Safe ‘Composability’

نویسنده

  • Nalini Venkatasubramanian
چکیده

I n the coming decade, distributed computing will establish itself as the default mode of operation for a wide variety of applications. With the proliferation of mobile devices and ubiquitous computing environments today, applications are beginning to place specialized requirements on the computing and communication infrastructure. Interactive applications, including personal multimedia services accessible through handheld devices, will become commonplace. These applications require continuous service quality despite frequent interruptions in network connectivity and degradation of device power levels. Additional requirements, including secure communication in mobile environments, further complicate system management. Reflective middleware promises dynamic customizability to satisfy application requirements, including quality-of-service (QoS), security, mobility, and fault tolerance, in the presence of changing system conditions. However, a number of technical challenges complicate deployment of safe plug-and-play middleware environments where protocols and services are installed and uninstalled on the fly to accommodate dynamicity. Distributed applications have varying requirements, often stated as QoS parameters defining the extent of violation of performance specifications, including responsiveness, reliability, availability, cost-effective utilization, and security. These requirements are satisfied through appropriate resource management policies, such as replication, migration, and checkpointing. Satisfying application QoS in a dynamic environment implies the dynamic customization of the underlying management mechanisms to meet QoS requirements. The safe “composability,” or simultaneous operation, of the executing middleware entities is a prime concern. Fundamental problems arise in the concurrent execution of multiple distributed resource management services and protocols; further complications arise in the dynamic customization of these services and protocols. The changing, often complex, interactions among distributed policies and services within the middleware layer can violate correctness, destroy validity, and alter the semantics of applications built above generic distributed management infrastructures. Much of the need to ensure safe interactions between middleware services has been ignored in existing commercial frameworks and distributed middleware infrastructures. Frameworks like the Object Management Group’s Common Object Request Broker (CORBA) and Microsoft’s Distributed Component Object Model (DCOM) represent a step toward compositional software architectures but do not deal with the interactions of multiple object services executing at the same time or with the implication of having to compose object services. This article explores principles and practices for developing safe customizable middleware, specifiLook to composable middleware frameworks to ensure safe middleware interactions for ubiquitous computing applications. Safe ‘Composability’ of Middleware Services Nalini Venkatasubramanian

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Implementation of a Safe, Reflective Middleware Framework

With the rapid evolution of the global information infrastructure and ubiquitous computing environments, service providers will need to provide effective and adaptive resource management mechanisms that can serve concurrent applications in the presence of changing system conditions. Flexible, scalable and customizable middleware can be used as enabling technology for next generation systems tha...

متن کامل

Designing Predictable Multicore Architectures for Avionics and Automotive Systems

This paper deals with architectures and their design principles for embedded control systems as they are used in the automotive and aeronautics industries. Growing software complexity in the embedded domain has led to the development of standardized frameworks which focus on composing components, possibly developed by different suppliers, on Electronic Control Units (ECUs). Examples are AUTOSAR...

متن کامل

Composability in quantum cryptography

If we combine two secure cryptographic systems, is the resulting system still secure? Answering this question is highly nontrivial and has recently sparked a considerable research effort, in particular, in the area of classical cryptography. A central insight was that the answer to the question is yes, but only within a well-specified composability framework and for carefully chosen security de...

متن کامل

The Re-entrance Problem and Its Solution

In this paper we take a formal look at the nature of the re-entrance problem. We see the essence of the problem in a conflict between the assumptions components make about each other’s behavior. We argue that to ensure safe composability of mutually dependent components in an open system one needs to reason about them modularly. We propose an approach for extending component specifications with...

متن کامل

Safe and Reliable Interoperability of Medical Devices using Data-Dependent Controller Synthesis

In the medical sector, there is a high demand for innovative methods to ensure a vendor independent, safe, and reliable communication between heterogeneous medical devices when patients should be provided with the highest possible level of care. Due to the increasing amount of medical devices that should interact, the complexity of such systems grows continuously. To accommodate this trend and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002