6 research outputs found

    Holding time and delay tolerance aware, availability-guaranteed connection provisioning in WDM networks

    Get PDF
    Optik dalga boyu bölmeli çoğullama (Wavelength Division Multiplexing- WDM) ağlarında, yeni teknolojilerdeki ilerleme, yüksek bant genişliği isteyen uygulamalara yüksek kapasite sağlamak üzere kiralanabilir devrelerin dinamik ve kısa vadeli olarak kurulup serbest bırakılmasına olanak sağlamaktadır. Yüksek hızlı optik bağlantının kesilmesi, büyük veri kaybına neden olduğundan, bu bağlantıların arızalara karşı korunması gerekmektedir. Diğer yandan, veri, ses ve video gibi verilerin farklı trafik tiplerinin hızla artması, kullanılabilirliği garantili bant genişliğinin yanı sıra farklılaştırılmış hizmetler gerektirmektedir. Bu nedenle, ilerideki ağ taşıyıcılarının, HDA (Hizmet Düzeyi Anlaşması) (Service Level Agreement- SLA) ilkelerini karşılaması ve böylece belli bir hizmet düzeyi garantilemesi ve verimli kaynak kullanımı sağlaması gerekmektedir. Bu amaçla bu çalışmada farklı sürdürülebilir yol kurulum teknikleri bağlantı isteklerinin düzeyine göre tercih edilmektedir. Hizmet kalitesine bağlı olarak korunmasız, yol paylaşımlı korumalı ve yol atamalı korumalı bağlantı kurulumunun tercihli kullanımı sonucunda, isteklerin farklılaşmış kullanılabilirlik gereklilikleri karşılanmaktadır. Bu çalışmada yedek kapasite kullanım oranının ve bloke olma olasılığının düşürülmesi amacıyla farklı iki teknik tanıtılmıştır. Birinci teknik, yeni gelen isteğin bağlantısını kurmadan önce sistemde önceden kurulmuş bağlantıların hizmet sürelerinden yararlanarak paylaşımı artırma esasına dayanmaktadır. İkinci yöntem ise bloke olma olasılığını düşürmek amacıyla kullanıcı tarafından belirlenen zaman toleransı parametresinden yararlanmaktadır. Bu iki yöntem önceki benzer amaca yönelik algoritmalarla karşılaştırılmaktadır. Sonuç olarak önerilen algoritmaların kaynak kullanımını azalttığı, bloke olma oranını ise yeni kaynak eklenmesine gerek duyulmaksızın düşürdüğü gözlemlenmiştir.  Anahtar Kelimeler: Optik ağlar, dalga boyu bölmeli çoğullama, kullanılabilirlik, yol atama.With the development of agile optical switches, dynamic optical circuit switching has become possible and connections are set up and torn down on- demand basis. The explosive growth of different traffic types such as data, voice and video requires the support of differentiated services in terms of survivability measures and timing requirements. In order to guarantee a specific level of survivability, availability-guaranteed bandwidth provisioning is considered. On the other hand, connections are set up and released for specific time durations, with sliding or fixed set-up times. Connection requests arrive to the network provider with specified holding times, delay tolerances and availability requirements which need to be satisfied. Delay tolerance is defined as the maximum time which a request can tolerate before the connection is set up. Future network carriers need to meet strict SLA (Service Level Agreement) guidelines, thus guaranteeing a level of service, as well as achieving efficient resource utilization. Connection availability is an important metric to measure the quality of service (QoS) in a survivable network. It is defined as the probability that a connection will be found in the operating state at a random time in the future (Clouqueur et al., 2002). It is affected by many factors such as network component failure probabilities, failure repair times, etc. Usually, the availability target for a connection is specified in a Service Level Agreement (SLA), which is a contract between a service provider (e.g., a network operator) and one of its customers (e.g., a large institutional user of bandwidth). An SLA violation may result in a penalty to be paid by the network operator to the customer according to the contract (Grover, 1999). In order to provide the appropriate level of availability stated in the SLAs, different recovery mechanisms can be used to provision different connection requests. In this study, we consider unprotected, shared-path protected and dedicated-path protected provisioning mechanisms at the same time to satisfy different QoS requirements in a dynamic manner. Previous studies, while maximizing sharability by routing backup paths in a dynamic traffic environment, do not make any estimation on future sharability of resources. They take the current link states into consideration to choose sharable links. Reference (Tornatore et al., 2005a,b) shows that resource overbuild (RO) in shared-path protection can be decreased by exploiting the holding-time information of connections which have already been provisioned in the network. Since holding times of incoming traffic demands may be known in advance for a variety of applications, this information about the future states of the links makes the route decision more intelligent by allowing the choice of more sharable paths. In this paper, unprotected, shared-path, and dedicated-path