codification of a frame to the Coding Layer. 2) ChannelAccess.indication: Primitive used by the coding layer to send the coded frame to the lower layer (physical layer). B. Modeling of the TM Coding Layer The layers defined by the CCSDS Recommendations are modeled as Java Interfaces thereby only defining their behavior but not specifying a concrete implementation. The sending side of the TM Coding Layer is named ISpaceTmCodingLayer. The relevant interfaces of the sending TM Coding Layer side are outlined in the UML Class Diagram Figure 2 below. Figure 2: ISpaceTmCodingLayer UML Diagram The Coding Layer interface defines the method codeframe(tmframe) that is used to forward transfer frames from the Transfer Layer to the Coding Layer. This method represents the ChannelAcces.request primitive as defined by the CCSDS Recommendation. The Coding Layer interface provides a Set & Get method to associate a physical layer with the coding layer. This association will be used by the Coding layer to call the ChannelAccess.indication primitive to forward the output of the coding layer to the Physical Layer. An advantage of using interfaces becomes apparent here. The coding layer does not need to know anything about the specific implementation of the physical layer. The actual implementation of the physical layer could be a network connection to a TM/TC baseband unit, a physical connection to RF equipment or it could connect directly to a Mission Control System or Control Center using the relevant network protocols. 3
4 The remaining setter and getter methods are used to configure the functions of the TM coding layer. A function worth mentioning is frame encoding. Here again, interfaces provide additional decoupling of concerns. To achieve this, an interface named IEncoder is defined in the framework. This interface must be implemented by all encoders thereby ensuring that the actual encoding implementation remains transparent to the TM coding layer. In case a mission would like to use a custom encoding algorithm, it is as simple as implementing the IEncoder interface and the coding layer would then be able to use the new algorithm without having to change any internal code of the layer. C. Default implementation and Hook Methods Every layer has a set of common functionalities that are mission independent (for example attachment of the Attached Sync Marker). The default implementation of the layer extracts the common functionalities and implements these so that they can be reused by the mission specific implementation. Additionally, some functionality related to low level development can be added here thereby making it available to the specific implementation (i.e. Property listeners to make easier the GUI development, or multithreading). This way the actual implementation of the layers for a specific mission will not have to rewrite any common code. Moreover, the default implementation needs to be extendable. This can be achieved by the use of so called Hook Methods. These are empty methods placed strategically in the default implementation code. This way the classes that derive from the default implementation only need to rewrite these extension points. Thus the code defining the basic common functionality of the layer is not affected. Figure 3: codeframehook Method Diagram Figure 3 shows how the hook method concept is applied to the codeframe Method of the TM coding Layer. The codeframe(etmframe) method implements a multithreading strategy to decide whether an additional thread is required to code the Frame or not. Then it will call the hook method codeframehook(etmframe) which will do the actual coding of the TM frame. In case the default implementation needs to be adapted only the 4
5 codeframehook(etmframe) method would have to be rewritten in the subclass. The codeframe(etmframe) method with the multithreading support will remain untouched and will be inherited by the mission specific implementation of the Coding Layer. The two approaches (default implementation and hook methods) are used in order to maximize the reusability of the code within the Framework with all the advantages that it brings. As explained, the default implementations are used as the base for the implementations of all the layers that either come with the framework or are derived from the framework. This, however, does not exclude the possibility of creating an implementation outside of the framework by implementing the layer interface directly. In addition, the default layers can be used out-of-the-box as they contain the common