Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy

Slides:



Advertisements
Similar presentations
© Chinese University, CSE Dept. Software Engineering / Software Engineering Topic 1: Software Engineering: A Preview Your Name: ____________________.
Advertisements

Software Fault Injection for Survivability Jeffrey M. Voas & Anup K. Ghosh Presented by Alison Teoh.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
Overview of the Multos construction process Chad R. Meiners.
Building software from reusable components.
Planning for Middleware Rose Gamble Leigh Davis Jamie Payton University of Tulsa.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Chapter 3 Software Processes.
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.
Issues and Ideas in Software Reliability for FCS Joe Loyall BBN Technologies.
Software Engineering Muhammad Fahad Khan
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 14Slide 1 Design with Reuse l Building software from reusable components.
1st IRRIIS Workshop, April 26th, 2006 Key challenges for Critical Information Infrastructure Protection 1st IRRIIS Workshop Sankt Augustin April 26th,
ANSALDO: BACKGROUND experience in dependable Signalling Automation Systems experience in dependable Management Automation Systems experience in installation,
S/W Project Management Software Process Models. Objectives To understand  Software process and process models, including the main characteristics of.
Software Engineering Reuse.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 19 Slide 1 Component-based software engineering 1.
Software Models (Cont.) 9/22/2015ICS 413 – Software Engineering1 -Component-based software engineering -Formal Development Model.
©Ian Sommerville 2000 Software Engineering, 6th edition. Slide 1 Component-based development l Building software from reusable components l Objectives.
©Ian Sommerville 2000, Mejia-Alvarez 2009 Slide 1 Software Processes l Coherent sets of activities for specifying, designing, implementing and testing.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Topic (1)Software Engineering (601321)1 Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution.
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
21-22 May 2004IMPROQ 2004 / Impact of SW Processes on Quality Workshop 1 Quality for Components: Component and Component- Based Software Quality Issues.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
Open Workshop,Pisa, November 2002 VI Framework: Integrated Project Dependable Systems and Information infrastructure - Research and Exploitation DeSIRE.
MAFTIA Expression of Interest for DEFINE and DESIRE presented by Robert Stroud, University of Newcastle upon Tyne.
10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
ICCS WSES BOF Discussion. Possible Topics Scientific workflows and Grid infrastructure Utilization of computing resources in scientific workflows; Virtual.
Safety-Critical Systems 7 Summary T V - Lifecycle model System Acceptance System Integration & Test Module Integration & Test Requirements Analysis.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
1 INTRUSION TOLERANT SYSTEMS WORKSHOP Phoenix, AZ 4 August 1999 Jaynarayan H. Lala ITS Program Manager.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
ESA Harwell Robotics & Autonomy Facility Study Workshop Autonomous Software Verification Presented By: Rick Blake.
Attributes Availability Reliability Safety Confidentiality Integrity Maintainability Dependability Means Fault Prevention Fault Tolerance Fault Removal.
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
Session 1: Technology Development August 15 NSF Workshop.
Reaching for k Nines Miroslaw Malek Humboldt University Berlin, Germany
Software Reuse. Objectives l To explain the benefits of software reuse and some reuse problems l To discuss several different ways to implement software.
Intrusion Tolerant Architectures
Rekayasa Perangkat Lunak Part-10
Integration Testing.
Rekayasa Perangkat Lunak
The Development Process of Web Applications
Chapter 17 - Component-based software engineering
Software Life Cycle “What happens in the ‘life’ of software”
Similarities between Grid-enabled Medical and Engineering Applications
Software Processes (a)
Distribution and components
Security Engineering.
Software Prototyping Animating and demonstrating system requirements.
Gabor Madl Ph.D. Candidate, UC Irvine Advisor: Nikil Dutt
Rekayasa Perangkat Lunak
A Must to Know - Testing IoT
An Urgent National Imperative
An Introduction to Software Architecture
Mark McKelvin EE249 Embedded System Design December 03, 2002
Software Engineering for Safety: a Roadmap
Chapter 17 - Component-based software engineering
Introduction To Distributed Systems
Chapter 5 Architectural Design.
Human Computer Interaction Lecture 14 HCI in Software Process
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy System Architecture and Interoperability - Architecture is a critical element of the solution - Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy Pisa, 25-27/11/02, Workshops on &