protection techniques are used to meet the differentiated availability requirements. Recently, among the other Service Level Specifications (SLSs), many new applications are identified by known-in-advance holding-time and delay tolerance. So, in this paper, for dynamic provisioning of availability-guaranteed connections in an optical mesh network, we propose two new algorithms which exploit 1-the knowledge of connection holding times to accomplish minimum backup capacity allocation as compared to the previous holding-time-unaware approach and 2- the knowledge of delay tolerances to degrease the blocking probability in the conditions that the system resources are not available to satisfy the SLS demands of connection requests. Here we also propose a new routing mechanism for backup paths optimizing backup resources considering the future departure time of existing connections. In order to show the performance gain; the first proposal, AGSDP_HT (Holding-time aware Availability-Guaranteed Service-Differentiated Provisioning) is compared by a base line algorithm AGSDP. The second proposal ADT (Availability-guaranteed, service differentiated provisioning with Delay Tolerance) is compared by a base line approach which does not consider delay tolerance. For the second proposal, both algorithms dedicated protection is not used as a choice, since blocking is decreased by delay tolerance. Keywords: WDM Networks, availability aware provisioning, survivability

    FDDI tabanlı bir ağ sistemi için etkin gerçek zamanlı iletişim yapısının tasarımı

    Full text link
    Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 1997Thesis (Ph.D.) -- İstanbul Technical University, Institute of Science and Technology, 1997Gerçek zamanlı dağıtılmış sistemlerde, birbirlerinden uzaktaki bilgisayarlarda yer alan süreçler ortak işleri yerine getirmek için birlikte çalışırlar. Bu tür sistemlerde süreçlerin zaman kısıtlamalarının sağlanması ve sistemin sağlıklı olarak çalışabilmesi için, süreçler arası iletilen verilerin belli zaman sınırları içinde hedeflerine ulaşması zorunludur. Bu nedenle gerçek zamanlı dağıtılmış sistemler, bu tür çalışmaları destekleyen bir iletişim alt yapısına gerek duyarlar. Î.T.Ü. Bilgisayar Bilimleri Anabilim Dalı'nda yürütülen TÜBİTAK EEEAG-BAĞ3 projesi çerçevesinde gerçek zamanlı sistemlere iletişim hizmeti vermek üzere bir iletişim birimi tasarlanmıştır. Tez çalışmasının konusunu ise bu iletişim biriminde yer alan ağ hizmet katmanları ve onları denetleyen yönetim biriminin tasarımı ve gerçeklenmesi oluşturmaktadır. Yedi katmanlı OSI modelinin ilk üç katmanına karşı düşen ağ hizmet katmanları yönetim birimi ile birlikte, iletişim ağının özelliklerini ve sistemdeki kaynakları en iyi şekilde kullanarak gerçek zamanlı verilerin hedeflerine istenen sürelerde iletilmesinden sorumludurlar. Yönetim birimi, ayrıca sistemdeki yükün değişimine göre iletişim ağının parametrelerini güncelleyerek veri aktarımının hedeflenen şekilde yürümesini sağlamaktadır. İletişim ağı, birbirlerine bağlı hiyerarşik FDDI halkaları ile oluşturulmuştur. FDDI protokolünün değişik özellikteki sistemlerde başarılı olması için parametrelerinin uygun şekilde seçilmesi ve gerektiğinde sistemin çalışması sırasında güncellenmesi gerekir. Tez çalışmasında, durakların senkron iletim sürelerinin, gerçek zamanlı iletişimi destekleyecek şekilde seçilmesini ve gerektiğinde iletişim ve işlem yükünü fazla arttırmadan güncellenme- sini sağlayan yeni bir senkron süre atama yöntemi geliştirilmiştir. Bu yöntem, büyük ölçüde yerel verilere dayanmakta ve daha önce yayınlanmış olan yerel yöntemlere göre daha iyi sonuçlar üretmektedir. Bu çalışmada geliştirilen diğer bir yeni yöntem de, hiyerarşik FDDI halkalarından oluşan bir ağ içinde, ulaşım katmanları arasındaki uçtan uca bağlantıların istenen iletişim kalitesine uygun olarak kurulmasını ve sürdürülmesini sağlayan mantıksal bağlantı denetimi yöntemidir. Yönetim birimi, ulaşım katmanından gelen bağlantı isteklerini bu yönteme göre değerlendirerek gerekli olan sistem kaynaklarını (bellek ve senkron bant genişliği) ayırır ve sistem parametrelerini yeni duruma göre günceller. Bağlantılar kurulurken ve sonlandırılırken iletilen denetim verilerinin miktarı, gerçek zamanlı iletişimi aksatmayacak düzeyde tutulmuştur. İletişim biriminin önemli elemanlarından biri de katmanlar arasındaki bağlantıyı sağlayan ilkel kuyruklarıdır. Tez çalışmasında, bir durakta birden fazla ulaşım katmanı bağlantısı kurulması durumunda, değişik özellikteki verilere uygun iletişim hizmeti sunmak için ulaşım katmanı ile ağ hizmet katmanları araşma, her bağlantı için ayrı bir ilkel kuyruğu yerleştirilmiştir. İletişim birimindeki kuyrukların önceliklerinin ve bir kuyruktan peş peşe okunan ilkel sayısının belirlenmesi, yönetim biriminin önemli işlevleri arasındadır. Tez çalışmasında, FDDI arabirim kartlarına sahip dört adet kişisel bilgisayar ile bir sistem oluşturulmuş ve ağ hizmet katmanları ile yönetim birimine ilişkin yazılımlar bu sistem üze rinde