Web services UML modeling



Similar documents
UML Profile for Schedulability, Performance and Time (UML-SPT)

Diagramming Techniques:

Mail Server Scenarios and Configurations

Basic Exchange Setup Guide

How To Configure A Vyatta As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net (Dspv) On A Network With A D

Secure Messaging Server Console... 2

UML TUTORIALS THE COMPONENT MODEL

Basic Exchange Setup Guide

Installation Notes for Outpost Network Security (ONS) version 3.2

WINDOWS MAIL VISTA ACCOUNT SETUP FOR USE WITH ELLIPSE ADVANCED SPAM FILTER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

UML other structural. diagrams. (Implementation Diagrams UML 1.5) Università di Padova. Facoltà di Scienze MM.FF.NN. Informatica - anno

Setup Guide for Exchange Server

Towards an Integration of Business Process Modeling and Object-Oriented Software Development

Chap 1. Introduction to Software Architecture

UML basics: An introduction to the Unified Modeling Language

This sequence diagram was generated with EventStudio System Designer (

Designing Real-Time and Embedded Systems with the COMET/UML method

Use Cases. Use Cases Diagrams

Chapter 1 - Web Server Management and Cluster Topology

Internet Technology 2/13/2013

Service Overview & Installation Guide

IBM WebSphere Application Server Communications Enabled Applications Setup guide

To install the SMTP service:

Applying 4+1 View Architecture with UML 2. White Paper

OUTLOOK EXPRESS ACCOUNT SETUP FOR USE WITH ELLIPSE ADVANCED SPAM FILTER

Compliance and Requirement Traceability for SysML v.1.0a

Broadband Phone Gateway BPG510 Technical Users Guide

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Evaluation guide. Vyatta Quick Evaluation Guide

Windows Clients and GoPrint Print Queues

c360 Portal Installation Guide

safend a w a v e s y s t e m s c o m p a n y

FTP and . Computer Networks. FTP: the file transfer protocol

1 Introduction: Network Applications

Introduction to Computer Security Benoit Donnet Academic Year

UIP1868P User Interface Guide

HOB WebSecureProxy as an SSL Terminal for Clients

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

Using UML Part Two Behavioral Modeling Diagrams

Installation Guide For Choic Enterprise Edition

F-Secure Messaging Security Gateway. Deployment Guide

Open Thunderbird. To set up an account in Thunderbird, from the Tools menu select Account Settings; choose account; then click Next.

White Paper. Securing and Integrating File Transfers Over the Internet

How to configure your client

Layered Approach to Development of OO War Game Models Using DEVS Framework

1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.

Setting Up Scan to SMB on TaskALFA series MFP s.

Installing GFI MailArchiver

POP3 Connector for Exchange - Configuration

Mail 8.2 for Apple OSX: Configure IMAP/POP/SMTP

Windows Live Mail Setup Guide

What is the Barracuda SSL VPN Server Agent?

Guideline for setting up a functional VPN

µfup: A Software Development Process for Embedded Systems

insync Installation Guide

Installing GFI MailArchiver

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

IIS, FTP Server and Windows

Outlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.

Configuring Notification for Business Glossary

Installation and Configuration Guide

IBM. Implementing SMTP and POP3 Scenarios with WebSphere Business Integration Connect. Author: Ronan Dalton

Network Layers. CSC358 - Introduction to Computer Networks

UML Diagram Types. Use Cases do the Following. Use Case Diagram

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

Install MS SQL Server 2012 Express Edition

A UML Introduction Tutorial

Download/Install IDENTD

IBM Unica emessage Version 8 Release 6 February 13, Startup and Administrator's Guide

Deployment of Keepit for Windows

13.1 Backup virtual machines running on VMware ESXi / ESX Server

Developing SOA solutions using IBM SOA Foundation

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

CTERA Cloud Onramp for IBM Tivoli Storage Manager

IBM Cloud Manager with OpenStack

Quick Instructions Installing on a VPS (Virtual Private Server)

Case Study - Configuration between NXC2500 and LDAP Server

NETWRIX EVENT LOG MANAGER

NovaBACKUP xsp Version 15.0 Upgrade Guide

If you examine a typical data exchange on the command connection between an FTP client and server, it would probably look something like this:

Before starting to use the new system you will need to know the password to your e-wire account.

Deploying the BIG-IP System for Microsoft Application Virtualization

Resonate Central Dispatch

Server Installation Manual 4.4.1

UML TUTORIALS THE USE CASE MODEL

Integrating with BarTender Integration Builder

Database Selection Guide

Instructions for Microsoft Outlook 2003

I219 Software Design Methodology

Installing Policy Patrol on a separate machine

FTP: the file transfer protocol

Aqua Connect Load Balancer User Manual (Mac)

How To - Implement Clientless Single Sign On Authentication with Active Directory

Knowledge Base Article: Article 218 Revision 2 How to connect BAI to a Remote SQL Server Database?

