Impacts of SoS on Software Development Gary Hafen Corporate Fellow, Software Engineering USC CSSE Workshop Integrating Systems and Software Engineering.

Slides:



Advertisements
Similar presentations
Brief-out: Isolation Working Group Topic discussion leader: Ken Birman.
Advertisements

1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Software Engineering Key construction decisions Design challenges.
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Managing Knowledge in the Digital Firm (II) Soetam Rizky.
Technology Drivers Traditional HPC application drivers – OS noise, resource monitoring and management, memory footprint – Complexity of resources to be.
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Main issues: • Why is reuse so difficult • How to realize reuse
Dagstuhl Intro Mike Whalen. 2 Mike Whalen My main goal is to reduce software verification and validation (V&V) cost and increasing.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Systems Engineering in a System of Systems Context
© 2006 Carnegie Mellon University Establishing a Network Centric Capability: Implications for Acquisition and Engineering Dennis Smith Complex System Symposium.
Software Engineering Techniques for the Development of System of Systems Seminar of “Component Base Software Engineering” course By : Marzieh Khalouzadeh.
Azad Madni Professor Director, SAE Program Viterbi School of Engineering Platform-based Engineering: Rapid, Risk-mitigated Development.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Capturing the requirements
1 Software Architecture: a Roadmap David Garlen Roshanak Roshandel Yulong Liu.
Effective Human Factors in Software-Intensive Systems Jo Ann Lane CSE Annual Research Review – March 2006 © USC CSE 2006 University.
Embedded Systems and Software Engineering Gary Hafen USC CSSE Executive Workshop March 10, 2010.
Process Synchronization Workshop Summary Report Jo Ann Lane University of Southern California Center for Software Engineering.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
© 2007 The MITRE Corporation. All rights reserved Approved for Public Release; Distribution Unlimited Potential New Ideas from Complexity Science.
MEsA Future Trends Panel Discussion Jairus Hihn 22nd International Forum on COCOMO and Systems/Software Cost Modeling (2007)
SQM - 1DCS - ANULECTURE Software Quality Management Software Quality Management Processes V & V of Critical Software & Systems Ian Hirst.
Copyright 2007 by Linda J. Vandergriff All rights reserved. Published 2007 System Engineering in the 21st Century - Implications from Complexity.
Chapter 1 Introduction to Databases
What Causes Software Vulnerabilities? _____________________ ___________ ____________ _______________   flaws in developers own code   flaws resulting.
Effective Methods for Software and Systems Integration
CHAPTER FIVE Enterprise Architectures. Enterprise Architecture (Introduction) An enterprise-wide plan for managing and implementing corporate data assets.
The Software Development Life Cycle: An Overview
SEC835 Database and Web application security Information Security Architecture.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
Priority Research Direction Key challenges Fault oblivious, Error tolerant software Hybrid and hierarchical based algorithms (eg linear algebra split across.
DBS201: DBA/DBMS Lecture 13.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Chapter 2: Software Process Omar Meqdadi SE 2730 Lecture 2 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Lecture 0 Anish Arora CSE 6333 Introduction to Distributed Computing.
CPSC 871 John D. McGregor Module 6 Session 3 System of Systems.
Copyright John C. Knight SOFTWARE ENGINEERING FOR DEPENDABLE SYSTEMS John C. Knight Department of Computer Science University of Virginia.
BE-SECBS FISA 2003 November 13th 2003 page 1 DSR/SAMS/BASP IRSN BE SECBS – IRSN assessment Context application of IRSN methodology to the reference case.
Suzhen Lin, A. Sai Sudhir, G. Manimaran Real-time Computing & Networking Laboratory Department of Electrical and Computer Engineering Iowa State University,
Software Engineering Saeed Akhtar The University of Lahore Lecture 6 Originally shared for: mashhoood.webs.com.
Polymorphous Computing Architectures Run-time Environment And Design Application for Polymorphous Technology Verification & Validation (READAPT V&V) Lockheed.
Cracow Grid Workshop October 2009 Dipl.-Ing. (M.Sc.) Marcus Hilbrich Center for Information Services and High Performance.
Develop a Safety Assurance approach for Complex Systems (Problem Definition) Supervisors: Tim Kelly, Rob Alexander Chris Leong HISE Group Giving a Presentation.
Program Development Cycle Modern software developers base many of their techniques on traditional approaches to mathematical problem solving. One such.
Bio-Networking: Biology Inspired Approach for Development of Adaptive Network Applications 21 May 2005Ognen Paunovski Bio-Networking: Biology Inspired.
1 Quality Attributes of Requirements Documents Lecture # 25.
Enterprise Cybersecurity Strategy
Distributed Models for Decision Support Jose Cuena & Sascha Ossowski Pesented by: Gal Moshitch & Rica Gonen.
Chapter 2: Testing in Software Life Cycle MNN1063 System Testing and Evaluation.
Chapter 1: Computing with Services Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Thomas L. Gilchrist Testing Basics Set 3: Testing Strategies By Tom Gilchrist Jan 2009.
June California Investor Owned Utilities (IOU) HAN vision statement development 15 June 2007.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Problem On a regular basis we use: –Java applets –JavaScript –ActiveX –Shockwave Notion of ubiquitous computing.
A service Oriented Architecture & Web Service Technology.
CSCE 548 Secure Software Development Risk-Based Security Testing
Requirements Analysis Scenes
Coupling and Cohesion 1.
SYSTEM ANALYSIS AND DESIGN
Software Connectors.
Presentation Title September 9, 2018
Database Architectures and the Web
Chapter 19: Building Systems with Assurance
Towards Next Generation Panel at SAINT 2002
Service Oriented Architecture (SOA)
Extending Interface Based Design
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