gerçekleştirilmiştir. Programlar nesneye dayalı yöntemle C++ dili kullanılarak yazılmış ve verilerin en hızlı biçimde işlenmesi amaçlanmıştır. Kurulan fiziksel sistemin ye terli olmadığı durumlarda, geliştirilen yöntemleri değişik sistemler üzerinde sınayabilmek için benzetim programlan hazırlanmıştır. Bu programlarla elde edilen sonuçlar, tez çalışmasında geliştirilen yöntemlerin gerçek zamanlı iletişim hedeflerine ulaştığını göstermiştir. There is an increasing use of computers in real-time applications, such as space ve hicle systems, image processing and transmission and industrial process control. These systems usually have a distributed implementation, because distributed sys tems share resources well and are reliable and extensible. In these systems, compu tational tasks reside on different nodes in the system and cooperate to achieve a common goal. Messages sent between these tasks have deadlines by which they must be transmitted. If a message fails to meet its transmission deadline it is considered to be lost and this message loss can lead to a catastrophe in a mission critical system. The key to meet the timing requirements in real-time systems is to have an underly ing network that ensures timely delivery of inter-task messages. In TÜBÎTAK EEEAG-BAG3 project, we have implemented a Communication Unit (CU) which provides reliable and real time communication services for the "client" processes. The aim of this thesis is to design and implement the Network Service Layers (NSL) and the Management Unit (MU) of the CU. These entities are re sponsible for sending data over an FDDI network in predefined time constraints. In this thesis, we propose a new synchronous bandwidth allocation scheme for FDDI networks and a new logical connection management protocol. The main task of the logical connection management entity is to allocate the system resources for transport layer connections and to tune the operational parameters of the FDDI ring. We built an experimental FDDI network by using four PCs with FDDI adapter cards. We implemented and tested programs related to NSL and MU in this communication system. Since this physical configuration is insufficient to test all capabilities of our new synchronous bandwidth allocation scheme and logical connection management protocol, we also wrote simulation programs to test them in different network con figurations. The interconnection network is made of FDDI rings as shown in Figure 1. Timed to ken access and synchronous data transfer capabilities are the main reasons of the FDDI protocol to be used in this work. An FDDI station in this network consists of a communication unit, which gives real-time communication service to a processor. The processors, which heavily communicate to each other take place in the same ring in the network. Some rings are grouped to form a cluster. They are connected via a router. The Communication Unit consists of the following parts:. The Session Layer (SL): It provides real time communication services for user processes implementing bi-directional links. xiv The Transport Layer (TL): It offers to the Session Layer a real-time, error-free, and connection oriented transport service. The Network Service Layer (NSL): It provides connectionless communication and routing services for the TL and MU in a multi-FDDI ring system. The Management Unit (MU): It is responsible for managing the CU and tuning some FDDI parameters by working with the MUs of other CUs in the ring. R: Router S: Station Figure 1. Overview of the Interconnection Network The NSL matches to the three bottom layers of the OSI network model. With this structure NSL provides the transfer of time-critical data between the processors in the network. The basis of the NSL is the FDDI protocol. The structure of the NSL is shown in Figure 2 and its sublayers are explained below:. The Physical Layer (PL): This layer is functionally equivalent to the Physical Layer and Physical Medium Dependent (PMD) of the FDDI standard. These two layers of the FDDI standard have not been modified in this work.. The Medium Access Control Layer (MAC): MAC schedules and performs all data transfers on the ring based on the timed token protocol of FDDI standard. This layer has been implemented by using an FDDI adapter card with National Semi conductor's FDDI Media Access Controller and System Interface DP 83266 chip (MACSI) and 256KB SRAM memory on it.. The Routing and Frame Control Layer (R&FCL): The main function of the R&FCL is to build the FDDI frame from the Service Data Units (SDU) of the Transport Layer (TL), and write them to the related outgoing frame queue of MAC. The R&FCL locates the target processor using the destination NSAP (NSL Service Access Point) address, and determines the destination MAC address of the FDDI frame. Than the frame type is determined to be synchronous or asynchro nous depending on the priority and the time-critical nature of data. The frame that is built is placed to one of the two outgoing frame queues of MAC. Frames, which xv come from MAC are placed to one of the appropriate primitive queues of the Transport Layer depending on their synchronous or asynchronous types. Queue Man. Timers Clock Synchronization Logical Conn. Management MU Frame Services Ring Management Physical Conn. Management ?