functionality of the layer. D. Intercepting filter pattern Thanks to previous experience in space-related software development, it was realized that there are still some cases that are not properly handled by the design. For example, it may be required to dump the output of the coding layer to the local file system or to a central logging facility. This information can be used for troubleshooting activities or to fulfill logging requirements. It would be possible to add this functionality by using hook methods. But this would result in having to use a series of conditional checks. Unfortunately, this would make the code less readable and maintainable as the flow of the layer and the processing of the data would be compiled into the layer itself. The key to solve this common problem in a flexible and unobtrusive manner is to have a simple mechanism for adding and removing processing components. This software design pattern is known as the Intercepting Filter Pattern. This pattern is frequently used in the CCSDS Layers Framework. The use of this pattern forces: Reusability of common processing components. Centralization of common logic. Components can be easily added or removed without affecting existing components, so that they can be used in a variety of combinations. Interceptor Client Filter Filter 1 Chain.. Filter N intercept dointerception Some processing dointerception Some processing Figure 4. Intercepting Filter Sequence Diagram 5
6 Figure 4 gives an overview of the flow of the Intercepting Filter Pattern. The use of the Intercepting Filter Pattern ensures that the Space Telemetry Coding Layer not only follows the CCSDS recommendation but is flexible enough to cope with mission specific requirements without interfering with the rest of the framework. Figure 5. DefaultSpaceTmCodingLayer UML Diagram The UML Diagram in Figure 5 shows how the interceptor pattern was added to the ISpaceTmCodingLayer interface. The methods setbeforetmframecodinginterceptorchain and setaftertmframecodinginterceptorchain enable the developer to unobtrusively add processing components that may be required by mission specific constraints. III. Development of ADLS with the CCSDS Layers Framework It was decided to break the work to be performed down into two main areas of expertise: Capability and configuration of TM/TC Baseband Unit Development of ATV TM/TC chain customization A. Capability and configuration of TM/TC Baseband Unit As already stated in the introduction, TM/TC baseband units are normally used to receive TM and transmit TC. But due to cost constraints, it was proposed to use a spare TM/TC baseband unit as the RF component of the ATV Data Link Simulator. An analysis of the capabilities of the TM/TC baseband unit revealed that it was not capable of supporting all required functions of the coding layer. 6
7 TM TC Transfer Layer CLCW Transfer Layer TM Transfer Frame TC Transfer Frame Reed Solomon encoding Attachment of Attached Sync Marker Convolutional encoding Codeblocks CADU Channel Symbols Coding Layer BCH Decoding CLTU CLTU sync and extraction Bit stream Convolutional decoding Channel Symbols Physical Layer Physical Layer Figure 6: Coding Layer Functional Block Diagram As detailed in Figure 6, the red boxes identify tasks that are not supported by the TM/TC Baseband Unit but will have to be implemented in software instead. These tasks are: Reed Solomon Encoding Attachment of Attached Sync Marker Detection and extraction of CLTU from the bit stream BCH Decoding of CLTU All of these tasks are supported out-of-the-box by the CCSDS Layers Framework. Therefore, it was possible to quickly assemble an ADLS prototype for testing the TM/TC baseband unit configuration and the interface to the ADLS. Moreover, the CCSDS Layers Framework provided most of the code needed for the development of an MCS simulator. With these tools it was possible to carry out a test to prove that the proposed solution was viable. This was a very important step as it enabled the verification of the proposed set-up. Thereby the overall project risk was greatly minimized. 7
