首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Towards integration of service and network management in TINA   总被引:4,自引:0,他引:4  
The Telecommunications Information Networking Architecture (TINA) defines a framework to support the rapid and flexible deployment and management of a wide range of multi-media, multi-party services in a multi-vendor telecommunications environment. The TINA approach applies opendistributed processing (ODP) and object-oriented design techniques to specify the control and management of the telecommunications services and infrastructure. Management in TINA is applied to the different components of the architecture, services and resources, and to thedistributed processingenvironment (DPE) that provides distribution transparencies and communication capabilities among TINA components. Management in TINA is based on TMN and extended with ODP concepts, as TINA is not concerned with just network management, but also systems management. TINA management architecture addresses aspects of distribution, interoperability, dynamic manager/managed roles, and integration with service control functions. TINA service management concerns different activities of the service life-cycle, from four main aspects: access session management, service session management, user session management and communication session management. The TINA network resource model supports requirements from both network management activities and service connectivity needs.  相似文献   

2.
This paper addresses the specification of and reasoning about interactive real-time systems, their interfaces, and architectures as well as their properties in terms of assumptions and commitments. Specifications are structured into assumptions restricting the behavior of the operational context of systems and commitments about the system behavior (also called rely/guarantee or assumption/promise specification patterns in the literature). A logical approach to assumption/commitment contracts is worked out based on a mathematical system model:
  • From assumption/commitment contracts plain interface assertions for the system are derived.
  • Healthiness conditions based on the system model are worked out for assumptions.
  • Safety and liveness properties for assumption/commitment contracts are identified.
  • From interaction specifications describing the interaction between two systems assumption/commitment contracts for the involved systems are derived.
  • Contracts for components in architectures are formulated in terms of assumptions and commitments and conditions are worked out to guarantee that assumptions for the composite systems guarantee the validity of the assumptions for components.
Based on the theoretical foundation architectural issues are considered for a systematic use of assumption/commitment patterns in system specification and architecture design.
  相似文献   

3.
We study a networking architecture model that is built on a distributed processing environment (DPE) for multimedia services suitable for high speed transport networks such as ATM networks. In this architecture, the applications are deployed as units of software building blocks. Each building block provides a layered view for the effective management and control of the multimedia network resources and services according to the concept of telecommunications management network (TMN) and telecommunications information networking architecture (TINA). For the purpose of flexible service provision to users and effective service introduction by service providers, this architecture proposes the adoption of ad hoc service building blocks such as a video on demand building block and a CSCW building block that have interactions with a general purpose building block. This paper also proposes a naming structure for the management of user profiles and session profiles using a directory service system, and an effective control model for multimedia logical device objects using a stream process approach. The proposed model is implemented on a DPE platform that provides various transparencies, ANSAware.  相似文献   

4.
5.
This paper contributes to the field of functional programming languages. We investigate the call-by-name and call-by-need implementation of a restricted type of functional programming, calledsyntax directed functional programming; the target of this implementation is an abstract machine that is based on nested stacks. In fact, the technical kernel of this paper is a refinement of an automata theoretical result that, roughly speaking, investigates the well-known relationship recursion = iteration + stack in the framework of tree transducers. More precisely, in the underlying result the class of functions computed by total deterministic macro tree-to-string transducers with the call-by-name computation strategy is characterized by total deterministic checking-tree nested-stack transducers. Note that total deterministic macro tree-to-string transducers are term rewriting systems by means of which the reduction semantics of syntax directed functional programming languages can be described.The work of this author has been supported by the Deutsche Forschungsgemeinschaft (DFG).  相似文献   

6.
Proper management of Information Technology (IT) resources and services has become imperative for the success of modern organizations. The IT Infrastructure Library (ITIL) represents, in this context, the most widely accepted framework to help achieve this end. Among the processes that compose ITIL, change management has an important role in defining best practices and processes for the efficient and prompt handling of IT changes. In practice, however, such changes are usually described and documented in an ad hoc fashion, due to the lack of proper support to assist the design process. This hampers knowledge acquired when specifying, planning, and carrying out previous changes to be reused in subsequent requests, even though such reuse may result in fewer incidents and faster specification of change plans. To address this problem, in this paper we present a conceptual solution to support the design and planning of IT changes and explore the concept of change templates as a mechanism to formalize, preserve, and (re)use knowledge in the specification of (recurrent and similar) IT changes. To prove concept and technical feasibility of the proposed solution, we have developed a prototypical implementation of a change management system called ChangeLedge and used it to carry out a set of experiments, considering typical IT changes. The results obtained indicate the effectiveness and efficiency of the system, which is able to generate accurate and actionable change plans in substantially less time than would be spent by a skilled human operator.  相似文献   