CREDENTIAL MANAGER IN WINDOWS 7

Transcription:

Web services UML modeling 1

Part II: Web services behavioral modeling 1st step: Model the system using UML. 2nd step: Annotate performance characteristics using the SPT Profile. 3rd step: Translate the UML-SPT diagrams into Petri nets. 4th step: Analyze the Petri nets to obtain performance results. 2

UML diagrams in our proposal UML use cases UML sequence diagram UML statecharts UML activity diagrams UML deployment diagram Version UML 1.4 3

The evolution of UML (from Bran Selic s WOSP 2002 Tutorial) UML 2.0 (MDA) 2003-2004 UML 1.4.1 UML 1.4 (action semantics) UML 1.3 (extensibility) 2002 2001 1998 1997 UML 1.1 (OMG Standard) 1996 Rumbaugh Booch Jacobson Foundations of OO ( Meyer,Stroustrup, Harel, Wirfs-Brock, Reenskaug, ) 1967 4

Case study: POP3 protocol UML models of a basic mail client. Classes: server host, client host and user. Check mail feature: Client establish TCP connection with the server. Authorization phase (username and password). Transaction phase (LIST command): download mails (text and with attach). QUIT ends the interaction. 5

Use case diagram Scenario modeling technique. Introduced by Jacobson. A scenario models how a system behaves (works), not how to implement it. Each scenario is described with a sequence of actions. A means to understand the system: developers, final users and domain experts. Elements: actors, ellipses and relationships. 6

Use case diagram: Relationships Communication. Generalization. Inclusion. Caso de uso padre Caso de uso hijo The base use case explicitly incorporates the behavior of the provider use case. Extension. The base use case implicitly incorporates the behavior of the provider use case. Optional behavior. Comprobar clave Hacer pedido Puntos de extension establecer prioridad <<include>> Validar usuario Examinar retina Seguir pedido Hacer pedido <<include>> <<include>> Validar usuario <<extend>> (establecer prioridad) Hacer pedido urgente Validar usuario 7

Sequence diagram A SD models a system interaction as a set of messages exchanged among classes. Vertical dimension: Time; Horizontal dimension: Classes Our proposal: Describe a use case. Useful to compute Response Time. Objects can reside in the same machine or in different ones. Transmission time. Message size. Probabilities as routing rates. 8

Check mail use case. Sequence diagram (2) 9

Sequence diagram (3) Clinical Decision Support System (CDSS) seq. diagram. Electronic Patient Record (EPR). 10

Statechart diagram User statechart. psclient / CH.check_mail UserMainState DO: Thinking / CH.exit_exec fsclient Model a class of the problem domain. Event-driven behavior: Reactive objects. Statechart basic modeling elements: Initial pseudo-state. Final state. Simple state. Transitions: event/class.event. Activities in states. KEY: Communication among SC via events. KEY: Consistency with the SD. 11

psmclient Statechart diagram (2) Client Host statechart. Greeting check_mail entry: SH.open_tcp_connection greeting Waiting4Entry Authentication exit_exec ok Quitting entry: SH.quit err entry: SH.username ok err fsmclient DeleteMessage ok[not new] entry: SH.dele ok[not messages_left] ok[messages_left] text_message RetrieveMessage CheckMessages ok[new] entry: SH.retr entry: SH.list attach_message CheckPassword entry:sh.password ok 12

Statechart diagram (3) pspop3server open_tcp_connection / CH.greeting Authorization DO: Authorization list / CH.ok Listening on TCP port 110 dele / CH.ok Transaction / CH.ok Update DO: unlock_maildrop quit retr / CH.text _message / CH.attach _message Server Host statechart. DO: Sending read_message 13

Statechart diagram (4) Detailed description of a statechart behavior: Execution model. ev1/act1 STATE 1 STATE 1 entry/act2 DO:activ1 exit/act3 ev3/act5 ev2/act4 STATE 1 ev4/act6 14

Statechart (5) 15

Activity diagram What happens with the authorization activity in the SH statechart? Model it in great detail to get an accurate view of the problem. Activity diagram is commonly used to workflow modeling not in our approach. We use the AD to model activities in SCs. Special case of statechart, where: Most of the transitions are fired when the action/activity in the state ends no reactive behaviour. Most of the states are action states. Automated transition firing. 16

Activity diagram (2) 17

Activity diagram (3) Action states No time spent in computation. Activity state Spent computation or waiting time. Can be decomposed in others may modeled with another AD With entry and/or exit. Transition Automatic firing Bifurcations Alternative paths. Object flow Objects involved in the diagram (create, destruct or modify). 18

Fork and Join Concurrent paths Join: each path waits until completions of all of them Activity diagram (4) 19

Activity diagram (5) Swimlanes Pasajero Vendedor Línea Aerea Solicitar pasaje Verificar existencia vuelo Dar detalles vuelo Informar alternativas y precios Seleccionar vuelo Solicitar pago Reservar plazas Pagar pasaje Confirmar plaza reservada Emitir billete 20

Deployment diagram Model the deployment of the software components in the hardware platform. Software component: configuration files, programs, tables in a DB, operating system, Nodes: represent the hardware resources (CPUs, disks, printers, LAN, Internet, ) name service-1 Nodo service-2 Component 21

Deployment diagram: Relationships Dependency Component-1 Component-2 Communication Nodo <<Internet>> Nodo 22

POP3 deployment. Deployment diagram :clienthost m:mailclient :Internet :serverhost s:serverhost 23