8 TCP/IP Intermediate Frequency TCP/IP MCS Simulator Main TM/TC Baseband Unit Spare TM/TC Baseband Unit Simulator Notebook Redu Ground Station Figure 7: TM/TC Baseband Equipment Test Diagram Figure 7 gives an overview of the preliminary test set-up that enabled the stakeholders to gain confidence in the proposed solution. The TM/TC Baseband Unit experts were no longer needed for the ADLS development and the resources could be freed for other projects. B. ATV TM/TC Chain Customization The next step was to implement the customization of the TM and TC Chain for ATV. Following specializations had to be performed Verification of ATV TC packets Generation of ATV Telecommand Acknowledgment TM packets Update of the time field of archived TM packets to simulate real-time TM Specific TM frame data field for the ATV TM Archiving of TM and TC stream The rest of the TM /TC Chain functionalities were already provided by the CCSDS Layers Framework such as FARM part of COP-1 protocol (AD Mode support) Check of TC Frame, check of TC Segment and the extraction of the TC packet TM flow control The integration of the customizations for ATV, thanks to the CCSDS Layer Framework design explained in the previous sections, was performed seamlessly. For example, the TM hexadecimal file archive was efficiently implemented by the use of the Interceptor pattern in the TM Coding layer. The Telecommand Verification task was added by implementing the ISpaceTcSpacePacketVerificationService interface. None of these customizations required any change to the Framework. Therefore, the ADLS reuses a large part of the CCSDS Layers Framework that has already been tested and used by other projects. This has facilitated the testing and the debugging of the ATV TM/TC Chain customizations, as it was easier to isolate bugs. 8
9 IV. Conclusion Using the CCSDS Layers Framework provides benefits in following domains: A. Technical Domain Robust Software: Thanks to the high level of reusability that the framework provides both in code and testing. Maintainable, scalable and extendable: The decoupling of concerns through the use of interfaces and the adoption of software design patterns such as the Intercepting Filter Pattern makes it easier to cope with future requirements and to integrate them with the existing framework. Debugging/Troubleshooting: As the amount of code that is prone to change is concentrated in certain points it is easier to focus the debugging and troubleshooting on known areas. Increase Productivity: The framework promotes loose coupling between modules and layers of the development thereby encouraging and promoting parallel development. Agile Development: As the framework provides default implementations it enables the use of agile development techniques and facilitates rapid prototyping. B. Management Domain Human Resources: New team members can become productive quickly as they only need to know the part of the framework that they are working on. Risk Management: Allows the developers to concentrate on the critical parts of the development at a very early stage, thereby decreasing the project risks. 9
5.2 Telemetry System Concept
126 Chapter 5 Traditionally, telemetry transmitted from spacecraft was formatted with a time-division multiplexing (TDM) scheme, where data items were multiplexed into a continuous stream of fixed-length
More informationFILE MANAGEMENT AND FILE TRANSFER CNES VIEWS. Christian POULIQUEN
FILE MANAGEMENT AND FILE TRANSFER CNES VIEWS Christian POULIQUEN 1 SOMMAIRE INTRODUCTION NEEDS AND OPS CONCEPT STANDARDS OVERVIEW CNES MISSION STATUS OPEN POINTS 2 FILES IN SPACE - SHORT INTRODUCTION Many
More informationArchitectures for Fleet Management. B. L. Kizzort. Harris Corporation, Melbourne, Florida, USA.
Architectures for Fleet Management B. L. Kizzort Harris Corporation, Melbourne, Florida, USA. Abstract With the increasing reliance on space systems for communications, the number of multi-satellite, multimission
More informationIOAG SERVICE CATALOG #1 IOAG. document title/ titre du document. prepared by/préparé par. Gian Paolo Calzolari (Editor)
D O C U M E N T document title/ titre du document IOAG SERVICE CATALOG #1 prepared by/préparé par Gian Paolo Calzolari (Editor) issue/édition 1 revision/révision 4 date of issue/date d édition 18/06/2013
More informationOn-board Software Reference Architecture for Payloads
On-board Software Reference Architecture for Payloads Presenters Victor Bos, phone: +358 400897907, email: victor.bos@ssf.fi Adam Trcka, phone: +420 736650822, email: adam.trcka@evolvsys.cz Introduction
More informationUSE OF PYTHON AS A SATELLITE OPERATIONS AND TESTING AUTOMATION LANGUAGE
USE OF PYTHON AS A SATELLITE OPERATIONS AND TESTING AUTOMATION LANGUAGE Gonzalo Garcia VP of Operations, USA Property of GMV All rights reserved INTRODUCTION Property of GMV All rights reserved INTRODUCTION
More informationDevelopment Plan for Turbo Encoder Core and Devices Implementing the Updated CCSDS Telemetry Channel Coding Standard