7.
In a pre and postcondition-style specification, it is difficult to specify the allowed sequences of method calls, referred to as protocols. The protocols are essential properties of reusable object-oriented classes and application frameworks, and the approaches based on the pre and postconditions, such as design by contracts (DBC) and formal behavioral interface specification languages (BISL), are being accepted as a practical and effective tool for describing precise interfaces of (reusable) program modules. We propose a simple extension to the Java Modeling Language (JML), a BISL for Java, to specify protocol properties in an intuitive and concise manner. The key idea of our approach is to separate protocol properties from functional properties written in pre and post-conditions and to specify them in a regular expression-like notation. The semantics of our extension is formally defined and provides a foundation for implementing runtime checks. Case studies have been performed to show the effectiveness our approach. We believe that our approach can be adopted by other BISLs.
Ashaveena PerumandlaEmail:
  相似文献   

8.
In this paper we develop an evaluation framework for Knowledge Management Systems (KMS). The framework builds on the theoretical foundations underlying organizational Knowledge Management (KM) to identify key KM activities and the KMS capabilities required to support each activity. These capabilities are then used to form a benchmark for evaluating KMS. Organizations selecting KMS can use the framework to identify gaps and overlaps in the extent to which the capabilities provided and utilized by their current KMS portfolio meet the KM needs of the organization. Other applications of the framework are also discussed.
Brent FurneauxEmail:
  相似文献   

9.
Service-oriented computing (SOC) is the computing paradigm that utilizes services as a fundamental building block. Services are self-describing, open components intended to support composition of distributed applications. Currently, Web services provide a standard-based realization of SOC due to: (1) the machine-readable format (XML) of their functional and nonfunctional specifications, and (2) their messaging protocols built on top of the Internet. However, how to methodologically identify, specify, design, deploy and manage a sound and complete set of Web services to move to a service-oriented architecture (SOA) is still an issue. This paper describes a process for reverse engineering relational database applications architecture into SOA architecture, where SQL statements are insulated from the applications, factored, implemented, and registered as Web services to be discovered, selected, and reused in composing e-business solutions. The process is based on two types of design patterns: schema transformation pattern and CRUD operations pattern. First, the schema transformation pattern allows an identification of the services. Then the CRUD operations pattern allows a specification of the abstract part of the identified services, namely their port types. This process is implemented as a CASE tool, which assists analysts specifying services that implement common, reusable, basic business logic and data manipulation.
Youcef BaghdadiEmail:
  相似文献   

10.
In this paper, we developed a framework for efficient resource management within the grid service environment. For considering the grid service architecture and functions, the resource management is the most important to grid service; therefore, GridRMF (Grid Resource Management Framework) is modeled and developed in order to respond to such variable characteristics of resources as accordingly as possible. GridRMF uses the participation level of grid resource as a basis of its hierarchical management. This hierarchical management divides managing domains into two parts: VMS (Virtual Organization Management System) for virtual organization management and RMS (Resource Management System) for metadata management. VMS mediates resources according to optimal virtual organization selection mechanism, and responds to malfunctions of the virtual organization by LRM (Local Resource Manager) automatic recovery mechanism. RMS, on the other hand, responds to load balance and fault by applying resource status monitoring information into adaptive performance-based task allocation algorithm.
Young-Sik Jeong (Corresponding author)Email:
  相似文献   

11.
Recent user interface concepts, such as multimedia, multimodal, wearable, ubiquitous, tangible, or augmented-reality-based (AR) interfaces, each cover different approaches that are all needed to support complex human–computer interaction. Increasingly, an overarching approach towards building what we call ubiquitous augmented reality (UAR) user interfaces that include all of the just mentioned concepts will be required. To this end, we present a user interface architecture that can form a sound basis for combining several of these concepts into complex systems. We explain in this paper the fundamentals of DWARFs user interface framework (DWARF standing for distributed wearable augmented reality framework) and an implementation of this architecture. Finally, we present several examples that show how the framework can form the basis of prototypical applications.  相似文献   

