ESERL Feature Interaction Management in Parlay/OSA Using Composition Constraints and Configuration Rules Alessandro (Alex) De Marco, Ferhat Khendek Dept.

Slides:



Advertisements
Similar presentations
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Advertisements

Feature Interaction Handling in LESS Xiaotao Wu and Henning Schulzrinne Internet Real Time Laboratory.
Seyedehmehrnaz Mireslami, Mohammad Moshirpour, Behrouz H. Far Department of Electrical and Computer Engineering University of Calgary, Canada {smiresla,
Snap-stabilizing Committee Coordination Borzoo Bonakdarpour Stephane Devismes Franck Petit IEEE International Parallel and Distributed Processing Symposium.
July 20, 2000H.323/SIP1 Interworking Between SIP/SDP and H.323 Agenda Compare SIP/H.323 Problems in interworking Possible solutions Conclusion Q/A Kundan.
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
Design Principles for Reusable, Composable and Extensible Frameworks Jilles van Gurp.
Application Architecture T H E S O C R A T E S G R O U P, I N C.
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
AVG Internet Security 7.5 Product presentation.
0 General information Rate of acceptance 37% Papers from 15 Countries and 5 Geographical Areas –North America 5 –South America 2 –Europe 20 –Asia 2 –Australia.
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB JavaForum.
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
Models of Computation for Embedded System Design Alvise Bonivento.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Software Engineering I Object-Oriented Design Software Design Refinement Using Design Patterns Instructor: Dr. Hany H. Ammar Dept. of Computer Science.
CS 290C: Formal Models for Web Software Lecture 6: Model Driven Development for Web Software with WebML Instructor: Tevfik Bultan.
A Gateway For SIP Event Interworking - Sasu Tarkoma & Thalainayar Balasubramanian Ramya.
Creating Business Workflow Using SharePoint Designer 2007 Presented by Tarek Ghazali IT Technical Specialist Microsoft SQL Server MVP Microsoft SQL Server.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Presented by Group 2: Presented by Group 2: Shan Gao ( ) Shan Gao ( ) Dayang Yu ( ) Dayang Yu ( ) Jiayu Zhou ( ) Jiayu Zhou.
C++ Code Analysis: an Open Architecture for the Verification of Coding Rules Paolo Tonella ITC-irst, Centro per la Ricerca Scientifica e Tecnologica
Using Mathematica for modeling, simulation and property checking of hardware systems Ghiath AL SAMMANE VDS group : Verification & Modeling of Digital systems.
Software Design Refinement Using Design Patterns Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Unrestricted Connection manager MIF WG IETF 78, Maastricht Gaëtan Feige, Cisco (presenter) Pierrick Seïté, France Telecom -
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Protocols and the TCP/IP Suite
Architecture-Based Runtime Software Evolution Peyman Oreizy, Nenad Medvidovic & Richard N. Taylor.
Features, Policies and Their Interactions Joanne M. Atlee Department of Computer Science University of Waterloo.
1 A Modularity Assessment Framework for Context-dependent Formal Specifications Naoyasu Ubayashi (Kyushu University, Japan) September 14, 2010 ACoM 2010.
TeraPaths TeraPaths: establishing end-to-end QoS paths - the user perspective Presented by Presented by Dimitrios Katramatos, BNL Dimitrios Katramatos,
Dart: A Meta-Level Object-Oriented Framework for Task-Specific Behavior Modeling by Domain Experts R. Razavi et al..OOPSLA Workshop DSML‘ Dart:
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Benjamin Gamble. What is Time?  Can mean many different things to a computer Dynamic Equation Variable System State 2.
SOFTWARE DESIGN (SWD) Instructor: Dr. Hany H. Ammar
Computer Concepts 2014 Chapter 12 Computer Programming.
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
SIPPING - IETF 62 - Minneapolis (March 2005) LESS effort, more services Xiaotao Wu Henning Schulzrinne Dept. of Computer Science Columbia University.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Class 5 Architecture-Based Self-Healing Systems David Garlan Carnegie Mellon University.
A Firewall for Routers: Protecting Against Routing Misbehavior1 June 26, A Firewall for Routers: Protecting Against Routing Misbehavior Jia Wang.
POLICY ENGINE Research: Design & Language IRT Lab, Columbia University.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
A Policy Architecture for Enhancing and Controlling Features Stephan Reiff-Marganiec Kenneth J Turner University of Stirling.
Andrew Allen Communication Service Identifier.
Egocentric Context-Aware Programming in Ad Hoc Mobile Environments Christine Julien Gruia-Catalin Roman Mobile Computing Laboratory Department of Computer.
12 Chapter 12: Advanced Topics in Object-Oriented Design Systems Analysis and Design in a Changing World, 3 rd Edition.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Modeling the ODP Computational Viewpoint with UML 2.0: The Templeman Library Example José Raúl Romero, Antonio Vallecillo Universidad de Málaga, Spain.
Plug-in Architectures Presented by Truc Nguyen. What’s a plug-in? “a type of program that tightly integrates with a larger application to add a special.
Review of Parnas’ Criteria for Decomposing Systems into Modules Zheng Wang, Yuan Zhang Michigan State University 04/19/2002.
Developing Product Line Components Jan Bosch Professor of Software Engineering University of Groningen, Netherlands
Computer Science 1 Systematic Structural Testing of Firewall Policies JeeHyun Hwang 1, Tao Xie 1, Fei Chen 2, and Alex Liu 2 North Carolina State University.
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB Markus.
What’s Ahead for Embedded Software? (Wed) Gilsoo Kim
CS223: Software Engineering
Briefing and Planning meeting on INSPIRE validator implementation – Discussion 16/12/2015.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
A Framework for Automated and Composable Testing of Component-based Services Miguel A. Jiménez, Ángela Villota, Norha M. Villegas, Gabriel Tamura, Laurence.
Model Checking Early Requirements Specifications in Tropos Presented by Chin-Yi Tsai.
1 Implementation of IMS-based S-CSCF with Presence Service Jenq-Muh Hsu and Yi-Han Lin National Chung Cheng University Department of Computer Science &
Software Design Refinement Using Design Patterns
Alhad Kuwadekar , Khalid Al-Begain
Instructor: Dr. Hany H. Ammar
Introduction to Networking
PL/SQL Scripting in Oracle:
Client-Side Validation with Javascript
Model-Driven Analysis Frameworks for Embedded Systems
Presentation transcript:

eSERL Feature Interaction Management in Parlay/OSA Using Composition Constraints and Configuration Rules Alessandro (Alex) De Marco, Ferhat Khendek Dept. of Electrical & Computer Engineering Concordia University Montreal, Canada

Outline 1. Introduction 2. eSERL Language Enhancements 3. Validation Algorithms 4. Implementation + Case Study 5. Conclusion

Introduction Trends Personalization Added-value through service composition Next-generation Networks “Everything over IP”; IP Everywhere Enhanced Multimedia & Signaling Capabilities Parlay/OSA 3GPP API for secure, open access to NG Networks Technology-agnostic SERL Service Execution Rule Lang. & Framework No FI detection; Only application of resolutions Section: Introduction (1/3)

Parlay/OSA Open Service Access standard adopted by 3GPP Access to core networks through secure framework Not just Call Control, but Mobility, IM, more Technology-agnostic Section: Introduction (2/3)

SERL Service Execution Rule Language 3 Internet Drafts in 2001 (Ericsson) FIM intercepts events, matches & applies rules to trigger services No FI detection or avoidance capabilities No known implementations Section: Introduction (3/3)

eSERL: Enhanced SERL Language Extensions Service Objects (named with I/O params) Composition Constraints Configuration Rules Feature Grouping Criteria Distinguish between routing & screening Section: eSERL (1/5)

Composition Constraints SUSC context: 1 user, 1 app server Service interactions are known/detected a priori Use any detection techniques Experts define service composition and inter-working constraints Explicit vs. implicit constraints Mutex, Order, Data Inter-working Section: eSERL (2/5)