Development Plan for Turbo Encoder Core and Devices Implementing the Updated CCSDS Telemetry Channel Coding Standard Sandi Habinc 1, Gian Paolo Calzolari 2, Enrico Vassallo 3 European Space Research and
More informationPatterns in. Lecture 2 GoF Design Patterns Creational. Sharif University of Technology. Department of Computer Engineering
Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 2 GoF Design Patterns Creational 1 GoF Design Patterns Principles Emphasis on flexibility and reuse through decoupling of classes. The underlying
More informationECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0
ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,
More informationIn: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal
Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real
More informationConsultative Committee for Space Data Systems REPORT CONCERNING SPACE DATA SYSTEM STANDARDS TELECOMMAND SUMMARY OF CONCEPT AND RATIONALE
Consultative Committee for Space Data Systems REPORT CONCERNING SPACE DATA SYSTEM STANDARDS TELECOMMAND SUMMARY OF CONCEPT AND RATIONALE CCSDS 200.0-G-6 GREEN BOOK JANUARY 1987 AUTHORITY * * * * * * *
More informationBENEFITS OF USING MULTIPLE PLP IN DVB-T2
BENEFITS OF USING MULTIPLE PLP IN DVB-T2 ENENSYS Technologies, France : http://www.enensys.com DVB-T2 has already achieved incredible success for delivering digital terrestrial television. More than 28
More informationSIMERO Software System Design and Implementation
SIMERO Software System Design and Implementation AG Eingebettete Systeme und Robotik (RESY),, http://resy.informatik.uni-kl.de/ 1. Motivation and Introduction 2. Basic Design Decisions 3. Major System
More informationASTERIX Format Analysis and Monitoring Tool
ASTERIX Format Analysis and Monitoring Tool Reference: SUR/STFRDE/APAT-SRS Status: Released Edition: 1.0 Date: 27 August 1998 Authors: Bruno Lambin, Tarkan Sevim Table of Contents 1. Introduction 1.1.
More informationBinonymizer A Two-Way Web-Browsing Anonymizer
Binonymizer A Two-Way Web-Browsing Anonymizer Tim Wellhausen Gerrit Imsieke (Tim.Wellhausen, Gerrit.Imsieke)@GfM-AG.de 12 August 1999 Abstract This paper presents a method that enables Web users to surf
More informationHummingbird. A Service Based Open Source Ground Segment for Small Satellites
Hummingbird A Service Based Open Source Ground Segment for Small Satellites Mark Doyle 1, Johannes Klug 2 mark.doyle@logica.com, johannes.klug@logica.com Logica Deutschland GmbH & Co. KG, Darmstadt, Hessen,
More informationcnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
More informationAdding Web 2.0 features to a Fleet Monitoring Dashboard
SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2249 Adding Web 2.0 features to a Fleet Monitoring Dashboard
More informationIntroduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
More informationSCADE Suite in Space Applications
SCADE Suite in Space Applications at EADS David Lesens 09/10/2008 Overview Introduction Historical use of SCADE at EADS Astrium ST Why using SCADE? The Automatic Transfer Vehicle (ATV) M51 and Vega R&T
More informationRapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
More informationWHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
More informationConfiguring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations
Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations Simon R. Chudley and Ulrich Ultes-Nitsche Department of Electronics and Computer Science, University of
More informationUsing IPSec in Windows 2000 and XP, Part 2
Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security
More informationCisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
More informationzen Platform technical white paper
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
More informationCisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
More informationSDR Architecture. Introduction. Figure 1.1 SDR Forum High Level Functional Model. Contributed by Lee Pucker, Spectrum Signal Processing
SDR Architecture Contributed by Lee Pucker, Spectrum Signal Processing Introduction Software defined radio (SDR) is an enabling technology, applicable across a wide range of areas within the wireless industry,
More informationUSE OF SCILAB FOR SPACE MISSION ANALYSIS AND FLIGHT DYNAMICS ACTIVITIES
USE OF SCILAB FOR SPACE MISSION ANALYSIS AND FLIGHT DYNAMICS ACTIVITIES Thierry Martin CNES Scilabtec 09 Use of Scilab for space mission analysis Page 1 Use of Scilab in CNES Scilab is now widely used
More informationConsiderations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