>: Q3 -> Q2 -" AT n £ İ İ İ Q4 bd Q5H Q6H Q7tdQ8 ö ^ ^ T.1. T ->:..I 'vU Ql Q9 | -; Q10 f ^S. :jM isr MAC 1N_ ISR.^w^ v.... J.._....' v :..'..... Frame I Queues Hardware PL Network Service Layers - NSL Qi: Primitive Queues A T: Address Table: ISR : Interrupt Service Routine F: Function Figure 2. Network Service Layer (NSL) The Management Unit (MU) consists of the following entities:. The Physical Connection Management Entity (CME) directs the PL and MAC for establishing connection with the peer layers of the neighbor CUs.. The Ring Management Entity (RME) is responsible for initiating recovery func tions on detecting faults like duplicate addresses.. The Fame Service Entity (FSE) enables the MU to communicate with other MUs in the ring.. The Logical Connection Management Entity (LCME) allocates system resources for TL connections and tunes the operational parameters of the FDDI ring.. The Timer Entity (TE) provides timer functions to other layers. These functions are used to measure time and to invoke some periodic processes.. The Queue Management Entity (QME) coordinates the activities in CU by allo cating the communication processor to different layers and entity processes ac cording to the length of primitive queues between them.. The Clock Synchronization Entity The router has been implemented with a Pentium based PC and more than one FDDI card on it. Each card provides a connection to a different ring. The main function of the router is to direct and send the data packets between different FDDI rings. The structure of a router is shown in Figure 3. The router has a PL and MAC for each ring xvi it is connected to. These units perform the same functions as in other CUs. However, the router has only one R&FCL, which performs the routing of data packets. Routing and Frame Control Layer R&FCL routers table local table MAC MAC MAC MAC PL PL PL PL to ring 0 to ring 1 to ring n to ring of routers Management Unit MU Figure 3. The Structure of the Router FDDI uses the timed token MAC (Medium Access Control) protocol that provides a guaranteed amount of channel bandwidth to support timely delivery of inter-task messages. With this protocol, messages are distinguished into two types: synchro nous messages and asynchronous messages. Synchronous messages, such as sam pled/digitized voice and video data, are periodic messages which arrive at regular intervals and have delivery time constraints. Asynchronous messages are nonperiodic and may arrive in a random way and have no time constraints. At network initializa tion time, all nodes negotiate a common value for the target token rotation time (TTRT) since each node has different synchronous transmission requirements to be satisfied. The negotiated value for TTRT should be chosen small enough to satisfy the most stringent response-time requirements of all nodes. Each node is assigned a frac tion of the TTRT, known as its synchronous bandwidth (Hi), which is the maximum time the node is allowed to transmit its synchronous messages every time it receives the token. After synchronous message transmission, asynchronous messages can be initiated (if any), but only if the token has arrived at the node earlier than expected. That is, synchronous traffic is assigned a guaranteed bandwidth while the leftover bandwidth (unallocated, unused or both) is dynamically shared among all the nodes for asynchronous traffic. The FDDI network guarantees, to each node, an average bandwidth and a bounded access delay for synchronous traffic. However, this guarantee alone, although neces sary, is insufficient for the timely delivery of deadline-constraint messages. For guar anteeing the synchronous message deadlines with the timed token protocol, the pro tocol parameters (TTRT and the synchronous bandwidths) have to be properly se lected. In dynamic environments where synchronous data connections are often established or terminated, the data load on the network changes during the operation. In these systems synchronous bandwidths of the nodes, their data load changes must be recal culated. In this thesis we propose a new synchronous bandwidth allocation scheme for guaranteeing synchronous messages with arbitrary deadlines. In allocating syn chronous bandwidth to a node, this scheme uses information locally available to the xvu node and the sum of the synchronous bandwidths allocated to other nodes. The lim ited use of global data makes the new scheme flexible and suitable for use in dy namic environments, since the recalculation of the synchronous bandwidth of a node does not effect other nodes until total synchronous bandwidth of the ring exceeds a predefined threshold. In the following paragraphs of the thesis we analyze the