Pros and cons of present architectural designs Most of large-scale infrastructures have been developed connecting stand-alone proprietary systems with ad-hoc solutions and independently developed components Pros: Ad-hoc components make easier system validation Limitation of third-party components Re-design and updating do not depend on third parties Cons: Components and implementation technologies evolution and obsolescence Upgrading of components Unflexibility and difficult adaptability Needed re-validation for new systems or major revisions Cons on interaction and interoperability Systems with slightly different requirements and specs cannot reuse components from previous designs: Complete re-design Lack of experience from older systems Interoperability is hard to achieve: Different project specifications Different dependability properties Different communication protocols or media ……. Difficult integration Pisa, 25-27/11/02, Workshops on &

What is needed Definition and construction of an architectural framework such: To reduce the design and development costs To reduce the number of components used in the several subsystems To simplify the evolution process of the products and reduce the associated costs To simplify the validation (and certification) of the products through an incremental approach based on reuse Infrastructure characteristics: Use of generic components: COTS and open source SW components Dependability properties associated to architecture and not only to components: Techniques for error detection, diagnosis and recovery independent from specific components (both HW or SW) Hierarchical approach for functional and non functional properties: To make validation easier Openness of the system: Adaptability to different kinds of architecture for interaction. Pisa, 25-27/11/02, Workshops on &

Trends, new problems and keywords Increasing number of (maybe non-trained) users: New fault types New threats (i.e. to privacy and security) Ubiquity and mobility: New threats to security Evolution, growing complexity, layering of services: Vital services and system survivability Keywords: Integration Composition Recursion: fault error failure Usability Genericity, Openness, Adaptability, Re-use for: Design of dependable components and architectures Designing architectures for dependability Dependable infrastructures from user perspective Pisa, 25-27/11/02, Workshops on &

Design of dependable components and architectures Architecture is a critical element of the solution Rigorous design (i.e. fault prevention) Verification and validation (i.e. fault removal) Fault Tolerance (accidental and malicious faults) System evaluation (i.e. fault forecasting) Requirements Composable compon. Secure components Separation of concern Invariance Early prototyping Adaptable compon. Testable components Coverage evaluation Enabling Technologies Formal methods Design for V&V State observability Testing Supports to validation and verification Redundancy Functional diversity Middleware Analytical modeling Fault injection Instruments Specs languages Modeling Tools Function placement Generic, composable, open source, reusable components Pisa, 25-27/11/02, Workshops on &

Designing architectures for dependability Multiple facets of dependability raise many issues Rigorous design (i.e. fault prevention) Verification and validation (i.e. fault removal) Fault Tolerance (accidental and malicious faults) System evaluation (i.e fault forecasting) How to compose: Interfaces Legacy systems How to guarantee integrity How to guarantee security How to guarantee survivability How to guarantee predictable timing Trusting the tools Testing Symbolic execution How to assess risks How to cope with new fault types How to reach survivability How to coordinate adaptability How to get good usability Uncertainty Meaningful models Meaningful simulations Evaluating coverage Experimental verification Abstraction, recursion, incremental verification Pisa, 25-27/11/02, Workshops on &

Dependable infrastructures from user perspective The user has the final word on system dependability Rigorous design (i.e. fault prevention) Verification and validation (i.e. fault removal) Fault Tolerance (accidental and malicious faults) System evaluation (i.e. fault forecasting) Is the system compliant with specifications ? Do I have the knowledge of possible residual faults ? Is the system able to provide meaningful service in presence of accidental and malicious faults ? Has the system sufficient performance to satisfy my needs ? Is system usability sufficiently good to reduce the probability of human errors ? Does the system protect my privacy, integrity of my data and and security ? Is the cost/dependability ratio optimal for my needs ? I think the system/service has (optimal/good/sufficient/insufficient) cost/dependability ! Pisa, 25-27/11/02, Workshops on &

System architecture in Application studies | Tools and Components | Support Measures Aerospace Healthcare Dependability Case Support Modelling and simulation Policy Issues e-business Infrastruct. Interdepend. Intrusion management Training Bestpractice Fault Prevention Fault Removal Fault Tolerance Fault Forecasting Pisa, 25-27/11/02, Workshops on &