12.
Realizing a TMN     
A functional partitioning of a TMN in terms of management functional areas and functional layers is proposed. This new method for classifying TMN functions is used to suggest logical expansions of the function decomposition in ITU-T Recommendation M. 3400. The method is also shown to be a useful tool for graphically comparing the functionality of Operations Systems that are already deployed, showing how they are positioned within a real TMN. Further, the new classification scheme is applied to the representation, in tabular form, of the functions of a particular example of a deployed OS.Industry standard open interfaces using the Common Management Information Service Element (CMISE) in the context of Open Systems Interconnections (OSI) protocols and the Generic Network Information Model are also being implemented. An example of a Q3 interface (between Operations Systems and Network Elements) and an example of an X interface (between different administrative jurisdictions) are discussed.Progress is being made on infrastructure software components that will ease implementations of TMN functions in a distributed processing environment. Future directions, such as the use of evolving Open Distributed Processing (ODP) specifications in distributed network management, are discussed.  相似文献   

13.
对简单网络管理协议(SNMP)和基于Web的企业管理(WBEM)两种系统管理技术进行了研究和分析。通过在可扩展性、响应速度、Web服务支持等方面的对比,总结了SNMP和WBEM各自的优缺点。在此基础上提出了一种使用WBEM管理SNMP兼容设备的新框架,并在此SNMP和WBEM结合的框架上,实现对系统底层资源的管理。经实验证明,只需要简单的步骤就可将SNMP设备纳入到WBEM的体系中,该结合框架不仅有利于设备的分布式管理,而且结合Web服务提供了更多有效的接口,使仅支持SNMP的设备能支持更多接口的访问。  相似文献   

14.
Blockchain platforms, such as Ethereum, allow a set of actors to maintain a ledger of transactions without relying on a central authority and to deploy programs, called smart contracts, that are executed whenever certain transactions occur. These features can be used as basic building blocks for executing collaborative business processes between mutually untrusting parties. However, implementing business processes using the low-level primitives provided by blockchain platforms is cumbersome and error-prone. In contrast, established business process management systems (BPMSs), such as those based on the standard Business Process Model and Notation (BPMN), provide convenient abstractions for rapid development of process-oriented applications. This article demonstrates how to combine the advantages of a BPMS with those of a blockchain platform. The article introduces a blockchain-based BPMN execution engine, named Caterpillar. Like any BPMN execution engine, Caterpillar supports the creation of instances of a process model and allows users to monitor the state of process instances and to execute tasks thereof. The specificity of Caterpillar is that the state of each process instance is maintained on the (Ethereum) blockchain and the workflow routing is performed by smart contracts generated by a BPMN-to-Solidity compiler. The Caterpillar compiler supports a large array of BPMN constructs, including subprocesses, multiple-instance activities, and event handlers. The paper describes the architecture of Caterpillar and the interfaces it provides to support the monitoring of process instances, the allocation and execution of work items, and the execution of service tasks.  相似文献   

15.
Ann argument function,f, is calledt-private if there exists a distributed protocol for computingf so that no coalition of at mostt processors can infer any additional information from the execution of the protocol. It is known that every function defined over a finite domain is [(n–1)/2]-private. The general question oft-privacy (fort[n/2]) is still unresolved.In this work, we relate the question of [n/2]-privacy for the class of symmetric functions of Boolean argumentsf: {0, 1} n {0, 1,...,n} to the structure of Hamming weights inf –1(b) (b{0, 1, ...,n}). We show that iff is [n/2]-private, then every set of Hamming weightsf –1(b) must be an arithmetic progression. For the class ofdense symmetric functions (defined in the sequel), we refine this to the following necessary and sufficient condition for [n/2]-privacy off: Every collection of such arithmetic progressions must yield non-identical remainders, when computed modulo the greatest common divisor of their differences. This condition is used to show that for dense symmetric functions, [n/2]-privacy impliesn-privacy.  相似文献   