More informationSoftware Defined Radio Architecture for NASA s Space Communications
From July 2007 High Frequency Electronics Copyright 2007 Summit Technical Media Software Defined Radio Architecture for NASA s Space Communications By Maximilian C. Scardelletti, Richard C. Reinhart, Monty
More informationCombining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus
Combining Service-Oriented Architecture and Event-Driven Architecture using an Enterprise Service Bus Level: Advanced Jean-Louis Maréchaux (jlmarech@ca.ibm.com), IT Architect, IBM 28 Mar 2006 Today's business
More informationChapter 13: Program Development and Programming Languages
Understanding Computers Today and Tomorrow 12 th Edition Chapter 13: Program Development and Programming Languages Learning Objectives Understand the differences between structured programming, object-oriented
More informationCOL- CC and ESA Ground Segment. Page 1
COL- CC and ESA Ground Segment Page 1 M&C Antenna Ground Station SpACE DLR has implemented a new antenna ground station M&C Framework for the Weilheim antennas. It will be the M&C software for the existing
More informationVIRTUAL LABORATORY: MULTI-STYLE CODE EDITOR
VIRTUAL LABORATORY: MULTI-STYLE CODE EDITOR Andrey V.Lyamin, State University of IT, Mechanics and Optics St. Petersburg, Russia Oleg E.Vashenkov, State University of IT, Mechanics and Optics, St.Petersburg,
More informationDecomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces
Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The
More informationDevelopment of AUTOSAR Software Components within Model-Based Design
2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior
More informationI2C PRESSURE MONITORING THROUGH USB PROTOCOL.
I2C PRESSURE MONITORING THROUGH USB PROTOCOL. Product Details: To eradicate human error while taking readings such as upper precision or lower precision Embedded with JAVA Application: Technology Used:
More informationSOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT
SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original
More information1-04-10 Configuration Management: An Object-Based Method Barbara Dumas
1-04-10 Configuration Management: An Object-Based Method Barbara Dumas Payoff Configuration management (CM) helps an organization maintain an inventory of its software assets. In traditional CM systems,
More informationThe PACS Software System. (A high level overview) Prepared by : E. Wieprecht, J.Schreiber, U.Klaas November,5 2007 Issue 1.
The PACS Software System (A high level overview) Prepared by : E. Wieprecht, J.Schreiber, U.Klaas November,5 2007 Issue 1.0 PICC-ME-DS-003 1. Introduction The PCSS, the PACS ICC Software System, is the
More informationHow To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
More informationWS_FTP Pro. Addendum to User s Guide. Software Version 6.6. Ipswitch, Inc.
WS_FTP Pro Addendum to User s Guide Software Version 6.6 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Fax: 781-676-5710 Lexington, MA 02421-3127 Web: http://www.ipswitch.com The information
More informationAutonomy for SOHO Ground Operations
From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). All rights reserved. Autonomy for SOHO Ground Operations Walt Truszkowski, NASA Goddard Space Flight Center (GSFC) Walt.Truszkowski@gsfc.nasa.gov
More informationIntegrated Development of Distributed Real-Time Applications with Asynchronous Communication
Integrated Development of Distributed Real-Time Applications with Asynchronous Communication Marc Schanne International Workshop on Java Technologies for Real-time and Embedded Systems (JTRES) 26-28 September
More informationTesting automation of projects in telecommunication domain
Testing automation of projects in telecommunication domain Alexey Veselov, Vsevolod Kotlyarov Saint-Petersburg State Polytechnic University, Saint-Petersburg, Russia a.veselov@ics2.ecd.spbstu.ru, vpk@ics2.ecd.spbstu.ru
More informationinet Enterprise Features Fact Sheet
2007 inet Enterprise Features Fact Sheet inetmon Sdn. Bhd. 1010 & 1011, Tingkat 10 Blok D, Dataran Usahawan Kelana,17, Jalan SS 7/26, Kelana Jaya, 47301 Petaling Jaya, Selangor Darul Ehsan Tel: 603-7880
More informationThe IBM Cognos Platform for Enterprise Business Intelligence
The IBM Cognos Platform for Enterprise Business Intelligence Highlights Optimize performance with in-memory processing and architecture enhancements Maximize the benefits of deploying business analytics
More informationCourse Curriculum for Master Degree in Electrical Engineering/Wireless Communications
Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies
More informationSoftware Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
More informationIEEE C802.20-03/88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption
IEEE C802.20-03/88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems Tata Consultancy Services
More informationGSAW 2010. C2 System Advantages Sought, Lessons Learned, and Product Philosophies. Ryan Telkamp. Presenter name Presenter Title
GSAW 2010 Evolution of a Service Oriented Architecture t (SOA) C2 System Advantages Sought, Lessons Learned, and Product Philosophies Ryan Telkamp Presenter name Presenter Title BOEING is a trademark of
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationSaaS Analytics. Analyzing usage data to improve software. Bart Schaap - 1308297 Tim Castelein - 1512277. February 10, 2014
SaaS Analytics Analyzing usage data to improve software Bart Schaap - 1308297 Tim Castelein - 1512277 February 10, 2014 Summary TOPdesk is a company that develops a software product, also called TOPdesk,
More information1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
More informationBest Practices for Verification, Validation, and Test in Model- Based Design
2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based
More informationInformation and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
More informationDatabase Administration for Spacecraft Operations The Integral Experience
r bulletin 103 august 2000 Database Administration for Spacecraft Operations The Integral Experience J. Houser & M Pecchioli Mission Operations Department, ESA Directorate of Technical and Operational
More informationSybase Unwired Platform 2.0
white paper Sybase Unwired Platform 2.0 Development Paradigm www.sybase.com TABLE OF CONTENTS 1 Sybase Unwired Platform 1 Mobile Application Development 2 Mobile Business Object (MBO) Development 4 Mobile
More informationModel-Driven Software Development for Robotics: an overview
Model-Driven Software Development for Robotics: an overview IEEE-ICRA2011 Workshop on Software Development and Integration in Robotics Jan F. Broenink, Maarten M. Bezemer Control Engineering, University
More informationSecure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
More informationFirst Application of the Generic Emulated Test Software, GETS, in the LISA Pathfinder Operational Simulator SESP 2008, 8 th October 2008, ESTEC
First Application of the Generic Emulated Test Software,, in the LISA Pathfinder Operational Simulator SESP 2008, 8 th October 2008, ESTEC Joachim Ochs Michael Irvine Mehran Sarkarati Mariella Spada VEGA
More informationSeptember 18, 2014. Modular development in Magento 2. Igor Miniailo Magento
September 18, 2014 Modular development in Magento 2 Igor Miniailo Magento Agenda 1 Magento 2 goals 2 Magento 1 modules 3 Decoupling techniques 4 Magento 2 is it getting better? 5 Modularity examples Magento
More informationAnalysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
More informationDetecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
More informationSatellite Control Software (SCS) Mission Data Client Extensibility User Guide
Page : 1 of 16 Satellite Control Software (SCS) Mission Data Client Extensibility User Guide Prepared by: Florian George Stéphane Billeter Space Center EPFL Lausanne Switzerland 06 November 2013 Page :
More informationPatterns in Software Engineering
Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 7 GoV Patterns Architectural Part 1 1 GoV Patterns for Software Architecture According to Buschmann et al.: A pattern for software architecture
More informationThe structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao.
Logging makes sense for testbench debug The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao. SystemVerilog provides
More informationESTRACK Management System Support for the CCSDS Space Communication Cross Support Service Management
ESTRACK Management System Support for the CCSDS Space Communication Cross Support Service Management Alexander Hoffmann 1 VEGA Space GmbH, Europaplatz 5, D-64293 Darmstadt, Germany Holger Dreihahn 2 and
More informationHow To Build A Financial Messaging And Enterprise Service Bus (Esb)
Simplifying SWIFT Connectivity Introduction to Financial Messaging Services Bus A White Paper by Microsoft and SAGA Version 1.0 August 2009 Applies to: Financial Services Architecture BizTalk Server BizTalk
More informationFirewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
More informationExtend the value of your core business systems.
Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems
More informationPropsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
More informationLRIT TRANSMITTER SPECIFICATION
LRIT TRANSMITTER SPECIFICATION 1.0 Introduction The National Oceanic and Atmospheric Administration (NOAA) Low Rate Information System (LRIT broadcast system is an imagery and environmental products delivery
More informationEmbedded Critical Software Testing for Aerospace Applications based on PUS
XI Workshop de Testes e Tolerância a Falhas 119 Embedded Critical Software Testing for Aerospace Applications based on PUS Rodrigo P. Pontes 1, Eliane Martins 2, Ana M. Ambrósio 3, Emília Villani 1 1 Instituto
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
More informationEVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer
WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction
More informationVisuSniff: A Tool For The Visualization Of Network Traffic
VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 oechsle@informatik.fh-trier.de Oliver Gronz University
More informationDistack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute
More informationImprove business agility with WebSphere Message Broker
Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching
More informationBest Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com
Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and
More informationGoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
More informationThe next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
More informationSybase Unwired Platform 2.1.x
white paper Sybase Unwired Platform 2.1.x Development Paradigm www.sybase.com Table of Contents 1 Sybase Unwired Platform 2 Mobile Application Development 3 Mobile Business Object (MBO) Development 5 Mobile
More informationRS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
More informationTesting WiMAX receiver performance in a multipath propagation environment using Agilent s E6651A with an EB Propsim C8 radio channel emulator
Testing WiMAX receiver performance in a multipath propagation environment using Agilent s E6651A with an EB Propsim C8 radio channel emulator Application Note 1 Summary Introduction As a part of the certification
More informationThe K 2 System: Lisp at the Core of the ISP Business
The K 2 System: Lisp at the Core of the ISP Business Espen J. Vestre Nextra AS 1 Introduction The Nextra Group, a subsidiary of Telenor (the norwegian Telecom), is Norway s largest ISP, with over 400.000
More informationEE984 Laboratory Experiment 2: Protocol Analysis
EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a
More informationESA s Data Management System for the Russian Segment of the International Space Station
iss data management system ESA s Data Management System for the Russian Segment of the International Space Station J. Graf, C. Reimers & A. Errington ESA Directorate of Manned Spaceflight and Microgravity,
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationAspect-Oriented Programming
Aspect-Oriented Programming An Introduction to Aspect-Oriented Programming and AspectJ Niklas Påhlsson Department of Technology University of Kalmar S 391 82 Kalmar SWEDEN Topic Report for Software Engineering
More informationOracle Data Integrator 12c: Integration and Administration
Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration
More informationLezione 6 Communications Blockset
Corso di Tecniche CAD per le Telecomunicazioni A.A. 2007-2008 Lezione 6 Communications Blockset Ing. Marco GALEAZZI 1 What Is Communications Blockset? Communications Blockset extends Simulink with a comprehensive
More informationDesign with Reuse. Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1
Design with Reuse Building software from reusable components. Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14 Slide 1 Objectives To explain the benefits of software reuse and some reuse
More informationPIE. Internal Structure
PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution
More informationSIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
More informationHigh Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
More informationVerification and Validation of Software Components and Component Based Software Systems
Chapter 5 29 Verification and Validation of Software Components and Component Based Christina Wallin Industrial Information Technology Software Engineering Processes ABB Corporate Research christina.wallin@mdh.se
More informationSEMS: The SIP Express Media Server. FRAFOS GmbH
SEMS: The SIP Express Media Server FRAFOS GmbH Introduction The SIP Express Media Server (SEMS) is a VoIP media and application platform for SIP based VoIP services. SEMS offers a wide selection of media
More informationApplication Integration: The Future of Technology in Business
Application Integration: The Future of Technology in Business ISLANDS OF DATA Over the last twenty years, the trend for businesses has been to base application development on need a new application is
More information