new synchronous bandwidth allocation scheme and show that it performs better than pre viously published local SBA schemes. To develop a new synchronous bandwidth allocation scheme the timing properties of the FDDI protocol are investigated: The network is assumed to consist of n nodes arranged to form a ring and be free from any hardware and software failures. Mes sage transmission is controlled by the timed token protocol. Token walk time T in cludes the ring latency, the token transmission time and other protocol/network de pendent overheads and thus represents the portion of TTRT that is not available for message transmission. There are n streams of synchronous messages Sı, S2, S3,..., Sn, with stream St originat ing at node /. Each synchronous message stream St can be characterized as Si=(Q, Pt, Dj), where 1. Q is the maximum amount of time required to transmit a message in the stream. 2. P{ is the interarrival period between messages in the stream. Let the first message in stream St arrive at node i at time fa. The/th message in stream St will arrive at node * at time t{j = tiX +(j~l)Pi} where j > 1. 3. D t is the relative deadline of messages in the stream, that is, the maximum amount of time that can elapse between a message arrival and completion of its transmis sion. Thus the transmission of the /th message in stream St which arrives at fa, must be completed by fa+Df. 4. Each synchronous message stream places a certain load on the system. We need a measure for this load. We define the effective utilization, Ut of stream Si as fol lows: ' mın( JJ.D,) 5. Asynchronous messages may arrive in a random way and have no time con straints. To ensure stable operation of the timed-token protocol, the total bandwidth allocated to synchronous messages must be less than the available network bandwidth. This protocol constraint is; f.H^TTRT-T (1) Zhang and Burns give an upper bound on the time elapsed between any v consecu tive token arrivals, derived a tighter upper bound and generalized Johnson and Sevcik's Theorem as follows: Ti(v) = vTTRT+ J,Hh+T- - For a given allocation H=[H\, H%,... Jf"], the minimum amount of time Xt available for node / to transmit its synchronous data in time interval [t, t+D,) is given by xvm TTRT-lJHh-T (2) Xi(H) = (qi-l)Hi + max(0,rmn(Di-Ti(qi),Hi)), where ^ =.TTRT. (3) Although, local SBA schemes use only local information available to the involved node, in implementation, every node shall know the total allocated synchronous bandwidth Z"=1 H. to be able to test the deadline constraint. By using the broadcast capability of the FDDI structure, each node can send its //,. value with only one frame to other nodes in the ring, and this increases the data traffic in the ring only by a neg ligible amount. The new SBA scheme uses only the total sum of allocated synchro nous bandwidths as global data in addition to local information. It performs better than local schemes and it is more flexible than global schemes, that makes it suitable to dynamic environments. In the new scheme, allocated synchronous bandwidth of the node i will be calculated with the following steps: 1. By using only local information the initial value 77/ such as V/,77/>77j will be calculated. 2. Each node broadcasts its initial value 77/ to the other nodes in the ring. 3. Each node calculates its actual synchronous bandwidth 77, by using 77/ initial val ues according to the new SBA scheme. 4. Each node broadcasts its actual 77} value to the other nodes. In order to calculate HI initial values, we generalized the local scheme developed by Zhang et al. as follows: 77/= W n- -{^4q-(o WKre#,= n L77KT. qt. 777*7; Dt >PiAqiTIKT>Pi,and £f=jij, Z^>/?A^,772?rplA2?:ft-i)+jy/>iî D^PiAJ^qt-D + H^P, DiPiAlXqi) + H;>Pi D^PiATfrqJ + HlZPi Dttransition(queue_number); global variables Base Object local variables transition function Object of State 1 local variables transition function, Object of State 2 local variables transition function Object of State k Figure 4. Derivation of State Objects The queue manager determines which layer to invoke, depending on which primitive queues in the system have data. It polls the primitive queues in a priority order. If it detects that there is a primitive in a queue, it invokes that layer, which takes primitive from this queue. The queue manager handles the data in higher priority queues first. When the higher priority queue is empty or a specified amount of primitive has al ready been taken from this queue, then the queue with the lower priority is served. The queues which belong to MU have higher priority than other queues. For each transport layer connection, we create a new primitive queue between the transport layer and the network service layers. Multiple streams on a node are thought of as multiple FDDI stations, each heaving its own FDDI interface. However, physically they share the single communication path and the single synchronous queue on the FDDI interface. The queue polling algorithm is similar to token based