Maintaining Terminal Integrity and Context-Aware Reconfiguration Johan Muskens (TU/e) Otso Virtanen (HIIT/BRU) Michel Chaudron (TU/e) Ronan Mac Laverty.

Slides:



Advertisements
Similar presentations
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Advertisements

18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
.NET Technology. Introduction Overview of.NET What.NET means for Developers, Users and Businesses Two.NET Research Projects:.NET Generics AsmL.
Software change management
Configuration management
TSpaces Services Suite: Automating the Development and Management of Web Services Presenter: Kevin McCurley IBM Almaden Research Center Contact: Marcus.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
5 August, 2014 Michel Chaudron,Johan Muskens, Johan J. Lukkien and Hailiang Mei TU/e Computer Science, System Architecture and Networking 1 Remote Terminal.
Objektorienteret Middleware Presentation 2: Distributed Systems – A brush up, and relations to Middleware, Heterogeneity & Transparency.
KOALA, Robocop, KobrA, PECOS and Pin
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
ICT 1 “Putting Context in Context: The Role and Design of Context Management in a Mobility and Adaptation Enabling Middleware” Marius Mikalsen Research.
ManageEngine TM Applications Manager 8 Monitoring Custom Applications.
Interpret Application Specifications
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Configuration Management
InBatch 9.0 Jos Peters Technical Support Engineer.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
This chapter is extracted from Sommerville’s slides. Text book chapter
February Semantion Privately owned, founded in 2000 First commercial implementation of OASIS ebXML Registry and Repository.
M. Taimoor Khan * Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic,
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
1 Autonomic Computing An Introduction Guenter Kickinger.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
A Domain-Specific RM&IG Solution Designed to Support the Implementation of ISAD(G) Arian Rajh, PhD, Assist. Prof., FFZG Krešimir Meze, Omega software d.o.o.
Enabling Workflow in UPnP Networks Andreas BobekUniversity of Rostock Faculty of Computer Science and Electrical Engineering Andreas Bobek, Hendrik Bohn,
An Introduction to Software Architecture
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
Enterprise JavaBeans. What is EJB? l An EJB is a specialized, non-visual JavaBean that runs on a server. l EJB technology supports application development.
Configuration Management (CM)
Creator: ACSession No: 16 Slide No: 1Reviewer: SS CSE300Advanced Software EngineeringFebruary 2006 (Software Quality) Configuration Management CSE300 Advanced.
XML Registries Source: Java TM API for XML Registries Specification.
Component frameworks Roy Kensmil. Historical trens in software development. ABSTRACT INTERACTIONS COMPONENT BUS COMPONENT GLUE THIRD-PARTY BINDING.
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
NOVA Networked Object-based EnVironment for Analysis P. Nevski, A. Vaniachine, T. Wenaus NOVA is a project to develop distributed object oriented physics.
PI Data Archive Server COM Points Richard Beeson.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 05. Review Software design methods Design Paradigms Typical Design Trade-offs.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
Kuali Rice at Indiana University From the System Owner Perspective July 29-30, 2008 Eric Westfall.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Blackboard Building Blocks Looking Ahead Thursday, December 03, 2015 Dan McFadyen, Tracy Engwirda, Tom Joyce.
DEAS2005Michael Shin Copyright1 Connector-Based Self-Healing Mechanism for Components of a Reliable System Michael E. Shin Department of Computer Science.
Scientific Annotation Middleware (SAM) Jim Myers, Elena Mendoza PNNL Al Geist, Jens Schwidder ORNL.
PerfSONAR-PS Functionality February 11 th 2010, APAN 29 – perfSONAR Workshop Jeff Boote, Assistant Director R&D.
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
NOVA A Networked Object-Based EnVironment for Analysis “Framework Components for Distributed Computing” Pavel Nevski, Sasha Vanyashin, Torre Wenaus US.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Using GStat 2.0 for Information Validation.
SelfCon Foil no 1 Variability in Self-Adaptive Systems.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
310414IMPLEMENTATION1 IMPLEMENTATIONIMPLEMENTATION SOFTWARE ENGINEERING SOFTWARE ENGINEERING.
CERES-2012 Deliverables Architecture and system overview 21 November 2011 Updated: 12 February
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
Tool Support for Testing Classify different types of test tools according to their purpose Explain the benefits of using test tools.
E2G Web Services E2G Scripts and Methods E2G Domain Logic E2G Domain Logic Client Custom Scripts and Methods Client Custom Scripts and Methods E2G Rules.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Redmond Protocols Plugfest 2016 Jinghui Zhang Office Interoperability Test Tools (Test Suites and Open Source Projects) Software Engineer Microsoft Corporation.
Progress Apama Fundamentals
Software Engineering (CSI 321)
Chapter 18 Maintaining Information Systems
Service Metadata Registry (COSMOS)
Chapter 1 (pages 4-9); Overview of SDLC
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
An Introduction to Software Architecture
Maintaining Terminal Integrity and Context-Aware Reconfiguration Johan Muskens (TU/e) Otso Virtanen (HIIT/BRU) Michel Chaudron (TU/e) Ronan Mac Laverty.
Metadata The metadata contains
EEC 688/788 Secure and Dependable Computing
End-to-End Reconfigurability (E2R)
Presentation transcript:

Maintaining Terminal Integrity and Context-Aware Reconfiguration Johan Muskens (TU/e) Otso Virtanen (HIIT/BRU) Michel Chaudron (TU/e) Ronan Mac Laverty (NRC) Oslo

Change terminal components according to e.g. location or other context information and maintain terminal integrity

Outline Robocop and Space4U Context-Aware Reconfiguration System Integrity Management Scenario

Consortium Robocop ( ): CSEM ESI FAGOR ELECTRODOMESTICOS IKERLAN Nokia Philips Electronics Nederland B.V., SAIA – Burgess Electronics Technical University Eindhoven Technical University of Madrid Visual Tools Space4U ( ): CSEM FAGOR ELECTRODOMESTICOS IKERLAN Nokia Philips Electronics Nederland B.V., Technical University Eindhoven Technical University of Madrid Visual Tools ITEA is a Eureka strategic cluster programme

Robocop’s Aim that enables robust and reliable operation upgrading and extension component trading Define an open, component-based framework for the middleware layer in high-volume consumer devices

Robocop Component Model Robocop component –A set of models –Models can be executable –Models are composable Robocop Component Resource Model Simulation Model Documentation Executable Component Functional Model Source Code … Executable Component Service 1 Service 2 Service Interface Requires Interface Provides Interface  Executable component

Assisting Frameworks Robocop Runtime Environment (RRE) keeps a registry of components available in terminal Robocop Download Process (RCDP) makes it possible to download new components to terminal Resource Management Framework, time requirements and quality of service management Fault Management Framework WIP Power Management Framework WIP Terminal Management Framework WIP Robocop Space4U Context-aware reconfiguration and System Integrity Management done in this subtask

Use existing Robocop mechanisms, mainly Robocop Download Process and RRE Client API for downloading and switching of components Develop a framework to keep the terminal in consistent shape and integrate this with context-aware reconfiguration framework Aim Change terminal components according to e.g. location or other context information and maintain terminal integrity

Our Solution… Context-aware Framework –Context monitoring (e.g. probing the neighborhood for nearby devices) –A placeholder for context data (for depositing relevant information) A blackboard flavoured solution for terminal suits our needs: Consists of following components: 1. The blackboard, 2. Control and 3. Arbitrary number of knowledge sources. What should we deposit here? What should we deposit here?

Models Deposited in Terminal Terminal Management based on a model describing the current configuration of the terminal (self-model) Model of terminal and context in which it is used: C = T x U x  x E c = c  C, where Terminal (t), User (u), Time (  ), and Environment (e). Example: Terminal Model consists of: –Application layer model (bindings between the service instances etc.) –Middleware model (runtime information etc.) –Platform model (operating system etc.)

High level set-up

Integrity Management Terminal Manager Terminal Externalize Self-Model i.e. take a snap-shot of the current state Externalize Self-Model i.e. take a snap-shot of the current state Basic Configuration Facilities Basic Configuration Facilities Monitoring Monitoring Diagnosis Diagnosis Repairing Repairing Script generation Script generation Script execution Script execution Database Provide rules Provide rules Provide solutions Provide solutions Maintaining software integrity using 3 roles !

Two Checks Developed Blacklist of Services –In this case a component with a defect has been deployed to a set of terminals  Solution is to compare the snapshot of terminal models to know faulty components (or services) deposited in database Missing services –Dynamically changing terminal. Problem: how to guarantee that all the services needed by some application X are available?  Solution is to compare the needed services by application X and the available services in the terminal. This information is recorded in the self model of terminal

Scenario 1.User equipped with a Robocop terminal arrives to an airport. The context framework notices the new context 2.A timetable application needed in this context is downloaded via RCDP. This also updates one of the existing components in terminal 3.User executes the timetable application 4.Later on that day the user notifies some strange behavior in the terminal and therefore starts the check terminal status –procedure 5.Snapshot of the terminal models is sent to terminal manager server 6.Terminal manager server notifies that one of the components in terminal is blacklisted (i.e. the one downloaded in phase 2) by a developer 7.Repair script is generated and an updated version of the faulty component is downloaded and registered to the user’s terminal