16.
朱向荣  吴鸿祜  胡伟 《软件学报》2022,33(10):3546-3564
知识图谱作为诸多人工智能应用的关键,受到学术界和工业界的广泛关注.当前的知识图谱一般由特定组织构建并维护,以RDF转储文件或SPARQL查询接口的方式提供知识访问服务,这种中心化的管理方式存在不能持久化访问的弊端.具体来说,一旦服务提供者单点崩溃,用户就无法以可靠的方式获取知识.此外,知识因时效性可能需要更新,不同来源的知识之间可能存在冲突,传统的知识图谱构建维护方式难以有效地处理这些问题.区块链技术以其分布式存储与共识机制,为知识图谱的分布式构建与管理提供了新思路.FactChain是一个基于区块链的知识管理系统,具有为知识的多源共享与融合建立全新的去中心化生态的潜力.使用联盟链作为底层架构,由区块链、组织和参与人三层结构组成.通过区块链上的智能合约编程实现融合多源冲突知识的真值验证算法,具有在组织层面实现并部署基于分布式应用的参与人管理、在本地局部本体与全局共享本体间建立映射以及结合链上与链下数据响应参与人查询请求等功能.  相似文献   

17.
We use the term electronic reality (ER) to encompass a broad class of concepts that mix real-world metaphors and computer interfaces. In our definition, electronic reality includes notions such as virtual reality, augmented reality, computer interactions with physical devices, interfaces that enhance 2D media such as paper or maps, and social interfaces where computer avatars engage humans in various forms of dialogue. One reason for bringing real-world metaphors to computer interfaces is that people already know how to navigate and interact with the world around them. Every day, people interact with each other, with pets, and sometimes with physical objects by using a combination of expressivemodalities, such as spoken words, lone of voice, pointing and gesturing, facial expressions, and body language. In contrast, when people typically interact with computers or appliances, interactions are unimodal, with a single method of communication such as the click of a mouse or a set of keystrokes serving to express intent. In this article, we describe our efforts to apply multimodal and spoken language interfaces to a number of ER applications, with the goal of creating an even more realistic or natural experience for the end user.  相似文献   

18.
Component-based development of Web-enabled eHome services   总被引:1,自引:1,他引:0  
In this paper we will take a look at the inside of connected homes, which build up complex IT systems. The building blocks of such systems are electronic devices, networks, and services, which empower the user to interact with his environment. Web-enabled eHome services offer functionality to the user by abstracting from devices and realize connectivity in three dimensions: (1) inner connectivity, (2) outer connectivity, and (3) integrative connectivity. Generations of Web-enabled eHome services have been developed based on proprietary hard- and software. Today, an extensible and modular platform is required for forward-looking design and implementation of such services. We describe a new view on component-based development of Web-enabled eHome services. While there is an adequate framework (open service gateway initiative) for the development of state-of-the-art Web-enabled eHome services, there is no knowledge about the system and service structure and its architecture in detail. We propose an 3-layer system structure (called PowerArchitecture), which incorporates several established design ideas and show how this cookbook makes system architects and developers life easier.  相似文献   

19.
提出了一种基于软件Agent的分布式网络管理体系结构DANMA(Distributed software Agent-based Network Management Architecture)。整个体系结构分为接口Agent、管理服务Agent和设备Agent三个层面。并对管理服务的提供与定制、自动 管理和管理系统集成三个问题进行了讨论。这种体系结构将网络管理的智能和控制分布到整个网络之中,使得整个管理系统具有自适应、自组织的特性、与传统集中式管理系统相比,此种结构的系统更易于集成,易于扩充,并提高了管理服务的复用性。  相似文献   

20.
The growing scale and complexity of the enterprise computing systems under distributed and heterogeneous environments present new challenges to system development, integration, and maintenance. In this paper, we present a model driven Web service development framework to combat these challenges. The framework capitalizes on the unified modeling language (UML) profile for enterprise distributed object computing (EDOC), MDA (model-driven architecture) and Web services. Within the framework, firstly, a general PIM (platform independent models) is created using the EDOC CCA structural specification and CCA choreography specification which defines the general functions of a system. Secondly, the general PIM is broken down into sub-PIMs according to functional decomposition, each of which can provide service independently and will be implemented in a Web service. Thirdly, all of the PIMs are transformed to Web service interface models for publication and invoking. Afterward, transform each PIM to a BPEL specified Web service orchestration model. Finally, supported by model transform techniques, the sub EDOC PIMs are implemented into Web services on specific platforms. Automatic model transformation is the key to this framework, therefore, the transformation from EDOC CCA models to WSDL specified Web service interface models and the transformation from EDOC CCA models to BPEL specified Web service orchestration models are deeply discussed, and the detailed transformation rules are proposed. A case study is also provided to demonstrate the effectiveness of these rules and the merits of this framework.
Xuandong Li (Corresponding author)Email:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号