Configuration Rules End-user requirements for their service behavior Expressed as condition-action rules Conditions relate to events Actions affect services, or events Backwards-compatible with SERL Section: eSERL (3/5)

Operational Context Experts Define constraints for all services in a system End-users Write configurations to compose and personalize services Deploy configurations System Validates* configuration (offline tool) Intercepts events, matches & applies rules (runtime Feature Interaction Manager*) Section: eSERL (4/5)

Abstract Example Participants: Julie (the driver) and her car If (INCOMING_CALL or OUTGOING_CALL) { Invoke CS(screening party: car) If (response from car: Julie is AVAILABLE) { Invoke ID(“warn that call may be disconnected”) } If (Session.CallExists(Julie)) { If (INCOMING_CALL from car and car says Julie is BUSY) { Invoke ACB // which terminates call, re-establishes later } High-speed, heavy traffic Section: eSERL (5/5)

Abstract Example Is this user-defined configuration “valid”? Section: eSERL (5/5)

Validation Check configurations against constraints Guaranteed behavior To the degree with which the expert is confident with the completeness and consistency of constraints Section: Validation (1/6)

Acceptable Compositions ‘Acceptable’ = All compositions except those in violation of constraints Completeness Assumption Approaches a “complete-set” Consistency Worst-case: no compositions allowed Approach depends on expert experience, tools, maintenance of rule-base Section: Validation (2/6)

Detect Constraint Violations Simple: 1 rule, several actions Order or mutex violation (composition) I/O params set (data inter-working) Complex: n rules, >0 actions for each Rules satisfied simultaneously by event? i.e. Do conditions overlap? If overlap, then compose the actions, and check for violations as for simple case Section: Validation (3/6)

Pair-wise Rule Comparison For rule1, where rule1 is a Configuration Rule For rule2, where rule2 is a Configuration Rule and not rule1 If rule1.condition and rule2.condition overlap then If rule1.action composed with rule2.action is not in set of acceptable compositions then Configuration Rule Module is invalid Section: Validation (4/6)

Rule Overlap Calculating overlap Polynomial time solution, O(n k ), if values for variables are discrete, finite, and ordered (D. Wang et al., IP firewall study) Parlay/OSA API methods, events meet criteria Example 1: Overlap: Yes C1 := {“my location is home”} C2 := {“caller is Example 2: Overlap: Maybe … syntax vs. semantics C1 := {“my location is school” AND “caller is C2 := {“my location is office” AND “caller is Section: Validation (5/6)

Rule-Action Composition Composing Actions, order is important Compare Processing Points Compare priorities of rule actions A single configuration may specify many compositions. If one is invalid, the whole configuration is rejected. Section: Validation (6/6)

Implementation Positioning of a FIM in the architecture Section: Implementation, Case Study (1/4)

Session & Proxy Objects (+ Event Translation) Section: Implementation, Case Study (2/4)

Julie Jones and the Family Car Incoming/Outgoing calls to/from driver - Julie Jones Screening by car (CS) If screening passed, warning (ID) Call in-session Julie becomes BUSY, save & disconnect (ACB) ACB waiting Julie becomes AVAILABLE, retry (ACB, [CS, ID]) Location too far from home Instant message to Mom (ID) Section: Implementation, Case Study (3/4)

Results Hand-written rules in terms of Parlay/OSA events. Implemented tools to validate rules against the system constraints. Implemented test architecture, including FIM. Section: Implementation, Case Study (4/4)

Contributions Generic framework for service personalization and composition while managing FI Guarantee, to a certain degree, on composed service behavior provided there are no constraint violations Design & implementation in Parlay/OSA context Section: Conclusion (1/2)

Future Work Multiple users, Multiple Servers Activation Rules Non-monotonic extensions due to system constraint changes Framework for writing rules with 3 rd party “theme-based” rule templates and wizards Composition Constraints = 3 rd party services Section: Conclusion (2/2)

Thank you. Questions ?