Impacts of SoS on Software Development Gary Hafen Corporate Fellow, Software Engineering USC CSSE Workshop Integrating Systems and Software Engineering October 29, 2007

Situation Software is providing an increasing percentage of functionality in our systemsSoftware is providing an increasing percentage of functionality in our systems –Space Craft –Aircraft –Ships –Automobiles –Cell Phones –Etc.

Situation Systems are being networked to achieve capabilities beyond what individual systems alone can provideSystems are being networked to achieve capabilities beyond what individual systems alone can provide –System of Systems –Family of Systems –Global Information Grid –Communities of Interest

Ramification Monolithic System design methods and techniques won’t scale up to an asynchronous, loosely coupled, multi- node, system of systemsMonolithic System design methods and techniques won’t scale up to an asynchronous, loosely coupled, multi- node, system of systems –Does not hierarchically decompose functionally –Manage and minimize constraints vs. variables –Adaptive vs. conformal interface logic

Monolithic System Design Defined and Contained Scope of FunctionDefined and Contained Scope of Function Centralized controlCentralized control –Can design with hierarchical structure Deterministic BehaviorDeterministic Behavior –Desirable characteristic that is verified and validated Planned EvolutionPlanned Evolution –Controlled centrally Traditional Acquisition Process Works For These Systems

SoS Design Initially Defined Scope of FunctionInitially Defined Scope of Function –Not all requirements can be known Decentralized control of internal and external interfacesDecentralized control of internal and external interfaces –Architecture must be adaptive to uncontrolled interface changes Behavior EmergesBehavior Emerges –Cannot perform traditional Verification –Emerging behavior may be good or bad depending on objectives and constraints SoS Evolution is not controlled by a central authoritySoS Evolution is not controlled by a central authority –It Happens

Impact on Software - 1 Software Requirements Allocation is problematicSoftware Requirements Allocation is problematic –All requirements are not known –Software solutions must balance performance versus adaptability/flexibility –Functionality may need to be migrated between non- heterogeneous systems –Interfaces cannot be assured to be consistent or even present Functionality must adapt to external environmentFunctionality must adapt to external environment Creates a wider range of test conditionsCreates a wider range of test conditions Requirements Growth/Instability is a Traditional Software Risk

Impact on Software - 2 Software Architecture TechnologiesSoftware Architecture Technologies –Standards such as DoDAF, SoA, XML, CORBA are necessary –Adaptive, intelligent network awareness characteristics are now required –Exploitation of Expert Agent and Data Mining Technologies to achieve capability –Polymorphic Computing Architectures –Fault Containment/Tolerance to unplanned external stimulus Non-Determinism is Now an Asset

Impact on Software - 3 Implementation TechnologiesImplementation Technologies –Model Based Development –Auto-generation of code, test vectors –4 th or 5 th generation languages –Intelligent System composition tools –Performance and Quality of Service assurance

Impact on Software - 4 Test/Verification/ValidationTest/Verification/Validation –Non-deterministic functional operation –Uncontrolled Test Environment –Isolation of errors in shared SoS architecture space –Intelligent System validation Software AssuranceSoftware Assurance –Multiple Independent Levels of Security –Information Assurance in an Information Warfare environment –Cyber Attack

Summary A System of Systems cannot be defined, designed, developed, verified and validated by conventional system development processesA System of Systems cannot be defined, designed, developed, verified and validated by conventional system development processes What used to be considered design “gold plating” may now be mainstream thinkingWhat used to be considered design “gold plating” may now be mainstream thinking Controlling functional performance to a confined envelope of conditions is no longer feasibleControlling functional performance to a confined envelope of conditions is no longer feasible –Emergent behavior has to be evaluated as desirable or undesirable –Adaptive characteristics need to be included in requirements allocation With the lack of controlled behavior, continuous Software Assurance becomes a focused priority.With the lack of controlled behavior, continuous Software Assurance becomes a focused priority.