Resolving QoS Policy Configuration Challenges for Publish/Subscribe Middleware Platforms AFRL JBI PI Meeting.

Slides:



Advertisements
Similar presentations
Chapter 2 The Software Process
Advertisements

22 May 2015Joe Hoffert Quality of Service Configuration DSML for the Data Distribution Service Joe Hoffert
Company confidential Prepared by HERE Transit Sr. Product Manager, HERE Transit Product Overview David Volpe.
P09233 Flight Parameter Measurements Michael Skube & James Hunt P09233
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
IS 421 Information Systems Management James Nowotarski 16 September 2002.
A Model-Driven Framework for Architectural Evaluation of Mobile Software Systems George Edwards Dr. Nenad Medvidovic Center.
Model Driven Architecture (MDA) Partha Kuchana. Agenda What is MDA Modeling Approaches MDA in a NutShell MDA Models SDLC MDA Models (an Example) MDA -
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Overview of Software Requirements
Software Issues Derived from Dr. Fawcett’s Slides Phil Pratt-Szeliga Fall 2009.
Copyright Arshi Khan1 System Programming Instructor Arshi Khan.
Object Oriented Analysis and Design Using the UML
Security Assessments FITSP-M Module 5. Security control assessments are not about checklists, simple pass-fail results, or generating paperwork to pass.
Domain-Specific Software Engineering Alex Adamec.
Business Rules INFS 770 – KM for E-Business Professor L. Kerschberg Spring 2004.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Copyright © MilSOFT,Turkey UNCLASSIFIED1 Ertan DENIZ MilSOFT A.S, Teknokent ODTU,Ankara/Turkey Huseyin Kutluca,
Release & Deployment ITIL Version 3
Developing Enterprise Architecture
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
1 Our Expertise and Commitment – Driving your Success An Introduction to Transformation Offering November 18, 2013 Offices in Boston, New York and Northern.
Security Assessments FITSP-A Module 5
Design Patterns OOD. Course topics Design Principles UML –Class Diagrams –Sequence Diagrams Design Patterns C#,.NET (all the course examples) Design Principles.
VTT-STUK assessment method for safety evaluation of safety-critical computer based systems - application in BE-SECBS project.
An Introduction to Software Architecture
Methodology - Conceptual Database Design Transparencies
Introduction to MDA (Model Driven Architecture) CYT.
Assessing the Suitability of UML for Modeling Software Architectures Nenad Medvidovic Computer Science Department University of Southern California Los.
Key Challenges for Modeling Language Creation by Demonstration Hyun Cho, Jeff Gray Department of Computer Science University of Alabama Jules White Bradley.
Creating a Shared Vision Model. What is a Shared Vision Model? A “Shared Vision” model is a collective view of a water resources system developed by managers.
1 Information Management Process for Electricity Distribution at NERSA.
1 Software Process Models-ii Presented By; Mehwish Shafiq.
Introduction GOALS:  To improve the Quality of Service (QoS) for the JBI platform and endpoints  E.g., latency, fault tolerance, scalability, graceful.
Instructor Course U.S. Soccer Federation Referee Program
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
Assessment Workshop Title of the Project (date). Project Title Assessment Workshop October 25, 2015© Company Name All rights reserved2 Agenda Purpose.
1 Introduction to Software Engineering Lecture 1.
Methodology - Conceptual Database Design
DataReader 2 Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain- specific Modeling Joe Hoffert, Akshay Dabholkar, Aniruddha Gokhale, and.
INRIA - LaBRICharles Consel Jan-06 1 Domain-Specific Software Engineering Charles Consel Phoenix Research Group LaBRI /INRIA-Futurs January 2006.
CoSMIC: Tool-suite for Weaving Deployment & Configuration Crosscutting Concerns of CCM-based DRE Systems Dr. Aniruddha Gokhale (PI) Institute for Software.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Object-Oriented Software Engineering using Java, Patterns &UML. Presented by: E.S. Mbokane Department of System Development Faculty of ICT Tshwane University.
Low Emission Strategies in Practice Rob Pilling (London, 12 th May 2009) web:
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
1 Key design time challenges Convert commander’s intent, along with static/dynamic environment, into QoS policies Quantitatively evaluate & explore complex.
Requirements Engineering Lesson 2. Terminologies:  Software Acquisition is where requirement engineering significantly meets business strategy.  Software.
NetQoPE: A Middleware-based Netowork QoS Provisioning Engine for Distributed Real-time and Embedded Systems Jaiganesh Balasubramanian
18 December 2015Joe Hoffert, Aniruddha Gokhale, Doug Schmidt Enabling Trustworthy Systems with the DDS Quality of Service Modeling Language Joe Hoffert,
A QoS Policy Modeling Language for Publish/Subscribe Middleware Platforms A QoS Policy Modeling Language for Publish/Subscribe Middleware Platforms Joe.
Software Engineering Lecture # 1.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Boeing-MIT Collaborative Time- Sensitive Targeting Project July 28, 2006 Stacey Scott, M. L. Cummings (PI) Humans and Automation Laboratory
Enhancing Security in Enterprise Distributed Real-time and Embedded Systems using Domain-specific Modeling Akshay Dabholkar, Joe Hoffert, Aniruddha Gokale,
SAS_05_Contingency_Lutz_Tal1 Contingency Software in Autonomous Systems Robyn Lutz, JPL/Caltech & ISU Doron Tal, USRA at NASA Ames Ann Patterson-Hine,
20 February 2016Joe Hoffert Quality of Service Configuration DSML for the Data Distribution Service Joe Hoffert
Harry Goossens Centre of Competence on Data Warehousing.
Introduction to Software Engineering 1. Software Engineering Failures – Complexity – Change 2. What is Software Engineering? – Using engineering approaches.
George Edwards Computer Science Department Center for Systems and Software Engineering University of Southern California
Data Management: Data Processing Types of Data Processing at USGS There are several ways to classify Data Processing activities at USGS, and here are some.
Trustworthy Conferencing via Domain-specific Modeling and Low Latency Reliable Protocols Joe Hoffert, Douglas Schmidt (Vanderbilt University); Mahesh Balakrishnan,
Software Design and Development Development Methodoligies Computing Science.
Model-Driven Analysis Frameworks for Embedded Systems
Assessment Workshop Title of the Project (date)
An Introduction to Software Architecture
Automated Analysis and Code Generation for Domain-Specific Models
Presentation transcript:

Resolving QoS Policy Configuration Challenges for Publish/Subscribe Middleware Platforms AFRL JBI PI Meeting

Outline Motivating Example QoS Policy Configuration Challenges Evaluating Common Solutions DQML Overview

Motivating Example – Unmanned Aerial Vehicle (UAV) UAV Desirable Data Flows –Storage and dissemination of data for late arriving subscribers (e.g., other aircraft and satellites coming into range) –Reliable communication of critical data (e.g., sensor data to satellite to ground station) –Prioritization of data delivery for mission-critical or high value data (e.g., time-sensitive targets) –Ordered and/or grouped data dissemination to ensure ordering and appropriate level of granularity

QoS Policy Configuration Challenges (1 of 3) QoS Policy Compatibility –QoS policies for the communicating entities must be compatible between what’s requested and offered Best effort data transfer offered Reliable data transfer requested X Data will not be transferred –For example, if subscriber requests reliable data transfer the publisher can not offer best effort data transfer

QoS Policy Configuration Challenges (2 of 3) QoS Policy Consistency –QoS policies for any one entity must be consistent with each other Deadline’s period = 5 ms. Time based filter’s minimum separation = 10 ms. X QoS policies will not be set –For example, deadline period must be >= minimum separation for time based filter

QoS Policy Configuration Challenges (3 of 3) Accurate QoS Policy Configuration Transformation –Propagating QoS policy configuration through development stages –For example, transforming design of QoS configuration into application code

Evaluating Common Solutions Three Common Solutions to Challenges –Point-based solutions –Patterns-based solutions –Domain specific modeling language (DSML) based solutions Categorized by –Robust vs. non-robust solution documentation –Robust vs. non-robust solution implementation

Point-based Solutions Focused on particular solution/application –QoS policy configuration is developed Configuration is designed Cons –Non-robust solution documentation –Non-robust solution implementation –Application is compiled & run –Feedback is gathered & evaluated –Process is repeated as necessary Design Code TestEvaluate Pros –Low overhead Configuration is implemented

Patterns-based Solutions Enables codification of configuration expertise Cons –No help with solution implementation (i.e., non-robust) Pros –Reuse of expert configuration design knowledge (i.e., robust design) Continuous Data Pattern Application A Application BApplication C Documented use of QoS policies for –Dataflow management –Dataflow prioritization –Dataflow shaping

DSML-based Solutions Uses domain specific terminology and constructs Cons –Learning curve/training overhead Pros –Robust solution documentation (via metamodel constraints) –Robust solution implementation (via interpreters) Application A Application B Application C Metamodel QoS Config Application model QoS Config Metamodel created in metamodeling tool QoS Config

DDS QoS Modeling Language (DQML 1 of 2) Models relevant DDS entities Models DDS QoS polices Models relationships between entities and QoS policies

DDS QoS Modeling Language (DQML 2 of 2) Supports QoS compatibility and consistency constraint checking Generates implementation artifacts (currently for DDS Benchmarking Environment (DBE)) DBE Interpreter DBE QoS SettingsDataReaderQoS Settings DataWriter