access proto col of FDDI standard. It has a circular service property with the period equal to TTRT. Each connection has an allocated synchronous bandwidth value Hy. The poll ing algorithm enables the NSL to read synchronous data with the length of Hy in each TTTJrtime unit from the queue of thej'th connection. The main contributions of this thesis are presented below:. A new synchronous bandwidth allocation scheme was proposed. The new scheme performs better than previously published local schemes and it is also suitable for dynamic environments.. A new logical connection management protocol for end-to-end connections was developed. The management unit allocates system resources to connections and tunes system parameters by using this protocol. The network service layers and the management unit of an FDDI station are designed and implemented. These entities are responsible for transferring real time data on a hierarchical multiring network. An experimental FDDI network was built, and the software was developed on this system. We also wrote simulation programs, to test and compare our new schemes with previously published schemes. The results of these tests show that, our new schemes perform successfully and efficient, in view of deadline guarantees of real-time data in an FDDI network.DoktoraPh.D

    Exploring Implicit Parallelism in Class Diagrams

    Full text link
    As multicore processors are becoming more wide-spread, leveraging of parallelism is once again becoming an important concern during the software development process. Substantial refactoring is required to parallelize legacy sequential software in order to exploit the advantages offered by parallel processing. In this study, guidelines are offered to aid in parallelizing object-oriented programs by analyzing their designs as represented in UML class diagrams. We define often occurring patterns of class-dependencies and demonstrate their characteristics in class diagrams by investigating their properties. We present example instances exhibiting the usage of these patterns in class diagrams. Through analyzing the runtime aspects of these instances, we have identified how they impact the parallelization of object oriented software. Taking these lessons into account when refactoring existing object-oriented software can significantly reduce time and effort required. We have evaluated our method by applying it to three popular design patterns and a real-world case study

    Applying Enhanced Graph Clustering to Software Dependency Analysis

    Full text link
    Dependencies between classes give key information about the static structure of an object oriented software system. for industrially sized systems it is difficult for the developer to visually analyze the dependencies between classes and to detect patterns of dependencies that frequently occur throughout UML class diagrams. in this paper, automatically detecting dependency patterns in software designs is focused. after applying graph clustering techniques to dependency graphs extracted from class diagrams it has been found that these techniques were not able to detect key dependency patterns an algorithm is proposed to detect such dependencieswhich also improves on the studied graph clustering techniques when applied to dependency analysis of class diagrams

    Verifying the interface compliance of federates using pre- and postconditions of RTI services

    Full text link
    The Federation Architecture Metamodel (FAMM) provides a domain specific language for describing the architecture of a High Level Architecture (HLA) compliant federation. A federation architecture model (FAM) consists of the object models and the behavioral models of participating federates. The communication behavior of each federate is to be modeled in the same level of detail as the HLA Federate Interface Specification so as to facilitate standard-compliant code generation. However, this level of detail increases the likelihood of the modelers making mistakes in following the standard. Thus, beyond well-formedness, static checking of the well-behavedness of federate behavioral models is desirable. If it can be shown that all the preconditions of the HLA Runtime Infrastructure (RTI) services used in a behavioral model are satisfiable then we have some assurance that the interface behavior can be compliant to the HLA Federate Interface Specification. In this paper, we present a model checking based procedure to verify the interface behavior of an HLA federate modeled in FAMM. Verification is performed automatically by the help of (1) a model interpreter that takes a FAM as input, and generates the PROMELA model of its behavioral part as output, (2) the SPIN model checker that performs model checking given the generated PROMELA process as input and then outputs the verification result in terms of the preconditions that will not hold at run-time. Copyright © (2009) by SISO - Simulation Interoperability Standards Organization
    corecore